/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_sock_rfc.h | 33 int* sock_fd, int flags); 35 int channel, int* sock_fd, int flags);
|
H A D | btif_sock_util.h | 61 int sock_send_fd(int sock_fd, const uint8_t* buffer, int len, int send_fd); 62 int sock_send_all(int sock_fd, const uint8_t* buf, int len); 63 int sock_recv_all(int sock_fd, uint8_t* buf, int len);
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_sock.c | 43 const uint8_t* uuid, int channel, int* sock_fd, int flags); 45 const uint8_t* uuid, int channel, int* sock_fd, int flags); 93 const uint8_t* service_uuid, int channel, int* sock_fd, int flags) 95 if((service_uuid == NULL && channel <= 0) || sock_fd == NULL) 97 BTIF_TRACE_ERROR("invalid parameters, uuid:%p, channel:%d, sock_fd:%p", service_uuid, channel, sock_fd); 100 *sock_fd = -1; 105 status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd, flags); 123 const uint8_t* uuid, int channel, int* sock_fd, int flags) 125 if((uuid == NULL && channel <= 0) || bd_addr == NULL || sock_fd 92 btsock_listen(btsock_type_t type, const char* service_name, const uint8_t* service_uuid, int channel, int* sock_fd, int flags) argument 122 btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, const uint8_t* uuid, int channel, int* sock_fd, int flags) argument [all...] |
H A D | btif_sock_util.c | 70 int sock_send_all(int sock_fd, const uint8_t* buf, int len) argument 76 do ret = send(sock_fd, buf, s, 0); 80 BTIF_TRACE_ERROR("sock fd:%d send errno:%d, ret:%d", sock_fd, errno, ret); 88 int sock_recv_all(int sock_fd, uint8_t* buf, int len) argument 94 do ret = recv(sock_fd, buf, r, MSG_WAITALL); 98 BTIF_TRACE_ERROR("sock fd:%d recv errno:%d, ret:%d", sock_fd, errno, ret); 107 int sock_send_fd(int sock_fd, const uint8_t* buf, int len, int send_fd) argument 117 if(sock_fd == -1 || send_fd == -1) 142 ret = sendmsg(sock_fd, &msg, MSG_NOSIGNAL); 147 sock_fd, send_f [all...] |
H A D | btif_sock_rfc.c | 314 int* sock_fd, int flags) 318 if(sock_fd == NULL || (service_uuid == NULL && (channel < 1 || channel > 30))) 320 APPL_TRACE_ERROR("invalid rfc channel:%d or sock_fd:%p, uuid:%p", channel, sock_fd, service_uuid); 323 *sock_fd = -1; 344 *sock_fd = rs->app_fd; 358 int channel, int* sock_fd, int flags) 360 if(sock_fd == NULL || (service_uuid == NULL && (channel < 1 || channel > 30))) 362 APPL_TRACE_ERROR("invalid rfc channel:%d or sock_fd:%p, uuid:%p", channel, sock_fd, 313 btsock_rfc_listen(const char* service_name, const uint8_t* service_uuid, int channel, int* sock_fd, int flags) argument 357 btsock_rfc_connect(const bt_bdaddr_t *bd_addr, const uint8_t* service_uuid, int channel, int* sock_fd, int flags) argument [all...] |
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl_unittest.cc | 316 base::ScopedFD sock_fd(socket(AF_UNIX, SOCK_STREAM, 0)); 317 BPF_ASSERT(sock_fd.is_valid()); 319 ASSERT_SYSCALL_RESULT(-ENOENT, fcntl, sock_fd.get(), F_GETFD); 320 ASSERT_SYSCALL_RESULT(-ENOENT, fcntl, sock_fd.get(), F_GETFL); 322 ASSERT_SYSCALL_RESULT(0, fcntl, sock_fd.get(), F_SETFD, O_CLOEXEC); 323 ASSERT_SYSCALL_RESULT(-EINVAL, fcntl, sock_fd.get(), F_SETFD, 0); 325 ASSERT_SYSCALL_RESULT(-EPERM, fcntl, sock_fd.get(), F_SETFL, O_RDONLY); 327 ASSERT_SYSCALL_RESULT(-EACCES, fcntl, sock_fd.get(), F_DUPFD, 0);
|
/external/chromium_org/chrome/test/chromedriver/net/ |
H A D | port_server.cc | 72 int sock_fd = socket(AF_UNIX, SOCK_STREAM, 0); local 73 if (sock_fd < 0) 75 base::SyncSocket sock(sock_fd); 79 if (setsockopt(sock_fd, 84 setsockopt(sock_fd,
|
/external/ppp/pppd/ |
H A D | sys-linux.c | 178 static int sock_fd = -1; /* socket for doing interface ioctls */ variable 314 sock_fd = socket(AF_INET, SOCK_DGRAM, 0); 315 if (sock_fd < 0) 363 if (sock_fd >= 0) 364 close(sock_fd); 1167 if (ifunit >= 0 && ioctl(sock_fd, SIOCSIFMTU, (caddr_t) &ifr) < 0) 1182 if (ifunit >= 0 && ioctl(sock_fd, SIOCGIFMTU, (caddr_t) &ifr) < 0) { 1350 if (ioctl(sock_fd, SIOCGPPPSTATS, &req) < 0) { 1618 if (ioctl(sock_fd, SIOCADDRT, &rt) < 0) { 1651 if (ioctl(sock_fd, SIOCDELR 1840 int ret, sock_fd; local [all...] |
/external/libpcap/ |
H A D | pcap-linux.c | 385 static int has_wext(int sock_fd, const char *device, char *ebuf); 387 static int enter_rfmon_mode(pcap_t *handle, int sock_fd, 639 add_mon_if(pcap_t *handle, int sock_fd, struct nl80211_state *state, argument 646 ifindex = iface_get_id(sock_fd, device, handle->errbuf); 735 del_mon_if(pcap_t *handle, int sock_fd, struct nl80211_state *state, argument 742 ifindex = iface_get_id(sock_fd, mondevice, handle->errbuf); 789 enter_rfmon_mode_mac80211(pcap_t *handle, int sock_fd, const char *device) argument 827 ret = add_mon_if(handle, sock_fd, &nlstate, device, mondevice); 875 if (ioctl(sock_fd, SIOCGIFFLAGS, &ifr) == -1) { 879 del_mon_if(handle, sock_fd, 923 int sock_fd; local 3001 int sock_fd = -1, arptype; local 4731 has_wext(int sock_fd, const char *device, char *ebuf) argument 4777 enter_rfmon_mode_wext(pcap_t *handle, int sock_fd, const char *device) argument 5407 enter_rfmon_mode(pcap_t *handle, int sock_fd, const char *device) argument [all...] |
/external/dhcpcd/ |
H A D | if-linux.c | 64 static int sock_fd; variable 133 sock_fd = _open_link_socket(&sock_nl); 134 set_cloexec(sock_fd); 135 return sock_fd; 427 if (sendmsg(sock_fd, &msg, 0) != -1) 428 r = get_netlink(sock_fd, 0, &err_netlink);
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_interceptors.inc | 1752 INTERCEPTOR(int, getsockname, int sock_fd, void *addr, int *addrlen) { 1754 COMMON_INTERCEPTOR_ENTER(ctx, getsockname, sock_fd, addr, addrlen); 1760 int res = REAL(getsockname)(sock_fd, addr, addrlen);
|