HomeSort by: relevance | last modified time | path
    Searched refs:sockctrl (Results 1 - 5 of 5) sorted by relevancy

  /src/external/bsd/libpcap/dist/rpcapd/
daemon.h 45 int daemon_serviceloop(PCAP_SOCKET sockctrl, int isactive, char *passiveClients,
daemon.c 96 PCAP_SOCKET sockctrl; //!< PCAP_SOCKET ID of the control connection member in struct:daemon_slpars
111 PCAP_SOCKET sockctrl; member in struct:session
113 SSL *ctrl_ssl, *data_ssl; // optional SSL handlers for sockctrl and sockdata.
126 static int daemon_msg_err(PCAP_SOCKET sockctrl, SSL *, uint32 plen);
143 static int daemon_unpackapplyfilter(PCAP_SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf);
212 daemon_serviceloop(PCAP_SOCKET sockctrl, int isactive, char *passiveClients,
261 nrecv = sock_recv(sockctrl, NULL, (char *)&first_octet, 1,
301 nrecv = rpcapd_recv_msg_header(sockctrl, NULL, &header);
315 if (rpcapd_discard(sockctrl, NULL, plen) == -1)
325 if (rpcap_senderror(sockctrl, NULL, header.ver
    [all...]
rpcapd.c 425 int sockctrl; local
431 sockctrl = dup(0);
432 if (sockctrl == -1)
467 (void)daemon_serviceloop(sockctrl, 0, hostlist_copy,
1130 PCAP_SOCKET sockctrl; member in struct:params_copy
1143 PCAP_SOCKET sockctrl; // keeps the socket ID for this control connection local
1163 sockctrl = accept(listen_sock, (struct sockaddr *) &from, &fromlen);
1165 if (sockctrl != INVALID_SOCKET)
1205 if (WSAEventSelect(sockctrl, NULL, 0) == SOCKET_ERROR)
1210 sock_close(sockctrl, NULL, 0)
1337 PCAP_SOCKET sockctrl; \/\/ keeps the socket ID for this control connection local
    [all...]
  /src/external/bsd/libpcap/dist/
pcap-rpcap.c 94 PCAP_SOCKET sockctrl; member in struct:activehosts
178 static void rpcap_msg_err(PCAP_SOCKET sockctrl, SSL *, uint32 plen, char *remote_errbuf);
751 if (temp->sockctrl == pr->rmt_sockctrl)
1132 if (temp->sockctrl == pr->rmt_sockctrl)
1974 static int rpcap_doauth(PCAP_SOCKET sockctrl, SSL *ssl, uint8 *ver,
2076 if (sock_send(sockctrl, ssl, sendbuf, sendbufidx, errbuf,
2081 if (rpcap_process_msg_header(sockctrl, ssl, 0, RPCAP_MSG_AUTH_REQ,
2101 (void)rpcap_discard(sockctrl, ssl, plen, NULL);
2126 (void)rpcap_discard(sockctrl, ssl, plen, NULL);
2131 if (rpcap_recv(sockctrl, ssl, (char *)&authreply
2448 PCAP_SOCKET sockctrl; local
2620 PCAP_SOCKET sockctrl; \/* socket descriptor of the control connection *\/ local
2931 PCAP_SOCKET sockctrl; \/* keeps the main socket identifier *\/ local
    [all...]
  /src/sys/arch/sparc64/sparc64/
rbus_machdep.c 206 uint32_t sockstat, sockctrl; local
217 sockctrl = bus_space_read_4(memt, memh, CB_SOCKET_CTRL);
218 DPRINTF("%s: pccbb_cardbus_isvalid: sockctrl %08x\n",
219 device_xname(sc->sc_dev), sockctrl);
220 if ((sockctrl & CB_SOCKET_CTRL_VCCMASK) == 0)

Completed in 37 milliseconds