/freebsd/crypto/openssl/crypto/objects/ |
H A D | obj_dat.h | 13 static const unsigned char so[8076] = { variable 1123 {"rsadsi", "RSA Data Security, Inc.", NID_rsadsi, 6, &so[0]}, 1124 {"pkcs", "RSA Data Security, Inc. PKCS", NID_pkcs, 7, &so[6]}, 1125 {"MD2", "md2", NID_md2, 8, &so[13]}, 1126 {"MD5", "md5", NID_md5, 8, &so[21]}, 1127 {"RC4", "rc4", NID_rc4, 8, &so[29]}, 1128 {"rsaEncryption", "rsaEncryption", NID_rsaEncryption, 9, &so[37]}, 1129 {"RSA-MD2", "md2WithRSAEncryption", NID_md2WithRSAEncryption, 9, &so[46]}, 1130 {"RSA-MD5", "md5WithRSAEncryption", NID_md5WithRSAEncryption, 9, &so[55]}, 1131 {"PBE-MD2-DES", "pbeWithMD2AndDES-CBC", NID_pbeWithMD2AndDES_CBC, 9, &so[64]}, [all …]
|
/freebsd/sys/kern/ |
H A D | uipc_socket.c | 166 static int soreceive_generic_locked(struct socket *so, 169 static int soreceive_rcvoob(struct socket *so, struct uio *uio, 171 static int soreceive_stream_locked(struct socket *so, struct sockbuf *sb, 174 static int sosend_generic_locked(struct socket *so, struct sockaddr *addr, 212 #define VNET_SO_ASSERT(so) \ argument 214 ("%s:%d curvnet is NULL, so=%p", __func__, __LINE__, (so))); 348 static int so_unsplice(struct socket *so, bool timeout); 801 struct socket *so; in soalloc() local 803 so = uma_zalloc(socket_zone, M_NOWAIT | M_ZERO); in soalloc() 804 if (so == NULL) in soalloc() [all …]
|
H A D | sys_socket.c | 121 struct socket *so = fp->f_data; in soo_read() local 125 error = mac_socket_check_receive(active_cred, so); in soo_read() 129 error = soreceive(so, 0, uio, 0, 0, 0); in soo_read() 137 struct socket *so = fp->f_data; in soo_write() local 141 error = mac_socket_check_send(active_cred, so); in soo_write() 145 error = sousrsend(so, NULL, uio, NULL, 0, NULL); in soo_write() 153 struct socket *so = fp->f_data; in soo_ioctl() local 158 SOCK_LOCK(so); in soo_ioctl() 160 so->so_state |= SS_NBIO; in soo_ioctl() 162 so->so_state &= ~SS_NBIO; in soo_ioctl() [all …]
|
H A D | uipc_accf.c | 165 accept_filt_getopt(struct socket *so, struct sockopt *sopt) in accept_filt_getopt() argument 172 SOCK_LOCK(so); in accept_filt_getopt() 173 if (!SOLISTENING(so)) { in accept_filt_getopt() 177 if (so->sol_accept_filter == NULL) { in accept_filt_getopt() 181 strcpy(afap->af_name, so->sol_accept_filter->accf_name); in accept_filt_getopt() 182 if (so->sol_accept_filter_str != NULL) in accept_filt_getopt() 183 strcpy(afap->af_arg, so->sol_accept_filter_str); in accept_filt_getopt() 185 SOCK_UNLOCK(so); in accept_filt_getopt() 193 accept_filt_setopt(struct socket *so, struct sockopt *sopt) in accept_filt_setopt() argument 208 SOCK_LOCK(so); in accept_filt_setopt() [all …]
|
H A D | uipc_sockbuf.c | 379 socantsendmore_locked(struct socket *so) in socantsendmore_locked() argument 382 SOCK_SENDBUF_LOCK_ASSERT(so); in socantsendmore_locked() 384 so->so_snd.sb_state |= SBS_CANTSENDMORE; in socantsendmore_locked() 385 sowwakeup_locked(so); in socantsendmore_locked() 386 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore_locked() 390 socantsendmore(struct socket *so) in socantsendmore() argument 393 SOCK_SENDBUF_LOCK(so); in socantsendmore() 394 socantsendmore_locked(so); in socantsendmore() 395 SOCK_SENDBUF_UNLOCK_ASSERT(so); in socantsendmore() 399 socantrcvmore_locked(struct socket *so) in socantrcvmore_locked() argument [all …]
|
H A D | uipc_usrreq.c | 295 static void unp_connect2(struct socket *so, struct socket *so2); 297 static void unp_dispose(struct socket *so); 421 uipc_abort(struct socket *so) in uipc_abort() argument 425 unp = sotounpcb(so); in uipc_abort() 440 uipc_attach(struct socket *so, int proto, struct thread *td) in uipc_attach() argument 447 KASSERT(so->so_pcb == NULL, ("uipc_attach: so_pcb != NULL")); in uipc_attach() 448 switch (so->so_type) { in uipc_attach() 455 STAILQ_INIT(&so->so_rcv.uxdg_mb); in uipc_attach() 456 STAILQ_INIT(&so->so_snd.uxdg_mb); in uipc_attach() 457 TAILQ_INIT(&so->so_rcv.uxdg_conns); in uipc_attach() [all …]
|
H A D | uipc_debug.c | 390 db_print_socket(struct socket *so, const char *socketname, int indent) in db_print_socket() argument 394 db_printf("%s at %p\n", socketname, so); in db_print_socket() 399 db_printf("so_count: %d ", so->so_count); in db_print_socket() 400 db_printf("so_type: %d (", so->so_type); in db_print_socket() 401 db_print_sotype(so->so_type); in db_print_socket() 405 db_printf("so_options: 0x%x (", so->so_options); in db_print_socket() 406 db_print_sooptions(so->so_options); in db_print_socket() 410 db_printf("so_linger: %d ", so->so_linger); in db_print_socket() 411 db_printf("so_state: 0x%x (", so->so_state); in db_print_socket() 412 db_print_sostate(so->so_state); in db_print_socket() [all …]
|
H A D | uipc_ktls.c | 405 ktls_get_cpu(struct socket *so) in ktls_get_cpu() argument 413 inp = sotoinpcb(so); in ktls_get_cpu() 599 ktls_create_session(struct socket *so, struct tls_enable *en, in ktls_create_session() argument 710 tls->inp = so->so_pcb; in ktls_create_session() 715 tls->wq_index = ktls_get_cpu(so); in ktls_create_session() 869 ktls_try_toe(struct socket *so, struct ktls_session *tls, int direction) in ktls_try_toe() argument 875 inp = so->so_pcb; in ktls_try_toe() 1096 ktls_try_ifnet(struct socket *so, struct ktls_session *tls, int direction, in ktls_try_ifnet() argument 1104 error = ktls_alloc_snd_tag(so->so_pcb, tls, force, &mst); in ktls_try_ifnet() 1110 error = ktls_alloc_rcv_tag(so->so_pcb, tls, &mst); in ktls_try_ifnet() [all …]
|
/freebsd/sys/sys/ |
H A D | socketvar.h | 245 #define SOCK_MTX(so) (&(so)->so_lock) argument 246 #define SOCK_LOCK(so) mtx_lock(&(so)->so_lock) argument 247 #define SOCK_OWNED(so) mtx_owned(&(so)->so_lock) argument 248 #define SOCK_UNLOCK(so) mtx_unlock(&(so)->so_lock) argument 249 #define SOCK_LOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_OWNED) argument 250 #define SOCK_UNLOCK_ASSERT(so) mtx_assert(&(so)->so_lock, MA_NOTOWNED) argument 279 #define SOCK_RECVBUF_MTX(so) \ argument 280 (&(so)->so_rcv_mtx) 281 #define SOCK_RECVBUF_LOCK(so) \ argument 282 mtx_lock(SOCK_RECVBUF_MTX(so)) [all …]
|
/freebsd/sys/security/mac/ |
H A D | mac_socket.c | 145 mac_socket_init(struct socket *so, int flag) in mac_socket_init() argument 149 so->so_label = mac_socket_label_alloc(flag); in mac_socket_init() 150 if (so->so_label == NULL) in mac_socket_init() 152 so->so_peerlabel = mac_socketpeer_label_alloc(flag); in mac_socket_init() 153 if (so->so_peerlabel == NULL) { in mac_socket_init() 154 mac_socket_label_free(so->so_label); in mac_socket_init() 155 so->so_label = NULL; in mac_socket_init() 159 so->so_label = NULL; in mac_socket_init() 160 so->so_peerlabel = NULL; in mac_socket_init() 182 mac_socket_destroy(struct socket *so) in mac_socket_destroy() argument [all …]
|
/freebsd/sys/dev/hyperv/hvsock/ |
H A D | hv_sock.c | 201 __hvs_remove_socket_from_list(struct socket *so, unsigned char list) in __hvs_remove_socket_from_list() argument 203 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_remove_socket_from_list() 211 __hvs_insert_socket_on_list(struct socket *so, unsigned char list) in __hvs_insert_socket_on_list() argument 213 struct hvs_pcb *pcb = so2hvspcb(so); in __hvs_insert_socket_on_list() 225 hvs_remove_socket_from_list(struct socket *so, unsigned char list) in hvs_remove_socket_from_list() argument 227 if (!so || !so->so_pcb) { in hvs_remove_socket_from_list() 234 __hvs_remove_socket_from_list(so, list); in hvs_remove_socket_from_list() 239 hvs_insert_socket_on_list(struct socket *so, unsigned char list) in hvs_insert_socket_on_list() argument 241 if (!so || !so->so_pcb) { in hvs_insert_socket_on_list() 248 __hvs_insert_socket_on_list(so, list); in hvs_insert_socket_on_list() [all …]
|
/freebsd/lib/libipsec/ |
H A D | test-policy.c | 155 int so; local 171 if ((so = socket(family, SOCK_DGRAM, 0)) < 0) 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 181 close(so); 187 if (getsockopt(so, proto, optname, getbuf, &len) < 0) { 189 close(so); 202 close(so); 211 close (so); 225 int so; in test2() local 242 if ((so = pfkey_open()) < 0) in test2() [all …]
|
/freebsd/sys/dev/iscsi/ |
H A D | icl_soft_proxy.c | 107 struct socket *so; in icl_soft_proxy_connect() local 110 error = socreate(domain, &so, socktype, protocol, in icl_soft_proxy_connect() 116 error = sobind(so, from_sa, curthread); in icl_soft_proxy_connect() 118 soclose(so); in icl_soft_proxy_connect() 123 error = soconnect(so, to_sa, curthread); in icl_soft_proxy_connect() 125 soclose(so); in icl_soft_proxy_connect() 129 SOCK_LOCK(so); in icl_soft_proxy_connect() 130 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) { in icl_soft_proxy_connect() 131 error = msleep(&so->so_timeo, SOCK_MTX(so), PSOCK | PCATCH, in icl_soft_proxy_connect() 137 error = so->so_error; in icl_soft_proxy_connect() [all …]
|
/freebsd/sys/ofed/drivers/infiniband/ulp/sdp/ |
H A D | sdp_main.c | 95 static void sdp_stop_keepalive_timer(struct socket *so); 191 sdp_getsockaddr(struct socket *so, struct sockaddr *sa) in sdp_getsockaddr() argument 193 struct sdp_sock *ssk = sdp_sk(so); in sdp_getsockaddr() 208 sdp_getpeeraddr(struct socket *so, struct sockaddr *sa) in sdp_getpeeraddr() argument 210 struct sdp_sock *ssk = sdp_sk(so); in sdp_getpeeraddr() 263 struct socket *so; in sdp_closed() local 268 so = ssk->socket; in sdp_closed() 269 soisdisconnected(so); in sdp_closed() 273 sorele(so); in sdp_closed() 411 sdp_attach(struct socket *so, int proto, struct thread *td) in sdp_attach() argument [all …]
|
/freebsd/contrib/sendmail/src/ |
H A D | sfsasl.c | 62 struct sasl_obj *so = (struct sasl_obj *) fp->f_cookie; local 67 if (so->fp == NULL) 69 return so->fp->f_file; /* for stdio fileno() compatibility */ 72 if (so->fp == NULL) 76 return sm_io_getinfo(so->fp, what, valp); 108 struct sasl_obj *so; local 111 so = (struct sasl_obj *) sm_malloc(sizeof(struct sasl_obj)); 112 if (so == NULL) 117 so->fp = si->fp; 118 so->conn = si->conn; [all …]
|
/freebsd/sbin/ipf/libipf/ |
H A D | ipoptsec.c | 29 struct ipopt_names *so; in seclevel() local 34 for (so = secclass; so->on_name; so++) in seclevel() 35 if (!strcasecmp(slevel, so->on_name)) in seclevel() 38 if (!so->on_name) { in seclevel() 42 return (u_char)so->on_value; in seclevel() 49 struct ipopt_names *so; in secbit() local 51 for (so = secclass; so->on_name; so++) in secbit() 52 if (so->on_value == class) in secbit() 55 if (!so->on_name) { in secbit() 59 return (u_char)so->on_bit; in secbit()
|
H A D | optprint.c | 16 struct ipopt_names *io, *so; in optprint() local 40 for (so = secclass; so->on_name; so++) in optprint() 41 if ((secmsk & so->on_bit) && in optprint() 42 ((so->on_bit & secmsk) == (so->on_bit & secbits))) { in optprint() 43 printf("%s%s", s, so->on_name); in optprint() 72 for (so = secclass; so->on_name; so++) in optprint() 73 if ((so->on_bit & secmsk) && in optprint() 74 ((so->on_bit & secmsk) != in optprint() 75 (so->on_bit & secbits))) { in optprint() 76 printf("%s%s", s, so->on_name); in optprint()
|
/freebsd/sys/netgraph/ |
H A D | ng_ksocket.c | 90 struct socket *so; member 175 static int ng_ksocket_listen_upcall(struct socket *so, void *arg, 179 static int ng_ksocket_incoming(struct socket *so, void *arg, int waitflag); 666 error = socreate(family, &priv->so, type, protocol, in ng_ksocket_newhook() 692 struct socket *const so = priv->so; in ng_ksocket_connect() local 695 SOCK_RECVBUF_LOCK(so); in ng_ksocket_connect() 696 soupcall_set(priv->so, SO_RCV, ng_ksocket_incoming, node); in ng_ksocket_connect() 697 SOCK_RECVBUF_UNLOCK(so); in ng_ksocket_connect() 698 SOCK_SENDBUF_LOCK(so); in ng_ksocket_connect() 699 soupcall_set(priv->so, SO_SND, ng_ksocket_incoming, node); in ng_ksocket_connect() [all …]
|
/freebsd/bin/sh/tests/builtins/ |
H A D | command7.0 | 11 check '"$(PATH=/libexec command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 12 check '"$(PATH=/libexec command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 13 check '"$(PATH=/libexec command -pv ld-elf.so.1)" = ""' 14 check '"$(PATH=/libexec command -pv ld-elf.so.1; :)" = ""' 18 check '"$(command -V ld-elf.so.1)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 19 check '"$(command -V ld-elf.so.1; :)" = "ld-elf.so.1 is /libexec/ld-elf.so.1"' 20 check '"$(command -pv ld-elf.so.1)" = ""' 21 check '"$(command -pv ld-elf.so.1; :)" = ""'
|
/freebsd/sys/netlink/ |
H A D | netlink_domain.c | 316 nl_attach(struct socket *so, int proto, struct thread *td) in nl_attach() argument 330 so, is_linux ? "(linux) " : "", curproc->p_pid, in nl_attach() 334 error = soreserve(so, nl_sendspace, nl_recvspace); in nl_attach() 339 TAILQ_INIT(&so->so_rcv.nl_queue); in nl_attach() 340 TAILQ_INIT(&so->so_snd.nl_queue); in nl_attach() 341 so->so_pcb = nlp; in nl_attach() 342 nlp->nl_socket = so; in nl_attach() 346 nlp->nl_unconstrained_vnet = !jailed_without_vnet(so->so_cred); in nl_attach() 361 soisconnected(so); in nl_attach() 367 nl_bind(struct socket *so, struct sockaddr *sa, struct thread *td) in nl_bind() argument [all …]
|
/freebsd/sys/netipsec/ |
H A D | keysock.c | 90 key_send(struct socket *so, int flags, struct mbuf *m, in key_send() argument 133 error = key_parse(m, so); in key_send() 179 key_sendup_mbuf(struct socket *so, struct mbuf *m, int target) in key_sendup_mbuf() argument 186 KASSERT(so != NULL || target != KEY_SENDUP_ONE, in key_sendup_mbuf() 221 if (so != NULL && so->so_pcb == kp) in key_sendup_mbuf() 240 if (so) { /* KEY_SENDUP_ONE */ in key_sendup_mbuf() 241 error = key_sendup0(so->so_pcb, m, 0); in key_sendup_mbuf() 260 key_attach(struct socket *so, int proto, struct thread *td) in key_attach() argument 265 KASSERT(so->so_pcb == NULL, ("key_attach: so_pcb != NULL")); in key_attach() 273 error = soreserve(so, key_sendspace, key_recvspace); in key_attach() [all …]
|
/freebsd/sys/netinet6/ |
H A D | raw_ip6.c | 348 rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam, in rip6_send() argument 366 inp = sotoinpcb(so); in rip6_send() 371 if (so->so_state & SS_ISCONNECTED) { in rip6_send() 408 so->so_cred, inp->inp_ip_p); in rip6_send() 423 if (!(so->so_state & SS_ISCONNECTED)) { in rip6_send() 470 error = in6_selectsrc_socket(dstsock, optp, inp, so->so_cred, in rip6_send() 577 rip6_ctloutput(struct socket *so, struct sockopt *sopt) in rip6_ctloutput() argument 579 struct inpcb *inp = sotoinpcb(so); in rip6_ctloutput() 587 return (icmp6_ctloutput(so, sopt)); in rip6_ctloutput() 592 return (ip6_ctloutput(so, sopt)); in rip6_ctloutput() [all …]
|
/freebsd/sys/netinet/ |
H A D | accf_http.c | 42 static int sohashttpget(struct socket *so, void *arg, int waitflag); 44 static int soparsehttpvers(struct socket *so, void *arg, int waitflag); 46 static int soishttpconnected(struct socket *so, void *arg, int waitflag); 150 sohashttpget(struct socket *so, void *arg, int waitflag) in sohashttpget() argument 153 if ((so->so_rcv.sb_state & SBS_CANTRCVMORE) == 0 && in sohashttpget() 154 !sbfull(&so->so_rcv)) { in sohashttpget() 159 m = so->so_rcv.sb_mb; in sohashttpget() 160 cc = sbavail(&so->so_rcv) - 1; in sohashttpget() 185 return (soishttpconnected(so, arg, waitflag)); in sohashttpget() 187 return (soparsehttpvers(so, arg, waitflag)); in sohashttpget() [all …]
|
/freebsd/usr.bin/bluetooth/btsockstat/ |
H A D | btsockstat.c | 220 struct socket so; in hcirawpr() local 232 if (kread(kvmd, (u_long) pcb.so, (char *) &so, sizeof(so)) < 0) in hcirawpr() 257 (unsigned long) pcb.so, in hcirawpr() 260 so.so_rcv.sb_ccc, in hcirawpr() 261 so.so_snd.sb_ccc, in hcirawpr() 275 struct socket so; in l2caprawpr() local 287 if (kread(kvmd, (u_long) pcb.so, (char *) &so, sizeof(so)) < 0) in l2caprawpr() 306 (unsigned long) pcb.so, in l2caprawpr() 308 so.so_rcv.sb_ccc, in l2caprawpr() 309 so.so_snd.sb_ccc, in l2caprawpr() [all …]
|
/freebsd/lib/libpam/pam.d/ |
H A D | sshd | 7 #auth sufficient pam_krb5.so no_warn try_first_pass 8 #auth sufficient pam_ssh.so no_warn try_first_pass 9 auth required pam_unix.so no_warn try_first_pass 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_login_access.so 15 account required pam_unix.so 18 #session optional pam_ssh.so want_agent 19 session required pam_permit.so 22 #password sufficient pam_krb5.so no_warn try_first_pass [all …]
|