• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/kern/

Lines Matching refs:filter

584  *		since socket filter authors and protocol family authors may
596 struct socket_filter_entry *filter;
611 /* Socket filter */
613 for (filter = so->so_filt; filter && (error == 0);
614 filter = filter->sfe_next_onsocket) {
615 if (filter->sfe_filter->sf_filter.sf_bind) {
621 error = filter->sfe_filter->sf_filter.
622 sf_bind(filter->sfe_cookie, so, nam);
629 /* End socket filter */
676 * <sf_listen> returns depend on what the filter author causes
677 * their filter to return.
684 struct socket_filter_entry *filter;
715 for (filter = so->so_filt; filter && (error == 0);
716 filter = filter->sfe_next_onsocket) {
717 if (filter->sfe_filter->sf_filter.sf_listen) {
723 error = filter->sfe_filter->sf_filter.
724 sf_listen(filter->sfe_cookie, so);
1085 struct socket_filter_entry *filter;
1091 * has not been made visible to the filter(s).
1109 for (filter = so->so_filt; filter != NULL && error == 0;
1110 filter = filter->sfe_next_onsocket) {
1111 if (filter->sfe_filter->sf_filter.sf_accept != NULL) {
1117 error = filter->sfe_filter->sf_filter.
1118 sf_accept(filter->sfe_cookie,
1146 * the socket has been exposed to the filter(s) earlier.
1152 /* Propagate socket filter's error code to the caller */
1174 * <sf_connect_out>:??? [anything a filter writer might set]
1213 * Run connect filter before calling protocol:
1216 struct socket_filter_entry *filter;
1220 for (filter = so->so_filt; filter && (error == 0);
1221 filter = filter->sfe_next_onsocket) {
1222 if (filter->sfe_filter->sf_filter.sf_connect_out) {
1228 error = filter->sfe_filter->sf_filter.
1229 sf_connect_out(filter->sfe_cookie, so, nam);
1346 * We're being called recursively from a filter,
1464 * <pru_send>:???[AF_UNIX] [whatever a filter author chooses]
1465 * <sf_data_out>:??? [whatever a filter author chooses]
1468 * <sf_data_out> returns depend on what the filter author causes
1469 * their filter to return.
1534 struct socket_filter_entry *filter;
1761 * Socket filter processing
1766 for (filter = so->so_filt; filter && (error == 0);
1767 filter = filter->sfe_next_onsocket) {
1768 if (filter->sfe_filter->sf_filter.sf_data_out) {
1780 error = filter->sfe_filter->sf_filter.
1781 sf_data_out(filter->sfe_cookie, so,
1789 * filter. The socket is unlocked as is
1791 * filter thread only when we are outside
1792 * of a filter's context. This allows for
1793 * a filter to issue multiple inject calls
1812 * End Socket filter processing
1816 /* A socket filter handled this data */
2942 * sflt_attach_private:??? [whatever a filter author chooses]
2943 * <sf_setoption>:??? [whatever a filter author chooses]
2946 * <sf_listen> returns depend on what the filter author causes
2947 * their filter to return.
2955 struct socket_filter_entry *filter;
2974 for (filter = so->so_filt; filter && (error == 0);
2975 filter = filter->sfe_next_onsocket) {
2976 if (filter->sfe_filter->sf_filter.sf_setoption) {
2982 error = filter->sfe_filter->sf_filter.
2983 sf_setoption(filter->sfe_cookie, so, sopt);
3300 struct socket_filter_entry *filter;
3313 for (filter = so->so_filt; filter && (error == 0);
3314 filter = filter->sfe_next_onsocket) {
3315 if (filter->sfe_filter->sf_filter.sf_getoption) {
3321 error = filter->sfe_filter->sf_filter.
3322 sf_getoption(filter->sfe_cookie, so, sopt);