/bionic/libc/bionic/ |
D | socket.cpp | 21 int socket(int domain, int type, int protocol) { in socket() function 22 return __netdClientDispatch.socket(domain, type, protocol); in socket()
|
D | send.cpp | 31 ssize_t send(int socket, const void* buf, size_t len, int flags) __overloadable { in send() argument 32 return sendto(socket, buf, len, flags, NULL, 0); in send()
|
D | recv.cpp | 32 ssize_t recv(int socket, void *buf, size_t len, int flags) { in recv() argument 33 return recvfrom(socket, buf, len, flags, NULL, 0); in recv()
|
D | NetdClient.cpp | 49 netdClientInitFunction(netdClientHandle, "netdClientInitSocket", &__netdClientDispatch.socket); in netdClientInitImpl()
|
D | net_if.cpp | 48 int s = socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, 0); in if_indextoname() 62 int s = socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, 0); in if_nametoindex()
|
D | bionic_netlink.cpp | 63 fd_ = socket(PF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_ROUTE); in SendRequest()
|
D | fortify.cpp | 221 ssize_t __recvfrom_chk(int socket, void* buf, size_t len, size_t buf_size, in __recvfrom_chk() argument 224 return recvfrom(socket, buf, len, flags, src_addr, addrlen); in __recvfrom_chk() 227 ssize_t __sendto_chk(int socket, const void* buf, size_t len, size_t buflen, in __sendto_chk() argument 231 return sendto(socket, buf, len, flags, dest_addr, addrlen); in __sendto_chk()
|
D | system_properties.cpp | 481 socket_ = ::socket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0); in PropertyServiceConnection() 514 int socket() { in socket() function in PropertyServiceConnection 580 if (writev(connection_->socket(), iov_, iov_index_) == -1) { in Send() 615 int s = connection.socket(); in send_prop_msg()
|
D | libc_logging.cpp | 459 int log_fd = TEMP_FAILURE_RETRY(socket(PF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0)); in __libc_open_log_socket()
|
/bionic/libc/private/ |
D | NetdClientDispatch.h | 28 int (*socket)(int, int, int); member
|
/bionic/tools/bionicbb/ |
D | tasks.py | 20 import socket 88 except socket.error:
|
/bionic/libc/include/sys/ |
D | socket.h | 317 __socketcall int socket(int, int, int); 386 ssize_t send(int socket, const void* buf, size_t len, int flags) 450 ssize_t recv(int socket, void* const buf __pass_object_size0, size_t len, in recv() argument 452 return recvfrom(socket, buf, len, flags, NULL, 0); in recv() 456 ssize_t send(int socket, const void* const buf __pass_object_size0, size_t len, int flags) in send() argument 458 return sendto(socket, buf, len, flags, NULL, 0); in send()
|
/bionic/tests/ |
D | sys_socket_test.cpp | 37 int fd = socket(PF_UNIX, SOCK_SEQPACKET | SOCK_CLOEXEC | SOCK_NONBLOCK, 0); in ConnectFn() 64 int fd = socket(PF_UNIX, SOCK_SEQPACKET, 0); in RunTest()
|
D | ifaddrs_test.cpp | 119 int fd = socket(AF_INET, SOCK_DGRAM, 0); in CheckAddressIsInSet()
|
/bionic/libc/ |
D | SECCOMP_BLACKLIST.TXT | 24 # For example, socket() syscall on i386 actually becomes:
|
D | SECCOMP_WHITELIST.TXT | 21 # For example, socket() syscall on i386 actually becomes:
|
D | SYSCALLS.TXT | 20 # For example, socket() syscall on i386 actually becomes: 240 int __socket:socket(int, int, int) arm,arm64,mips,mips64,x86_64
|
D | libc.mips64.map | 893 socket;
|
D | libc.x86_64.map | 893 socket;
|
D | libc.arm64.map | 893 socket;
|
D | libc.x86.map | 948 socket;
|
/bionic/libc/dns/resolv/ |
D | res_send.c | 799 statp->_vcsock = socket(nsap->sa_family, SOCK_STREAM | SOCK_CLOEXEC, 0); in send_vc() 1100 EXT(statp).nssocks[ns] = socket(nsap->sa_family, SOCK_DGRAM | SOCK_CLOEXEC, 0); in send_dg()
|
/bionic/libc/tools/ |
D | posix-2013.txt | 973 socket
|
/bionic/libc/dns/net/ |
D | getaddrinfo.c | 878 s = socket(pai->ai_family, SOCK_DGRAM | SOCK_CLOEXEC, 0); in explore_null() 1800 sock = socket(addr->sa_family, SOCK_DGRAM | SOCK_CLOEXEC, IPPROTO_UDP); in _find_src_addr()
|
D | gethnamaddr.c | 570 int s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0); in android_open_proxy()
|