Searched defs:fd (Results 226 - 250 of 1450) sorted by path

1234567891011>>

/external/chromium_org/net/socket/
H A Dtcp_socket_libevent.cc47 bool SetTCPNoDelay(int fd, bool no_delay) { argument
49 int error = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &on, sizeof(on));
54 bool SetTCPKeepAlive(int fd, bool enable, int delay) { argument
56 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof(on))) {
57 PLOG(ERROR) << "Failed to set SO_KEEPALIVE on fd: " << fd;
67 if (setsockopt(fd, SOL_TCP, TCP_KEEPIDLE, &delay, sizeof(delay))) {
68 PLOG(ERROR) << "Failed to set TCP_KEEPIDLE on fd: " << fd;
72 if (setsockopt(fd, SOL_TC
[all...]
H A Dunix_domain_listen_socket_posix.cc44 SocketDescriptor fd = CreatePlatformSocket(PF_UNIX, SOCK_STREAM, 0); local
45 if (fd == kInvalidSocket)
48 if (bind(fd, address.addr, address.addr_len) < 0) {
50 close(fd);
56 *socket_fd = fd;
/external/chromium_org/net/test/
H A Dopenssl_helper.cc193 const int fd = accept(3, NULL, NULL); local
196 BIO* bio = BIO_new_socket(fd, 1 /* take ownership of fd */);
/external/chromium_org/net/test/spawned_test_server/
H A Dlocal_test_server_posix.cc63 bool ReadData(int fd, ssize_t bytes_max, uint8* buffer, argument
70 poll_fds[0].fd = fd;
91 ssize_t num_bytes = HANDLE_EINTR(read(fd, buffer + bytes_read,
/external/chromium_org/net/third_party/nss/ssl/
H A Dprelib.c20 PEHeader *SSL_PreencryptedStreamToFile(PRFileDesc *fd, PEHeader *inHeader, argument
27 PEHeader *SSL_PreencryptedFileToStream(PRFileDesc *fd, PEHeader *header, argument
H A Dsslauth.c14 SSL_PeerCertificate(PRFileDesc *fd) argument
18 ss = ssl_FindSocket(fd);
21 SSL_GETPID(), fd));
32 SSL_PeerCertificateChain(PRFileDesc *fd) argument
39 ss = ssl_FindSocket(fd);
42 SSL_GETPID(), fd));
72 SSL_LocalCertificate(PRFileDesc *fd) argument
76 ss = ssl_FindSocket(fd);
79 SSL_GETPID(), fd));
97 SSL_SecurityStatus(PRFileDesc *fd, in argument
220 SSL_SetClientChannelIDCallback(PRFileDesc *fd, SSLClientChannelIDCallback callback, void *arg) argument
282 SSL_AuthCertificate(void *arg, PRFileDesc *fd, PRBool checkSig, PRBool isServer) argument
[all...]
H A Dssldef.c22 PRFileDesc *lower = ss->fd->lower;
31 PRFileDesc *lower = ss->fd->lower;
40 PRFileDesc *lower = ss->fd->lower;
49 PRFileDesc *lower = ss->fd->lower;
58 PRFileDesc *lower = ss->fd->lower;
81 PRFileDesc *lower = ss->fd->lower;
120 PRFileDesc *lower = ss->fd->lower;
133 PRFileDesc *lower = ss->fd->lower;
158 PRFileDesc *lower = ss->fd->lower;
167 PRFileDesc *lower = ss->fd
176 PRFileDesc *fd; local
[all...]
H A Dsslimpl.h1219 PRFileDesc * fd; member in struct:sslSocketStr
1492 extern PRBool ssl_FdIsBlocking(PRFileDesc *fd);
1634 extern sslSocket *ssl_FindSocket(PRFileDesc *fd);
1894 extern PRFileDesc *ssl_NewPRSocket(sslSocket *ss, PRFileDesc *fd);
1895 extern void ssl_FreePRSocket(PRFileDesc *fd);
2009 SECStatus SSL_DisableExportCipherSuites(PRFileDesc * fd);
H A Dsslinfo.c24 SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, PRUintn len) argument
35 ss = ssl_FindSocket(fd);
38 SSL_GETPID(), fd));
267 SSL_DisableExportCipherSuites(PRFileDesc * fd) argument
275 rv = SSL_CipherPrefSet(fd, pInfo->cipherSuite, PR_FALSE);
298 SSL_GetNegotiatedHostInfo(PRFileDesc *fd) argument
304 ss = ssl_FindSocket(fd);
307 SSL_GETPID(), fd));
324 name = SSL_RevealURL(fd);
338 SSL_ExportKeyingMaterial(PRFileDesc *fd, argument
[all...]
H A Dsslmutex.c78 setNonBlocking(int fd, int nonBlocking) argument
83 flags = fcntl(fd, F_GETFL, 0);
90 err = fcntl(fd, F_SETFL, flags);
H A Dsslreveal.c17 SSL_RevealCert(PRFileDesc * fd) argument
22 sslsocket = ssl_FindSocket(fd);
36 SSL_RevealPinArg(PRFileDesc * fd) argument
41 sslsocket = ssl_FindSocket(fd);
55 SSL_RevealURL(PRFileDesc * fd) argument
60 sslsocket = ssl_FindSocket(fd);
H A Dsslsecur.c133 SSL_TRC(3, ("%d: SSL[%d]: handshake is completed", SSL_GETPID(), ss->fd));
141 (ss->handshakeCallback)(ss->fd, ss->handshakeCallbackData);
169 ssl_SetTimeout(PRFileDesc *fd, PRIntervalTime timeout) argument
173 ss = ssl_FindSocket(fd);
175 SSL_DBG(("%d: SSL[%d]: bad socket in SetTimeout", SSL_GETPID(), fd));
262 SSL_ReHandshake(PRFileDesc *fd, PRBool flushCache) argument
267 ss = ssl_FindSocket(fd);
269 SSL_DBG(("%d: SSL[%d]: bad socket in RedoHandshake", SSL_GETPID(), fd));
296 SSL_IMPORT SECStatus SSL_ReHandshakeWithTimeout(PRFileDesc *fd, argument
300 if (SECSuccess != ssl_SetTimeout(fd, timeou
307 SSL_RedoHandshake(PRFileDesc *fd) argument
316 SSL_HandshakeCallback(PRFileDesc *fd, SSLHandshakeCallback cb, void *client_data) argument
349 SSL_SetCanFalseStartCallback(PRFileDesc *fd, SSLCanFalseStartCallback cb, void *arg) argument
379 SSL_RecommendedCanFalseStart(PRFileDesc *fd, PRBool *canFalseStart) argument
421 SSL_ForceHandshake(PRFileDesc *fd) argument
480 SSL_ForceHandshakeWithTimeout(PRFileDesc *fd, PRIntervalTime timeout) argument
816 SSL_ConfigSecureServer(PRFileDesc *fd, CERTCertificate *cert, SECKEYPrivateKey *key, SSL3KEAType kea) argument
824 SSL_ConfigSecureServerWithCertChain(PRFileDesc *fd, CERTCertificate *cert, const CERTCertificateList *certChainOpt, SECKEYPrivateKey *key, SSL3KEAType kea) argument
1344 SSL_BadCertHook(PRFileDesc *fd, SSLBadCertHandler f, void *arg) argument
1367 SSL_SetURL(PRFileDesc *fd, const char *url) argument
1399 SSL_SetTrustAnchors(PRFileDesc *fd, CERTCertList *certList) argument
1435 SSL_DataPending(PRFileDesc *fd) argument
1452 SSL_InvalidateSession(PRFileDesc *fd) argument
1484 SSL_CacheSession(PRFileDesc *fd) argument
1503 SSL_CacheSessionUnlocked(PRFileDesc *fd) argument
1516 SSL_GetSessionID(PRFileDesc *fd) argument
1549 SSL_CertDBHandleSet(PRFileDesc *fd, CERTCertDBHandle *dbHandle) argument
1591 SSL_RestartHandshakeAfterCertReq(PRFileDesc * fd, CERTCertificate * cert, SECKEYPrivateKey * key, CERTCertificateList *certChain) argument
1631 SSL_RestartHandshakeAfterChannelIDReq(PRFileDesc * fd, SECKEYPublicKey * channelIDPub, SECKEYPrivateKey *channelID) argument
1678 SSL_AuthCertificateComplete(PRFileDesc *fd, PRErrorCode error) argument
1708 SSL_SNISocketConfigHook(PRFileDesc *fd, SSLSNISocketConfig func, void *arg) argument
[all...]
H A Dsslsock.c151 ssl_GetPrivate(PRFileDesc *fd) argument
155 PORT_Assert(fd != NULL);
156 PORT_Assert(fd->methods->file_type == PR_DESC_LAYERED);
157 PORT_Assert(fd->identity == ssl_layer_id);
159 if (fd->methods->file_type != PR_DESC_LAYERED ||
160 fd->identity != ssl_layer_id) {
165 ss = (sslSocket *)fd->secret;
166 ss->fd = fd;
171 * It searches for the first SSL layer at or below the argument fd,
176 ssl_FindSocket(PRFileDesc *fd) argument
472 SSL_Enable(PRFileDesc *fd, int which, PRBool on) argument
570 SSL_OptionSet(PRFileDesc *fd, PRInt32 which, PRBool on) argument
819 SSL_OptionGet(PRFileDesc *fd, PRInt32 which, PRBool *pOn) argument
1271 SSL_CipherPrefSet(PRFileDesc *fd, PRInt32 which, PRBool enabled) argument
1295 SSL_CipherOrderSet(PRFileDesc *fd, const PRUint16 *ciphers, unsigned int len) argument
1308 SSL_CipherPrefGet(PRFileDesc *fd, PRInt32 which, PRBool *enabled) argument
1360 SSL_GetChannelBinding(PRFileDesc *fd, SSLChannelBindingType binding_type, unsigned char *out, unsigned int *outLen, unsigned int outLenMax) argument
1384 ssl_ImportFD(PRFileDesc *model, PRFileDesc *fd, SSLProtocolVariant variant) argument
1424 SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd) argument
1430 DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd) argument
1436 SSL_SetNextProtoCallback(PRFileDesc *fd, SSLNextProtoCallback callback, void *arg) argument
1459 ssl_NextProtoNegoCallback(void *arg, PRFileDesc *fd, const unsigned char *protos, unsigned int protos_len, unsigned char *protoOut, unsigned int *protoOutLen, unsigned int protoMaxLen) argument
1511 SSL_SetNextProtoNego(PRFileDesc *fd, const unsigned char *data, unsigned int length) argument
1540 SSL_GetNextProto(PRFileDesc *fd, SSLNextProtoState *state, unsigned char *buf, unsigned int *bufLen, unsigned int bufLenMax) argument
1573 SSL_SetSRTPCiphers(PRFileDesc *fd, const PRUint16 *ciphers, unsigned int numCiphers) argument
1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) argument
1643 SSL_ReconfigFD(PRFileDesc *model, PRFileDesc *fd) argument
1861 SSL_VersionRangeGet(PRFileDesc *fd, SSLVersionRange *vrange) argument
1906 SSL_VersionRangeSet(PRFileDesc *fd, const SSLVersionRange *vrange) argument
1947 SSL_PeerStapledOCSPResponses(PRFileDesc *fd) argument
1966 SSL_PeerSignedCertTimestamps(PRFileDesc *fd) argument
1989 SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) argument
2003 SSL_GetRequestedClientCertificateTypes(PRFileDesc *fd) argument
2022 ssl_Accept(PRFileDesc *fd, PRNetAddr *sockaddr, PRIntervalTime timeout) argument
2093 ssl_Connect(PRFileDesc *fd, const PRNetAddr *sockaddr, PRIntervalTime timeout) argument
2118 ssl_Bind(PRFileDesc *fd, const PRNetAddr *addr) argument
2138 ssl_Listen(PRFileDesc *fd, PRIntn backlog) argument
2158 ssl_Shutdown(PRFileDesc *fd, PRIntn how) argument
2186 ssl_Close(PRFileDesc *fd) argument
2213 ssl_Recv(PRFileDesc *fd, void *buf, PRInt32 len, PRIntn flags, PRIntervalTime timeout) argument
2234 ssl_Send(PRFileDesc *fd, const void *buf, PRInt32 len, PRIntn flags, PRIntervalTime timeout) argument
2255 ssl_Read(PRFileDesc *fd, void *buf, PRInt32 len) argument
2275 ssl_Write(PRFileDesc *fd, const void *buf, PRInt32 len) argument
2295 ssl_GetPeerName(PRFileDesc *fd, PRNetAddr *addr) argument
2338 ssl_GetSockName(PRFileDesc *fd, PRNetAddr *name) argument
2351 SSL_SetStapledOCSPResponses(PRFileDesc *fd, const SECItemArray *responses, SSLKEAType kea) argument
2380 SSL_SetSockPeerID(PRFileDesc *fd, const char *peerID) argument
2403 ssl_Poll(PRFileDesc *fd, PRInt16 how_flags, PRInt16 *p_out_flags) argument
2523 ssl_TransmitFile(PRFileDesc *sd, PRFileDesc *fd, const void *headers, PRInt32 hlen, PRTransmitFileFlags flags, PRIntervalTime timeout) argument
2542 ssl_FdIsBlocking(PRFileDesc *fd) argument
2565 ssl_WriteV(PRFileDesc *fd, const PRIOVec *iov, PRInt32 vectors, PRIntervalTime timeout) argument
2696 ssl_Available(PRFileDesc *fd) argument
2704 ssl_Available64(PRFileDesc *fd) argument
2715 ssl_FSync(PRFileDesc *fd) argument
2723 ssl_Seek(PRFileDesc *fd, PRInt32 offset, PRSeekWhence how) argument
2730 ssl_Seek64(PRFileDesc *fd, PRInt64 offset, PRSeekWhence how) argument
2740 ssl_FileInfo(PRFileDesc *fd, PRFileInfo *info) argument
2748 ssl_FileInfo64(PRFileDesc *fd, PRFileInfo64 *info) argument
2756 ssl_RecvFrom(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, PRNetAddr *addr, PRIntervalTime timeout) argument
2765 ssl_SendTo(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout) argument
[all...]
/external/chromium_org/net/tools/epoll_server/
H A Depoll_server.cc21 // B. Once the callback is found by hash lookup using the fd, the lookup of
43 // memory (save 32 bytes/fd), and does not affect cache usage (we need to
45 // - Embed the fd directly into CBAndEventMask and switch to using hash_set.
47 // we can get both the fd and the callback.
63 virtual void OnEvent(int fd, EpollEvent* event) OVERRIDE {
69 data_read = read(fd, &data, sizeof(data));
72 virtual void OnShutdown(EpollServer *eps, int fd) OVERRIDE {}
115 int fd = cb_iter->fd; local
120 cb->OnShutdown(this, fd);
190 RegisterFD(int fd, CB* cb, int event_mask) argument
224 GetFlags(int fd) argument
228 SetNonblocking(int fd) argument
258 RegisterFDForWrite(int fd, CB* cb) argument
262 RegisterFDForReadWrite(int fd, CB* cb) argument
266 RegisterFDForRead(int fd, CB* cb) argument
270 UnregisterFD(int fd) argument
304 ModifyCallback(int fd, int event_mask) argument
308 StopRead(int fd) argument
312 StartRead(int fd) argument
316 StopWrite(int fd) argument
320 StartWrite(int fd) argument
324 HandleEvent(int fd, int event_mask) argument
412 SetFDReady(int fd, int events_to_fake) argument
433 SetFDNotReady(int fd) argument
571 AddFD(int fd, int event_mask) const argument
589 ModFD(int fd, int event_mask) const argument
609 ModifyFD(int fd, int remove_event, int add_event) argument
672 int fd = events[i].data.fd; local
[all...]
H A Depoll_server.h21 // as well as providing a per-fd-registered summary of
67 // fd - the file descriptor which was registered
71 virtual void OnRegistration(EpollServer* eps, int fd, int event_mask) = 0;
76 // fd - the file descriptor which was registered
80 virtual void OnModification(int fd, int event_mask) = 0;
86 // fd - the file descriptor which was registered
91 // this fd on the ready list.
92 virtual void OnEvent(int fd, EpollEvent* event) = 0;
97 // fd - the file descriptor which was registered, and of this call, is now
101 virtual void OnUnregistration(int fd, boo
491 SetFlags(int fd, int flags) argument
524 CBAndEventMask(EpollCallbackInterface* cb, int event_mask, int fd) argument
545 int fd; member in struct:net::EpollServer::CBAndEventMask
754 RecordFDMaskEvent(int fd, int mask, const char* function) argument
768 RecordEpollEvent(int fd, int event_mask) argument
791 RecordUnregistration(int fd) argument
813 FDMaskOutput(int fd, int mask, const char* function) argument
[all...]
/external/chromium_org/net/tools/flip_server/
H A Dacceptor_thread.cc94 LOG(ERROR) << "setsockopt() failed fd=" << server_fd;
101 VLOG(1) << ACCEPTOR_CLIENT_IDENT << "Acceptor: Closing fd " << server_fd;
123 int fd = accept(acceptor_->listen_fd_, &address, &socklen); local
124 if (fd == -1) {
133 HandleConnection(fd, (struct sockaddr_in*)&address);
139 int fd = accept(acceptor_->listen_fd_, &address, &socklen); local
140 if (fd == -1) {
149 HandleConnection(fd, (struct sockaddr_in*)&address);
199 void SMAcceptorThread::OnEvent(int fd, EpollEvent* event) { argument
H A Dcreate_listener.cc42 // fd - the socket to close
48 // sets *fd to -1 if socket was closed.
50 bool CloseSocket(int* fd, int tries) { argument
52 if (!close(*fd)) {
53 *fd = -1;
61 void FlipSetNonBlocking(int fd) { argument
62 DCHECK_GE(fd, 0);
64 int fcntl_return = fcntl(fd, F_GETFL, 0);
65 CHECK_NE(fcntl_return, -1) << "error doing fcntl(fd, F_GETFL, 0) fd
77 SetDisableNagle(int fd) argument
[all...]
H A Dflip_in_mem_edsm_server.cc107 int fd; local
111 fd = open(pidfile, O_RDWR | O_CREAT, 0600);
112 if (fd == -1) {
117 ret = flock(fd, LOCK_EX | LOCK_NB);
127 if (fstat(fd, &pid_stat) == -1) {
133 if (ftruncate(fd, pid_stat.st_size) == -1) {
145 if (write(fd, pid_str, strlen(pid_str)) != bytes) {
147 close(fd);
151 return fd;
H A Dhttp_interface.cc98 int fd,
108 fd,
95 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument
H A Dmem_cache.cc123 int fd = open(filename, 0, "r"); local
124 if (fd == -1)
127 ssize_t read_status = read(fd, buffer, sizeof(buffer));
131 read_status = read(fd, buffer, sizeof(buffer));
134 close(fd);
H A Dmem_cache.h95 explicit MemCacheIter(FileData* fd) argument
96 : file_data(fd),
H A Dsm_connection.cc82 int fd,
94 if (fd == -1) {
95 // If fd == -1, then we are initializing a new connection that will
121 // If fd != -1 then we are initializing a connection that has just been
129 << "Closing pre-existing fd";
134 fd_ = fd;
223 void SMConnection::OnRegistration(EpollServer* eps, int fd, int event_mask) { argument
227 void SMConnection::OnEvent(int fd, EpollEvent* event) { argument
236 void SMConnection::OnUnregistration(int fd, bool replaced) { argument
240 void SMConnection::OnShutdown(EpollServer* eps, int fd) { argument
79 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument
[all...]
H A Dsm_connection.h66 int fd() const { return fd_; } function in class:net::SMConnection
73 int fd,
86 int fd,
88 virtual void OnModification(int fd, int event_mask) OVERRIDE {}
89 virtual void OnEvent(int fd, EpollEvent* event) OVERRIDE;
90 virtual void OnUnregistration(int fd, bool replaced) OVERRIDE;
91 virtual void OnShutdown(EpollServer* eps, int fd) OVERRIDE;
H A Dspdy_interface.cc59 int fd,
68 fd,
56 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument
H A Dstreamer_interface.cc53 int fd,
63 fd,
50 InitSMConnection(SMConnectionPoolInterface* connection_pool, SMInterface* sm_interface, EpollServer* epoll_server, int fd, std::string server_ip, std::string server_port, std::string remote_ip, bool use_ssl) argument

Completed in 4837 milliseconds

1234567891011>>