SOCKET
rk_SOCK_IOCTL(SOCKET s, long cmd, int * argp) {
cc = SOCKET_READ((SOCKET)fd, buf, len);
SOCKET xp_sock;
(*k5_tls_setup_fn)(krb5_context context, SOCKET fd, const char *servername,
#define INVALID_SOCKET ((SOCKET)~0)
socket_sendmsg(SOCKET fd, sg_buf *iov, int iovcnt)
SOCKET fd = INVALID_SOCKET;
SOCKET fd;
kpasswd_sendto_msg_callback(SOCKET fd, void *data, krb5_data *message)
SOCKET fd = (SOCKET) infd;
SOCKET sock;
cc = SOCKET_READ((SOCKET)fd, buf, len);
cc = SOCKET_WRITEV((SOCKET)fd, sgp, nsg, tmp);
int (*pfn_callback)(SOCKET fd, void *data, krb5_data *message);
SOCKET fd;
SOCKET socket;
SOCKET *sockp,
SOCKET cu_sock;
SOCKET sock;
SOCKET sock = INVALID_SOCKET;
SOCKET sock,
SOCKET sock;
setup(krb5_context context, SOCKET fd, const char *servername,
SOCKET handle;
SOCKET handle = EV_FD_TO_WIN32_HANDLE (fd);
SOCKET handle = anfds [fd].handle;
SOCKET handle = anfds [fd].handle;
static SOCKET
SOCKET listener;
SOCKET sock [2] = { -1, -1 };
SOCKET s;
if ((SOCKET)fd == INVALID_SOCKET)
ret = WSASendMsg((SOCKET)b->num, &wmsg, 0, &num_bytes_sent, NULL, NULL);
ret = WSARecvMsg((SOCKET)b->num, &wmsg, &num_bytes_received, NULL, NULL);
h->error.errtype = SOCKET;
h->error.errtype = SOCKET;
COOKIE(SOCKET),
case SOCKET:
case SOCKET:
case SOCKET:
case SOCKET:
case SOCKET:
case SOCKET:
DEFINE_LINUX_IOCTL_SET(socket, SOCKET);