Searched refs:sock (Results 76 - 100 of 285) sorted by relevance

1234567891011>>

/freebsd-10.1-release/sbin/dhclient/
H A Dprivsep.h50 ssize_t buf_read(int sock, void *, size_t);
/freebsd-10.1-release/tools/regression/netinet/arphold/
H A Darphold.c64 int sock; local
85 if ((sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
116 if (sendto(sock, message, sizeof(message), 0,
143 if (sendto(sock, message, sizeof(message), 0,
/freebsd-10.1-release/usr.sbin/rtadvd/
H A Dif.h40 extern struct sockinfo sock;
/freebsd-10.1-release/crypto/heimdal/appl/test/
H A Dgssapi_client.c42 do_trans (int sock, gss_ctx_id_t context_hdl) argument
62 write_token (sock, input_token);
63 write_token (sock, output_token);
80 write_token (sock, output_token);
92 write_token (sock, output_token);
100 proto (int sock, const char *hostname, const char *service) argument
156 if (getsockname (sock, (struct sockaddr *)&local, &addrlen) < 0
161 if (getpeername (sock, (struct sockaddr *)&remote, &addrlen) < 0
214 write_token (sock, output_token);
223 read_token (sock, input_toke
[all...]
/freebsd-10.1-release/contrib/pf/pflogd/
H A Dprivsep_fdpass.c50 send_fd(int sock, int fd) argument
81 if ((n = sendmsg(sock, &msg, 0)) == -1)
82 warn("%s: sendmsg(%d)", __func__, sock);
89 receive_fd(int sock) argument
110 if ((n = recvmsg(sock, &msg, 0)) == -1)
/freebsd-10.1-release/tools/tools/mcgrab/
H A Dmcgrab.cc94 int sock; local
105 if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
115 if (ioctl(sock, SIOCGIFADDR, &ifreq) < 0) {
125 if (setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq,
132 if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_IF,
/freebsd-10.1-release/tools/tools/mctest/
H A Dmctest.cc100 int sock, backchan; local
114 if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
125 if (ioctl(sock, SIOCGIFADDR, &ifreq) < 0) {
135 if (setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq,
141 if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_IF,
153 if (bind(sock, (struct sockaddr *)&local, sizeof(local)) < 0) {
167 if (setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &timeout,
173 if (recvfrom(sock, packet, pkt_size, 0, (struct sockaddr *)&recvd,
238 int sock, n =0; local
246 if ((sock
302 int sock; local
[all...]
/freebsd-10.1-release/contrib/subversion/subversion/libsvn_ra_svn/
H A Dstreams.c47 apr_socket_t *sock;
143 status = apr_socket_timeout_get(b->sock, &interval);
153 apr_socket_timeout_set(b->sock, -1);
154 status = apr_socket_recv(b->sock, buffer, len);
155 apr_socket_timeout_set(b->sock, interval);
169 apr_status_t status = apr_socket_send(b->sock, buffer, len);
180 apr_socket_timeout_set(b->sock, interval);
191 pfd.desc.s = b->sock;
197 svn_ra_svn__stream_from_sock(apr_socket_t *sock,
202 b->sock
46 apr_socket_t *sock; member in struct:sock_baton_t
196 svn_ra_svn__stream_from_sock(apr_socket_t *sock, apr_pool_t *pool) argument
[all...]
/freebsd-10.1-release/crypto/heimdal/kdc/
H A Dhpropd.c78 krb5_socket_t sock = rk_INVALID_SOCKET; local
119 sock = STDIN_FILENO;
128 sock = STDIN_FILENO;
131 if (getpeername (sock, sa, &sin_len) < 0) {
142 HPROP_PORT), &sock);
145 if(getpeername(sock, sa, &sin_len) < 0)
171 ret = krb5_recvauth(context, &ac, &sock, HPROP_VERSION, NULL,
226 ret = krb5_read_message(context, &sock, &data);
230 ret = krb5_read_priv_message(context, ac, &sock, &data);
239 krb5_write_priv_message(context, ac, &sock,
[all...]
/freebsd-10.1-release/crypto/openssl/apps/
H A Ds_socket.c109 static int init_client_ip(int *sock, unsigned char ip[4], int port, int type);
110 static int init_server(int *sock, int port, int type);
111 static int init_server_long(int *sock, int port, char *ip, int type);
112 static int do_accept(int acc_sock, int *sock, char **host);
234 int init_client(int *sock, char *host, int port, int type) argument
241 return init_client_ip(sock, ip, port, type);
244 static int init_client_ip(int *sock, unsigned char ip[4], int port, int type) argument
288 *sock = s;
296 int sock; local
310 if (do_accept(accept_socket, &sock,
328 init_server_long(int *sock, int port, char *ip, int type) argument
381 init_server(int *sock, int port, int type) argument
386 do_accept(int acc_sock, int *sock, char **host) argument
[all...]
/freebsd-10.1-release/sys/compat/svr4/
H A Dsvr4_socket.c73 struct sockaddr_un sock;/* Pathname for the socket */ member in struct:svr4_sockcache_entry
105 DPRINTF(("%s\n", e->sock.sun_path));
106 *saun = e->sock;
132 if ((error = copyinstr(path, e->sock.sun_path,
133 sizeof(e->sock.sun_path), &len)) != 0) {
139 e->sock.sun_family = AF_LOCAL;
140 e->sock.sun_len = len;
145 DPRINTF(("svr4_add_socket: %s [%p,%d,%d]\n", e->sock.sun_path,
164 e->sock.sun_path, p, (int)e->dev, e->ino));
183 e->sock
[all...]
/freebsd-10.1-release/tools/tools/netrate/http/
H A Dhttp.c96 int sock; local
98 sock = socket(PF_INET, SOCK_STREAM, 0);
99 if (sock < 0) {
107 if (connect(sock, (struct sockaddr *)sin, sizeof(*sin)) < 0) {
110 close(sock);
120 len = send(sock, buffer, strlen(buffer), 0);
124 close(sock);
136 len = recv(sock, buffer, BUFFER, 0);
140 close(sock);
147 close(sock);
[all...]
/freebsd-10.1-release/usr.sbin/ypbind/
H A Dyp_ping.c117 int sock = -1; local
124 PMAPVERS, timeout, &sock, RPCSMALLMSGSIZE, RPCSMALLMSGSIZE);
141 if (sock != -1)
142 (void)close(sock);
223 int sock, dontblock = 1; local
256 sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
257 clnt = clntudp_create(any, YPPROG, YPVERS, tv, &sock);
259 close(sock);
272 ioctl(sock, FIONBIO, &dontblock);
300 close(sock);
[all...]
/freebsd-10.1-release/contrib/wpa/src/utils/
H A Deloop_none.c16 int sock; member in struct:eloop_sock
19 void (*handler)(int sock, void *eloop_ctx, void *sock_ctx);
62 int eloop_register_read_sock(int sock, argument
63 void (*handler)(int sock, void *eloop_ctx,
75 tmp[eloop.reader_count].sock = sock;
81 if (sock > eloop.max_sock)
82 eloop.max_sock = sock;
89 void eloop_unregister_read_sock(int sock) argument
97 if (eloop.readers[i].sock
389 eloop_wait_for_read_sock(int sock) argument
[all...]
/freebsd-10.1-release/crypto/heimdal/lib/krb5/
H A Dchangepw.c73 rk_socket_t sock,
142 if (rk_IS_SOCKET_ERROR( sendmsg (sock, &msghdr, 0) )) {
165 rk_socket_t sock,
252 if (rk_IS_SOCKET_ERROR( sendmsg (sock, &msghdr, 0) )) {
269 rk_socket_t sock,
287 ret = recvfrom (sock, reply + len, sizeof(reply) - len,
316 ret = recvfrom (sock, reply, sizeof(reply), 0, NULL, NULL);
518 rk_socket_t sock; local
565 sock = socket (a->ai_family, a->ai_socktype | SOCK_CLOEXEC, a->ai_protocol);
566 if (rk_IS_BAD_SOCKET(sock))
68 chgpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument
160 setpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument
266 process_reply(krb5_context context, krb5_auth_context auth_context, int is_stream, rk_socket_t sock, int *result_code, krb5_data *result_code_string, krb5_data *result_string, const char *host) argument
[all...]
/freebsd-10.1-release/contrib/tcp_wrappers/
H A Dworkarounds.c125 int fix_recvfrom(sock, buf, buflen, flags, from, fromlen)
126 int sock;
137 if ((ret = recvfrom(sock, buf, buflen, flags, from, fromlen)) >= 0) {
165 int fix_getpeername(sock, sa, len)
166 int sock;
177 if ((ret = getpeername(sock, sa, len)) >= 0
/freebsd-10.1-release/crypto/openssh/
H A Dmonitor_fdpass.c47 mm_send_fd(int sock, int fd) argument
82 pfd.fd = sock;
84 while ((n = sendmsg(sock, &msg, 0)) == -1 &&
108 mm_receive_fd(int sock) argument
138 pfd.fd = sock;
140 while ((n = recvmsg(sock, &msg, 0)) == -1 &&
H A Dmonitor.c634 mm_answer_moduli(int sock, Buffer *m) argument
664 mm_request_send(sock, MONITOR_ANS_MODULI, m);
671 mm_answer_sign(int sock, Buffer *m) argument
717 mm_request_send(sock, MONITOR_ANS_SIGN, m);
728 mm_answer_pwnamallow(int sock, Buffer *m) argument
800 mm_request_send(sock, MONITOR_ANS_PWNAM, m);
818 int mm_answer_auth2_read_banner(int sock, Buffer *m) argument
825 mm_request_send(sock, MONITOR_ANS_AUTH2_READ_BANNER, m);
832 mm_answer_authserv(int sock, Buffer *m) argument
850 mm_answer_authpassword(int sock, Buffe argument
882 mm_answer_bsdauthquery(int sock, Buffer *m) argument
912 mm_answer_bsdauthrespond(int sock, Buffer *m) argument
945 mm_answer_skeyquery(int sock, Buffer *m) argument
966 mm_answer_skeyrespond(int sock, Buffer *m) argument
994 mm_answer_pam_start(int sock, Buffer *m) argument
1007 mm_answer_pam_account(int sock, Buffer *m) argument
1028 mm_answer_pam_init_ctx(int sock, Buffer *m) argument
1045 mm_answer_pam_query(int sock, Buffer *m) argument
1079 mm_answer_pam_respond(int sock, Buffer *m) argument
1110 mm_answer_pam_free_ctx(int sock, Buffer *m) argument
1126 mm_answer_keyallowed(int sock, Buffer *m) argument
1340 mm_answer_keyverify(int sock, Buffer *m) argument
1432 mm_answer_pty(int sock, Buffer *m) argument
1499 mm_answer_pty_cleanup(int sock, Buffer *m) argument
1515 mm_answer_sesskey(int sock, Buffer *m) argument
1545 mm_answer_sessid(int sock, Buffer *m) argument
1563 mm_answer_rsa_keyallowed(int sock, Buffer *m) argument
1610 mm_answer_rsa_challenge(int sock, Buffer *m) argument
1648 mm_answer_rsa_response(int sock, Buffer *m) argument
1693 mm_answer_term(int sock, Buffer *req) argument
2038 mm_answer_gss_setup_ctx(int sock, Buffer *m) argument
2063 mm_answer_gss_accept_ctx(int sock, Buffer *m) argument
2093 mm_answer_gss_checkmic(int sock, Buffer *m) argument
2121 mm_answer_gss_userok(int sock, Buffer *m) argument
[all...]
/freebsd-10.1-release/tools/regression/netinet/tcpsockclosebeforeaccept/
H A Dtcpsockclosebeforeaccept.c120 int error, sock; local
125 sock = socket(PF_INET, SOCK_STREAM, 0);
126 if (sock < 0) {
139 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) {
147 if (getsockname(sock, (struct sockaddr *)&sin_local, &slen) < 0) {
163 close(sock);
/freebsd-10.1-release/tools/regression/netinet/tcpsocktimewait/
H A Dtcpsocktimewait.c73 int error, sock; local
77 sock = socket(PF_INET, SOCK_STREAM, 0);
78 if (sock < 0) {
91 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) {
98 if (shutdown(sock, SHUT_RDWR) < 0) {
106 close(sock);
/freebsd-10.1-release/tools/regression/netinet/tcpstream/
H A Dtcpstream.c88 int i, j, sock; local
92 sock = socket(PF_INET, SOCK_STREAM, 0);
93 if (sock == -1)
96 if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) == -1)
102 len = send(sock, buffer, i * sizeof(long), 0);
114 close(sock);
/freebsd-10.1-release/lib/libstand/
H A Dnetif.c281 socktodesc(sock)
282 int sock;
284 if (sock >= SOPEN_MAX) {
288 return (&sockets[sock]);
324 netif_close(sock)
325 int sock;
327 if (sock >= SOPEN_MAX) {
331 netif_detach(sockets[sock].io_netif);
332 sockets[sock].io_netif = (struct netif *)0;
/freebsd-10.1-release/usr.sbin/ppp/
H A Datm.c172 struct sockaddr_natm sock; local
180 sock.snatm_len = sizeof sock;
181 sock.snatm_family = AF_NATM;
182 strncpy(sock.snatm_if, iface, IFNAMSIZ);
183 sock.snatm_vpi = vpi;
184 sock.snatm_vci = vci;
193 if (connect(p->fd, (struct sockaddr *)&sock, sizeof sock) == 0)
/freebsd-10.1-release/usr.bin/procstat/
H A Dprocstat_files.c292 struct sockstat sock; local
469 error = procstat_get_socket_info(procstat, fst, &sock, NULL);
473 protocol_to_string(sock.dom_family,
474 sock.type, sock.proto));
482 if (sock.dom_family == AF_LOCAL) {
484 (struct sockaddr_un *)&sock.sa_local;
487 print_address(&sock.sa_local);
489 print_address(&sock.sa_peer);
491 print_address(&sock
[all...]
/freebsd-10.1-release/contrib/openbsm/bin/auditdistd/
H A Dproto_impl.h81 int proto_common_send(int sock, const unsigned char *data, size_t size, int fd);
82 int proto_common_recv(int sock, unsigned char *data, size_t size, int *fdp);

Completed in 315 milliseconds

1234567891011>>