| /src/external/bsd/libpcap/dist/rpcapd/ |
| daemon.h | 45 int daemon_serviceloop(PCAP_SOCKET sockctrl, int isactive, char *passiveClients,
|
| daemon.c | 96 PCAP_SOCKET sockctrl; //!< PCAP_SOCKET ID of the control connection member in struct:daemon_slpars 111 PCAP_SOCKET sockctrl; member in struct:session 113 SSL *ctrl_ssl, *data_ssl; // optional SSL handlers for sockctrl and sockdata. 126 static int daemon_msg_err(PCAP_SOCKET sockctrl, SSL *, uint32 plen); 143 static int daemon_unpackapplyfilter(PCAP_SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf); 212 daemon_serviceloop(PCAP_SOCKET sockctrl, int isactive, char *passiveClients, 261 nrecv = sock_recv(sockctrl, NULL, (char *)&first_octet, 1, 301 nrecv = rpcapd_recv_msg_header(sockctrl, NULL, &header); 315 if (rpcapd_discard(sockctrl, NULL, plen) == -1) 325 if (rpcap_senderror(sockctrl, NULL, header.ver [all...] |
| rpcapd.c | 425 int sockctrl; local 431 sockctrl = dup(0); 432 if (sockctrl == -1) 467 (void)daemon_serviceloop(sockctrl, 0, hostlist_copy, 1130 PCAP_SOCKET sockctrl; member in struct:params_copy 1143 PCAP_SOCKET sockctrl; // keeps the socket ID for this control connection local 1163 sockctrl = accept(listen_sock, (struct sockaddr *) &from, &fromlen); 1165 if (sockctrl != INVALID_SOCKET) 1205 if (WSAEventSelect(sockctrl, NULL, 0) == SOCKET_ERROR) 1210 sock_close(sockctrl, NULL, 0) 1337 PCAP_SOCKET sockctrl; \/\/ keeps the socket ID for this control connection local [all...] |
| /src/external/bsd/libpcap/dist/ |
| pcap-rpcap.c | 94 PCAP_SOCKET sockctrl; member in struct:activehosts 178 static void rpcap_msg_err(PCAP_SOCKET sockctrl, SSL *, uint32 plen, char *remote_errbuf); 751 if (temp->sockctrl == pr->rmt_sockctrl) 1132 if (temp->sockctrl == pr->rmt_sockctrl) 1974 static int rpcap_doauth(PCAP_SOCKET sockctrl, SSL *ssl, uint8 *ver, 2076 if (sock_send(sockctrl, ssl, sendbuf, sendbufidx, errbuf, 2081 if (rpcap_process_msg_header(sockctrl, ssl, 0, RPCAP_MSG_AUTH_REQ, 2101 (void)rpcap_discard(sockctrl, ssl, plen, NULL); 2126 (void)rpcap_discard(sockctrl, ssl, plen, NULL); 2131 if (rpcap_recv(sockctrl, ssl, (char *)&authreply 2448 PCAP_SOCKET sockctrl; local 2620 PCAP_SOCKET sockctrl; \/* socket descriptor of the control connection *\/ local 2931 PCAP_SOCKET sockctrl; \/* keeps the main socket identifier *\/ local [all...] |
| /src/sys/arch/sparc64/sparc64/ |
| rbus_machdep.c | 206 uint32_t sockstat, sockctrl; local 217 sockctrl = bus_space_read_4(memt, memh, CB_SOCKET_CTRL); 218 DPRINTF("%s: pccbb_cardbus_isvalid: sockctrl %08x\n", 219 device_xname(sc->sc_dev), sockctrl); 220 if ((sockctrl & CB_SOCKET_CTRL_VCCMASK) == 0)
|