/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | ntp_signd.c | 30 connect to a unix domain socket 50 if (connect(fd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
|
/freebsd-13-stable/contrib/ntp/sntp/libevent/test/ |
H A D | bench_httpclient.c | 153 if (connect(sock, (struct sockaddr*)&sin, sizeof(sin)) < 0) {
|
/freebsd-13-stable/crypto/openssh/ |
H A D | entropy.c | 123 if (connect(fd, (struct sockaddr*)&addr, addr_len) == -1) { 125 error("Couldn't connect to PRNGD port %d: %s", 128 error("Couldn't connect to PRNGD socket \"%s\": %s",
|
/freebsd-13-stable/crypto/openssl/crypto/bio/ |
H A D | b_sock2.c | 70 * BIO_connect - connect to an address 71 * @sock: the socket to connect with 72 * @addr: the address to connect to 119 if (connect(sock, BIO_ADDR_sockaddr(addr), 200 * then check both for new clients that connect to it. You want to set up
|
/freebsd-13-stable/usr.sbin/ppp/ |
H A D | tcp.c | 92 if (connect(sock, (struct sockaddr *)&dest, sizeof dest) < 0) { 93 log_Printf(LogWARN, "%s: connect: %s\n", name, strerror(errno));
|
/freebsd-13-stable/tools/tools/netrate/netblast/ |
H A D | netblast.c | 202 if (connect(s, res->ai_addr, res->ai_addrlen) < 0) { 203 cause = "connect";
|
/freebsd-13-stable/usr.bin/finger/ |
H A D | net.c | 146 if (connect(s, ai->ai_addr, ai->ai_addrlen) < 0) { 147 warn("connect");
|
/freebsd-13-stable/tests/sys/kern/ |
H A D | sonewconn_overflow.py | 59 s.connect(self.addr)
|
/freebsd-13-stable/tools/regression/netinet/tcpsockclosebeforeaccept/ |
H A D | tcpsockclosebeforeaccept.c | 139 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) { 143 err(-1, "connect");
|
/freebsd-13-stable/tools/regression/netinet/tcpsocktimewait/ |
H A D | tcpsocktimewait.c | 91 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) { 95 err(-1, "connect");
|
/freebsd-13-stable/tools/regression/netinet/tcpstream/ |
H A D | tcpstream.c | 96 if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) == -1) 97 errx(-1, "connect: %s", strerror(errno));
|
/freebsd-13-stable/tools/regression/security/cap_test/ |
H A D | cap_test_capmode.c | 96 CHECK_CAPMODE(connect, PF_INET, NULL, 0);
|
/freebsd-13-stable/tools/regression/sockets/accept_fd_leak/ |
H A D | accept_fd_leak.c | 168 if (connect(s, (struct sockaddr *)&sin, 170 errx(-1, "connect: %s", strerror(errno));
|
/freebsd-13-stable/tools/regression/sockets/udp_pingpong/ |
H A D | udp_pingpong.c | 255 if (connect(tcp->fds[0], (struct sockaddr *)&tcp->sin[1], af_len) < 0) 256 err(1, "%s: setup_udp: connect(%s, %d)", tcp->name, 258 if (connect(tcp->fds[1], (struct sockaddr *)&tcp->sin[0], af_len) < 0) 259 err(1, "%s: setup_udp: connect(%s, %d)", tcp->name, 300 if (connect(tcp->fds[0], (struct sockaddr *)&tcp->sin[1], af_len) < 0) 301 err(1, "%s: setup_udp: connect(%s, %d)", tcp->name, 304 if (connect(tcp->fds[1], (struct sockaddr *)&tcp->sin[0], af_len) < 0) 305 err(1, "%s: setup_udp: connect(%s, %d)", tcp->name,
|
/freebsd-13-stable/contrib/ipfilter/samples/ |
H A D | proxy.c | 117 syslog(LOG_DAEMON|LOG_INFO, "connect to %s,%d", 119 printf("connect to %s,%d\n", 166 (void) connect(ofd, (struct sockaddr *)&usin, sizeof(usin)); 223 if (connect(ofd, (struct sockaddr *)&usin, sizeof(usin))) 224 perror("connect");
|
/freebsd-13-stable/contrib/pf/tftp-proxy/ |
H A D | tftp-proxy.c | 199 if (connect(peer, (struct sockaddr *)&from, from.ss_len) < 0) { 200 syslog(LOG_ERR, "connect: %m"); 246 if (connect(out_fd, (struct sockaddr *)&server, 248 syslog(LOG_ERR, "couldn't connect to remote server: %m");
|
/freebsd-13-stable/sys/contrib/ngatm/netnatm/sig/ |
H A D | unidef.h | 323 struct uni_connect connect; member in struct:uniapi_setup_response 326 struct uni_connect connect; member in struct:uniapi_setup_confirm
|
/freebsd-13-stable/share/examples/netgraph/ |
H A D | virtual.chain | 166 # for future use; you will connect this interface to the other 172 # for future use; you will connect this interface to the other 178 # ngctl connect INTERFACE1: INTERFACE2: ether ether. 181 ngctl connect ${PEER1_INTERFACE}: ${PEER2_INTERFACE}: ether ether \
|
/freebsd-13-stable/tools/tools/netrate/netsend/ |
H A D | netsend.c | 135 * If the two ports are the same we connect() the socket upfront, which 194 if (connect(a->s, (struct sockaddr *)&a->sin6, sizeof(a->sin6))) { 195 perror("connect (ipv6)"); 199 if (connect(a->s, (struct sockaddr *)&a->sin, sizeof(a->sin))) { 200 perror("connect (ipv4)");
|
/freebsd-13-stable/tests/sys/audit/ |
H A D | network.c | 420 "connect(2) call"); 436 "connect.*0x%x.*%s.*success", sockfd2, SERVER_PATH); 439 ATF_REQUIRE_EQ(0, connect(sockfd2, (struct sockaddr *)&server, len)); 456 "connect(2) call"); 464 "connect.*%s.*return,failure", SERVER_PATH); 468 ATF_REQUIRE_EQ(-1, connect(-1, (struct sockaddr *)&server, len)); 557 ATF_REQUIRE_EQ(0, connect(sockfd2, (struct sockaddr *)&server, len)); 614 /* Set up "blocking" client and connect with non-blocking server */ 616 ATF_REQUIRE_EQ(0, connect(sockfd2, (struct sockaddr *)&server, len)); 676 /* Set up "blocking" client and connect wit [all...] |
/freebsd-13-stable/contrib/llvm-project/llvm/include/llvm/Analysis/ |
H A D | DDG.h | 376 Graph.connect(Src, Tgt, *E); 382 Graph.connect(Src, Tgt, *E); 389 Graph.connect(Src, Tgt, *E);
|
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | Makefile.am | 29 kdc_SOURCES = connect.c \
|
/freebsd-13-stable/sys/dev/mlx5/mlx5_fpga/ |
H A D | mlx5fpga_sdk.c | 497 enum mlx5_fpga_connect *connect) 515 err = mlx5_fpga_ctrl_connect(fdev->mdev, connect); 517 mlx5_fpga_err(fdev, "Failed to connect/disconnect: %d\n", err); 496 mlx5_fpga_connectdisconnect(struct mlx5_fpga_device *fdev, enum mlx5_fpga_connect *connect) argument
|
/freebsd-13-stable/sys/sys/ |
H A D | syscall.mk | 81 connect.o \
|
/freebsd-13-stable/tools/tools/netrate/juggle/ |
H A D | juggle.c | 136 if (connect(sock1, (struct sockaddr *) &sin2, sizeof(sin2)) < 0) { 142 if (connect(sock2, (struct sockaddr *) &sin1, sizeof(sin1)) < 0) {
|