/freebsd/sys/kern/ |
H A D | uipc_socket.c | 166 static int soreceive_generic_locked(struct socket *so, 169 static int soreceive_rcvoob(struct socket *so, struct uio *uio, 171 static int soreceive_stream_locked(struct socket *so, struct sockbuf *sb, 174 static int sosend_generic_locked(struct socket *so, struct sockaddr *addr, 212 #define VNET_SO_ASSERT(so) \ argument 214 ("%s:%d curvnet is NULL, so=%p", __func__, __LINE__, (so))); 258 * The purpose of the UINT_MAX / 3 limit, is so that the formula in sysctl_somaxconn() 348 static int so_unsplice(struct socket *so, bool timeout); 598 * held, so w 801 struct socket *so; soalloc() local 863 sodealloc(struct socket * so) sodealloc() argument 915 struct socket *so; socreate() local 1021 struct socket *so; global() local 1233 struct socket *so; global() local 1257 solisten_enqueue(struct socket * so,int connstatus) global() argument 1315 struct socket *so; global() local 1371 sobind(struct socket * so,struct sockaddr * nam,struct thread * td) global() argument 1382 sobindat(int fd,struct socket * so,struct sockaddr * nam,struct thread * td) global() argument 1405 solisten(struct socket * so,int backlog,struct thread * td) global() argument 1420 solisten_proto_check(struct socket * so) global() argument 1468 solisten_proto_abort(struct socket * so) global() argument 1477 solisten_proto(struct socket * so,int backlog) global() argument 1584 struct socket *so; global() local 1668 so_splice(struct socket * so,struct socket * so2,struct splice * splice) global() argument 1756 so_unsplice(struct socket * so,bool timeout) global() argument 1845 sofree(struct socket * so) global() argument 1891 sorele_locked(struct socket * so) global() argument 1909 soclose(struct socket * so) global() argument 1998 soabort(struct socket * so) global() argument 2010 soaccept(struct socket * so,struct sockaddr * sa) global() argument 2026 sopeeraddr(struct socket * so,struct sockaddr * sa) global() argument 2043 sosockaddr(struct socket * so,struct sockaddr * sa) global() argument 2060 soconnect(struct socket * so,struct sockaddr * nam,struct thread * td) global() argument 2067 soconnectat(int fd,struct socket * so,struct sockaddr * nam,struct thread * td) global() argument 2114 sodisconnect(struct socket * so) global() argument 2128 sosend_dgram(struct socket * so,struct sockaddr * addr,struct uio * uio,struct mbuf * top,struct mbuf * control,int flags,struct thread * td) global() argument 2291 sosend_generic_locked(struct socket * so,struct sockaddr * addr,struct uio * uio,struct mbuf * top,struct mbuf * control,int flags,struct thread * td) global() argument 2549 sosend_generic(struct socket * so,struct sockaddr * addr,struct uio * uio,struct mbuf * top,struct mbuf * control,int flags,struct thread * td) global() argument 2571 sosend(struct socket * so,struct sockaddr * addr,struct uio * uio,struct mbuf * top,struct mbuf * control,int flags,struct thread * td) global() argument 2587 sousrsend(struct socket * so,struct sockaddr * addr,struct uio * uio,struct mbuf * control,int flags,struct proc * userproc) global() argument 2640 soreceive_rcvoob(struct socket * so,struct uio * uio,int flags) global() argument 2716 soreceive_generic_locked(struct socket * so,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp,struct mbuf ** controlp,int * flagsp) global() argument 3198 soreceive_generic(struct socket * so,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp,struct mbuf ** controlp,int * flagsp) global() argument 3229 soreceive_stream_locked(struct socket * so,struct sockbuf * sb,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp0,struct mbuf ** controlp,int flags) global() argument 3401 soreceive_stream(struct socket * so,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp0,struct mbuf ** controlp,int * flagsp) global() argument 3464 soreceive_dgram(struct socket * so,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp0,struct mbuf ** controlp,int * flagsp) global() argument 3643 soreceive(struct socket * so,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp0,struct mbuf ** controlp,int * flagsp) global() argument 3655 soshutdown(struct socket * so,enum shutdown_how how) global() argument 3670 sorflush(struct socket * so) global() argument 3708 hhook_run_socket(struct socket * so,void * hctx,int32_t h_id) global() argument 3762 so_setsockopt(struct socket * so,int level,int optname,void * optval,size_t optlen) global() argument 3777 sosetopt(struct socket * so,struct sockopt * sopt) global() argument 4057 sogetopt(struct socket * so,struct sockopt * sopt) global() argument 4399 sohasoutofband(struct socket * so) global() argument 4408 sopoll(struct socket * so,int events,struct ucred * active_cred,struct thread * td) global() argument 4420 sopoll_generic(struct socket * so,int events,struct ucred * active_cred,struct thread * td) global() argument 4481 struct socket *so = kn->kn_fp->f_data; global() local 4525 struct socket *so = kn->kn_fp->f_data; global() local 4538 struct socket *so; global() local 4583 struct socket *so = kn->kn_fp->f_data; global() local 4596 struct socket *so; global() local 4628 struct socket *so; global() local 4645 socheckuid(struct socket * so,uid_t uid) global() argument 4688 soisconnecting(struct socket * so) global() argument 4698 soisconnected(struct socket * so) global() argument 4772 soisdisconnecting(struct socket * so) global() argument 4790 soisdisconnected(struct socket * so) global() argument 4819 soiolock(struct socket * so,struct sx * sx,int flags) global() argument 4869 sodtor_set(struct socket * so,so_dtor_t * func) global() argument 4880 soupcall_set(struct socket * so,sb_which which,so_upcall_t func,void * arg) global() argument 4901 soupcall_clear(struct socket * so,sb_which which) global() argument 4924 solisten_upcall_set(struct socket * so,so_upcall_t func,void * arg) global() argument 4935 struct socket *so = arg; global() local 4952 struct socket *so = arg; global() local 4963 struct socket *so = arg; global() local 4981 struct socket *so = arg; global() local 4998 struct socket *so = arg; global() local 5009 struct socket *so = arg; global() local 5033 sotoxsocket(struct socket * so,struct xsocket * xso) global() argument 5070 so_options_get(const struct socket * so) global() argument 5077 so_options_set(struct socket * so,int val) global() argument 5084 so_error_get(const struct socket * so) global() argument 5091 so_error_set(struct socket * so,int val) global() argument [all...] |
H A D | sys_socket.c | 121 struct socket *so = fp->f_data; in soo_read() local 125 error = mac_socket_check_receive(active_cred, so); in soo_read() 129 error = soreceive(so, 0, uio, 0, 0, 0); in soo_read() 137 struct socket *so = fp->f_data; in soo_write() local 141 error = mac_socket_check_send(active_cred, so); in soo_write() 145 error = sousrsend(so, NULL, uio, NULL, 0, NULL); in soo_write() 153 struct socket *so = fp->f_data; in soo_ioctl() local 158 SOCK_LOCK(so); in soo_ioctl() 160 so->so_state |= SS_NBIO; in soo_ioctl() 162 so->so_state &= ~SS_NBIO; in soo_ioctl() [all …]
|
H A D | uipc_accf.c | 69 * Must be passed a malloc'd structure so we don't explode if the kld is 165 accept_filt_getopt(struct socket *so, struct sockopt *sopt) in accept_filt_getopt() argument 172 SOCK_LOCK(so); in accept_filt_getopt() 173 if (!SOLISTENING(so)) { in accept_filt_getopt() 177 if (so->sol_accept_filter == NULL) { in accept_filt_getopt() 181 strcpy(afap->af_name, so->sol_accept_filter->accf_name); in accept_filt_getopt() 182 if (so->sol_accept_filter_str != NULL) in accept_filt_getopt() 183 strcpy(afap->af_arg, so->sol_accept_filter_str); in accept_filt_getopt() 185 SOCK_UNLOCK(so); in accept_filt_getopt() 193 accept_filt_setopt(struct socket *so, struct sockopt *sopt) in accept_filt_setopt() argument [all …]
|
H A D | uipc_usrreq.c | 224 * pointer is an invariant, so no lock is required to dereference the so_pcb 295 static void unp_connect2(struct socket *so, struct socket *so2); 297 static void unp_dispose(struct socket *so); 421 uipc_abort(struct socket *so) in uipc_abort() argument 425 unp = sotounpcb(so); in uipc_abort() 440 uipc_attach(struct socket *so, int proto, struct thread *td) in uipc_attach() argument 447 KASSERT(so->so_pcb == NULL, ("uipc_attach: so_pcb != NULL")); in uipc_attach() 448 if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { in uipc_attach() 449 switch (so in uipc_attach() 519 uipc_bindat(int fd,struct socket * so,struct sockaddr * nam,struct thread * td) uipc_bindat() argument 647 uipc_bind(struct socket * so,struct sockaddr * nam,struct thread * td) uipc_bind() argument 654 uipc_connect(struct socket * so,struct sockaddr * nam,struct thread * td) uipc_connect() argument 664 uipc_connectat(int fd,struct socket * so,struct sockaddr * nam,struct thread * td) uipc_connectat() argument 675 uipc_close(struct socket * so) uipc_close() argument 709 uipc_chmod(struct socket * so,mode_t mode,struct ucred * cred __unused,struct thread * td __unused) uipc_chmod() argument 749 uipc_detach(struct socket * so) uipc_detach() argument 838 uipc_disconnect(struct socket * so) uipc_disconnect() argument 854 uipc_listen(struct socket * so,int backlog,struct thread * td) uipc_listen() argument 888 uipc_peeraddr(struct socket * so,struct sockaddr * ret) uipc_peeraddr() argument 914 uipc_rcvd(struct socket * so,int flags) uipc_rcvd() argument 964 uipc_send(struct socket * so,int flags,struct mbuf * m,struct sockaddr * nam,struct mbuf * control,struct thread * td) uipc_send() argument 1132 uipc_sosend_dgram(struct socket * so,struct sockaddr * addr,struct uio * uio,struct mbuf * m,struct mbuf * c,int flags,struct thread * td) uipc_sosend_dgram() argument 1379 uipc_peek_dgram(struct socket * so,struct mbuf * m,struct sockaddr ** psa,struct uio * uio,struct mbuf ** controlp,int * flagsp) uipc_peek_dgram() argument 1442 uipc_soreceive_dgram(struct socket * so,struct sockaddr ** psa,struct uio * uio,struct mbuf ** mp0,struct mbuf ** controlp,int * flagsp) uipc_soreceive_dgram() argument 1608 uipc_ready_scan(struct socket * so,struct mbuf * m,int count,int * errorp) uipc_ready_scan() argument 1641 uipc_ready(struct socket * so,struct mbuf * m,int count) uipc_ready() argument 1688 uipc_sense(struct socket * so,struct stat * sb) uipc_sense() argument 1702 uipc_shutdown(struct socket * so,enum shutdown_how how) uipc_shutdown() argument 1760 uipc_sockaddr(struct socket * so,struct sockaddr * ret) uipc_sockaddr() argument 1779 uipc_ctloutput(struct socket * so,struct sockopt * sopt) uipc_ctloutput() argument 1878 unp_connect(struct socket * so,struct sockaddr * nam,struct thread * td) unp_connect() argument 1885 unp_connectat(int fd,struct socket * so,struct sockaddr * nam,struct thread * td,bool return_locked) unp_connectat() argument 2083 unp_connect2(struct socket * so,struct socket * so2) unp_connect2() argument 2127 struct socket *so, *so2; unp_disconnect() local 2384 struct socket *so; unp_shutdown() local 2400 struct socket *so; unp_drop() local 2899 struct socket *so; fptounp() local 3042 unp_scan_socket(struct socket * so,void (* op)(struct filedescent **,int)) unp_scan_socket() argument 3070 struct socket *so, *soa; unp_gc_scan() local 3213 struct socket *so; unp_gc() local 3235 unp_dispose(struct socket * so) unp_dispose() argument [all...] |
H A D | uipc_sockbuf.c | 57 * Function pointer set by the AIO routines so that the socket buffer code 379 socantsendmore_locked(struct socket *so) in socantsendmore_locked() argument 382 SOCK_SENDBUF_LOCK_ASSERT(so); in socantsendmore_locked() 384 so->so_snd.sb_state |= SBS_CANTSENDMORE; in socantsendmore_locked() 385 sowwakeup_locked(so); in socantsendmore_locked() 386 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore_locked() 390 socantsendmore(struct socket *so) in socantsendmore() argument 393 SOCK_SENDBUF_LOCK(so); in socantsendmore() 394 socantsendmore_locked(so); in socantsendmore() 395 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore() [all …]
|
/freebsd/sys/sys/ |
H A D | socketvar.h | 97 * (b) locked by SOCK_LOCK(so). 98 * (cr) locked by SOCK_RECVBUF_LOCK(so) 99 * (cs) locked by SOCK_SENDBUF_LOCK(so) 145 off_t so_splice_sent; /* (ir) splice bytes sent so far */ 245 #define SOCK_MTX(so) (&(so)->so_lock) argument 246 #define SOCK_LOCK(so) mtx_lock(&(so)->so_lock) argument 247 #define SOCK_OWNED(so) mtx_owned(&(so)->so_lock) argument 248 #define SOCK_UNLOCK(so) mtx_unlock(&(so)->so_lock) argument 249 #define SOCK_LOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_OWNED) argument 250 #define SOCK_UNLOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_NOTOWNED) argument [all …]
|
/freebsd/sys/security/mac/ |
H A D | mac_socket.c | 145 mac_socket_init(struct socket *so, int flag) in mac_socket_init() argument 149 so->so_label = mac_socket_label_alloc(flag); in mac_socket_init() 150 if (so->so_label == NULL) in mac_socket_init() 152 so->so_peerlabel = mac_socketpeer_label_alloc(flag); in mac_socket_init() 153 if (so->so_peerlabel == NULL) { in mac_socket_init() 154 mac_socket_label_free(so->so_label); in mac_socket_init() 155 so->so_label = NULL; in mac_socket_init() 159 so->so_label = NULL; in mac_socket_init() 160 so->so_peerlabel = NULL; in mac_socket_init() 182 mac_socket_destroy(struct socket *so) in mac_socket_destroy() argument [all …]
|
/freebsd/sys/dev/hyperv/hvsock/ |
H A D | hv_sock.c | 201 __hvs_remove_socket_from_list(struct socket *so, unsigned char list) in __hvs_remove_socket_from_list() argument 203 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_remove_socket_from_list() 211 __hvs_insert_socket_on_list(struct socket *so, unsigned char list) in __hvs_insert_socket_on_list() argument 213 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_insert_socket_on_list() 225 hvs_remove_socket_from_list(struct socket *so, unsigned char list) in hvs_remove_socket_from_list() argument 227 if (!so || !so->so_pcb) { in hvs_remove_socket_from_list() 234 __hvs_remove_socket_from_list(so, list); in hvs_remove_socket_from_list() 239 hvs_insert_socket_on_list(struct socket *so, unsigned char list) in hvs_insert_socket_on_list() argument 241 if (!so || !so->so_pcb) { in hvs_insert_socket_on_list() 248 __hvs_insert_socket_on_list(so, list); in hvs_insert_socket_on_list() [all …]
|
/freebsd/sys/ofed/drivers/infiniband/ulp/sdp/ |
H A D | sdp_main.c | 95 static void sdp_stop_keepalive_timer(struct socket *so); 191 sdp_getsockaddr(struct socket *so, struct sockaddr *sa) in sdp_getsockaddr() argument 193 struct sdp_sock *ssk = sdp_sk(so); in sdp_getsockaddr() 208 sdp_getpeeraddr(struct socket *so, struct sockaddr *sa) in sdp_getpeeraddr() argument 210 struct sdp_sock *ssk = sdp_sk(so); in sdp_getpeeraddr() 263 struct socket *so; in sdp_closed() local 268 so = ssk->socket; in sdp_closed() 269 soisdisconnected(so); in sdp_closed() 273 sorele(so); in sdp_closed() 299 /* We have to clear this so sdp_detach() will call pcbfree(). */ in sdp_shutdown_task() [all …]
|
/freebsd/crypto/openssl/crypto/objects/ |
H A D | obj_dat.h | 13 static const unsigned char so[8076] = { variable 1123 {"rsadsi", "RSA Data Security, Inc.", NID_rsadsi, 6, &so[0]}, 1124 {"pkcs", "RSA Data Security, Inc. PKCS", NID_pkcs, 7, &so[6]}, 1125 {"MD2", "md2", NID_md2, 8, &so[13]}, 1126 {"MD5", "md5", NID_md5, 8, &so[21]}, 1127 {"RC4", "rc4", NID_rc4, 8, &so[29]}, 1128 {"rsaEncryption", "rsaEncryption", NID_rsaEncryption, 9, &so[37]}, 1129 {"RSA-MD2", "md2WithRSAEncryption", NID_md2WithRSAEncryption, 9, &so[46]}, 1130 {"RSA-MD5", "md5WithRSAEncryption", NID_md5WithRSAEncryption, 9, &so[55]}, 1131 {"PBE-MD2-DES", "pbeWithMD2AndDES-CBC", NID_pbeWithMD2AndDES_CBC, 9, &so[64]}, [all …]
|
/freebsd/share/man/man9/ |
H A D | socket.9 | 37 .Fn soabort "struct socket *so" 39 .Fn soaccept "struct socket *so" "struct sockaddr *nam" 41 .Fn socheckuid "struct socket *so" "uid_t uid" 43 .Fn sobind "struct socket *so" "struct sockaddr *nam" "struct thread *td" 45 .Fn soclose "struct socket *so" 47 .Fn soconnect "struct socket *so" "struct sockaddr *nam" "struct thread *td" 54 .Fn sodisconnect "struct socket *so" 57 .Fa "struct socket *so" 63 .Fn sofree "struct socket *so" 65 .Fn sohasoutofband "struct socket *so" [all …]
|
/freebsd/bin/sh/tests/builtins/ |
H A D | command7.0 | 11 check '"$(PATH=/libexec command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 12 check '"$(PATH=/libexec command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 13 check '"$(PATH=/libexec command -pv ld-elf.so.1)" = ""' 14 check '"$(PATH=/libexec command -pv ld-elf.so.1; :)" = ""' 18 check '"$(command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 19 check '"$(command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 20 check '"$(command -pv ld-elf.so.1)" = ""' 21 check '"$(command -pv ld-elf.so.1; :)" = ""'
|
/freebsd/share/man/man5/ |
H A D | libmap.conf.5 | 36 .Xr ld-elf.so.1 1 87 The constraint is matched literally so that only an executable with an 121 or similar, so the basename constraint type is the most useful. 148 libc_r.so.6 libpthread.so.2 # Everything that uses 'libc_r' 149 libc_r.so libpthread.so # now uses 'libpthread' 152 libpthread.so.2 libc_r.so.6 153 libpthread.so libc_r.so 158 libpthread.so.2 libthr.so.2 159 libpthread.so libthr.so 161 # Glue for Linux-only EPSON printer .so to be loaded into cups, etc. [all …]
|
/freebsd/sys/netlink/ |
H A D | netlink_domain.c | 314 nl_pru_attach(struct socket *so, int proto, struct thread *td) in nl_pru_attach() argument 328 so, is_linux ? "(linux) " : "", curproc->p_pid, in nl_pru_attach() 337 MPASS(sotonlpcb(so) == NULL); in nl_pru_attach() 340 error = soreserve(so, nl_sendspace, nl_recvspace); in nl_pru_attach() 345 TAILQ_INIT(&so->so_rcv.nl_queue); in nl_pru_attach() 346 TAILQ_INIT(&so->so_snd.nl_queue); in nl_pru_attach() 347 so->so_pcb = nlp; in nl_pru_attach() 348 nlp->nl_socket = so; in nl_pru_attach() 350 nlp->nl_cred = so->so_cred; in nl_pru_attach() 354 nlp->nl_unconstrained_vnet = !jailed_without_vnet(so->so_cred); in nl_pru_attach() [all …]
|
/freebsd/sys/dev/iscsi/ |
H A D | icl_soft_proxy.c | 107 struct socket *so; in icl_soft_proxy_connect() local 110 error = socreate(domain, &so, socktype, protocol, in icl_soft_proxy_connect() 116 error = sobind(so, from_sa, curthread); in icl_soft_proxy_connect() 118 soclose(so); in icl_soft_proxy_connect() 123 error = soconnect(so, to_sa, curthread); in icl_soft_proxy_connect() 125 soclose(so); in icl_soft_proxy_connect() 129 SOCK_LOCK(so); in icl_soft_proxy_connect() 130 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) { in icl_soft_proxy_connect() 131 error = msleep(&so->so_timeo, SOCK_MTX(so), PSOCK | PCATCH, in icl_soft_proxy_connect() 137 error = so->so_error; in icl_soft_proxy_connect() [all …]
|
/freebsd/sbin/ipf/libipf/ |
H A D | ipoptsec.c | 29 struct ipopt_names *so; in seclevel() local 34 for (so = secclass; so->on_name; so++) in seclevel() 35 if (!strcasecmp(slevel, so->on_name)) in seclevel() 38 if (!so->on_name) { in seclevel() 42 return (u_char)so->on_value; in seclevel() 49 struct ipopt_names *so; in secbit() local 51 for (so = secclass; so->on_name; so++) in secbit() 52 if (so->on_value == class) in secbit() 55 if (!so->on_name) { in secbit() 59 return (u_char)so->on_bit; in secbit()
|
H A D | optprint.c | 16 struct ipopt_names *io, *so; in optprint() local 40 for (so = secclass; so->on_name; so++) in optprint() 41 if ((secmsk & so->on_bit) && in optprint() 42 ((so->on_bit & secmsk) == (so->on_bit & secbits))) { in optprint() 43 printf("%s%s", s, so->on_name); in optprint() 72 for (so = secclass; so->on_name; so++) in optprint() 73 if ((so->on_bit & secmsk) && in optprint() 74 ((so->on_bit & secmsk) != in optprint() 75 (so->on_bit & secbits))) { in optprint() 76 printf("%s%s", s, so->on_name); in optprint()
|
/freebsd/lib/libpam/pam.d/ |
H A D | sshd | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 9 auth required pam_unix.so no_warn try_first_pass 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_login_access.so 15 account required pam_unix.so 18 #session optional pam_ssh.so want_agent 19 session required pam_permit.so 22 #password sufficient pam_krb5.so no_warn try_first_pass [all …]
|
H A D | system | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 9 auth required pam_unix.so no_warn try_first_pass nullok 12 #account required pam_krb5.so 13 account required pam_login_access.so 14 account required pam_unix.so 17 #session optional pam_ssh.so want_agent 18 session required pam_lastlog.so no_fail 19 session required pam_xdg.so 22 #password sufficient pam_krb5.so no_warn try_first_pass [all …]
|
/freebsd/contrib/sendmail/src/ |
H A D | sfsasl.c | 62 struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie; local 67 if (so->fp == NULL) 69 return so->fp->f_file; /* for stdio fileno() compatibility */ 72 if (so->fp == NULL) 76 return sm_io_getinfo(so->fp, what, valp); 108 struct sasl_obj *so; local 111 so = (struct sasl_obj *) sm_malloc(sizeof(struct sasl_obj)); 112 if (so == NULL) 117 so->fp = si->fp; 118 so->conn = si->conn; [all …]
|
/freebsd/share/doc/usd/13.viref/ |
H A D | Makefile | 2 EXTRA= ex.cmd.roff ref.so set.opt.roff vi.cmd.roff 10 sed -e 's:^\.so index.so$$:&.\\*[.T]:' ${.ALLSRC} > ${.TARGET} 15 EXTRA+= index.so.${_dev} 16 CLEANFILES+= index.so.${_dev} vi.ref-${_dev} 18 vi.ref-${_dev}: index.so.${_dev} 19 sed -e 's:^\.so index\.so\.\\\*\[\.T\]$$:${_dev}:' vi.ref-patched > ${.TARGET} 21 # Build index.so as a side-effect of building the paper. 22 index.so.${_dev}: vi.ref-patched ${EXTRA:Nindex.so.${_dev}} 23 sed -e 's:^\.so index\.so\.\\\*\[\.T\]$$::' vi.ref-patched | \
|
/freebsd/sys/netipsec/ |
H A D | keysock.c | 90 key_send(struct socket *so, int flags, struct mbuf *m, in key_send() argument 133 error = key_parse(m, so); in key_send() 177 /* so can be NULL if target != KEY_SENDUP_ONE */ 179 key_sendup_mbuf(struct socket *so, struct mbuf *m, int target) in key_sendup_mbuf() argument 186 KASSERT(so != NULL || target != KEY_SENDUP_ONE, in key_sendup_mbuf() 221 if (so != NULL && so->so_pcb == kp) in key_sendup_mbuf() 240 if (so) { /* KEY_SENDUP_ONE */ in key_sendup_mbuf() 241 error = key_sendup0(so->so_pcb, m, 0); in key_sendup_mbuf() 260 key_attach(struct socket *so, int proto, struct thread *td) in key_attach() argument 265 KASSERT(so->so_pcb == NULL, ("key_attach: so_pcb != NULL")); in key_attach() [all …]
|
/freebsd/sys/netsmb/ |
H A D | smb_trantcp.c | 72 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td) argument 79 nb_setsockopt_int(struct socket *so, int level, int name, int val) in nb_setsockopt_int() argument 89 CURVNET_SET(so->so_vnet); in nb_setsockopt_int() 90 error = sosetopt(so, &sopt); in nb_setsockopt_int() 102 nb_upcall(struct socket *so, void *arg, int waitflag) in nb_upcall() argument 146 struct socket *so; in nb_connect_in() local 149 error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP, in nb_connect_in() 153 nbp->nbp_tso = so; in nb_connect_in() 154 SOCKBUF_LOCK(&so->so_rcv); in nb_connect_in() 155 soupcall_set(so, SO_RCV, nb_upcall, nbp); in nb_connect_in() [all …]
|
/freebsd/sys/netgraph/ |
H A D | ng_ksocket.c | 90 struct socket *so; member 175 static int ng_ksocket_listen_upcall(struct socket *so, void *arg, 179 static int ng_ksocket_incoming(struct socket *so, void *arg, int waitflag); 666 error = socreate(family, &priv->so, type, protocol, in ng_ksocket_newhook() 692 struct socket *const so = priv->so; in ng_ksocket_connect() local 695 SOCK_RECVBUF_LOCK(so); in ng_ksocket_connect() 696 soupcall_set(priv->so, SO_RCV, ng_ksocket_incoming, node); in ng_ksocket_connect() 697 SOCK_RECVBUF_UNLOCK(so); in ng_ksocket_connect() 698 SOCK_SENDBUF_LOCK(so); in ng_ksocket_connect() 699 soupcall_set(priv->so, SO_SND, ng_ksocket_incoming, node); in ng_ksocket_connect() [all …]
|
/freebsd/lib/libipsec/ |
H A D | test-policy.c | 155 int so; local 171 if ((so = socket(family, SOCK_DGRAM, 0)) < 0) 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 181 close(so); 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) { 189 close(so); 202 close(so); 211 close (so); 225 int so; in test2() local 242 if ((so = pfkey_open()) < 0) in test2() [all …]
|