Searched refs:sock (Results 126 - 150 of 359) sorted by relevance

1234567891011>>

/freebsd-current/tools/regression/netinet/tcpdrop/
H A Dtcpdrop.c123 int error, sock; local
130 sock = socket(PF_INET, SOCK_STREAM, 0);
131 if (sock < 0) {
144 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) {
152 if (getsockname(sock, (struct sockaddr *)&sin_local, &slen) < 0) {
165 len = send(sock, &ch, sizeof(ch), MSG_NOSIGNAL);
187 len = send(sock, &ch, sizeof(ch), MSG_NOSIGNAL);
197 close(sock);
/freebsd-current/contrib/libevent/
H A Dlog-internal.h62 void event_sock_err(int eval, evutil_socket_t sock, const char *fmt, ...) EV_CHECK_FMT(3,4) EV_NORETURN;
64 void event_sock_warn(evutil_socket_t sock, const char *fmt, ...) EV_CHECK_FMT(2,3);
/freebsd-current/lib/libc/rpc/
H A Dpmap_getmaps.c71 int sock = -1; local
81 PMAPVERS, &sock, 50, 500);
H A Dpmap_getport.c68 int sock = -1; local
76 PMAPVERS, timeout, &sock, RPCSMALLMSGSIZE, RPCSMALLMSGSIZE);
/freebsd-current/usr.sbin/nfscbd/
H A Dnfscbd.c102 int nfssvc_flag, on, sock, tcpsock, ret, mustfreeai = 0; local
218 if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
227 ret = bind(sock, (struct sockaddr *)&inetaddr, sizeof(inetaddr));
231 if (getsockname(sock, (struct sockaddr *)&inetaddr, &len) < 0){
240 nfscbdargs.sock = sock;
248 (void)close(sock);
307 nfscbdargs.sock = msgsock;
/freebsd-current/crypto/openssl/Configurations/
H A D50-cppbuilder.conf43 push @ex_libs, "ws2_32.lib" unless $disabled{sock};
/freebsd-current/usr.sbin/rpc.ypupdated/
H A Dypupdated_main.c192 int sock; local
225 sock = 0;
236 sock = RPC_ANYSOCK;
241 transp = svcudp_create(sock);
255 transp = svctcp_create(sock, 0, 0);
/freebsd-current/usr.sbin/bsnmpd/modules/snmp_bridge/
H A Dbridge_sys.c63 int sock = -1; variable
68 if ((sock = socket(PF_INET, SOCK_DGRAM, 0)) < 0) {
145 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
155 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
166 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
175 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
184 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
193 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
202 if (ioctl(sock, SIOCGDRVSPEC, &ifd) < 0) {
231 if (ioctl(sock, SIOCGDRVSPE
[all...]
/freebsd-current/tools/test/stress2/misc/
H A Dsendfile26.sh63 int fd, sock, ret;
68 sock = socket(AF_INET, SOCK_STREAM, 0);
69 if (sock < 0) {
78 ret = connect(sock, (struct sockaddr *)&sa, sizeof(sa));
81 close(sock);
89 close(sock);
101 ret = sendfile(fd, sock, cursor, to_send,
109 ret = sendfile(fd, sock, cursor, &sbytes, NULL, 0);
127 close(sock);
/freebsd-current/crypto/heimdal/appl/kf/
H A Dkf.c120 * forward creds to `hostname'/`service' over `sock'
125 proto (int sock, const char *hostname, const char *service, argument
147 &sock);
167 &sock,
189 status = krb5_write_priv_message(context, auth_context, &sock, &data_send);
197 status = krb5_write_priv_message(context, auth_context, &sock, &data_send);
254 status = krb5_write_priv_message(context, auth_context, &sock, &data);
264 status = krb5_read_priv_message(context, auth_context, &sock, &data);
/freebsd-current/crypto/openssh/openbsd-compat/
H A Dport-net.c213 int fd = -1, sock; local
268 if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) == -1)
271 if (ioctl(sock, SIOCGIFFLAGS, &ifr) == -1)
275 if (ioctl(sock, SIOCSIFFLAGS, &ifr) == -1)
282 close(sock);
288 if (sock >= 0)
289 close(sock);
/freebsd-current/lib/libcasper/libcasper/
H A Dlibcasper_service.c228 int sock, maxfd, ret; local
249 sock = service_connection_get_sock(sconn);
250 FD_SET(sock, &fds);
251 maxfd = sock > maxfd ? sock : maxfd;
281 sock = service_connection_get_sock(sconn);
282 if (FD_ISSET(sock, &fds)) {
/freebsd-current/stand/common/
H A Ddev_net.c44 * RPC/mountd - nfs_mount(sock, ip, path)
83 static int net_getparams(int sock);
257 net_getparams(int sock) argument
270 bootp(sock);
283 if (rarp_getipaddress(sock)) {
290 if (bp_whoami(sock)) {
305 if (bp_getfile(sock, "gateway", &gateip, buf) == 0) {
323 if (bp_getfile(sock, "root", &rootip, rootpath)) {
/freebsd-current/crypto/openssh/
H A Dnchan.c381 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])",
382 c->self, c->istate, c->ostate, c->sock, c->wfd, c->efd,
384 if (c->sock != -1) {
385 if (shutdown(c->sock, SHUT_WR) == -1) {
387 "fd %d [i%d o%d]: %.100s", c->self, c->sock,
404 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])",
405 c->self, c->istate, c->ostate, c->sock, c->rfd, c->efd,
407 if (c->sock != -1) {
409 * shutdown(sock, SHUT_READ) may return ENOTCONN if the
413 if (shutdown(c->sock, SHUT_R
[all...]
H A Dsrclimit.c64 srclimit_check_allow(int sock, int id) argument
76 debug("%s: sock %d id %d limit %d", __func__, sock, id, max_persource);
77 if (getpeername(sock, sa, &addrlen) != 0)
H A Dmonitor.c568 mm_answer_moduli(struct ssh *ssh, int sock, struct sshbuf *m) argument
602 mm_request_send(sock, MONITOR_ANS_MODULI, m);
608 mm_answer_sign(struct ssh *ssh, int sock, struct sshbuf *m) argument
695 mm_request_send(sock, MONITOR_ANS_SIGN, m);
712 mm_answer_pwnamallow(struct ssh *ssh, int sock, struct sshbuf *m) argument
799 mm_request_send(sock, MONITOR_ANS_PWNAM, m);
813 int mm_answer_auth2_read_banner(struct ssh *ssh, int sock, struct sshbuf *m) argument
822 mm_request_send(sock, MONITOR_ANS_AUTH2_READ_BANNER, m);
829 mm_answer_authserv(struct ssh *ssh, int sock, struct sshbuf *m) argument
878 mm_answer_authpassword(struct ssh *ssh, int sock, struc argument
918 mm_answer_bsdauthquery(struct ssh *ssh, int sock, struct sshbuf *m) argument
952 mm_answer_bsdauthrespond(struct ssh *ssh, int sock, struct sshbuf *m) argument
986 mm_answer_pam_start(struct ssh *ssh, int sock, struct sshbuf *m) argument
1001 mm_answer_pam_account(struct ssh *ssh, int sock, struct sshbuf *m) argument
1024 mm_answer_pam_init_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument
1049 mm_answer_pam_query(struct ssh *ssh, int sock, struct sshbuf *m) argument
1090 mm_answer_pam_respond(struct ssh *ssh, int sock, struct sshbuf *m) argument
1132 mm_answer_pam_free_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument
1152 mm_answer_keyallowed(struct ssh *ssh, int sock, struct sshbuf *m) argument
1394 mm_answer_keyverify(struct ssh *ssh, int sock, struct sshbuf *m) argument
1547 mm_answer_pty(struct ssh *ssh, int sock, struct sshbuf *m) argument
1617 mm_answer_pty_cleanup(struct ssh *ssh, int sock, struct sshbuf *m) argument
1635 mm_answer_term(struct ssh *ssh, int sock, struct sshbuf *req) argument
1832 mm_answer_gss_setup_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument
1865 mm_answer_gss_accept_ctx(struct ssh *ssh, int sock, struct sshbuf *m) argument
1899 mm_answer_gss_checkmic(struct ssh *ssh, int sock, struct sshbuf *m) argument
1930 mm_answer_gss_userok(struct ssh *ssh, int sock, struct sshbuf *m) argument
[all...]
/freebsd-current/contrib/netbsd-tests/dev/raidframe/
H A Dt_raid.sh60 export RUMP_SERVER=unix://sock
71 export RUMP_SERVER=unix://sock
89 export RUMP_SERVER=unix://sock
122 export RUMP_SERVER=unix://sock
139 export RUMP_SERVER=unix://sock
162 export RUMP_SERVER=unix://sock
177 export RUMP_SERVER=unix://sock
211 export RUMP_SERVER=unix://sock
226 export RUMP_SERVER=unix://sock
261 export RUMP_SERVER=unix://sock
[all...]
/freebsd-current/contrib/ofed/librdmacm/
H A Dacm.c114 static int sock = -1; variable
145 sock = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, IPPROTO_TCP);
146 if (sock < 0)
153 ret = connect(sock, (struct sockaddr *) &addr, sizeof(addr));
155 close(sock);
156 sock = -1;
166 if (sock >= 0) {
167 shutdown(sock, SHUT_RDWR);
168 close(sock);
374 if (sock <
[all...]
/freebsd-current/contrib/ntp/sntp/libevent/test/
H A Dbench_cascade.c70 evutil_socket_t sock = (evutil_socket_t)(ev_intptr_t)arg; local
73 if (sock >= 0) {
74 if (send(sock, "e", 1, 0) < 0)
/freebsd-current/contrib/libevent/test/
H A Dbench_cascade.c70 evutil_socket_t sock = (evutil_socket_t)(ev_intptr_t)arg; local
73 if (sock >= 0) {
74 if (send(sock, "e", 1, 0) < 0)
/freebsd-current/usr.sbin/ypset/
H A Dypset.c64 int sock, port, r; local
88 sock = RPC_ANYSOCK;
89 client = clntudp_create(sin, YPBINDPROG, YPBINDVERS, tv, &sock);
/freebsd-current/contrib/openbsm/bin/auditdistd/
H A Dproto_tls.c444 tls_call_exec_client(struct proto_conn *sock, const char *srcaddr, argument
451 proto_recv(sock, NULL, 0);
458 if (proto_descriptor(sock) != startfd) {
460 if (dup2(proto_descriptor(sock), startfd) == -1)
462 proto_close(sock);
495 struct proto_conn *sock; local
509 if (proto_connect(NULL, "socketpair://", -1, &sock) == -1)
529 proto_close(sock);
537 tls_call_exec_client(sock, srcaddr, dstaddr, timeout);
544 proto_close(sock);
712 tls_call_exec_server(struct proto_conn *sock, struct proto_conn *tcp) argument
778 struct proto_conn *sock, *tcp; local
850 struct proto_conn *sock; local
[all...]
/freebsd-current/contrib/wpa/src/utils/
H A Deloop_win.c18 int sock; member in struct:eloop_sock
113 int eloop_register_read_sock(int sock, eloop_sock_handler handler, argument
128 if (WSAEventSelect(sock, event, FD_READ)) {
136 WSAEventSelect(sock, event, 0);
141 tmp[eloop.reader_count].sock = sock;
148 if (sock > eloop.max_sock)
149 eloop.max_sock = sock;
156 void eloop_unregister_read_sock(int sock) argument
164 if (eloop.readers[i].sock
675 eloop_wait_for_read_sock(int sock) argument
[all...]
/freebsd-current/contrib/sendmail/libmilter/
H A Dlistener.c128 socket_t sock; local
446 sock = socket(addr.sa.sa_family, SOCK_STREAM, 0);
447 if (!ValidSocket(sock))
455 if ((fdflags = fcntl(sock, F_GETFD, 0)) == -1 ||
456 fcntl(sock, F_SETFD, fdflags | FD_CLOEXEC) == -1)
461 (void) closesocket(sock);
469 setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &sockopt,
475 (void) closesocket(sock);
491 (void) closesocket(sock);
500 (void) closesocket(sock);
[all...]
/freebsd-current/contrib/wpa/src/common/
H A Dctrl_iface_common.c77 void sockaddr_print(int level, const char *msg, struct sockaddr_storage *sock, argument
80 switch (sock->ss_family) {
88 getnameinfo((struct sockaddr *) sock, socklen,
103 (u8 *) ((struct sockaddr_un *) sock)->sun_path,

Completed in 324 milliseconds

1234567891011>>