/dragonfly/sys/kern/ |
H A D | uipc_proto.c | 58 .pr_type = SOCK_SEQPACKET, 96 SYSCTL_NODE(_net_local, SOCK_SEQPACKET, seqpacket, CTLFLAG_RW, 0,
|
H A D | uipc_usrreq.c | 260 case SOCK_SEQPACKET: in unp_globalhead() 564 case SOCK_SEQPACKET: in uipc_rcvd() 722 case SOCK_SEQPACKET: in uipc_send() 771 } else if (so->so_type == SOCK_SEQPACKET) { in uipc_send() 956 else if (so->so_type == SOCK_SEQPACKET) in uipc_ctloutput() 1044 case SOCK_SEQPACKET: in unp_attach() 1333 if ((so->so_type == SOCK_STREAM || so->so_type == SOCK_SEQPACKET) && in unp_connect2() 1386 case SOCK_SEQPACKET: in unp_disconnect() 1527 unp->unp_socket->so_type == SOCK_SEQPACKET) && in unp_shutdown() 2504 case SOCK_SEQPACKET: in unp_connect_pair()
|
/dragonfly/sys/netbt/ |
H A D | bt_proto.c | 84 .pr_type = SOCK_SEQPACKET, 99 .pr_type = SOCK_SEQPACKET,
|
/dragonfly/usr.bin/netstat/ |
H A D | unix.c | 70 for (type = SOCK_STREAM; type <= SOCK_SEQPACKET; type++) { in unixpr()
|
/dragonfly/usr.sbin/vknetd/ |
H A D | vknetd.c | 354 net_fd = socket(AF_UNIX, SOCK_SEQPACKET, 0); in vknet_listener() 457 net_fd = socket(AF_UNIX, SOCK_SEQPACKET, 0); in vknet_connect()
|
/dragonfly/sys/netgraph7/bluetooth/socket/ |
H A D | ng_btsocket.c | 179 .pr_type = SOCK_SEQPACKET,
|
H A D | ng_btsocket_rfcomm.c | 567 error = socreate(PF_BLUETOOTH, &l2so, SOCK_SEQPACKET, in ng_btsocket_rfcomm_connect() 932 socreate_error = socreate(PF_BLUETOOTH, &l2so, SOCK_SEQPACKET, in ng_btsocket_rfcomm_listen()
|
H A D | ng_btsocket_l2cap.c | 1926 if (so->so_type != SOCK_SEQPACKET) { in ng_btsocket_l2cap_attach()
|
/dragonfly/sbin/devd/ |
H A D | devd.cc | 870 if (i->socktype == SOCK_SEQPACKET) in notify_clients() 958 seqpacket_fd = create_socket(SEQPACKETPIPE, SOCK_SEQPACKET); in event_loop() 1049 new_client(seqpacket_fd, SOCK_SEQPACKET); in event_loop()
|
/dragonfly/lib/libsdp/ |
H A D | session.c | 92 ss->s = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP); in sdp_open()
|
/dragonfly/sys/sys/ |
H A D | socket.h | 95 #define SOCK_SEQPACKET 5 /* sequenced packet stream */ macro
|
/dragonfly/usr.bin/vknet/ |
H A D | vknet.c | 322 tap_fd = socket(AF_UNIX, SOCK_SEQPACKET, 0); in vknet_connect()
|
/dragonfly/contrib/dhcpcd/src/ |
H A D | privsep-root.c | 895 if (xsocketpair(AF_UNIX, SOCK_SEQPACKET | SOCK_CXNB, 0, logfd) == -1) in ps_root_start() 902 if (socketpair(AF_UNIX, SOCK_SEQPACKET | SOCK_CXNB, 0, datafd) == -1) in ps_root_start()
|
H A D | privsep.c | 352 if (xsocketpair(AF_UNIX, SOCK_SEQPACKET | SOCK_CXNB, 0, fd) == -1) { in ps_startprocess()
|
H A D | dhcpcd.c | 2369 if (xsocketpair(AF_UNIX, SOCK_SEQPACKET|SOCK_CXNB, 0, fork_fd) == -1) { in main()
|
/dragonfly/usr.sbin/sdpd/ |
H A D | server.c | 162 l2sock = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP); in server_init()
|
/dragonfly/sys/platform/vkernel64/platform/ |
H A D | init.c | 1140 net_fd = socket(AF_UNIX, SOCK_SEQPACKET, 0); in unix_connect()
|
/dragonfly/sys/netgraph/ksocket/ |
H A D | ng_ksocket.c | 135 { "seqpacket", SOCK_SEQPACKET },
|
/dragonfly/sys/netgraph7/ksocket/ |
H A D | ng_ksocket.c | 135 { "seqpacket", SOCK_SEQPACKET },
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | crypto_linux.c | 34 s = socket(AF_ALG, SOCK_SEQPACKET, 0); in linux_af_alg_socket()
|
/dragonfly/usr.sbin/inetd/ |
H A D | inetd.c | 1511 sep->se_socktype = SOCK_SEQPACKET; in getconfigent()
|
/dragonfly/sys/vfs/nfs/ |
H A D | nfs_socket.c | 472 if (so->so_type == SOCK_SEQPACKET) in nfs_send()
|