/titanic_41/usr/src/cmd/lms/ |
H A D | Protocol.h | 47 #define SOCKET int macro 48 #define INVALID_SOCKET (SOCKET)(~0) 95 static int _isLocalCallback(void *const param, SOCKET s); 97 static int _isRemoteCallback(void *const param, SOCKET s); 119 bool _acceptConnection(SOCKET s, unsigned int port); 120 int _rxFromSocket(SOCKET s); 125 int _isRemote(SOCKET s) const; 133 Channel *_getSockOpenChannel(SOCKET s); 137 SOCKET s; 150 SOCKET _serverSignalSocket; [all …]
|
H A D | PortForwardRequest.h | 37 #ifndef SOCKET 38 #define SOCKET int macro 42 typedef int (*IsConnectionPermittedCallback)(void * const param, SOCKET s); 54 SOCKET listeningSocket, in PortForwardRequest() 66 SOCKET GetListeningSocket() const { return _listeningSocket; } in GetListeningSocket() 68 int IsConnectionPermitted(void *param, SOCKET s) in IsConnectionPermitted() 96 const SOCKET _listeningSocket;
|
H A D | Channel.h | 37 #ifndef SOCKET 38 #define SOCKET int macro 54 Channel(PortForwardRequest *portForwardRequest, SOCKET socket) : in Channel() 91 SOCKET GetSocket() const { return _socket; } in GetSocket() 100 const SOCKET _socket;
|
H A D | Protocol.cpp | 165 Channel *Protocol::_getSockOpenChannel(SOCKET s) 357 SOCKET s_new = accept(_serverSignalSocket, (struct sockaddr *)&addr, &addrLen); 392 bool Protocol::_acceptConnection(SOCKET s, unsigned int port) 402 SOCKET s_new = ATNetworkTool::Accept(s, addr, error); 501 SOCKET serverSocket = it->second[0]->GetListeningSocket(); 518 SOCKET socket = it->second->GetSocket(); 567 SOCKET serverSocket = it->second[0]->GetListeningSocket(); 590 int Protocol::_rxFromSocket(SOCKET s) 721 SOCKET serverSocket = (*it2)->GetListeningSocket(); 1067 SOCKET serverSocket = INVALID_SOCKET; [all …]
|
H A D | ProtocolCompat.cpp | 58 SOCKET s_new = INVALID_SOCKET; in _LmeReceiveCompat()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | genaddrs.c | 84 SOCKET fd = (SOCKET) infd; in krb5_auth_con_genaddrs()
|
H A D | net_write.c | 46 cc = SOCKET_WRITE((SOCKET)fd, buf, wrlen); in krb5_net_write()
|
H A D | net_read.c | 47 cc = SOCKET_READ((SOCKET)fd, buf, len); in krb5_net_read()
|
H A D | localaddr.c | 1446 SOCKET sock; in local_addr_fallback_kludge()
|
/titanic_41/usr/src/uts/common/inet/ip/ |
H A D | THIRDPARTYLICENSE.rts.descrip | 1 PORTIONS OF IP ROUTING SOCKET FUNCTIONALITY
|
/titanic_41/usr/src/uts/common/io/ib/clients/rds/ |
H A D | THIRDPARTYLICENSE.descrip | 1 PORTIONS OF RELIABLE DATAGRAM SOCKET SUPPORT
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | port-sockets.h | 122 #define SOCKET int macro 123 #define INVALID_SOCKET ((SOCKET)~0)
|
H A D | cm.h | 58 SOCKET fd;
|
/titanic_41/usr/src/cmd/krb5/slave/ |
H A D | kprop.c | 366 #ifdef SOCKET 367 #undef SOCKET 384 enum err_types {SOCKET, CONNECT}; enumerator 410 which_err = SOCKET; 428 case SOCKET:
|
/titanic_41/usr/src/lib/krb5/kadm5/clnt/ |
H A D | changepw.c | 104 SOCKET s1 = INVALID_SOCKET; 105 SOCKET s2 = INVALID_SOCKET;
|
/titanic_41/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_ipc.h | 106 # define dnssd_sock_t SOCKET
|
/titanic_41/usr/src/head/ |
H A D | lber.h | 104 typedef SOCKET LBER_SOCKET;
|
/titanic_41/usr/src/lib/libsocket/common/ |
H A D | mapfile-vers | 42 SYMBOL_VERSION ILLUMOS_0.2 { # reentrant ethers(3SOCKET)
|
/titanic_41/usr/src/cmd/mandoc/ |
H A D | msec.in | 83 LINE("3SOCKET", "Sockets Library Functions")
|
/titanic_41/usr/src/uts/common/os/ |
H A D | priv_defs | 229 SO_MAC_EXEMPT socket option by using setsockopt(3SOCKET). 241 setsockopt(3SOCKET). This allows a privileged process to
|
/titanic_41/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 269 fatal_cleanup(), and thence will forcibly shutdown(3SOCKET) the
|