/external/clang/test/Analysis/ |
D | pr_4164.c | 16 int getsockopt(int, int, int, void * restrict, socklen_t * restrict); 22 if (getsockopt(s, 0xffff, 0x1001, (char *)&size, &size_len) < 0) in test1()
|
/external/bluetooth/bluez/btio/ |
D | btio.c | 155 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &err, &len) < 0) in connect_cb() 305 if (getsockopt(sock, SOL_L2CAP, L2CAP_LM, &flags, &len) < 0) in l2cap_set_master() 330 if (getsockopt(sock, SOL_RFCOMM, RFCOMM_LM, &flags, &len) < 0) in rfcomm_set_master() 442 if (getsockopt(sock, SOL_L2CAP, L2CAP_LM, &opt, &len) < 0) in l2cap_get_lm() 463 if (getsockopt(sock, SOL_RFCOMM, RFCOMM_LM, &opt, &len) < 0) in rfcomm_get_lm() 486 if (getsockopt(sock, SOL_BLUETOOTH, BT_POWER, &pwr, &len) == 0) { in get_force_active() 508 if (getsockopt(sock, SOL_BLUETOOTH, BT_SECURITY, &sec, &len) == 0) { in get_sec_level() 552 if (getsockopt(sock, SOL_L2CAP, L2CAP_OPTIONS, &l2o, in l2cap_set() 685 if (getsockopt(sock, SOL_SCO, SCO_OPTIONS, &sco_opt, &len) < 0) { in sco_set() 816 if (getsockopt(sock, SOL_L2CAP, L2CAP_CONNINFO, &info, &len) < 0) in l2cap_get_info() [all …]
|
/external/libselinux/src/ |
D | getpeercon.c | 26 ret = getsockopt(fd, SOL_SOCKET, SO_PEERSEC, buf, &size); in getpeercon() 36 ret = getsockopt(fd, SOL_SOCKET, SO_PEERSEC, buf, &size); in getpeercon()
|
/external/openssl/crypto/bio/ |
D | bss_dgram.c | 268 if (getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, in dgram_adjust_rcv_timeout() 277 if ( getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, in dgram_adjust_rcv_timeout() 580 if ((ret = getsockopt(b->num, IPPROTO_IP, IP_MTU, (void *)&sockopt_val, in dgram_ctrl() 596 if ((ret = getsockopt(b->num, IPPROTO_IPV6, IPV6_MTU, (void *)&sockopt_val, in dgram_ctrl() 734 if (getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, in dgram_ctrl() 745 if ( getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, in dgram_ctrl() 772 if (getsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, in dgram_ctrl() 783 if ( getsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, in dgram_ctrl() 872 ret = getsockopt(fd, IPPROTO_SCTP, SCTP_LOCAL_AUTH_CHUNKS, authchunks, &sockopt_len); in BIO_new_dgram_sctp() 898 ret = getsockopt(fd, IPPROTO_SCTP, SCTP_EVENTS, &event, &sockopt_len); in BIO_new_dgram_sctp() [all …]
|
/external/iptables/extensions/ |
D | libxt_set.h | 27 res = getsockopt(sockfd, SOL_IP, SO_IP_SET, &req_version, &size); in get_version() 47 res = getsockopt(sockfd, SOL_IP, SO_IP_SET, &req, &size); in get_set_byid() 77 res = getsockopt(sockfd, SOL_IP, SO_IP_SET, &req, &size); in get_set_byname()
|
/external/valgrind/main/memcheck/tests/ |
D | null_socket.c | 17 if (-1 != getsockopt(0, 0, 0, NULL, 0)) in main()
|
/external/bluetooth/bluez/test/ |
D | scotest.c | 110 if (getsockopt(sk, SOL_SCO, SCO_CONNINFO, &conn, &optlen) < 0) { in do_connect() 186 if (getsockopt(nsk, SOL_SCO, SCO_CONNINFO, &conn, &optlen) < 0) { in do_listen() 264 if (getsockopt(sk, SOL_SCO, SCO_OPTIONS, &so, &len) < 0) { in send_mode()
|
D | l2test.c | 223 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { in do_connect() 308 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { in do_connect() 318 if (getsockopt(sk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) { in do_connect() 396 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { in do_listen() 477 if (getsockopt(nsk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { in do_listen() 490 if (getsockopt(nsk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) { in do_listen() 594 if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) { in dump_mode() 663 if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) { in recv_mode()
|
D | hstest.c | 115 if (getsockopt(s, SOL_SCO, SCO_CONNINFO, &conn, &size) < 0) { in sco_connect() 123 if (getsockopt(s, SOL_SCO, SCO_OPTIONS, &opts, &size) < 0) { in sco_connect()
|
D | rctest.c | 229 if (getsockopt(sk, SOL_RFCOMM, RFCOMM_CONNINFO, &conn, &optlen) < 0) { in do_connect() 344 if (getsockopt(nsk, SOL_RFCOMM, RFCOMM_CONNINFO, &conn, &optlen) < 0) { in do_listen()
|
/external/openssh/ |
D | roaming_common.c | 58 if (getsockopt(fd, SOL_SOCKET, SO_SNDBUF, &optval, &optvallen) != 0) in get_snd_buf_size() 70 if (getsockopt(fd, SOL_SOCKET, SO_RCVBUF, &optval, &optvallen) != 0) in get_recv_buf_size()
|
D | aclocal.m4 | 56 dnl types for the argument to getsockopt, getpeername, etc. So we
|
/external/kernel-headers/original/linux/ |
D | net.h | 152 int (*getsockopt)(struct socket *sock, int level, member 262 SOCKCALL_WRAP(name, getsockopt, (struct socket *sock, int level, int optname, \ 286 .getsockopt = __lock_##name##_getsockopt, \
|
/external/openssh/openbsd-compat/ |
D | bsd-getpeereid.c | 33 if (getsockopt(s, SOL_SOCKET, SO_PEERCRED, &cred, &len) < 0) in getpeereid()
|
/external/dbus/dbus/ |
D | sd-daemon.c | 176 if (getsockopt(fd, SOL_SOCKET, SO_TYPE, &other_type, &l) < 0) in sd_is_socket_internal() 190 if (getsockopt(fd, SOL_SOCKET, SO_ACCEPTCONN, &accepting, &l) < 0) in sd_is_socket_internal()
|
/external/valgrind/main/coregrind/ |
D | pub_core_libcfile.h | 72 extern Int VG_(getsockopt) ( Int sd, Int level, Int optname,
|
/external/bluetooth/bluez/compat/ |
D | pand.c | 195 getsockopt(sk, SOL_SOCKET, SO_ERROR, &err, &olen); in w4_hup() 246 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen) < 0) { in do_listen() 353 getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen); in create_connection()
|
/external/libpcap/lbl/ |
D | os-sunos4.h | 103 int getsockopt(int, int, int, char *, int *);
|
/external/tcpdump/lbl/ |
D | os-sunos4.h | 103 int getsockopt(int, int, int, char *, int *);
|
/external/qemu/ |
D | migration-tcp.c | 61 ret = getsockopt(s->fd, SOL_SOCKET, SO_ERROR, (void *) &val, &valsize); in tcp_wait_for_connect()
|
/external/ipsec-tools/src/libipsec/ |
D | test-policy.c | 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) {
|
/external/chromium/third_party/libjingle/source/talk/base/ |
D | physicalsocketserver.cc | 126 VERIFY(0 == getsockopt(s_, SOL_SOCKET, SO_TYPE, (SockOptArg)&type, &len)); in PhysicalSocket() 249 int ret = ::getsockopt(s_, slevel, sopt, (SockOptArg)value, &optlen); in GetOption() 438 int err = getsockopt(s_, IPPROTO_IP, IP_MTU, &value, &vlen); in EstimateMTU() 1316 ::getsockopt(fd, SOL_SOCKET, SO_ERROR, &errcode, &len); in Wait()
|
/external/valgrind/main/memcheck/tests/darwin/ |
D | scalar.stderr.exp | 355 Syscall param getsockopt(s) contains uninitialised byte(s) 358 Syscall param getsockopt(level) contains uninitialised byte(s) 361 Syscall param getsockopt(optname) contains uninitialised byte(s) 364 Syscall param getsockopt(optval) contains uninitialised byte(s) 367 Syscall param getsockopt(optlen) contains uninitialised byte(s)
|
/external/libpcap/ |
D | pcap-linux.c | 805 if (getsockopt(handle->fd, SOL_PACKET, PACKET_STATISTICS, in pcap_stats_linux() 1648 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &err, &errlen) == -1) { in iface_bind() 1919 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &err, &errlen) == -1) { in iface_bind_old()
|
/external/bluetooth/bluez/src/ |
D | sdpd-server.c | 103 if (getsockopt(l2cap_sock, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { in init_server()
|