Searched refs:connect (Results 1 - 25 of 28) sorted by relevance

12

/system/core/libcutils/
H A Dsocket_loopback_client.c49 if(connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
H A Dsocket_local_client.c120 * connect to peer named "name" on fd
139 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) {
150 * connect to peer named "name"
H A Dsocket_network_client.c78 if ((ret = connect(s, (struct sockaddr *) &addr, sizeof(addr))) < 0) {
/system/bt/test/suite/cases/
H A Dpan.c51 CALL_AND_WAIT(error = pan_interface->connect(&bt_remote_bdaddr, local_role, remote_role), pan_connection_state_changed);
54 TASSERT(pan_get_connection_state() == BTPAN_STATE_CONNECTING, "Invalid PAN state after connect: %d", pan_get_connection_state());
60 TASSERT(pan_get_connection_state() == BTPAN_STATE_CONNECTED, "Invalid PAN state after connect: %d", pan_get_connection_state());
H A Drfcomm.c48 error = socket_interface->connect(&bt_remote_bdaddr, BTSOCK_RFCOMM, (const uint8_t *)&HFP_AG_UUID, 0, &fd, 0);
/system/core/adb/
H A Dtest_track_devices.cpp37 ret = connect( s, (struct sockaddr*) &server, sizeof(server) );
38 if (ret < 0) panic( "could not connect to server" );
/system/netd/client/
H A DFwmarkClient.cpp53 if (TEMP_FAILURE_RETRY(connect(mChannel, reinterpret_cast<const sockaddr*>(&FWMARK_SERVER_PATH),
55 // If we are unable to connect to the fwmark server, assume there's no error. This protects
/system/extras/tests/net_test/
H A Dping6_test.py313 s.connect(("127.0.0.1", 55))
320 s.connect(("::1", 55))
377 s.connect(("127.0.0.1", 12345))
403 # We can't just call s.connect(), s.bind() etc. with a tuple of the wrong
666 s.connect(("127.0.0.1", 0xbeef))
676 s.connect(("::1", 0xbeef))
683 s.connect(("127.0.0.1", 0xbeef))
691 s.connect(("::1", 0xbeef))
698 # Try send, bind and connect to check the addresses and the state.
712 s.connect(("ff0
[all...]
H A Dcsocket.py110 """Python wrapper for connect."""
116 """Python wrapper for connect."""
117 ret = libc.connect(s.fileno(), to.CPointer(), len(to))
H A Dmultinetwork_test.py314 self.assertRaisesErrno(errno.EINPROGRESS, s.connect, (dstaddr, 53))
315 msg = "IPv%s TCP connect: expected %s on %s" % (
335 s.connect((dstaddr, 53))
337 self.ExpectPacketOn(netid, msg % "connect/send", expected)
426 # If we're testing connected sockets, connect the socket on the first
431 s.connect((dstaddr, 53))
914 s.connect((dstaddr, 1234))
943 s2.connect((dstaddr, 1234))
H A Dsrcaddr_selection_test.py62 s.connect((net_test.IPV6_ADDR, 123))
H A Diproute.py365 self.sock.connect((0, 0)) # The kernel.
/system/core/include/usbhost/
H A Dusbhost.h189 /* Requests the kernel to connect or disconnect its driver for the specified interface.
194 unsigned int interface, int connect);
/system/bt/tools/bdtool/
H A Dbdtool.c230 int error = sock->connect(&bt_remote_bdaddr, BTSOCK_RFCOMM, (const uint8_t *)&HFP_AG_UUID, 0, &rfcomm_fd, 0);
232 fprintf(stderr, "Unable to connect to RFCOMM socket: %d.\n", error);
241 error = sock->connect(&bt_remote_bdaddr, BTSOCK_SCO, NULL, 5, &sock_fd, 0);
243 fprintf(stderr, "Unable to connect to SCO socket: %d.\n", error);
/system/bt/tools/hci/
H A Dmain.c152 if (connect(sock, (const struct sockaddr *)&addr, sizeof(addr)) == -1)
/system/bt/btif/src/
H A Dbtif_hf_client.c208 ** Function connect
210 ** Description connect to audio gateway
229 static bt_status_t connect( bt_bdaddr_t *bd_addr ) function
670 .connect = connect,
H A Dbtif_hf.c741 ** Function connect
743 ** Description connect to headset
777 static bt_status_t connect( bt_bdaddr_t *bd_addr ) function
1575 connect,
H A Dbtif_hh.c122 * NUMLOCK state toggle on fpr first connect.*/
657 pagescan mode, we will do 2 retries to connect before giving up */
774 // The connect request must come from device side and exceeded the connected
999 keys work from first keyboard connect */
1239 ** Function connect
1241 ** Description connect to hid device
1246 static bt_status_t connect( bt_bdaddr_t *bd_addr) function
1685 connect,
/system/bt/stack/avdt/
H A Davdt_ccb_act.c1016 p_ccb->p_conn_cback = p_data->connect.p_cback;
1019 BTM_SetSecurityLevel(TRUE, "", BTM_SEC_SERVICE_AVDTP, p_data->connect.sec_mask,
H A Davdt_api.c246 ** and connect to this endpoint.
1054 evt.connect.p_cback = p_cback;
1055 evt.connect.sec_mask = sec_mask;
H A Davdt_int.h104 /* scb transport channel connect timeout value */
415 tAVDT_CCB_API_CONNECT connect; member in union:__anon799
/system/core/libusbhost/
H A Dusbhost.c549 unsigned int interface, int connect)
554 ctl.ioctl_code = (connect ? USBDEVFS_CONNECT : USBDEVFS_DISCONNECT);
548 usb_device_connect_kernel_driver(struct usb_device *device, unsigned int interface, int connect) argument
/system/core/adb/tests/
H A Dtest_adb.py200 def connect(self, host): member in class:AdbWrapper
201 return call_checked(self.adb_cmd + "connect {}".format(host))
/system/core/liblog/
H A Dlogd_write.c122 if (TEMP_FAILURE_RETRY(connect(i, (struct sockaddr *)&un,
H A Dlog_read.c148 * connect to peer named "name" on fd
167 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) {
178 * connect to peer named "name"

Completed in 677 milliseconds

12