| /freebsd/crypto/openssl/crypto/objects/ |
| H A D | obj_dat.h | 13 static const unsigned char so[9517] = { variable 1356 {"rsadsi", "RSA Data Security, Inc.", NID_rsadsi, 6, &so[0]}, 1357 {"pkcs", "RSA Data Security, Inc. PKCS", NID_pkcs, 7, &so[6]}, 1358 {"MD2", "md2", NID_md2, 8, &so[13]}, 1359 {"MD5", "md5", NID_md5, 8, &so[21]}, 1360 {"RC4", "rc4", NID_rc4, 8, &so[29]}, 1361 {"rsaEncryption", "rsaEncryption", NID_rsaEncryption, 9, &so[37]}, 1362 {"RSA-MD2", "md2WithRSAEncryption", NID_md2WithRSAEncryption, 9, &so[46]}, 1363 {"RSA-MD5", "md5WithRSAEncryption", NID_md5WithRSAEncryption, 9, &so[55]}, 1364 {"PBE-MD2-DES", "pbeWithMD2AndDES-CBC", NID_pbeWithMD2AndDES_CBC, 9, &so[64]}, [all …]
|
| /freebsd/sys/kern/ |
| H A D | uipc_socket.c | 167 static int soreceive_generic_locked(struct socket *so, 170 static int soreceive_rcvoob(struct socket *so, struct uio *uio, 172 static int soreceive_stream_locked(struct socket *so, struct sockbuf *sb, 175 static int sosend_generic_locked(struct socket *so, struct sockaddr *addr, 215 #define VNET_SO_ASSERT(so) \ argument 217 ("%s:%d curvnet is NULL, so=%p", __func__, __LINE__, (so))); 378 static int so_unsplice(struct socket *so, bool timeout); 838 struct socket *so; in soalloc() local 840 so = uma_zalloc(socket_zone, M_NOWAIT | M_ZERO); in soalloc() 841 if (so == NULL) in soalloc() [all …]
|
| H A D | sys_socket.c | 123 struct socket *so = fp->f_data; in soo_read() local 127 error = mac_socket_check_receive(active_cred, so); in soo_read() 131 error = soreceive(so, 0, uio, 0, 0, 0); in soo_read() 139 struct socket *so = fp->f_data; in soo_write() local 143 error = mac_socket_check_send(active_cred, so); in soo_write() 147 error = sousrsend(so, NULL, uio, NULL, 0, NULL); in soo_write() 155 struct socket *so = fp->f_data; in soo_ioctl() local 160 SOCK_LOCK(so); in soo_ioctl() 162 so->so_state |= SS_NBIO; in soo_ioctl() 164 so->so_state &= ~SS_NBIO; in soo_ioctl() [all …]
|
| H A D | uipc_accf.c | 165 accept_filt_getopt(struct socket *so, struct sockopt *sopt) in accept_filt_getopt() argument 172 SOCK_LOCK(so); in accept_filt_getopt() 173 if (!SOLISTENING(so)) { in accept_filt_getopt() 177 if (so->sol_accept_filter == NULL) { in accept_filt_getopt() 181 strcpy(afap->af_name, so->sol_accept_filter->accf_name); in accept_filt_getopt() 182 if (so->sol_accept_filter_str != NULL) in accept_filt_getopt() 183 strcpy(afap->af_arg, so->sol_accept_filter_str); in accept_filt_getopt() 185 SOCK_UNLOCK(so); in accept_filt_getopt() 193 accept_filt_setopt(struct socket *so, struct sockopt *sopt) in accept_filt_setopt() argument 208 SOCK_LOCK(so); in accept_filt_setopt() [all …]
|
| H A D | uipc_usrreq.c | 298 static void unp_dispose(struct socket *so); 427 uipc_lock_peer(struct socket *so, struct unpcb **unp2) in uipc_lock_peer() argument 432 unp = sotounpcb(so); in uipc_lock_peer() 435 if (__predict_false(so->so_error != 0)) { in uipc_lock_peer() 436 error = so->so_error; in uipc_lock_peer() 437 so->so_error = 0; in uipc_lock_peer() 449 error = so->so_state & SS_ISDISCONNECTED ? EPIPE : ENOTCONN; in uipc_lock_peer() 459 uipc_abort(struct socket *so) in uipc_abort() argument 463 unp = sotounpcb(so); in uipc_abort() 478 uipc_attach(struct socket *so, int proto, struct thread *td) in uipc_attach() argument [all …]
|
| H A D | uipc_sockbuf.c | 78 static void sbunreserve_locked(struct socket *so, sb_which which); 373 socantsendmore_locked(struct socket *so) in socantsendmore_locked() argument 376 SOCK_SENDBUF_LOCK_ASSERT(so); in socantsendmore_locked() 378 so->so_snd.sb_state |= SBS_CANTSENDMORE; in socantsendmore_locked() 379 sowwakeup_locked(so); in socantsendmore_locked() 380 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore_locked() 384 socantsendmore(struct socket *so) in socantsendmore() argument 387 SOCK_SENDBUF_LOCK(so); in socantsendmore() 388 socantsendmore_locked(so); in socantsendmore() 389 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore() [all …]
|
| H A D | uipc_debug.c | 383 db_print_socket(struct socket *so, const char *socketname, int indent) in db_print_socket() argument 387 db_printf("%s at %p\n", socketname, so); in db_print_socket() 392 db_printf("so_count: %d ", so->so_count); in db_print_socket() 393 db_printf("so_type: %d (", so->so_type); in db_print_socket() 394 db_print_sotype(so->so_type); in db_print_socket() 398 db_printf("so_options: 0x%x (", so->so_options); in db_print_socket() 399 db_print_sooptions(so->so_options); in db_print_socket() 403 db_printf("so_linger: %d ", so->so_linger); in db_print_socket() 404 db_printf("so_state: 0x%x (", so->so_state); in db_print_socket() 405 db_print_sostate(so->so_state); in db_print_socket() [all …]
|
| /freebsd/sys/sys/ |
| H A D | socketvar.h | 246 #define SOCK_MTX(so) (&(so)->so_lock) argument 247 #define SOCK_LOCK(so) mtx_lock(&(so)->so_lock) argument 248 #define SOCK_OWNED(so) mtx_owned(&(so)->so_lock) argument 249 #define SOCK_UNLOCK(so) mtx_unlock(&(so)->so_lock) argument 250 #define SOCK_LOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_OWNED) argument 251 #define SOCK_UNLOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_NOTOWNED) argument 280 #define SOCK_RECVBUF_MTX(so) \ argument 281 (&(so)->so_rcv_mtx) 282 #define SOCK_RECVBUF_LOCK(so) \ argument 283 mtx_lock(SOCK_RECVBUF_MTX(so)) [all …]
|
| /freebsd/sys/security/mac/ |
| H A D | mac_socket.c | 145 mac_socket_init(struct socket *so, int flag) in mac_socket_init() argument 149 so->so_label = mac_socket_label_alloc(flag); in mac_socket_init() 150 if (so->so_label == NULL) in mac_socket_init() 152 so->so_peerlabel = mac_socketpeer_label_alloc(flag); in mac_socket_init() 153 if (so->so_peerlabel == NULL) { in mac_socket_init() 154 mac_socket_label_free(so->so_label); in mac_socket_init() 155 so->so_label = NULL; in mac_socket_init() 159 so->so_label = NULL; in mac_socket_init() 160 so->so_peerlabel = NULL; in mac_socket_init() 182 mac_socket_destroy(struct socket *so) in mac_socket_destroy() argument [all …]
|
| /freebsd/crypto/krb5/src/util/ |
| H A D | valgrind-suppressions | 20 obj:/lib/ld-2.3.6.so 21 obj:/lib/ld-2.3.6.so 22 obj:/lib/ld-2.3.6.so 23 obj:/lib/libc-2.3.6.so 24 obj:/lib/ld-2.3.6.so 30 obj:/lib/ld-2.3.6.so 31 obj:/lib/libc-2.3.6.so 32 obj:/lib/ld-2.3.6.so 38 obj:/lib/ld-2.3.6.so 39 obj:/lib/ld-2.3.6.so [all …]
|
| /freebsd/sys/dev/hyperv/hvsock/ |
| H A D | hv_sock.c | 201 __hvs_remove_socket_from_list(struct socket *so, unsigned char list) in __hvs_remove_socket_from_list() argument 203 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_remove_socket_from_list() 211 __hvs_insert_socket_on_list(struct socket *so, unsigned char list) in __hvs_insert_socket_on_list() argument 213 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_insert_socket_on_list() 225 hvs_remove_socket_from_list(struct socket *so, unsigned char list) in hvs_remove_socket_from_list() argument 227 if (!so || !so->so_pcb) { in hvs_remove_socket_from_list() 234 __hvs_remove_socket_from_list(so, list); in hvs_remove_socket_from_list() 239 hvs_insert_socket_on_list(struct socket *so, unsigned char list) in hvs_insert_socket_on_list() argument 241 if (!so || !so->so_pcb) { in hvs_insert_socket_on_list() 248 __hvs_insert_socket_on_list(so, list); in hvs_insert_socket_on_list() [all …]
|
| /freebsd/lib/libipsec/ |
| H A D | test-policy.c | 155 int so; local 171 if ((so = socket(family, SOCK_DGRAM, 0)) < 0) 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 181 close(so); 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) { 189 close(so); 202 close(so); 211 close (so); 225 int so; in test2() local 242 if ((so = pfkey_open()) < 0) in test2() [all …]
|
| /freebsd/sys/dev/iscsi/ |
| H A D | icl_soft_proxy.c | 107 struct socket *so; in icl_soft_proxy_connect() local 110 error = socreate(domain, &so, socktype, protocol, in icl_soft_proxy_connect() 116 error = sobind(so, from_sa, curthread); in icl_soft_proxy_connect() 118 soclose(so); in icl_soft_proxy_connect() 123 error = soconnect(so, to_sa, curthread); in icl_soft_proxy_connect() 125 soclose(so); in icl_soft_proxy_connect() 129 SOCK_LOCK(so); in icl_soft_proxy_connect() 130 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) { in icl_soft_proxy_connect() 131 error = msleep(&so->so_timeo, SOCK_MTX(so), PSOCK | PCATCH, in icl_soft_proxy_connect() 137 error = so->so_error; in icl_soft_proxy_connect() [all …]
|
| /freebsd/sys/ofed/drivers/infiniband/ulp/sdp/ |
| H A D | sdp_main.c | 95 static void sdp_stop_keepalive_timer(struct socket *so); 191 sdp_getsockaddr(struct socket *so, struct sockaddr *sa) in sdp_getsockaddr() argument 193 struct sdp_sock *ssk = sdp_sk(so); in sdp_getsockaddr() 208 sdp_getpeeraddr(struct socket *so, struct sockaddr *sa) in sdp_getpeeraddr() argument 210 struct sdp_sock *ssk = sdp_sk(so); in sdp_getpeeraddr() 263 struct socket *so; in sdp_closed() local 268 so = ssk->socket; in sdp_closed() 269 soisdisconnected(so); in sdp_closed() 273 sorele(so); in sdp_closed() 411 sdp_attach(struct socket *so, int proto, struct thread *td) in sdp_attach() argument [all …]
|
| /freebsd/sbin/ipf/libipf/ |
| H A D | ipoptsec.c | 29 struct ipopt_names *so; in seclevel() local 34 for (so = secclass; so->on_name; so++) in seclevel() 35 if (!strcasecmp(slevel, so->on_name)) in seclevel() 38 if (!so->on_name) { in seclevel() 42 return (u_char)so->on_value; in seclevel() 49 struct ipopt_names *so; in secbit() local 51 for (so = secclass; so->on_name; so++) in secbit() 52 if (so->on_value == class) in secbit() 55 if (!so->on_name) { in secbit() 59 return (u_char)so->on_bit; in secbit()
|
| H A D | optprint.c | 16 struct ipopt_names *io, *so; in optprint() local 40 for (so = secclass; so->on_name; so++) in optprint() 41 if ((secmsk & so->on_bit) && in optprint() 42 ((so->on_bit & secmsk) == (so->on_bit & secbits))) { in optprint() 43 printf("%s%s", s, so->on_name); in optprint() 72 for (so = secclass; so->on_name; so++) in optprint() 73 if ((so->on_bit & secmsk) && in optprint() 74 ((so->on_bit & secmsk) != in optprint() 75 (so->on_bit & secbits))) { in optprint() 76 printf("%s%s", s, so->on_name); in optprint()
|
| /freebsd/contrib/sendmail/src/ |
| H A D | sfsasl.c | 62 struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie; local 67 if (so->fp == NULL) 69 return so->fp->f_file; /* for stdio fileno() compatibility */ 72 if (so->fp == NULL) 76 return sm_io_getinfo(so->fp, what, valp); 108 struct sasl_obj *so; local 111 so = (struct sasl_obj *) sm_malloc(sizeof(struct sasl_obj)); 112 if (so == NULL) 117 so->fp = si->fp; 118 so->conn = si->conn; [all …]
|
| /freebsd/sys/netlink/ |
| H A D | netlink_domain.c | 316 nl_attach(struct socket *so, int proto, struct thread *td) in nl_attach() argument 330 so, is_linux ? "(linux) " : "", curproc->p_pid, in nl_attach() 333 mtx_init(&so->so_snd_mtx, "netlink so_snd", NULL, MTX_DEF); in nl_attach() 334 mtx_init(&so->so_rcv_mtx, "netlink so_rcv", NULL, MTX_DEF); in nl_attach() 335 error = soreserve(so, nl_sendspace, nl_recvspace); in nl_attach() 337 mtx_destroy(&so->so_snd_mtx); in nl_attach() 338 mtx_destroy(&so->so_rcv_mtx); in nl_attach() 341 TAILQ_INIT(&so->so_rcv.nl_queue); in nl_attach() 342 TAILQ_INIT(&so->so_snd.nl_queue); in nl_attach() 344 so->so_pcb = nlp; in nl_attach() [all …]
|
| /freebsd/sys/netgraph/ |
| H A D | ng_ksocket.c | 90 struct socket *so; member 175 static int ng_ksocket_listen_upcall(struct socket *so, void *arg, 179 static int ng_ksocket_incoming(struct socket *so, void *arg, int waitflag); 666 error = socreate(family, &priv->so, type, protocol, in ng_ksocket_newhook() 692 struct socket *const so = priv->so; in ng_ksocket_connect() local 695 SOCK_RECVBUF_LOCK(so); in ng_ksocket_connect() 696 soupcall_set(priv->so, SO_RCV, ng_ksocket_incoming, node); in ng_ksocket_connect() 697 SOCK_RECVBUF_UNLOCK(so); in ng_ksocket_connect() 698 SOCK_SENDBUF_LOCK(so); in ng_ksocket_connect() 699 soupcall_set(priv->so, SO_SND, ng_ksocket_incoming, node); in ng_ksocket_connect() [all …]
|
| /freebsd/bin/sh/tests/builtins/ |
| H A D | command7.0 | 11 check '"$(PATH=/libexec command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 12 check '"$(PATH=/libexec command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 13 check '"$(PATH=/libexec command -pv ld-elf.so.1)" = ""' 14 check '"$(PATH=/libexec command -pv ld-elf.so.1; :)" = ""' 18 check '"$(command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 19 check '"$(command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 20 check '"$(command -pv ld-elf.so.1)" = ""' 21 check '"$(command -pv ld-elf.so.1; :)" = ""'
|
| /freebsd/sys/netipsec/ |
| H A D | keysock.c | 89 key_send(struct socket *so, int flags, struct mbuf *m, in key_send() argument 132 error = key_parse(m, so); in key_send() 178 key_sendup_mbuf(struct socket *so, struct mbuf *m, int target) in key_sendup_mbuf() argument 185 KASSERT(so != NULL || target != KEY_SENDUP_ONE, in key_sendup_mbuf() 220 if (so != NULL && so->so_pcb == kp) in key_sendup_mbuf() 239 if (so) { /* KEY_SENDUP_ONE */ in key_sendup_mbuf() 240 error = key_sendup0(so->so_pcb, m, 0); in key_sendup_mbuf() 259 key_attach(struct socket *so, int proto, struct thread *td) in key_attach() argument 264 KASSERT(so->so_pcb == NULL, ("key_attach: so_pcb != NULL")); in key_attach() 272 error = soreserve(so, key_sendspace, key_recvspace); in key_attach() [all …]
|
| /freebsd/sys/netinet6/ |
| H A D | raw_ip6.c | 346 rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam, in rip6_send() argument 365 inp = sotoinpcb(so); in rip6_send() 370 if (so->so_state & SS_ISCONNECTED) { in rip6_send() 407 so->so_cred, inp->inp_ip_p); in rip6_send() 422 if (!(so->so_state & SS_ISCONNECTED)) { in rip6_send() 465 error = in6_selectsrc_socket(dstsock, optp, inp, so->so_cred, in rip6_send() 572 rip6_ctloutput(struct socket *so, struct sockopt *sopt) in rip6_ctloutput() argument 574 struct inpcb *inp = sotoinpcb(so); in rip6_ctloutput() 582 return (icmp6_ctloutput(so, sopt)); in rip6_ctloutput() 587 return (ip6_ctloutput(so, sopt)); in rip6_ctloutput() [all …]
|
| /freebsd/sys/netinet/ |
| H A D | accf_http.c | 41 static int sohashttpget(struct socket *so, void *arg, int waitflag); 43 static int soparsehttpvers(struct socket *so, void *arg, int waitflag); 45 static int soishttpconnected(struct socket *so, void *arg, int waitflag); 149 sohashttpget(struct socket *so, void *arg, int waitflag) in sohashttpget() argument 152 if ((so->so_rcv.sb_state & SBS_CANTRCVMORE) == 0 && in sohashttpget() 153 !sbfull(&so->so_rcv)) { in sohashttpget() 158 m = so->so_rcv.sb_mb; in sohashttpget() 159 cc = sbavail(&so->so_rcv) - 1; in sohashttpget() 184 return (soishttpconnected(so, arg, waitflag)); in sohashttpget() 186 return (soparsehttpvers(so, arg, waitflag)); in sohashttpget() [all …]
|
| /freebsd/usr.bin/bluetooth/btsockstat/ |
| H A D | btsockstat.c | 220 struct socket so; in hcirawpr() local 232 if (kread(kvmd, (u_long) pcb.so, (char *) &so, sizeof(so)) < 0) in hcirawpr() 257 (unsigned long) pcb.so, in hcirawpr() 260 so.so_rcv.sb_ccc, in hcirawpr() 261 so.so_snd.sb_ccc, in hcirawpr() 275 struct socket so; in l2caprawpr() local 287 if (kread(kvmd, (u_long) pcb.so, (char *) &so, sizeof(so)) < 0) in l2caprawpr() 306 (unsigned long) pcb.so, in l2caprawpr() 308 so.so_rcv.sb_ccc, in l2caprawpr() 309 so.so_snd.sb_ccc, in l2caprawpr() [all …]
|
| /freebsd/lib/libpam/pam.d/ |
| H A D | sshd | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 9 auth required pam_unix.so no_warn try_first_pass 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_login_access.so 15 account required pam_unix.so 18 #session optional pam_ssh.so want_agent 19 session required pam_permit.so 22 #password sufficient pam_krb5.so no_warn try_first_pass [all …]
|