/freebsd/sys/kern/ |
H A D | uipc_socket.c | 166 static int soreceive_generic_locked(struct socket *so, 169 static int soreceive_rcvoob(struct socket *so, struct uio *uio, 171 static int soreceive_stream_locked(struct socket *so, struct sockbuf *sb, 174 static int sosend_generic_locked(struct socket *so, struct sockaddr *addr, 211 #define VNET_SO_ASSERT(so) \ argument 213 ("%s:%d curvnet is NULL, so=%p", __func__, __LINE__, (so))); 257 * The purpose of the UINT_MAX / 3 limit, is so that the formula in sysctl_somaxconn() 347 static int so_unsplice(struct socket *so, bool timeout); 754 * of the change so that they can update their dependent limits as required. 795 struct socket *so; in soalloc() local [all …]
|
H A D | sys_socket.c | 121 struct socket *so = fp->f_data; in soo_read() local 125 error = mac_socket_check_receive(active_cred, so); in soo_read() 129 error = soreceive(so, 0, uio, 0, 0, 0); in soo_read() 137 struct socket *so = fp->f_data; in soo_write() local 141 error = mac_socket_check_send(active_cred, so); in soo_write() 145 error = sousrsend(so, NULL, uio, NULL, 0, NULL); in soo_write() 153 struct socket *so = fp->f_data; in soo_ioctl() local 158 SOCK_LOCK(so); in soo_ioctl() 160 so->so_state |= SS_NBIO; in soo_ioctl() 162 so->so_state &= ~SS_NBIO; in soo_ioctl() [all …]
|
H A D | uipc_usrreq.c | 228 * pointer is an invariant, so no lock is required to dereference the so_pcb 301 static void unp_dispose(struct socket *so); 430 uipc_lock_peer(struct socket *so, struct unpcb **unp2) in uipc_lock_peer() argument 435 unp = sotounpcb(so); in uipc_lock_peer() 438 if (__predict_false(so->so_error != 0)) { in uipc_lock_peer() 439 error = so->so_error; in uipc_lock_peer() 440 so->so_error = 0; in uipc_lock_peer() 452 error = so->so_state & SS_ISDISCONNECTED ? EPIPE : ENOTCONN; in uipc_lock_peer() 462 uipc_abort(struct socket *so) in uipc_abort() argument 466 unp = sotounpcb(so); in uipc_abort() [all …]
|
H A D | uipc_accf.c | 69 * Must be passed a malloc'd structure so we don't explode if the kld is 165 accept_filt_getopt(struct socket *so, struct sockopt *sopt) in accept_filt_getopt() argument 172 SOCK_LOCK(so); in accept_filt_getopt() 173 if (!SOLISTENING(so)) { in accept_filt_getopt() 177 if (so->sol_accept_filter == NULL) { in accept_filt_getopt() 181 strcpy(afap->af_name, so->sol_accept_filter->accf_name); in accept_filt_getopt() 182 if (so->sol_accept_filter_str != NULL) in accept_filt_getopt() 183 strcpy(afap->af_arg, so->sol_accept_filter_str); in accept_filt_getopt() 185 SOCK_UNLOCK(so); in accept_filt_getopt() 193 accept_filt_setopt(struct socket *so, struct sockopt *sopt) in accept_filt_setopt() argument [all …]
|
H A D | uipc_sockbuf.c | 57 * Function pointer set by the AIO routines so that the socket buffer code 78 static void sbunreserve_locked(struct socket *so, sb_which which); 379 socantsendmore_locked(struct socket *so) in socantsendmore_locked() argument 382 SOCK_SENDBUF_LOCK_ASSERT(so); in socantsendmore_locked() 384 so->so_snd.sb_state |= SBS_CANTSENDMORE; in socantsendmore_locked() 385 sowwakeup_locked(so); in socantsendmore_locked() 386 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore_locked() 390 socantsendmore(struct socket *so) in socantsendmore() argument 393 SOCK_SENDBUF_LOCK(so); in socantsendmore() 394 socantsendmore_locked(so); in socantsendmore() [all …]
|
/freebsd/sys/sys/ |
H A D | socketvar.h | 98 * (b) locked by SOCK_LOCK(so). 99 * (cr) locked by SOCK_RECVBUF_LOCK(so) 100 * (cs) locked by SOCK_SENDBUF_LOCK(so) 146 off_t so_splice_sent; /* (ir) splice bytes sent so far */ 246 #define SOCK_MTX(so) (&(so)->so_lock) argument 247 #define SOCK_LOCK(so) mtx_lock(&(so)->so_lock) argument 248 #define SOCK_OWNED(so) mtx_owned(&(so)->so_lock) argument 249 #define SOCK_UNLOCK(so) mtx_unlock(&(so)->so_lock) argument 250 #define SOCK_LOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_OWNED) argument 251 #define SOCK_UNLOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_NOTOWNED) argument [all …]
|
/freebsd/sys/security/mac/ |
H A D | mac_socket.c | 145 mac_socket_init(struct socket *so, int flag) in mac_socket_init() argument 149 so->so_label = mac_socket_label_alloc(flag); in mac_socket_init() 150 if (so->so_label == NULL) in mac_socket_init() 152 so->so_peerlabel = mac_socketpeer_label_alloc(flag); in mac_socket_init() 153 if (so->so_peerlabel == NULL) { in mac_socket_init() 154 mac_socket_label_free(so->so_label); in mac_socket_init() 155 so->so_label = NULL; in mac_socket_init() 159 so->so_label = NULL; in mac_socket_init() 160 so->so_peerlabel = NULL; in mac_socket_init() 182 mac_socket_destroy(struct socket *so) in mac_socket_destroy() argument [all …]
|
/freebsd/crypto/krb5/src/util/ |
H A D | valgrind-suppressions | 20 obj:/lib/ld-2.3.6.so 21 obj:/lib/ld-2.3.6.so 22 obj:/lib/ld-2.3.6.so 23 obj:/lib/libc-2.3.6.so 24 obj:/lib/ld-2.3.6.so 30 obj:/lib/ld-2.3.6.so 31 obj:/lib/libc-2.3.6.so 32 obj:/lib/ld-2.3.6.so 38 obj:/lib/ld-2.3.6.so 39 obj:/lib/ld-2.3.6.so [all …]
|
/freebsd/sys/dev/hyperv/hvsock/ |
H A D | hv_sock.c | 201 __hvs_remove_socket_from_list(struct socket *so, unsigned char list) in __hvs_remove_socket_from_list() argument 203 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_remove_socket_from_list() 211 __hvs_insert_socket_on_list(struct socket *so, unsigned char list) in __hvs_insert_socket_on_list() argument 213 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_insert_socket_on_list() 225 hvs_remove_socket_from_list(struct socket *so, unsigned char list) in hvs_remove_socket_from_list() argument 227 if (!so || !so->so_pcb) { in hvs_remove_socket_from_list() 234 __hvs_remove_socket_from_list(so, list); in hvs_remove_socket_from_list() 239 hvs_insert_socket_on_list(struct socket *so, unsigned char list) in hvs_insert_socket_on_list() argument 241 if (!so || !so->so_pcb) { in hvs_insert_socket_on_list() 248 __hvs_insert_socket_on_list(so, list); in hvs_insert_socket_on_list() [all …]
|
/freebsd/sys/ofed/drivers/infiniband/ulp/sdp/ |
H A D | sdp_main.c | 95 static void sdp_stop_keepalive_timer(struct socket *so); 191 sdp_getsockaddr(struct socket *so, struct sockaddr *sa) in sdp_getsockaddr() argument 193 struct sdp_sock *ssk = sdp_sk(so); in sdp_getsockaddr() 208 sdp_getpeeraddr(struct socket *so, struct sockaddr *sa) in sdp_getpeeraddr() argument 210 struct sdp_sock *ssk = sdp_sk(so); in sdp_getpeeraddr() 263 struct socket *so; in sdp_closed() local 268 so = ssk->socket; in sdp_closed() 269 soisdisconnected(so); in sdp_closed() 273 sorele(so); in sdp_closed() 299 /* We have to clear this so sdp_detach() will call pcbfree(). */ in sdp_shutdown_task() [all …]
|
/freebsd/crypto/openssl/crypto/objects/ |
H A D | obj_dat.h | 13 static const unsigned char so[8076] = { variable 1123 {"rsadsi", "RSA Data Security, Inc.", NID_rsadsi, 6, &so[0]}, 1124 {"pkcs", "RSA Data Security, Inc. PKCS", NID_pkcs, 7, &so[6]}, 1125 {"MD2", "md2", NID_md2, 8, &so[13]}, 1126 {"MD5", "md5", NID_md5, 8, &so[21]}, 1127 {"RC4", "rc4", NID_rc4, 8, &so[29]}, 1128 {"rsaEncryption", "rsaEncryption", NID_rsaEncryption, 9, &so[37]}, 1129 {"RSA-MD2", "md2WithRSAEncryption", NID_md2WithRSAEncryption, 9, &so[46]}, 1130 {"RSA-MD5", "md5WithRSAEncryption", NID_md5WithRSAEncryption, 9, &so[55]}, 1131 {"PBE-MD2-DES", "pbeWithMD2AndDES-CBC", NID_pbeWithMD2AndDES_CBC, 9, &so[64]}, [all …]
|
/freebsd/share/man/man9/ |
H A D | socket.9 | 37 .Fn soabort "struct socket *so" 39 .Fn soaccept "struct socket *so" "struct sockaddr *nam" 41 .Fn socheckuid "struct socket *so" "uid_t uid" 43 .Fn sobind "struct socket *so" "struct sockaddr *nam" "struct thread *td" 45 .Fn soclose "struct socket *so" 47 .Fn soconnect "struct socket *so" "struct sockaddr *nam" "struct thread *td" 54 .Fn sodisconnect "struct socket *so" 57 .Fa "struct socket *so" 63 .Fn sofree "struct socket *so" 65 .Fn sohasoutofband "struct socket *so" [all …]
|
/freebsd/bin/sh/tests/builtins/ |
H A D | command7.0 | 11 check '"$(PATH=/libexec command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 12 check '"$(PATH=/libexec command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 13 check '"$(PATH=/libexec command -pv ld-elf.so.1)" = ""' 14 check '"$(PATH=/libexec command -pv ld-elf.so.1; :)" = ""' 18 check '"$(command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 19 check '"$(command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 20 check '"$(command -pv ld-elf.so.1)" = ""' 21 check '"$(command -pv ld-elf.so.1; :)" = ""'
|
/freebsd/crypto/krb5/src/util/support/ |
H A D | deps | 4 threads.so threads.po $(OUTPRE)threads.$(OBJEXT): $(BUILDTOP)/include/autoconf.h \ 9 init-addrinfo.so init-addrinfo.po $(OUTPRE)init-addrinfo.$(OBJEXT): \ 14 plugins.so plugins.po $(OUTPRE)plugins.$(OBJEXT): $(BUILDTOP)/include/autoconf.h \ 18 errors.so errors.po $(OUTPRE)errors.$(OBJEXT): $(BUILDTOP)/include/autoconf.h \ 21 k5buf.so k5buf.po $(OUTPRE)k5buf.$(OBJEXT): $(BUILDTOP)/include/autoconf.h \ 24 gmt_mktime.so gmt_mktime.po $(OUTPRE)gmt_mktime.$(OBJEXT): \ 27 fake-addrinfo.so fake-addrinfo.po $(OUTPRE)fake-addrinfo.$(OBJEXT): \ 32 utf8.so utf8.po $(OUTPRE)utf8.$(OBJEXT): $(BUILDTOP)/include/autoconf.h \ 35 utf8_conv.so utf8_conv.po $(OUTPRE)utf8_conv.$(OBJEXT): \ 40 gettimeofday.so gettimeofday.po $(OUTPRE)gettimeofday.$(OBJEXT): \ [all …]
|
/freebsd/share/man/man5/ |
H A D | libmap.conf.5 | 36 .Xr ld-elf.so.1 1 87 The constraint is matched literally so that only an executable with an 121 or similar, so the basename constraint type is the most useful. 148 libc_r.so.6 libpthread.so.2 # Everything that uses 'libc_r' 149 libc_r.so libpthread.so # now uses 'libpthread' 152 libpthread.so.2 libc_r.so.6 153 libpthread.so libc_r.so 158 libpthread.so.2 libthr.so.2 159 libpthread.so libthr.so 161 # Glue for Linux-only EPSON printer .so to be loaded into cups, etc. [all …]
|
/freebsd/sys/dev/iscsi/ |
H A D | icl_soft_proxy.c | 107 struct socket *so; in icl_soft_proxy_connect() local 110 error = socreate(domain, &so, socktype, protocol, in icl_soft_proxy_connect() 116 error = sobind(so, from_sa, curthread); in icl_soft_proxy_connect() 118 soclose(so); in icl_soft_proxy_connect() 123 error = soconnect(so, to_sa, curthread); in icl_soft_proxy_connect() 125 soclose(so); in icl_soft_proxy_connect() 129 SOCK_LOCK(so); in icl_soft_proxy_connect() 130 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) { in icl_soft_proxy_connect() 131 error = msleep(&so->so_timeo, SOCK_MTX(so), PSOCK | PCATCH, in icl_soft_proxy_connect() 137 error = so->so_error; in icl_soft_proxy_connect() [all …]
|
/freebsd/sys/netlink/ |
H A D | netlink_domain.c | 316 nl_attach(struct socket *so, int proto, struct thread *td) in nl_attach() argument 330 so, is_linux ? "(linux) " : "", curproc->p_pid, in nl_attach() 334 error = soreserve(so, nl_sendspace, nl_recvspace); in nl_attach() 339 TAILQ_INIT(&so->so_rcv.nl_queue); in nl_attach() 340 TAILQ_INIT(&so->so_snd.nl_queue); in nl_attach() 341 so->so_pcb = nlp; in nl_attach() 342 nlp->nl_socket = so; in nl_attach() 346 nlp->nl_unconstrained_vnet = !jailed_without_vnet(so->so_cred); in nl_attach() 361 soisconnected(so); in nl_attach() 367 nl_bind(struct socket *so, struct sockaddr *sa, struct thread *td) in nl_bind() argument [all …]
|
/freebsd/sbin/ipf/libipf/ |
H A D | ipoptsec.c | 29 struct ipopt_names *so; in seclevel() local 34 for (so = secclass; so->on_name; so++) in seclevel() 35 if (!strcasecmp(slevel, so->on_name)) in seclevel() 38 if (!so->on_name) { in seclevel() 42 return (u_char)so->on_value; in seclevel() 49 struct ipopt_names *so; in secbit() local 51 for (so = secclass; so->on_name; so++) in secbit() 52 if (so->on_value == class) in secbit() 55 if (!so->on_name) { in secbit() 59 return (u_char)so->on_bit; in secbit()
|
H A D | optprint.c | 16 struct ipopt_names *io, *so; in optprint() local 40 for (so = secclass; so->on_name; so++) in optprint() 41 if ((secmsk & so->on_bit) && in optprint() 42 ((so->on_bit & secmsk) == (so->on_bit & secbits))) { in optprint() 43 printf("%s%s", s, so->on_name); in optprint() 72 for (so = secclass; so->on_name; so++) in optprint() 73 if ((so->on_bit & secmsk) && in optprint() 74 ((so->on_bit & secmsk) != in optprint() 75 (so->on_bit & secbits))) { in optprint() 76 printf("%s%s", s, so->on_name); in optprint()
|
/freebsd/contrib/sendmail/src/ |
H A D | sfsasl.c | 62 struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie; local 67 if (so->fp == NULL) 69 return so->fp->f_file; /* for stdio fileno() compatibility */ 72 if (so->fp == NULL) 76 return sm_io_getinfo(so->fp, what, valp); 108 struct sasl_obj *so; local 111 so = (struct sasl_obj *) sm_malloc(sizeof(struct sasl_obj)); 112 if (so == NULL) 117 so->fp = si->fp; 118 so->conn = si->conn; [all …]
|
/freebsd/lib/libpam/pam.d/ |
H A D | sshd | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 9 auth required pam_unix.so no_warn try_first_pass 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_login_access.so 15 account required pam_unix.so 18 #session optional pam_ssh.so want_agent 19 session required pam_permit.so 22 #password sufficient pam_krb5.so no_warn try_first_pass [all …]
|
H A D | system | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 9 auth required pam_unix.so no_warn try_first_pass nullok 12 #account required pam_krb5.so 13 account required pam_login_access.so 14 account required pam_unix.so 17 #session optional pam_ssh.so want_agent 18 session required pam_lastlog.so no_fail 19 session required pam_xdg.so 22 #password sufficient pam_krb5.so no_warn try_first_pass [all …]
|
/freebsd/sys/netgraph/ |
H A D | ng_ksocket.c | 90 struct socket *so; member 175 static int ng_ksocket_listen_upcall(struct socket *so, void *arg, 179 static int ng_ksocket_incoming(struct socket *so, void *arg, int waitflag); 666 error = socreate(family, &priv->so, type, protocol, in ng_ksocket_newhook() 692 struct socket *const so = priv->so; in ng_ksocket_connect() local 695 SOCK_RECVBUF_LOCK(so); in ng_ksocket_connect() 696 soupcall_set(priv->so, SO_RCV, ng_ksocket_incoming, node); in ng_ksocket_connect() 697 SOCK_RECVBUF_UNLOCK(so); in ng_ksocket_connect() 698 SOCK_SENDBUF_LOCK(so); in ng_ksocket_connect() 699 soupcall_set(priv->so, SO_SND, ng_ksocket_incoming, node); in ng_ksocket_connect() [all …]
|
/freebsd/sys/netipsec/ |
H A D | keysock.c | 89 key_send(struct socket *so, int flags, struct mbuf *m, in key_send() argument 132 error = key_parse(m, so); in key_send() 176 /* so can be NULL if target != KEY_SENDUP_ONE */ 178 key_sendup_mbuf(struct socket *so, struct mbuf *m, int target) in key_sendup_mbuf() argument 185 KASSERT(so != NULL || target != KEY_SENDUP_ONE, in key_sendup_mbuf() 220 if (so != NULL && so->so_pcb == kp) in key_sendup_mbuf() 239 if (so) { /* KEY_SENDUP_ONE */ in key_sendup_mbuf() 240 error = key_sendup0(so->so_pcb, m, 0); in key_sendup_mbuf() 259 key_attach(struct socket *so, int proto, struct thread *td) in key_attach() argument 264 KASSERT(so->so_pcb == NULL, ("key_attach: so_pcb != NULL")); in key_attach() [all …]
|
/freebsd/lib/libipsec/ |
H A D | test-policy.c | 155 int so; local 171 if ((so = socket(family, SOCK_DGRAM, 0)) < 0) 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 181 close(so); 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) { 189 close(so); 202 close(so); 211 close (so); 225 int so; in test2() local 242 if ((so = pfkey_open()) < 0) in test2() [all …]
|