/external/chromium_org/net/socket/ |
H A D | tcp_socket_libevent.cc | 47 bool SetTCPNoDelay(int fd, bool no_delay) { argument 49 int error = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &on, sizeof(on)); 54 bool SetTCPKeepAlive(int fd, bool enable, int delay) { argument 56 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof(on))) { 57 PLOG(ERROR) << "Failed to set SO_KEEPALIVE on fd: " << fd; 67 if (setsockopt(fd, SOL_TCP, TCP_KEEPIDLE, &delay, sizeof(delay))) { 68 PLOG(ERROR) << "Failed to set TCP_KEEPIDLE on fd: " << fd; 72 if (setsockopt(fd, SOL_TC [all...] |
H A D | unix_domain_listen_socket_posix.cc | 44 SocketDescriptor fd = CreatePlatformSocket(PF_UNIX, SOCK_STREAM, 0); local 45 if (fd == kInvalidSocket) 48 if (bind(fd, address.addr, address.addr_len) < 0) { 50 close(fd); 56 *socket_fd = fd;
|
/external/chromium_org/net/test/ |
H A D | openssl_helper.cc | 193 const int fd = accept(3, NULL, NULL); local 196 BIO* bio = BIO_new_socket(fd, 1 /* take ownership of fd */);
|
/external/chromium_org/net/test/spawned_test_server/ |
H A D | local_test_server_posix.cc | 63 bool ReadData(int fd, ssize_t bytes_max, uint8* buffer, argument 70 poll_fds[0].fd = fd; 91 ssize_t num_bytes = HANDLE_EINTR(read(fd, buffer + bytes_read,
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | prelib.c | 20 PEHeader *SSL_PreencryptedStreamToFile(PRFileDesc *fd, PEHeader *inHeader, argument 27 PEHeader *SSL_PreencryptedFileToStream(PRFileDesc *fd, PEHeader *header, argument
|
H A D | sslauth.c | 14 SSL_PeerCertificate(PRFileDesc *fd) argument 18 ss = ssl_FindSocket(fd); 21 SSL_GETPID(), fd)); 32 SSL_PeerCertificateChain(PRFileDesc *fd) argument 39 ss = ssl_FindSocket(fd); 42 SSL_GETPID(), fd)); 72 SSL_LocalCertificate(PRFileDesc *fd) argument 76 ss = ssl_FindSocket(fd); 79 SSL_GETPID(), fd)); 97 SSL_SecurityStatus(PRFileDesc *fd, in argument 220 SSL_SetClientChannelIDCallback(PRFileDesc *fd, SSLClientChannelIDCallback callback, void *arg) argument 282 SSL_AuthCertificate(void *arg, PRFileDesc *fd, PRBool checkSig, PRBool isServer) argument [all...] |
H A D | ssldef.c | 22 PRFileDesc *lower = ss->fd->lower; 31 PRFileDesc *lower = ss->fd->lower; 40 PRFileDesc *lower = ss->fd->lower; 49 PRFileDesc *lower = ss->fd->lower; 58 PRFileDesc *lower = ss->fd->lower; 81 PRFileDesc *lower = ss->fd->lower; 120 PRFileDesc *lower = ss->fd->lower; 133 PRFileDesc *lower = ss->fd->lower; 158 PRFileDesc *lower = ss->fd->lower; 167 PRFileDesc *lower = ss->fd 176 PRFileDesc *fd; local [all...] |
H A D | sslimpl.h | 1219 PRFileDesc * fd; member in struct:sslSocketStr 1492 extern PRBool ssl_FdIsBlocking(PRFileDesc *fd); 1634 extern sslSocket *ssl_FindSocket(PRFileDesc *fd); 1894 extern PRFileDesc *ssl_NewPRSocket(sslSocket *ss, PRFileDesc *fd); 1895 extern void ssl_FreePRSocket(PRFileDesc *fd); 2009 SECStatus SSL_DisableExportCipherSuites(PRFileDesc * fd);
|
H A D | sslinfo.c | 24 SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, PRUintn len) argument 35 ss = ssl_FindSocket(fd); 38 SSL_GETPID(), fd)); 267 SSL_DisableExportCipherSuites(PRFileDesc * fd) argument 275 rv = SSL_CipherPrefSet(fd, pInfo->cipherSuite, PR_FALSE); 298 SSL_GetNegotiatedHostInfo(PRFileDesc *fd) argument 304 ss = ssl_FindSocket(fd); 307 SSL_GETPID(), fd)); 324 name = SSL_RevealURL(fd); 338 SSL_ExportKeyingMaterial(PRFileDesc *fd, argument [all...] |
H A D | sslmutex.c | 78 setNonBlocking(int fd, int nonBlocking) argument 83 flags = fcntl(fd, F_GETFL, 0); 90 err = fcntl(fd, F_SETFL, flags);
|
H A D | sslreveal.c | 17 SSL_RevealCert(PRFileDesc * fd) argument 22 sslsocket = ssl_FindSocket(fd); 36 SSL_RevealPinArg(PRFileDesc * fd) argument 41 sslsocket = ssl_FindSocket(fd); 55 SSL_RevealURL(PRFileDesc * fd) argument 60 sslsocket = ssl_FindSocket(fd);
|
H A D | sslsecur.c | 133 SSL_TRC(3, ("%d: SSL[%d]: handshake is completed", SSL_GETPID(), ss->fd)); 141 (ss->handshakeCallback)(ss->fd, ss->handshakeCallbackData); 169 ssl_SetTimeout(PRFileDesc *fd, PRIntervalTime timeout) argument 173 ss = ssl_FindSocket(fd); 175 SSL_DBG(("%d: SSL[%d]: bad socket in SetTimeout", SSL_GETPID(), fd)); 262 SSL_ReHandshake(PRFileDesc *fd, PRBool flushCache) argument 267 ss = ssl_FindSocket(fd); 269 SSL_DBG(("%d: SSL[%d]: bad socket in RedoHandshake", SSL_GETPID(), fd)); 296 SSL_IMPORT SECStatus SSL_ReHandshakeWithTimeout(PRFileDesc *fd, argument 300 if (SECSuccess != ssl_SetTimeout(fd, timeou 307 SSL_RedoHandshake(PRFileDesc *fd) argument 316 SSL_HandshakeCallback(PRFileDesc *fd, SSLHandshakeCallback cb, void *client_data) argument 349 SSL_SetCanFalseStartCallback(PRFileDesc *fd, SSLCanFalseStartCallback cb, void *arg) argument 379 SSL_RecommendedCanFalseStart(PRFileDesc *fd, PRBool *canFalseStart) argument 421 SSL_ForceHandshake(PRFileDesc *fd) argument 480 SSL_ForceHandshakeWithTimeout(PRFileDesc *fd, PRIntervalTime timeout) argument 816 SSL_ConfigSecureServer(PRFileDesc *fd, CERTCertificate *cert, SECKEYPrivateKey *key, SSL3KEAType kea) argument 824 SSL_ConfigSecureServerWithCertChain(PRFileDesc *fd, CERTCertificate *cert, const CERTCertificateList *certChainOpt, SECKEYPrivateKey *key, SSL3KEAType kea) argument 1344 SSL_BadCertHook(PRFileDesc *fd, SSLBadCertHandler f, void *arg) argument 1367 SSL_SetURL(PRFileDesc *fd, const char *url) argument 1399 SSL_SetTrustAnchors(PRFileDesc *fd, CERTCertList *certList) argument 1435 SSL_DataPending(PRFileDesc *fd) argument 1452 SSL_InvalidateSession(PRFileDesc *fd) argument 1484 SSL_CacheSession(PRFileDesc *fd) argument 1503 SSL_CacheSessionUnlocked(PRFileDesc *fd) argument 1516 SSL_GetSessionID(PRFileDesc *fd) argument 1549 SSL_CertDBHandleSet(PRFileDesc *fd, CERTCertDBHandle *dbHandle) argument 1591 SSL_RestartHandshakeAfterCertReq(PRFileDesc * fd, CERTCertificate * cert, SECKEYPrivateKey * key, CERTCertificateList *certChain) argument 1631 SSL_RestartHandshakeAfterChannelIDReq(PRFileDesc * fd, SECKEYPublicKey * channelIDPub, SECKEYPrivateKey *channelID) argument 1678 SSL_AuthCertificateComplete(PRFileDesc *fd, PRErrorCode error) argument 1708 SSL_SNISocketConfigHook(PRFileDesc *fd, SSLSNISocketConfig func, void *arg) argument [all...] |
H A D | sslsock.c | 151 ssl_GetPrivate(PRFileDesc *fd) argument 155 PORT_Assert(fd != NULL); 156 PORT_Assert(fd->methods->file_type == PR_DESC_LAYERED); 157 PORT_Assert(fd->identity == ssl_layer_id); 159 if (fd->methods->file_type != PR_DESC_LAYERED || 160 fd->identity != ssl_layer_id) { 165 ss = (sslSocket *)fd->secret; 166 ss->fd = fd; 171 * It searches for the first SSL layer at or below the argument fd, 176 ssl_FindSocket(PRFileDesc *fd) argument 472 SSL_Enable(PRFileDesc *fd, int which, PRBool on) argument 570 SSL_OptionSet(PRFileDesc *fd, PRInt32 which, PRBool on) argument 819 SSL_OptionGet(PRFileDesc *fd, PRInt32 which, PRBool *pOn) argument 1271 SSL_CipherPrefSet(PRFileDesc *fd, PRInt32 which, PRBool enabled) argument 1295 SSL_CipherOrderSet(PRFileDesc *fd, const PRUint16 *ciphers, unsigned int len) argument 1308 SSL_CipherPrefGet(PRFileDesc *fd, PRInt32 which, PRBool *enabled) argument 1360 SSL_GetChannelBinding(PRFileDesc *fd, SSLChannelBindingType binding_type, unsigned char *out, unsigned int *outLen, unsigned int outLenMax) argument 1384 ssl_ImportFD(PRFileDesc *model, PRFileDesc *fd, SSLProtocolVariant variant) argument 1424 SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd) argument 1430 DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd) argument 1436 SSL_SetNextProtoCallback(PRFileDesc *fd, SSLNextProtoCallback callback, void *arg) argument 1459 ssl_NextProtoNegoCallback(void *arg, PRFileDesc *fd, const unsigned char *protos, unsigned int protos_len, unsigned char *protoOut, unsigned int *protoOutLen, unsigned int protoMaxLen) argument 1511 SSL_SetNextProtoNego(PRFileDesc *fd, const unsigned char *data, unsigned int length) argument 1540 SSL_GetNextProto(PRFileDesc *fd, SSLNextProtoState *state, unsigned char *buf, unsigned int *bufLen, unsigned int bufLenMax) argument 1573 SSL_SetSRTPCiphers(PRFileDesc *fd, const PRUint16 *ciphers, unsigned int numCiphers) argument 1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) argument 1643 SSL_ReconfigFD(PRFileDesc *model, PRFileDesc *fd) argument 1861 SSL_VersionRangeGet(PRFileDesc *fd, SSLVersionRange *vrange) argument 1906 SSL_VersionRangeSet(PRFileDesc *fd, const SSLVersionRange *vrange) argument 1947 SSL_PeerStapledOCSPResponses(PRFileDesc *fd) argument 1966 SSL_PeerSignedCertTimestamps(PRFileDesc *fd) argument 1989 SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) argument 2003 SSL_GetRequestedClientCertificateTypes(PRFileDesc *fd) argument 2022 ssl_Accept(PRFileDesc *fd, PRNetAddr *sockaddr, PRIntervalTime timeout) argument 2093 ssl_Connect(PRFileDesc *fd, const PRNetAddr *sockaddr, PRIntervalTime timeout) argument 2118 ssl_Bind(PRFileDesc *fd, const PRNetAddr *addr) argument 2138 ssl_Listen(PRFileDesc *fd, PRIntn backlog) argument 2158 ssl_Shutdown(PRFileDesc *fd, PRIntn how) argument 2186 ssl_Close(PRFileDesc *fd) argument 2213 ssl_Recv(PRFileDesc *fd, void *buf, PRInt32 len, PRIntn flags, PRIntervalTime timeout) argument 2234 ssl_Send(PRFileDesc *fd, const void *buf, PRInt32 len, PRIntn flags, PRIntervalTime timeout) argument 2255 ssl_Read(PRFileDesc *fd, void *buf, PRInt32 len) argument 2275 ssl_Write(PRFileDesc *fd, const void *buf, PRInt32 len) argument 2295 ssl_GetPeerName(PRFileDesc *fd, PRNetAddr *addr) argument 2338 ssl_GetSockName(PRFileDesc *fd, PRNetAddr *name) argument 2351 SSL_SetStapledOCSPResponses(PRFileDesc *fd, const SECItemArray *responses, SSLKEAType kea) argument 2380 SSL_SetSockPeerID(PRFileDesc *fd, const char *peerID) argument 2403 ssl_Poll(PRFileDesc *fd, PRInt16 how_flags, PRInt16 *p_out_flags) argument 2523 ssl_TransmitFile(PRFileDesc *sd, PRFileDesc *fd, const void *headers, PRInt32 hlen, PRTransmitFileFlags flags, PRIntervalTime timeout) argument 2542 ssl_FdIsBlocking(PRFileDesc *fd) argument 2565 ssl_WriteV(PRFileDesc *fd, const PRIOVec *iov, PRInt32 vectors, PRIntervalTime timeout) argument 2696 ssl_Available(PRFileDesc *fd) argument 2704 ssl_Available64(PRFileDesc *fd) argument 2715 ssl_FSync(PRFileDesc *fd) argument 2723 ssl_Seek(PRFileDesc *fd, PRInt32 offset, PRSeekWhence how) argument 2730 ssl_Seek64(PRFileDesc *fd, PRInt64 offset, PRSeekWhence how) argument 2740 ssl_FileInfo(PRFileDesc *fd, PRFileInfo *info) argument 2748 ssl_FileInfo64(PRFileDesc *fd, PRFileInfo64 *info) argument 2756 ssl_RecvFrom(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, PRNetAddr *addr, PRIntervalTime timeout) argument 2765 ssl_SendTo(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout) argument [all...] |
/external/chromium_org/net/tools/epoll_server/ |
H A D | epoll_server.cc | 21 // B. Once the callback is found by hash lookup using the fd, the lookup of 43 // memory (save 32 bytes/fd), and does not affect cache usage (we need to 45 // - Embed the fd directly into CBAndEventMask and switch to using hash_set. 47 // we can get both the fd and the callback. 63 virtual void OnEvent(int fd, EpollEvent* event) OVERRIDE { 69 data_read = read(fd, &data, sizeof(data)); 72 virtual void OnShutdown(EpollServer *eps, int fd) OVERRIDE {} 115 int fd = cb_iter->fd; local 120 cb->OnShutdown(this, fd); 190 RegisterFD(int fd, CB* cb, int event_mask) argument 224 GetFlags(int fd) argument 228 SetNonblocking(int fd) argument 258 RegisterFDForWrite(int fd, CB* cb) argument 262 RegisterFDForReadWrite(int fd, CB* cb) argument 266 RegisterFDForRead(int fd, CB* cb) argument 270 UnregisterFD(int fd) argument 304 ModifyCallback(int fd, int event_mask) argument 308 StopRead(int fd) argument 312 StartRead(int fd) argument 316 StopWrite(int fd) argument 320 StartWrite(int fd) argument 324 HandleEvent(int fd, int event_mask) argument 412 SetFDReady(int fd, int events_to_fake) argument 433 SetFDNotReady(int fd) argument 571 AddFD(int fd, int event_mask) const argument 589 ModFD(int fd, int event_mask) const argument 609 ModifyFD(int fd, int remove_event, int add_event) argument 672 int fd = events[i].data.fd; local [all...] |
H A D | epoll_server.h | 21 // as well as providing a per-fd-registered summary of 67 // fd - the file descriptor which was registered 71 virtual void OnRegistration(EpollServer* eps, int fd, int event_mask) = 0; 76 // fd - the file descriptor which was registered 80 virtual void OnModification(int fd, int event_mask) = 0; 86 // fd - the file descriptor which was registered 91 // this fd on the ready list. 92 virtual void OnEvent(int fd, EpollEvent* event) = 0; 97 // fd - the file descriptor which was registered, and of this call, is now 101 virtual void OnUnregistration(int fd, boo 491 SetFlags(int fd, int flags) argument 524 CBAndEventMask(EpollCallbackInterface* cb, int event_mask, int fd) argument 545 int fd; member in struct:net::EpollServer::CBAndEventMask 754 RecordFDMaskEvent(int fd, int mask, const char* function) argument 768 RecordEpollEvent(int fd, int event_mask) argument 791 RecordUnregistration(int fd) argument 813 FDMaskOutput(int fd, int mask, const char* function) argument [all...] |
/external/chromium_org/net/tools/flip_server/ |
H A D | acceptor_thread.cc | 94 LOG(ERROR) << "setsockopt() failed fd=" << server_fd; 101 VLOG(1) << ACCEPTOR_CLIENT_IDENT << "Acceptor: Closing fd " << server_fd; 123 int fd = accept(acceptor_->listen_fd_, &address, &socklen); local 124 if (fd == -1) { 133 HandleConnection(fd, (struct sockaddr_in*)&address); 139 int fd = accept(acceptor_->listen_fd_, &address, &socklen); local 140 if (fd == -1) { 149 HandleConnection(fd, (struct sockaddr_in*)&address); 199 void SMAcceptorThread::OnEvent(int fd, EpollEvent* event) { argument
|
H A D | create_listener.cc | 42 // fd - the socket to close 48 // sets *fd to -1 if socket was closed. 50 bool CloseSocket(int* fd, int tries) { argument 52 if (!close(*fd)) { 53 *fd = -1; 61 void FlipSetNonBlocking(int fd) { argument 62 DCHECK_GE(fd, 0); 64 int fcntl_return = fcntl(fd, F_GETFL, 0); 65 CHECK_NE(fcntl_return, -1) << "error doing fcntl(fd, F_GETFL, 0) fd 77 SetDisableNagle(int fd) argument [all...] |
H A D | flip_in_mem_edsm_server.cc | 107 int fd; local 111 fd = open(pidfile, O_RDWR | O_CREAT, 0600); 112 if (fd == -1) { 117 ret = flock(fd, LOCK_EX | LOCK_NB); 127 if (fstat(fd, &pid_stat) == -1) { 133 if (ftruncate(fd, pid_stat.st_size) == -1) { 145 if (write(fd, pid_str, strlen(pid_str)) != bytes) { 147 close(fd); 151 return fd;
|
H A D | http_interface.cc | 98 int fd, 108 fd, 95 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument
|
H A D | mem_cache.cc | 123 int fd = open(filename, 0, "r"); local 124 if (fd == -1) 127 ssize_t read_status = read(fd, buffer, sizeof(buffer)); 131 read_status = read(fd, buffer, sizeof(buffer)); 134 close(fd);
|
H A D | mem_cache.h | 95 explicit MemCacheIter(FileData* fd) argument 96 : file_data(fd),
|
H A D | sm_connection.cc | 82 int fd, 94 if (fd == -1) { 95 // If fd == -1, then we are initializing a new connection that will 121 // If fd != -1 then we are initializing a connection that has just been 129 << "Closing pre-existing fd"; 134 fd_ = fd; 223 void SMConnection::OnRegistration(EpollServer* eps, int fd, int event_mask) { argument 227 void SMConnection::OnEvent(int fd, EpollEvent* event) { argument 236 void SMConnection::OnUnregistration(int fd, bool replaced) { argument 240 void SMConnection::OnShutdown(EpollServer* eps, int fd) { argument 79 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument [all...] |
H A D | sm_connection.h | 66 int fd() const { return fd_; } function in class:net::SMConnection 73 int fd, 86 int fd, 88 virtual void OnModification(int fd, int event_mask) OVERRIDE {} 89 virtual void OnEvent(int fd, EpollEvent* event) OVERRIDE; 90 virtual void OnUnregistration(int fd, bool replaced) OVERRIDE; 91 virtual void OnShutdown(EpollServer* eps, int fd) OVERRIDE;
|
H A D | spdy_interface.cc | 59 int fd, 68 fd, 56 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument
|
H A D | streamer_interface.cc | 53 int fd, 63 fd, 50 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument
|