/external/ppp/pppd/plugins/radius/ |
D | config.c | 31 static OPTION *find_option(char *optname, unsigned int type) in find_option() argument 37 if (!strcmp(config_options[i].name, optname) && in find_option() 267 char *rc_conf_str(char *optname) in rc_conf_str() argument 271 option = find_option(optname, OT_STR); in rc_conf_str() 274 fatal("rc_conf_str: unkown config option requested: %s", optname); in rc_conf_str() 278 int rc_conf_int(char *optname) in rc_conf_int() argument 282 option = find_option(optname, OT_INT|OT_AUO); in rc_conf_int() 285 fatal("rc_conf_int: unkown config option requested: %s", optname); in rc_conf_int() 289 SERVER *rc_conf_srv(char *optname) in rc_conf_srv() argument 293 option = find_option(optname, OT_SRV); in rc_conf_srv() [all …]
|
/external/android-clat/ |
D | setif.c | 29 #define DEBUG_OPTNAME(a) case (a): { optname = #a; break; } 136 char *optname; in do_anycast_setsockopt() local 143 optname = "???"; in do_anycast_setsockopt() 149 logmsg(ANDROID_LOG_ERROR, "%s: setsockopt(%s): %s", __func__, optname, strerror(errno)); in do_anycast_setsockopt()
|
/external/ipsec-tools/src/libipsec/ |
D | test-policy.c | 156 int proto = 0, optname = 0; local 163 optname = IP_IPSEC_POLICY; 167 optname = IPV6_IPSEC_POLICY; 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) {
|
/external/iptables/extensions/ |
D | libxt_iprange.c | 45 uint8_t family, const char *optname) in iprange_parse_spec() argument 59 optname, spec[i]); in iprange_parse_spec() 67 optname, spec[i]); in iprange_parse_spec() 74 uint8_t family, const char *optname) in iprange_parse_range() argument 83 iprange_parse_spec(arg, arg, range, family, optname); in iprange_parse_range() 89 iprange_parse_spec(arg, dash + 1, range, family, optname); in iprange_parse_range()
|
/external/valgrind/coregrind/ |
D | pub_core_libcfile.h | 75 extern Int VG_(getsockopt) ( Int sd, Int level, Int optname, 77 extern Int VG_(setsockopt) ( Int sd, Int level, Int optname,
|
D | m_libcfile.c | 1293 Int VG_(getsockopt) ( Int sd, Int level, Int optname, void *optval, in VG_() 1303 args[2] = optname; in VG_() 1314 (UWord)sd, (UWord)level, (UWord)optname, in VG_() 1321 (UWord)sd, (UWord)level, (UWord)optname, in VG_() 1327 res = VG_(do_syscall6)(__NR_getsockopt, sd, level, optname, (UWord)optval, in VG_() 1337 Int VG_(setsockopt) ( Int sd, Int level, Int optname, void *optval, in VG_() 1347 args[2] = optname; in VG_() 1358 (UWord)sd, (UWord)level, (UWord)optname, in VG_() 1365 (UWord)sd, (UWord)level, (UWord)optname, in VG_() 1372 (UWord)sd, (UWord)level, (UWord)optname, in VG_()
|
/external/webrtc/webrtc/test/channel_transport/ |
D | udp_socket_posix.cc | 116 bool UdpSocketPosix::SetSockopt(int32_t level, int32_t optname, in SetSockopt() argument 119 if(0 == setsockopt(_socket, level, optname, optval, optlen )) in SetSockopt()
|
D | udp_socket_posix.h | 41 int32_t optname,
|
D | udp_socket_wrapper.h | 69 virtual bool SetSockopt(int32_t level, int32_t optname,
|
D | udp_socket2_win.h | 51 int32_t optname,
|
D | udp_socket2_win.cc | 257 bool UdpSocket2Windows::SetSockopt(int32_t level, int32_t optname, in SetSockopt() argument 265 if(0 != setsockopt(_socket, level, optname, in SetSockopt()
|
/external/parameter-framework/asio-1.10.6/include/asio/detail/impl/ |
D | socket_ops.ipp | 1034 socket_type s, int level, int optname, 1037 return ::setsockopt(s, level, optname, 1041 int setsockopt(socket_type s, state_type& state, int level, int optname, 1050 if (level == custom_socket_option_level && optname == always_fail_option) 1057 && optname == enable_connection_aborted_option) 1073 if (level == SOL_SOCKET && optname == SO_LINGER) 1078 s, level, optname, optval, optlen), ec); 1087 && level == SOL_SOCKET && optname == SO_REUSEADDR) 1100 socket_type s, int level, int optname, 1104 int result = ::getsockopt(s, level, optname, (char*)optval, &tmp_optlen); [all …]
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
D | baseline_policy.cc | 238 const Arg<int> optname(2); in EvaluateSyscallImpl() local 239 return If(AllOf(level == SOL_SOCKET, optname == SO_PEEK_OFF), Allow()) in EvaluateSyscallImpl()
|
/external/parameter-framework/asio-1.10.6/include/asio/detail/ |
D | socket_ops.hpp | 190 int level, int optname, const void* optval, 194 int level, int optname, void* optval,
|
/external/kernel-headers/original/uapi/rdma/ |
D | rdma_user_cm.h | 289 __u32 optname; member
|
/external/v8/third_party/llvm-build/Release+Asserts/lib/clang/3.9.0/include/sanitizer/ |
D | linux_syscall_hooks.h | 1061 #define __sanitizer_syscall_pre_setsockopt(fd, level, optname, optval, optlen) \ argument 1063 (long)(optname), (long)(optval), \ 1065 #define __sanitizer_syscall_post_setsockopt(res, fd, level, optname, optval, \ argument 1068 (long)(optname), (long)(optval), \ 1070 #define __sanitizer_syscall_pre_getsockopt(fd, level, optname, optval, optlen) \ argument 1072 (long)(optname), (long)(optval), \ 1074 #define __sanitizer_syscall_post_getsockopt(res, fd, level, optname, optval, \ argument 1077 (long)(optname), (long)(optval), \ 2594 void __sanitizer_syscall_pre_impl_setsockopt(long fd, long level, long optname, 2597 long optname, long optval, [all …]
|
/external/compiler-rt/include/sanitizer/ |
D | linux_syscall_hooks.h | 1061 #define __sanitizer_syscall_pre_setsockopt(fd, level, optname, optval, optlen) \ argument 1063 (long)(optname), (long)(optval), \ 1065 #define __sanitizer_syscall_post_setsockopt(res, fd, level, optname, optval, \ argument 1068 (long)(optname), (long)(optval), \ 1070 #define __sanitizer_syscall_pre_getsockopt(fd, level, optname, optval, optlen) \ argument 1072 (long)(optname), (long)(optval), \ 1074 #define __sanitizer_syscall_post_getsockopt(res, fd, level, optname, optval, \ argument 1077 (long)(optname), (long)(optval), \ 2594 void __sanitizer_syscall_pre_impl_setsockopt(long fd, long level, long optname, 2597 long optname, long optval, [all …]
|
/external/vboot_reference/futility/ |
D | cmd_sign.c | 74 static int no_opt_if(int expr, const char *optname) in no_opt_if() argument 77 fprintf(stderr, "Missing --%s option\n", optname); in no_opt_if()
|
/external/netperf/src/ |
D | netlib.c | 3032 int optname = (which == SEND_BUFFER) ? SO_SNDBUF : SO_RCVBUF; in get_sock_buffer() local 3036 if (getsockopt(sd, SOL_SOCKET, optname, (char *)effective_sizep, in get_sock_buffer() 3061 int optname = (which == SEND_BUFFER) ? SO_SNDBUF : SO_RCVBUF; in set_sock_buffer() local 3070 if (setsockopt(sd, SOL_SOCKET, optname, in set_sock_buffer()
|
/external/valgrind/coregrind/m_syswrap/ |
D | syswrap-tilegx-linux.c | 740 int, s, int, level, int, optname, in PRE() 750 int, s, int, level, int, optname, in PRE()
|
D | syswrap-darwin.c | 3621 int, s, int, level, int, optname, in PRE() 3634 int, s, int, level, int, optname, in PRE()
|
/external/fio/ |
D | options.c | 4127 void add_opt_posval(const char *optname, const char *ival, const char *help) in add_opt_posval() argument 4132 o = find_option(fio_options, optname); in add_opt_posval() 4146 void del_opt_posval(const char *optname, const char *ival) in del_opt_posval() argument 4151 o = find_option(fio_options, optname); in del_opt_posval()
|
/external/valgrind/memcheck/tests/darwin/ |
D | scalar.stderr.exp | 364 Syscall param setsockopt(optname) contains uninitialised byte(s) 419 Syscall param getsockopt(optname) contains uninitialised byte(s)
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_common_syscalls.inc | 1742 PRE_SYSCALL(setsockopt)(long fd, long level, long optname, void *optval, 1745 POST_SYSCALL(setsockopt)(long res, long fd, long level, long optname, 1754 PRE_SYSCALL(getsockopt)(long fd, long level, long optname, void *optval, 1757 POST_SYSCALL(getsockopt)(long res, long fd, long level, long optname,
|
D | sanitizer_common_interceptors.inc | 2185 INTERCEPTOR(int, getsockopt, int sockfd, int level, int optname, void *optval, 2188 COMMON_INTERCEPTOR_ENTER(ctx, getsockopt, sockfd, level, optname, optval, 2194 int res = REAL(getsockopt)(sockfd, level, optname, optval, optlen);
|