/macosx-10.5.8/xnu-1228.15.4/bsd/crypto/aes/ppc/ |
H A D | aescrypt.c | 49 #define so(y,x,c) word_out(y, c, s(x,c)) macro 66 #define state_out(y,x) so(y,x,0); so(y,x,1); so(y,x,2); so(y,x,3) 73 so we need to control this with the following VC++ pragmas 241 so we need to control this with the following VC++ pragmas 387 // We are doing the first block so we need the IV rather than the previous
|
/macosx-10.5.8/xnu-1228.15.4/bsd/netinet6/ |
H A D | icmp6.c | 253 * this check has already done in ip6_unknown_opt(), so we can 1377 * so it rarely varies in the defined qtypes. 1856 * address configuration by DHCPv6, so the former 2731 icmp6_ctloutput(so, sopt) 2732 struct socket *so; 2737 struct inpcb *inp = sotoinpcb(so); 2810 icmp6_dgram_ctloutput(struct socket *so, struct sockopt *sopt) argument 2812 if (so->so_uid == 0) 2813 return icmp6_ctloutput(so, sopt); 2818 return icmp6_ctloutput(so, sop 2855 icmp6_dgram_send(struct socket *so, __unused int flags, struct mbuf *m, struct sockaddr *nam, struct mbuf *control, __unused struct proc *p) argument 2924 icmp6_dgram_attach(struct socket *so, int proto, struct proc *p) argument [all...] |
H A D | in6_proto.c | 146 static int rip6_pr_output(struct mbuf *m, struct socket *so, struct sockaddr_in6 *, struct mbuf *); 341 int rip6_pr_output(__unused struct mbuf *m, __unused struct socket *so, argument 394 * or so? (jinmei@kame.net 19990310)
|
H A D | in6_src.c | 163 * sin6_scope_id field, so this part will be rewritten in 258 /* No route yet, so try to acquire one */ 278 * the address. But we don't know why it does so. 280 * so doesn't check out IFF_LOOPBACK. 297 * I don't think so. 358 struct socket *so = inp->inp_socket; local 371 if ((so->so_options & (SO_REUSEADDR|SO_REUSEPORT)) == 0) 398 * We split the two cases (up and down) so that the direction
|
H A D | ip6_var.h | 359 int rip6_ctloutput(struct socket *so, struct sockopt *sopt);
|
H A D | ipsec.h | 313 extern int ipsec_init_policy(struct socket *so, struct inpcbpolicy **);
|
H A D | in6.c | 192 * RTF_LLINFO flag, so that the corresponding host route would have 406 in6_control(so, cmd, data, ifp, p) 407 struct socket *so; 500 return in6_lifaddr_ioctl(so, cmd, data, ifp, p); 821 * interface route, so we configure the address first. 1566 in6_lifaddr_ioctl(so, cmd, data, ifp, p) 1567 struct socket *so; 1681 return in6_control(so, SIOCAIFADDR_IN6, (caddr_t)&ifra, ifp, p); 1810 return in6_control(so, SIOCDIFADDR_IN6, (caddr_t)&ifra, 1913 * so w [all...] |
H A D | ip6_output.c | 158 * nd_ifinfo.linkmtu is u_int32_t. so we use u_long to hold largest one, 190 struct socket *so = NULL; local 198 so = ipsec_getsocket(m); 235 if (so == NULL) 238 sp = ipsec6_getpolicybysock(m, IPSEC_DIR_OUTBOUND, so, &error); 1360 ip6_ctloutput(so, sopt) 1361 struct socket *so; 1365 struct inpcb *in6p = sotoinpcb(so); 1404 m, so, sopt); 1796 __unused struct socket *so, 1793 ip6_pcbopts( struct ip6_pktopts **pktopt, struct mbuf *m, __unused struct socket *so, struct sockopt *sopt) argument [all...] |
/macosx-10.5.8/xnu-1228.15.4/bsd/kern/ |
H A D | kern_audit.c | 169 * at a time, so if more than one thread requests a replacement, only 175 * by the worker thread so a waiting thread can start another replacement. 235 * XXX: Couldn't find the include file for this, so copied kern_exec.c's 325 * so that we know how we're doing on space. In both cases, 370 /* Check if the current log file is full; if so, call for 464 * check to see if we're in a failure mode, and if so, whether 544 * broadcast so that both new replacements can be inserted, 545 * but also so that the source(s) of replacement can return 748 * has been replaced in, so we can return successfully. 832 * a complete kernel audit record just so th 2183 audit_arg_sockaddr(struct vnode *cwd_vp, struct sockaddr *so) argument 2365 struct socket *so; local [all...] |
H A D | proc_info.c | 111 int pid_socketinfo(socket_t so, struct fileproc *fp, int closeonexec, user_addr_t buffer, uint32_t buffersize, register_t * retval); 961 pid_socketinfo(socket_t so, struct fileproc *fp, int closeonexec, user_addr_t buffer, __unused uint32_t buffersize, register_t * retval) argument 969 if ((error = fill_socketinfo(so, &s.psi)) == 0) { 1138 socket_t so; local 1140 if ((error = fp_getfsock(p, fd, &fp, &so)) !=0) { 1145 error = pid_socketinfo(so, fp, closeonexec, buffer, buffersize, retval);
|
/macosx-10.5.8/xnu-1228.15.4/libkern/ppc/ |
H A D | bcmp.s | 46 mr r6,r3 ; copy LHS ptr so we can use r3 as result
|
/macosx-10.5.8/xnu-1228.15.4/osfmk/ppc/ |
H A D | bcopy.s | 41 ; The bcopy_phys variants use a stack frame so they can call bcopy as a subroutine. 53 ; are very slow doing real-mode (translation off) copies, so we set up temporary BATs 61 ; is loaded. We do not touch the IBATs, so there is no issue if either physical page 84 stwu r1,-BCOPY_SF_SIZE(r1) ; push on a stack frame so we can call bcopy 85 mtcrf 0x02,r8 ; move pf64Bit to cr6 so we can test 127 bl EXT(bcopy) ; BATs set up, args in r3-r5, so do the copy with DR on 154 ; will not check, so be careful. 167 stwu r1,-BCOPY_SF_SIZE(r1) ; push on a stack frame so we can call bcopy 170 mtcrf 0x02,r8 ; move pf64Bit to cr6 so we can test 205 std r8,BCOPY_SF_MSR(r1) ; save caller's MSR so w [all...] |
H A D | skiplists.s | 57 * (4**4)==256 mappings requires the larger node, so the average size is 64.25 bytes. 108 mr r6,r3 ; save pmap ptr here so we can accumulate statistics 123 ; r2 = count of mappings visited so far 145 bne++ mapSrch64a ; was another, so loop 160 ld r4,pmapSkipLists(r6) ; assume prev ptr null... so next is first 204 beqlr- ; next ptr was null, so return 0 in r4 and r5 211 ; r2 = count of mappings visited so far 233 bne+ mapSrch32a ; was another, so loop 248 lwz r4,pmapSkipLists+4(r6) ; assume prev ptr null... so next is first 294 beqlr- ; next ptr was null, so retur [all...] |
H A D | cswtch.s | 103 * See if a continuation is supplied, and skip state save if so. 308 ; killing off the old context of the new guy so we need to pop off 453 bne-- cr1,fssync0a ; Yea, still locked so sniff harder... 475 beq-- fsneedone ; Never saved it, so go do it... 584 beq-- fsnosave ; No live context, so nothing to save... 598 ; and handle specially if so. 638 bne-- cr1,fswsync0a ; Yea, still locked so sniff harder... 671 bne-- fsnosavelk ; Something has changed, so this is not ours to save... 688 beq++ fsnosavelk ; Same level, so already saved... 744 bne-- cr1,fsnsync0a ; Yea, still locked so snif [all...] |
H A D | misc_asm.s | 77 mr r9,r1 ; We are already on the stack, so use the current value
|
H A D | savearea_asm.s | 491 ; Local list was low so replenish from global list. 540 ; First we check if there are any left in the local list and if so, we allow 558 ; empty. Add in a few so we have enough to take down the system. 631 ; Local list was low so replenish from global list. 680 ; First we check if there are any left in the local list and if so, we allow 698 ; empty. Add in a few so we have enough to take down the system. 755 mr r11,r4 ; was save_ret_wMSR, so overwrite saved MSR 825 bltlr++ ; List not too long, so done 833 * using it, eh? So for this case, we are safe so long as the savearea stays on 896 bltlr+ ; List not too long, so don [all...] |
/macosx-10.5.8/xnu-1228.15.4/security/ |
H A D | mac_base.c | 279 * Policy list array allocation chunk size. Trying to set this so that we 602 * to contain the potential new elements so we don't have to 1644 struct socket *so; local 1710 so = (struct socket *) fp->f_fglob->fg_data; 1712 sock_lock(so, 1); 1713 mac_socket_label_copy(so->so_label, intlabel); 1714 sock_unlock(so, 1); 1725 error = ENOSYS; // only sockets/vnodes so far 1837 struct socket *so; local 1907 so [all...] |
H A D | mac_vfs.c | 1339 struct socket *so; local 1375 so = (struct socket *)fp->f_fglob->fg_data; 1376 socket_lock(so, 1); 1378 vfs_context_ucred(ctx), (socket_t)so, so->so_label, 1380 socket_unlock(so, 1);
|
H A D | mac_internal.h | 293 int mac_socket_label_update(struct ucred *cred, struct socket *so, struct label *l);
|
/macosx-10.5.8/xnu-1228.15.4/bsd/netinet/ |
H A D | ip_output.c | 250 struct socket *so = NULL; local 358 so = ipsec_getsocket(m); 368 so = ipsec_getsocket(m); 523 * interface having such an address, so bail out. 569 * cloned host route so that we end up with a route 780 * default source IP. It's a shame so much effort happens 870 if (so == NULL) 873 sp = ipsec4_getpolicybysock(m, IPSEC_DIR_OUTBOUND, so, &error); 1123 * so they are not needed anymore. 1195 * to a local socket. If so the [all...] |
H A D | tcp_var.h | 340 #define sototcpcb(so) (intotcpcb(sotoinpcb(so)))
|
/macosx-10.5.8/xnu-1228.15.4/bsd/netat/ |
H A D | adsp_Control.c | 102 if (((sp->gref)->so)->so_rcv.sb_mb) 103 for (p = ((sp->gref)->so)->so_rcv.sb_mb; p; p = p->m_nextpkt) 451 * Blocking' setting. If so, then we won't send this data unless 483 * receive window. If so, we need to send an ack request along 489 eom = 0; /* so can't send EOM */
|
H A D | ddp.c | 135 int ddp_ctloutput(so, sopt) 136 struct socket *so; 139 struct atpcb *at_pcb = sotoatpcb(so); 580 * up... Note that for LocalTalk, dst_net zero means "THIS_NET", so 714 else { /* We are in multiport mode, so we can bypass all the rest 852 * we don't want elap to be looking into ddp header, so 971 * We want everything in router mode, specially socket 254 for nbp so we need 1066 /* strip off DDP header if so indicated by 1292 * we don't want elap to be looking into ddp header, so
|
/macosx-10.5.8/xnu-1228.15.4/bsd/bsm/ |
H A D | audit_kernel.h | 362 struct sockaddr *so); 415 * Wrap the audit_syscall_exit() function so that it is called only when
|
/macosx-10.5.8/xnu-1228.15.4/bsd/nfs/ |
H A D | nfs_vfsops.c | 630 * disabled for a mount, so we can definitely answer NO in that case. 634 * successfully perform a lock operation on a mount point, so if it 645 /* locks disabled on this mount, so they definitely won't work */ 820 * - do enough of "ifconfig" by calling ifioctl() so that the system 1061 * mimic main()!. Temporarily set up rootvnode and other stuff so 1765 * call, so advertise the fact. 2014 socket_t so = NULL; local 2023 if (((error = sock_socket(saddr->sin_family, SOCK_DGRAM, IPPROTO_UDP, NULL, NULL, &so))) || 2024 ((error = sock_setsockopt(so, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv)))) || 2025 ((error = sock_setsockopt(so, SOL_SOCKE [all...] |