/freebsd-current/tools/regression/netinet/tcpdrop/ |
H A D | tcpdrop.c | 123 int error, sock; local 130 sock = socket(PF_INET, SOCK_STREAM, 0); 131 if (sock < 0) { 144 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) { 152 if (getsockname(sock, (struct sockaddr *)&sin_local, &slen) < 0) { 165 len = send(sock, &ch, sizeof(ch), MSG_NOSIGNAL); 187 len = send(sock, &ch, sizeof(ch), MSG_NOSIGNAL); 197 close(sock);
|
/freebsd-current/contrib/libevent/ |
H A D | log-internal.h | 62 void event_sock_err(int eval, evutil_socket_t sock, const char *fmt, ...) EV_CHECK_FMT(3,4) EV_NORETURN; 64 void event_sock_warn(evutil_socket_t sock, const char *fmt, ...) EV_CHECK_FMT(2,3);
|
/freebsd-current/lib/libc/rpc/ |
H A D | pmap_getmaps.c | 71 int sock = -1; local 81 PMAPVERS, &sock, 50, 500);
|
H A D | pmap_getport.c | 68 int sock = -1; local 76 PMAPVERS, timeout, &sock, RPCSMALLMSGSIZE, RPCSMALLMSGSIZE);
|
/freebsd-current/usr.sbin/nfscbd/ |
H A D | nfscbd.c | 102 int nfssvc_flag, on, sock, tcpsock, ret, mustfreeai = 0; local 218 if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { 227 ret = bind(sock, (struct sockaddr *)&inetaddr, sizeof(inetaddr)); 231 if (getsockname(sock, (struct sockaddr *)&inetaddr, &len) < 0){ 240 nfscbdargs.sock = sock; 248 (void)close(sock); 307 nfscbdargs.sock = msgsock;
|
/freebsd-current/crypto/openssl/Configurations/ |
H A D | 50-cppbuilder.conf | 43 push @ex_libs, "ws2_32.lib" unless $disabled{sock};
|
/freebsd-current/usr.sbin/rpc.ypupdated/ |
H A D | ypupdated_main.c | 192 int sock; local 225 sock = 0; 236 sock = RPC_ANYSOCK; 241 transp = svcudp_create(sock); 255 transp = svctcp_create(sock, 0, 0);
|
/freebsd-current/usr.sbin/bsnmpd/modules/snmp_bridge/ |
H A D | bridge_sys.c | 63 int sock = -1; variable 68 if ((sock = socket(PF_INET, SOCK_DGRAM, 0)) < 0) { 145 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 155 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 166 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 175 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 184 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 193 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 202 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) { 231 if (ioctl(sock, SIOCGDRVSPE [all...] |
/freebsd-current/tools/test/stress2/misc/ |
H A D | sendfile26.sh | 63 int fd, sock, ret; 68 sock = socket(AF_INET, SOCK_STREAM, 0); 69 if (sock < 0) { 78 ret = connect(sock, (struct sockaddr *)&sa, sizeof(sa)); 81 close(sock); 89 close(sock); 101 ret = sendfile(fd, sock, cursor, to_send, 109 ret = sendfile(fd, sock, cursor, &sbytes, NULL, 0); 127 close(sock);
|
/freebsd-current/crypto/heimdal/appl/kf/ |
H A D | kf.c | 120 * forward creds to `hostname'/`service' over `sock' 125 proto (int sock, const char *hostname, const char *service, argument 147 &sock); 167 &sock, 189 status = krb5_write_priv_message(context, auth_context, &sock, &data_send); 197 status = krb5_write_priv_message(context, auth_context, &sock, &data_send); 254 status = krb5_write_priv_message(context, auth_context, &sock, &data); 264 status = krb5_read_priv_message(context, auth_context, &sock, &data);
|
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | port-net.c | 213 int fd = -1, sock; local 268 if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) == -1) 271 if (ioctl(sock, SIOCGIFFLAGS, &ifr) == -1) 275 if (ioctl(sock, SIOCSIFFLAGS, &ifr) == -1) 282 close(sock); 288 if (sock >= 0) 289 close(sock);
|
/freebsd-current/lib/libcasper/libcasper/ |
H A D | libcasper_service.c | 228 int sock, maxfd, ret; local 249 sock = service_connection_get_sock(sconn); 250 FD_SET(sock, &fds); 251 maxfd = sock > maxfd ? sock : maxfd; 281 sock = service_connection_get_sock(sconn); 282 if (FD_ISSET(sock, &fds)) {
|
/freebsd-current/stand/common/ |
H A D | dev_net.c | 44 * RPC/mountd - nfs_mount(sock, ip, path) 83 static int net_getparams(int sock); 257 net_getparams(int sock) argument 270 bootp(sock); 283 if (rarp_getipaddress(sock)) { 290 if (bp_whoami(sock)) { 305 if (bp_getfile(sock, "gateway", &gateip, buf) == 0) { 323 if (bp_getfile(sock, "root", &rootip, rootpath)) {
|
/freebsd-current/crypto/openssh/ |
H A D | nchan.c | 381 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", 382 c->self, c->istate, c->ostate, c->sock, c->wfd, c->efd, 384 if (c->sock != -1) { 385 if (shutdown(c->sock, SHUT_WR) == -1) { 387 "fd %d [i%d o%d]: %.100s", c->self, c->sock, 404 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", 405 c->self, c->istate, c->ostate, c->sock, c->rfd, c->efd, 407 if (c->sock != -1) { 409 * shutdown(sock, SHUT_READ) may return ENOTCONN if the 413 if (shutdown(c->sock, SHUT_R [all...] |
H A D | srclimit.c | 64 srclimit_check_allow(int sock, int id) argument 76 debug("%s: sock %d id %d limit %d", __func__, sock, id, max_persource); 77 if (getpeername(sock, sa, &addrlen) != 0)
|
H A D | monitor.c | 568 mm_answer_moduli(struct ssh *ssh, int sock, struct sshbuf *m) argument 602 mm_request_send(sock, MONITOR_ANS_MODULI, m); 608 mm_answer_sign(struct ssh *ssh, int sock, struct sshbuf *m) argument 695 mm_request_send(sock, MONITOR_ANS_SIGN, m); 712 mm_answer_pwnamallow(struct ssh *ssh, int sock, struct sshbuf *m) argument 799 mm_request_send(sock, MONITOR_ANS_PWNAM, m); 813 int mm_answer_auth2_read_banner(struct ssh *ssh, int sock, struct sshbuf *m) argument 822 mm_request_send(sock, MONITOR_ANS_AUTH2_READ_BANNER, m); 829 mm_answer_authserv(struct ssh *ssh, int sock, struct sshbuf *m) argument 878 mm_answer_authpassword(struct ssh *ssh, int sock, struc argument 918 mm_answer_bsdauthquery(struct ssh *ssh, int sock, struct sshbuf *m) argument 952 mm_answer_bsdauthrespond(struct ssh *ssh, int sock, struct sshbuf *m) argument 986 mm_answer_pam_start(struct ssh *ssh, int sock, struct sshbuf *m) argument 1001 mm_answer_pam_account(struct ssh *ssh, int sock, struct sshbuf *m) argument 1024 mm_answer_pam_init_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument 1049 mm_answer_pam_query(struct ssh *ssh, int sock, struct sshbuf *m) argument 1090 mm_answer_pam_respond(struct ssh *ssh, int sock, struct sshbuf *m) argument 1132 mm_answer_pam_free_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument 1152 mm_answer_keyallowed(struct ssh *ssh, int sock, struct sshbuf *m) argument 1394 mm_answer_keyverify(struct ssh *ssh, int sock, struct sshbuf *m) argument 1547 mm_answer_pty(struct ssh *ssh, int sock, struct sshbuf *m) argument 1617 mm_answer_pty_cleanup(struct ssh *ssh, int sock, struct sshbuf *m) argument 1635 mm_answer_term(struct ssh *ssh, int sock, struct sshbuf *req) argument 1832 mm_answer_gss_setup_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument 1865 mm_answer_gss_accept_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument 1899 mm_answer_gss_checkmic(struct ssh *ssh, int sock, struct sshbuf *m) argument 1930 mm_answer_gss_userok(struct ssh *ssh, int sock, struct sshbuf *m) argument [all...] |
/freebsd-current/contrib/netbsd-tests/dev/raidframe/ |
H A D | t_raid.sh | 60 export RUMP_SERVER=unix://sock 71 export RUMP_SERVER=unix://sock 89 export RUMP_SERVER=unix://sock 122 export RUMP_SERVER=unix://sock 139 export RUMP_SERVER=unix://sock 162 export RUMP_SERVER=unix://sock 177 export RUMP_SERVER=unix://sock 211 export RUMP_SERVER=unix://sock 226 export RUMP_SERVER=unix://sock 261 export RUMP_SERVER=unix://sock [all...] |
/freebsd-current/contrib/ofed/librdmacm/ |
H A D | acm.c | 114 static int sock = -1; variable 145 sock = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, IPPROTO_TCP); 146 if (sock < 0) 153 ret = connect(sock, (struct sockaddr *) &addr, sizeof(addr)); 155 close(sock); 156 sock = -1; 166 if (sock >= 0) { 167 shutdown(sock, SHUT_RDWR); 168 close(sock); 374 if (sock < [all...] |
/freebsd-current/contrib/ntp/sntp/libevent/test/ |
H A D | bench_cascade.c | 70 evutil_socket_t sock = (evutil_socket_t)(ev_intptr_t)arg; local 73 if (sock >= 0) { 74 if (send(sock, "e", 1, 0) < 0)
|
/freebsd-current/contrib/libevent/test/ |
H A D | bench_cascade.c | 70 evutil_socket_t sock = (evutil_socket_t)(ev_intptr_t)arg; local 73 if (sock >= 0) { 74 if (send(sock, "e", 1, 0) < 0)
|
/freebsd-current/usr.sbin/ypset/ |
H A D | ypset.c | 64 int sock, port, r; local 88 sock = RPC_ANYSOCK; 89 client = clntudp_create(sin, YPBINDPROG, YPBINDVERS, tv, &sock);
|
/freebsd-current/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tls.c | 444 tls_call_exec_client(struct proto_conn *sock, const char *srcaddr, argument 451 proto_recv(sock, NULL, 0); 458 if (proto_descriptor(sock) != startfd) { 460 if (dup2(proto_descriptor(sock), startfd) == -1) 462 proto_close(sock); 495 struct proto_conn *sock; local 509 if (proto_connect(NULL, "socketpair://", -1, &sock) == -1) 529 proto_close(sock); 537 tls_call_exec_client(sock, srcaddr, dstaddr, timeout); 544 proto_close(sock); 712 tls_call_exec_server(struct proto_conn *sock, struct proto_conn *tcp) argument 778 struct proto_conn *sock, *tcp; local 850 struct proto_conn *sock; local [all...] |
/freebsd-current/contrib/wpa/src/utils/ |
H A D | eloop_win.c | 18 int sock; member in struct:eloop_sock 113 int eloop_register_read_sock(int sock, eloop_sock_handler handler, argument 128 if (WSAEventSelect(sock, event, FD_READ)) { 136 WSAEventSelect(sock, event, 0); 141 tmp[eloop.reader_count].sock = sock; 148 if (sock > eloop.max_sock) 149 eloop.max_sock = sock; 156 void eloop_unregister_read_sock(int sock) argument 164 if (eloop.readers[i].sock 675 eloop_wait_for_read_sock(int sock) argument [all...] |
/freebsd-current/contrib/sendmail/libmilter/ |
H A D | listener.c | 128 socket_t sock; local 446 sock = socket(addr.sa.sa_family, SOCK_STREAM, 0); 447 if (!ValidSocket(sock)) 455 if ((fdflags = fcntl(sock, F_GETFD, 0)) == -1 || 456 fcntl(sock, F_SETFD, fdflags | FD_CLOEXEC) == -1) 461 (void) closesocket(sock); 469 setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &sockopt, 475 (void) closesocket(sock); 491 (void) closesocket(sock); 500 (void) closesocket(sock); [all...] |
/freebsd-current/contrib/wpa/src/common/ |
H A D | ctrl_iface_common.c | 77 void sockaddr_print(int level, const char *msg, struct sockaddr_storage *sock, argument 80 switch (sock->ss_family) { 88 getnameinfo((struct sockaddr *) sock, socklen, 103 (u8 *) ((struct sockaddr_un *) sock)->sun_path,
|