Sponsored Content
Top Forums Programming Which are blocking and non-blocking api's in sockets in C ? Post 302911296 by VSSajjan on Thursday 31st of July 2014 03:02:12 AM
Old 07-31-2014
Which are blocking and non-blocking api's in sockets in C ?

among the below socket programming api's, please let me know which are blocking and non-blocking.

socket
accept
bind
listen
write
read
close

Last edited by VSSajjan; 07-31-2014 at 06:35 AM.. Reason: missed accept api
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

blocking domains

Dear All , Kindly note I have sun solaries 7 . I want to block a domain who keep sending emails to my domain and users . thanks (1 Reply)
Discussion started by: tamemi
1 Replies

2. IP Networking

School Blocking

I'm in highschool. They blocked my favorite site. How do I disable websense without getting caught on that particular webpage? Is it even possible? *twitch* I would also like to get as much UNIX for beginners information, so if someone might point me in the right direction so I don't have to read... (1 Reply)
Discussion started by: Satine
1 Replies

3. IP Networking

blocking DHCP

I've got a legit DHCP server on my network. I've got a 3550 as my VTP server providing 4 vlans to 4 2950 switches. If somebody were to plug into one of those vlans with a DHCP server configured then it would throw off my whole network. How could i block the DHCP server that could plug into the... (2 Replies)
Discussion started by: byblyk
2 Replies

4. Programming

Linux BSD sockets blocking issue

I am using BSD TCP sockets under Debian Linux 2.6 and no matter what I do, the socket blocks on recv. I have set O_NONBLOCK and O_NDELAY using fcntl to no effect. Any ideas ? (3 Replies)
Discussion started by: johnmb
3 Replies

5. Shell Programming and Scripting

Non-blocking pipe

Hello, Would this be an acceptable way of creating a non-blocking pipe. Basically I want to create kind of a server client arch. This code would be in the server, and I don't want to have to wait for clients to read before moving on to the next client. One problem I can see is if... (4 Replies)
Discussion started by: cdlaforc
4 Replies

6. Shell Programming and Scripting

blocking script help

sed -n '/robots.txt/!{s/\(\{1,\}\.*\.*\.*\).*\/\(.*\.txt\).*/\1 \2/p;}' myaapache.log Above command will search all txt except robots.txt from apache logs and show like 94.136.63.119 idsuper.txt 174.121.67.233 fx29id1.txt I want to block that ip address automatically, i need script... (1 Reply)
Discussion started by: learnbash
1 Replies

7. UNIX for Advanced & Expert Users

ps blocking

Hi Folks I have been debugging a script that is called every thirty seconds. Basically it is doing a ps, well two actually, one to file (read by the getline below) and the other into a pipe. The one into the pipe is: - V_SYSVPS=/usr/sysv/bin/ps $V_SYSVPS -p$PIDLIST -o$PSARGS... (0 Replies)
Discussion started by: steadyonabix
0 Replies

8. UNIX for Dummies Questions & Answers

Blocking signals

I know how to add signal to a set. But what if I want to add 2 or 3 signals to the set. I know I can use sigaddset (&set,SIGBUS)....but what if I want to add SIGBUS and SIGALRM at once. Do i have to do it like this.. sigaddset (&set,SIGBUS); sigaddset (&set,SIGALRM); Is there another way to... (0 Replies)
Discussion started by: joker40
0 Replies

9. Red Hat

Blocking an IP address

Dear all, I am new to this forum.I need some assistant from you people. I have a server in which Linux 5 is installed and it is in the network. How i block any user to access my server.. Upto how many users i can block.. send me the procedure.... Thank you in advance...... (10 Replies)
Discussion started by: sudhansu
10 Replies

10. IP Networking

ping blocking

Hi I am starting to practice nmap for my own education. Now I created two host in virtual box. Bot are scientific linux, one in installed as web server and the other as developing station. I tried to run nmap on so I did nmap on their IP address, I got an answer that ip is down or that... (8 Replies)
Discussion started by: programAngel
8 Replies
ACCEPT(2)						      BSD System Calls Manual							 ACCEPT(2)

NAME
accept, paccept -- accept a connection on a socket LIBRARY
Standard C Library (libc, -lc) SYNOPSIS
#include <sys/socket.h> int accept(int s, struct sockaddr * restrict addr, socklen_t * restrict addrlen); int paccept(int s, struct sockaddr * restrict addr, socklen_t * restrict addrlen, const sigset_t * restrict sigmask, int flags); DESCRIPTION
The argument s is a socket that has been created with socket(2), bound to an address with bind(2), and is listening for connections after a listen(2). The accept() argument extracts the first connection request on the queue of pending connections, creates a new socket with the same properties of s and allocates a new file descriptor for the socket. If no pending connections are present on the queue, and the socket is not marked as non-blocking, accept() blocks the caller until a connection is present. If the socket is marked non-blocking and no pending connections are present on the queue, accept() returns an error as described below. The accepted socket may not be used to accept more con- nections. The original socket s remains open. The argument addr is a result parameter that is filled in with the address of the connecting entity, as known to the communications layer. The exact format of the addr parameter is determined by the domain in which the communication is occurring. The addrlen is a value-result parameter; it should initially contain the amount of space pointed to by addr; on return it will contain the actual length (in bytes) of the address returned. This call is used with connection-based socket types, currently with SOCK_STREAM. It is possible to select(2) or poll(2) a socket for the purposes of doing an accept() by selecting or polling it for read. For certain protocols which require an explicit confirmation, such as ISO or DATAKIT, accept() can be thought of as merely dequeuing the next connection request and not implying confirmation. Confirmation can be implied by a normal read or write on the new file descriptor, and rejection can be implied by closing the new socket. One can obtain user connection request data without confirming the connection by issuing a recvmsg(2) call with an msg_iovlen of 0 and a non- zero msg_controllen, or by issuing a getsockopt(2) request. Similarly, one can provide user connection rejection information by issuing a sendmsg(2) call with providing only the control information, or by calling setsockopt(2). The paccept() function behaves exactly like accept(), but it also allows to set the following flags on the returned file descriptor: SOCK_CLOEXEC Set the close on exec property. SOCK_NONBLOCK Sets non-blocking I/O. It can also temporarily replace the signal mask of the calling thread if sigmask is a non-NULL pointer, then the paccept() function shall replace the signal mask of the caller by the set of signals pointed to by sigmask before waiting for a connection, and shall restore the sig- nal mask of the calling thread before returning. RETURN VALUES
The accept() and paccept() calls return -1 on error. If they succeed, they return a non-negative integer that is a descriptor for the accepted socket. COMPATIBILITY
The accept() implementation makes the new file descriptor inherit file flags (like O_NONBLOCK) from the listening socket. It's a traditional behaviour for BSD derivative systems. On the other hand, there are implementations which don't do so. Linux is an example of such implemen- tations. Portable programs should not rely on either of the behaviours. ERRORS
The accept() will fail if: [EAGAIN] The socket is marked non-blocking and no connections are present to be accepted. [EBADF] The descriptor is invalid. [ECONNABORTED] A connection has been aborted. [EFAULT] The addr parameter is not in a writable part of the user address space. [EINTR] The accept() call has been interrupted by a signal. [EINVAL] The socket has not been set up to accept connections (using bind(2) and listen(2)). [EMFILE] The per-process descriptor table is full. [ENFILE] The system file table is full. [ENOTSOCK] The descriptor references a file, not a socket. [EOPNOTSUPP] The referenced socket is not of type SOCK_STREAM. SEE ALSO
bind(2), connect(2), listen(2), poll(2), select(2), socket(2) HISTORY
The accept() function appeared in 4.2BSD. The pselect() function is inspired from Linux and appeared in NetBSD 6.0. BSD
June 2, 2011 BSD
All times are GMT -4. The time now is 09:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy