/system/core/libcutils/ |
H A D | socket_loopback_client.c | 49 if(connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
H A D | socket_local_client.c | 120 * connect to peer named "name" on fd 139 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) { 150 * connect to peer named "name"
|
H A D | socket_network_client.c | 78 if ((ret = connect(s, (struct sockaddr *) &addr, sizeof(addr))) < 0) {
|
/system/bt/test/suite/cases/ |
H A D | pan.c | 51 CALL_AND_WAIT(error = pan_interface->connect(&bt_remote_bdaddr, local_role, remote_role), pan_connection_state_changed); 54 TASSERT(pan_get_connection_state() == BTPAN_STATE_CONNECTING, "Invalid PAN state after connect: %d", pan_get_connection_state()); 60 TASSERT(pan_get_connection_state() == BTPAN_STATE_CONNECTED, "Invalid PAN state after connect: %d", pan_get_connection_state());
|
H A D | rfcomm.c | 48 error = socket_interface->connect(&bt_remote_bdaddr, BTSOCK_RFCOMM, (const uint8_t *)&HFP_AG_UUID, 0, &fd, 0);
|
/system/core/adb/ |
H A D | test_track_devices.cpp | 37 ret = connect( s, (struct sockaddr*) &server, sizeof(server) ); 38 if (ret < 0) panic( "could not connect to server" );
|
/system/netd/client/ |
H A D | FwmarkClient.cpp | 53 if (TEMP_FAILURE_RETRY(connect(mChannel, reinterpret_cast<const sockaddr*>(&FWMARK_SERVER_PATH), 55 // If we are unable to connect to the fwmark server, assume there's no error. This protects
|
/system/extras/tests/net_test/ |
H A D | ping6_test.py | 313 s.connect(("127.0.0.1", 55)) 320 s.connect(("::1", 55)) 377 s.connect(("127.0.0.1", 12345)) 403 # We can't just call s.connect(), s.bind() etc. with a tuple of the wrong 666 s.connect(("127.0.0.1", 0xbeef)) 676 s.connect(("::1", 0xbeef)) 683 s.connect(("127.0.0.1", 0xbeef)) 691 s.connect(("::1", 0xbeef)) 698 # Try send, bind and connect to check the addresses and the state. 712 s.connect(("ff0 [all...] |
H A D | csocket.py | 110 """Python wrapper for connect.""" 116 """Python wrapper for connect.""" 117 ret = libc.connect(s.fileno(), to.CPointer(), len(to))
|
H A D | multinetwork_test.py | 314 self.assertRaisesErrno(errno.EINPROGRESS, s.connect, (dstaddr, 53)) 315 msg = "IPv%s TCP connect: expected %s on %s" % ( 335 s.connect((dstaddr, 53)) 337 self.ExpectPacketOn(netid, msg % "connect/send", expected) 426 # If we're testing connected sockets, connect the socket on the first 431 s.connect((dstaddr, 53)) 914 s.connect((dstaddr, 1234)) 943 s2.connect((dstaddr, 1234))
|
H A D | srcaddr_selection_test.py | 62 s.connect((net_test.IPV6_ADDR, 123))
|
H A D | iproute.py | 365 self.sock.connect((0, 0)) # The kernel.
|
/system/core/include/usbhost/ |
H A D | usbhost.h | 189 /* Requests the kernel to connect or disconnect its driver for the specified interface. 194 unsigned int interface, int connect);
|
/system/bt/tools/bdtool/ |
H A D | bdtool.c | 230 int error = sock->connect(&bt_remote_bdaddr, BTSOCK_RFCOMM, (const uint8_t *)&HFP_AG_UUID, 0, &rfcomm_fd, 0); 232 fprintf(stderr, "Unable to connect to RFCOMM socket: %d.\n", error); 241 error = sock->connect(&bt_remote_bdaddr, BTSOCK_SCO, NULL, 5, &sock_fd, 0); 243 fprintf(stderr, "Unable to connect to SCO socket: %d.\n", error);
|
/system/bt/tools/hci/ |
H A D | main.c | 152 if (connect(sock, (const struct sockaddr *)&addr, sizeof(addr)) == -1)
|
/system/bt/btif/src/ |
H A D | btif_hf_client.c | 208 ** Function connect 210 ** Description connect to audio gateway 229 static bt_status_t connect( bt_bdaddr_t *bd_addr ) function 670 .connect = connect,
|
H A D | btif_hf.c | 741 ** Function connect 743 ** Description connect to headset 777 static bt_status_t connect( bt_bdaddr_t *bd_addr ) function 1575 connect,
|
H A D | btif_hh.c | 122 * NUMLOCK state toggle on fpr first connect.*/ 657 pagescan mode, we will do 2 retries to connect before giving up */ 774 // The connect request must come from device side and exceeded the connected 999 keys work from first keyboard connect */ 1239 ** Function connect 1241 ** Description connect to hid device 1246 static bt_status_t connect( bt_bdaddr_t *bd_addr) function 1685 connect,
|
/system/bt/stack/avdt/ |
H A D | avdt_ccb_act.c | 1016 p_ccb->p_conn_cback = p_data->connect.p_cback; 1019 BTM_SetSecurityLevel(TRUE, "", BTM_SEC_SERVICE_AVDTP, p_data->connect.sec_mask,
|
H A D | avdt_api.c | 246 ** and connect to this endpoint. 1054 evt.connect.p_cback = p_cback; 1055 evt.connect.sec_mask = sec_mask;
|
H A D | avdt_int.h | 104 /* scb transport channel connect timeout value */ 415 tAVDT_CCB_API_CONNECT connect; member in union:__anon799
|
/system/core/libusbhost/ |
H A D | usbhost.c | 549 unsigned int interface, int connect) 554 ctl.ioctl_code = (connect ? USBDEVFS_CONNECT : USBDEVFS_DISCONNECT); 548 usb_device_connect_kernel_driver(struct usb_device *device, unsigned int interface, int connect) argument
|
/system/core/adb/tests/ |
H A D | test_adb.py | 200 def connect(self, host): member in class:AdbWrapper 201 return call_checked(self.adb_cmd + "connect {}".format(host))
|
/system/core/liblog/ |
H A D | logd_write.c | 122 if (TEMP_FAILURE_RETRY(connect(i, (struct sockaddr *)&un,
|
H A D | log_read.c | 148 * connect to peer named "name" on fd 167 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) { 178 * connect to peer named "name"
|