/dragonfly/tools/tools/net80211/w00t/redir/ |
H A D | redir.c | 437 if (connect(p->s, (struct sockaddr*) &s_in, sizeof(s_in)) == -1) in connect_buddy()
|
/dragonfly/lib/libthread_xu/thread/ |
H A D | thr_syscalls.c | 230 __strong_reference(__connect, connect);
|
/dragonfly/libexec/tftpd/ |
H A D | tftpd.c | 296 if (connect(peer, (struct sockaddr *)&from, from.ss_len) < 0) { in main()
|
/dragonfly/sbin/iscontrol/ |
H A D | fsm.c | 144 if(connect(soc, res->ai_addr, res->ai_addrlen) == 0) in tcpConnect()
|
/dragonfly/crypto/openssh/ |
H A D | authfd.c | 105 connect(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) { in ssh_get_authentication_socket_path()
|
H A D | ssh-keyscan.c | 374 if (connect(s, ai->ai_addr, ai->ai_addrlen) == -1 && in tcpconnect()
|
H A D | misc.c | 361 return connect(sockfd, serv_addr, addrlen); in timeout_connect() 365 if (connect(sockfd, serv_addr, addrlen) == 0) { in timeout_connect()
|
/dragonfly/sys/netgraph7/bluetooth/socket/ |
H A D | ng_btsocket_rfcomm.c | 520 struct socket *so = msg->connect.base.nm_so; in ng_btsocket_rfcomm_connect() 521 struct sockaddr *nam = msg->connect.nm_nam; in ng_btsocket_rfcomm_connect() 522 struct thread *td = msg->connect.nm_td; in ng_btsocket_rfcomm_connect() 665 lwkt_replymsg(&msg->connect.base.lmsg, error); in ng_btsocket_rfcomm_connect()
|
/dragonfly/usr.sbin/rtadvctl/ |
H A D | rtadvctl.c | 210 if (connect(s->si_fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) in csock_client_open()
|
/dragonfly/sys/netgraph7/ |
H A D | ng_source.c | 257 .connect = ng_source_connect,
|
/dragonfly/sys/netgraph7/bluetooth/drivers/h4/ |
H A D | ng_h4.c | 129 .connect = ng_h4_connect,
|
/dragonfly/contrib/tcp_wrappers/ |
H A D | README | 67 connect to what network daemons; client user name lookups with the RFC 120 connect to one of your systems, a telnet server process is executed on 243 Access control can also be used to connect clients to the "right" 676 attempts to connect to our portmap process. The telnet command should 928 will be taken, when hosts connect to your own system. The program is
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | README-HS20 | 395 > enable_network 0 no-connect 435 to connect with:
|
/dragonfly/etc/ |
H A D | termcap.small | 174 # communications packages (but NOT PC/IX connect) do some kind of emulation.
|
/dragonfly/contrib/ldns/ |
H A D | net.c | 211 if (connect(sockfd, (struct sockaddr*)to, tolen) == SOCK_INVALID) {
|
/dragonfly/contrib/tcpdump/ |
H A D | README.md | 189 - On a local host (but not the Sun running tcpdump), connect to
|
/dragonfly/usr.bin/telnet/ |
H A D | commands.c | 2213 if (connect(net, (struct sockaddr *)&su, sizeof su) == -1) { in tn() 2371 if (connect(net, res->ai_addr, res->ai_addrlen) < 0) { in tn()
|
/dragonfly/usr.sbin/traceroute6/ |
H A D | traceroute6.c | 685 if (connect(dummy, (struct sockaddr *)&Nxt, Nxt.sin6_len) < 0) { in main()
|
/dragonfly/sys/netgraph7/bluetooth/hci/ |
H A D | ng_hci_main.c | 89 .connect = ng_hci_connect,
|
/dragonfly/usr.sbin/ppp/ |
H A D | ppp.8.m4 | 536 This only ever happens if you connect to a running version of 978 will perform the dialing action (chat script) and try to connect 984 If the connect fails, the default behaviour is to wait 30 seconds 985 and then attempt to connect when another outgoing packet is detected. 1000 to connect again. 1046 will attempt to connect 4 times for each outgoing packet that causes 1060 to attempt to connect 20 times. 2400 If you wish to use more than one physical link to connect to a 2940 mode) to properly connect the process that caused the PPP link to 4511 will attempt to connect to the given [all …]
|
/dragonfly/sys/kern/ |
H A D | uipc_usrreq.c | 423 error = unp_connect(msg->base.nm_so, msg->connect.nm_nam, in uipc_connect() 424 msg->connect.nm_td); in uipc_connect()
|
/dragonfly/usr.sbin/btconfig/ |
H A D | btconfig.c | 456 if (connect(hci, (struct sockaddr *)&sa, sizeof(sa)) < 0) in set_unit()
|
/dragonfly/sys/netgraph7/bluetooth/drivers/bt3c/ |
H A D | ng_bt3c_pccard.c | 236 .connect = ng_bt3c_connect,
|
/dragonfly/sys/platform/vkernel64/platform/ |
H A D | init.c | 1143 if (connect(net_fd, (void *)&sunx, len) < 0) { in unix_connect()
|
/dragonfly/lib/libfetch/ |
H A D | ftp.c | 775 if (connect(sd, (struct sockaddr *)&sa, sa.ss_len) == -1) in ftp_transfer()
|