/netbsd-6-1-5-RELEASE/sys/compat/osf1/ |
H A D | osf1_file.c | 134 syscallarg(int) fd; 152 int ncookies, fd; local 159 fd = SCARG(uap, fd); 160 if ((error = fd_getvnode(fd, &fp)) != 0) 262 fd_putfile(fd);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ssl.h | 1701 int SSL_set_fd(SSL *s, int fd); 1702 int SSL_set_rfd(SSL *s, int fd); 1703 int SSL_set_wfd(SSL *s, int fd);
|
H A D | ssl_lib.c | 664 int SSL_set_fd(SSL *s,int fd) argument 676 BIO_set_fd(bio,fd,BIO_NOCLOSE); 683 int SSL_set_wfd(SSL *s,int fd) argument 689 || ((int)BIO_get_fd(s->rbio,NULL) != fd)) 695 BIO_set_fd(bio,fd,BIO_NOCLOSE); 705 int SSL_set_rfd(SSL *s,int fd) argument 711 || ((int)BIO_get_fd(s->wbio,NULL) != fd)) 720 BIO_set_fd(bio,fd,BIO_NOCLOSE);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rand/ |
H A D | randfile.c | 213 int fd = open(file, O_WRONLY|O_CREAT|O_BINARY, 0600); local 214 if (fd != -1) 215 out = fdopen(fd, "wb");
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | apps.c | 680 } else if(!strncmp(arg, "fd:", 3)) { 688 /* Can't do BIO_gets on an fd BIO so add a buffering BIO */
|
H A D | ocsp.c | 1290 int fd; local 1309 if (BIO_get_fd(cbio, &fd) <= 0) 1311 BIO_puts(err, "Can't get connection fd\n"); 1318 openssl_fdset(fd, &confds); 1321 rv = select(fd + 1, NULL, (void *)&confds, NULL, &tv); 1352 openssl_fdset(fd, &confds); 1356 rv = select(fd + 1, (void *)&confds, NULL, NULL, &tv); 1358 rv = select(fd + 1, NULL, (void *)&confds, NULL, &tv);
|
/netbsd-6-1-5-RELEASE/distrib/utils/sysinst/arch/alpha/ |
H A D | md.c | 67 int fd; local 72 fd = open (dev_name, O_RDONLY, 0); 73 if (fd < 0) { 78 if (ioctl(fd, DIOCGDINFO, &disklabel) == -1) { 81 close(fd); 84 close(fd);
|
/netbsd-6-1-5-RELEASE/libexec/httpd/ |
H A D | bozohttpd.c | 769 mmap_and_write_part(bozohttpd_t *httpd, int fd, off_t first_byte_pos, size_t sz) argument 796 addr = mmap(0, mappedsz, PROT_READ, MAP_SHARED, fd, mappedoffset); 1538 int fd, isindex; local 1548 fd = -1; 1552 fd = open(file, O_RDONLY); 1553 if (fd >= 0) 1560 if (fd < 0) 1561 fd = open(file, O_RDONLY); 1563 if (fd < 0) { 1582 if (fstat(fd, 2004 bozodgetln(bozohttpd_t *httpd, int fd, ssize_t *lenp, ssize_t (*readfn)(bozohttpd_t *, int, void *, size_t)) argument [all...] |
H A D | daemon-bozo.c | 162 httpd->fds[i].fd = httpd->sock[i]; 195 daemon_runchild(bozohttpd_t *httpd, int fd) argument 200 dup2(fd, 0); 201 dup2(fd, 1); 202 /*dup2(fd, 2);*/ 203 close(fd); 207 daemon_poll_err(bozohttpd_t *httpd, int fd, int idx) argument 212 bozo_warn(httpd, "poll on fd %d pid %d revents %d: %s", 213 httpd->fds[idx].fd, getpid(), httpd->fds[idx].revents, 258 int fd; local [all...] |
H A D | ssl-bozo.c | 117 bozo_ssl_read(bozohttpd_t *httpd, int fd, void *buf, size_t nbytes) argument 122 USE_ARG(fd); 138 bozo_ssl_write(bozohttpd_t *httpd, int fd, const void *buf, size_t nbytes) argument 143 USE_ARG(fd); 265 bozo_read(bozohttpd_t *httpd, int fd, void *buf, size_t len) argument 269 return bozo_ssl_read(httpd, fd, buf, len); 272 return read(fd, buf, len); 276 bozo_write(bozohttpd_t *httpd, int fd, const void *buf, size_t len) argument 280 return bozo_ssl_write(httpd, fd, buf, len); 283 return write(fd, bu [all...] |
/netbsd-6-1-5-RELEASE/sys/compat/netbsd32/ |
H A D | netbsd32_compat_50.c | 285 syscallarg(int) fd; 297 if ((error = fd_getvnode(SCARG(uap, fd), &fp)) != 0) 302 fd_putfile(SCARG(uap, fd)); 617 syscallarg(int) fd; 639 error = kevent1(retval, SCARG(uap, fd), 746 syscallarg(int) fd; 753 error = do_sys_fstat(SCARG(uap, fd), &ub);
|
H A D | netbsd32_event.c | 98 syscallarg(int) fd; 120 error = kevent1(retval, SCARG(uap, fd),
|
H A D | netbsd32_execve.c | 85 syscallarg(int) fd; 91 NETBSD32TO64_UAP(fd);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bio/ |
H A D | bss_dgram.c | 209 BIO *BIO_new_dgram(int fd, int close_flag) argument 215 BIO_set_fd(ret,fd,close_flag); 872 BIO *BIO_new_dgram_sctp(int fd, int close_flag) argument 891 BIO_set_fd(bio,fd,close_flag); 895 ret = setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, sizeof(struct sctp_authchunk)); 898 ret = setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, sizeof(struct sctp_authchunk)); 907 ret = getsockopt(fd, IPPROTO_SCTP, SCTP_LOCAL_AUTH_CHUNKS, authchunks, &sockopt_len); 929 ret = setsockopt(fd, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(struct sctp_event)); 933 ret = getsockopt(fd, IPPROTO_SCTP, SCTP_EVENTS, &event, &sockopt_len); 938 ret = setsockopt(fd, IPPROTO_SCT [all...] |
/netbsd-6-1-5-RELEASE/sys/net/ |
H A D | if_tap.c | 756 int error, fd; local 758 if ((error = fd_allocfile(&fp, &fd)) != 0) 762 fd_abort(curproc, fp, fd); 768 return fd_clone(fp, fd, FREAD|FWRITE, &tap_fileops,
|
/netbsd-6-1-5-RELEASE/usr.sbin/postinstall/ |
H A D | postinstall | 250 fd="${_dest}/${f}" 252 if [ ! -f "${fd}" ]; then 253 _error="${fd} does not exist" 254 elif ! cmp -s "${fs}" "${fd}" ; then 255 if $_onlynew; then # leave existing ${fd} alone 258 _error="${fs} != ${fd}" 264 if [ -n "${DIFF_STYLE}" -a -f "${fd}" ]; then 265 diff -${DIFF_STYLE} ${DIFF_OPT} "${fd}" "${fs}" 268 elif ! rm -f "${fd}" || 269 ! cp -f "${fs}" "${fd}"; the [all...] |
/netbsd-6-1-5-RELEASE/sys/kern/ |
H A D | vfs_syscalls.c | 1127 * Get filesystem statistics by fd. 1130 do_sys_fstatvfs(struct lwp *l, int fd, int flags, struct statvfs *sb) argument 1137 if ((error = fd_getvnode(fd, &fp)) != 0) 1141 fd_putfile(fd); 1150 syscallarg(int) fd; 1158 error = do_sys_fstatvfs(l, SCARG(uap, fd), SCARG(uap, flags), sb); 1255 syscallarg(int) fd; 1262 int error, fd; local 1265 fd = SCARG(uap, fd); 1323 int error, fd = SCARG(uap, fd); local 1472 do_open(lwp_t *l, struct pathbuf *pb, int open_flags, int open_mode, int *fd) argument 1521 fd_open(const char *path, int open_flags, int open_mode, int *fd) argument 2551 int error, fd; local 2607 int error, fd = SCARG(uap, fd); local 2674 int error, fd = SCARG(uap, fd); local [all...] |
H A D | uipc_syscalls.c | 102 int fd, error; local 105 SCARG(uap, protocol), l, &fd); 107 *retval = fd; 132 do_sys_bind(struct lwp *l, int fd, struct mbuf *nam) argument 137 if ((error = fd_getsock(fd, &so)) != 0) { 144 fd_putfile(fd); 172 int error, fd; local 182 if ((error = fd_allocfile(&fp2, &fd)) != 0) { 188 *new_sock = fd; 250 fd_abort(curproc, NULL, fd); 278 int error, fd; local 307 int error, fd; local 355 do_sys_connect(struct lwp *l, int fd, struct mbuf *nam) argument 410 makesocket(struct lwp *l, file_t **fp, int *fd, int flags, int type, int domain, int proto, struct socket *soo) argument 447 int fd, error, sv[2]; local 1057 int fd, error; local 1109 do_sys_getsockname(struct lwp *l, int fd, int which, struct mbuf **nam) argument [all...] |
H A D | uipc_socket.c | 568 int fd, error; local 572 if ((error = fd_allocfile(&fp, &fd)) != 0) 574 fd_set_exclose(l, fd, (flags & SOCK_CLOEXEC) != 0); 581 fd_abort(curproc, fp, fd); 586 fd_affix(curproc, fp, fd); 587 *fdout = fd; 1622 * An application has called close() on an fd on which another 1626 * On system call re-entry the fd is validated and EBADF returned. 1627 * Any other fd will block again on the 2nd syscall.
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/easy_tls/ |
H A D | easy-tls.c | 128 * TLS_APP_PROCESS_INIT -- void ...(int fd, int client_p, void *apparg) 135 # define TLS_APP_PROCESS_INIT(fd, client_p, apparg) ((void) 0) 168 static int tls_socket_nonblocking(int fd); 179 ret.fd = -1; 188 /* Slice in TLS proxy process at fd. 204 DEBUG_MSG2("tls_start_proxy fd", a.fd); 207 if (a.fd == -1 || a.client_p == -1 || a.ctx == NULL) 220 if (a.fd >= FD_SETSIZE || fds[0] >= FD_SETSIZE) { 244 TLS_APP_PROCESS_INIT(a.fd, 785 tls_socket_nonblocking(int fd) argument 831 int fd; local 1200 write_attempt(int fd, struct tunnelbuf *buf, int *select, int *closed, int *progress) argument 1222 read_attempt(int fd, struct tunnelbuf *buf, int *select, int *closed, int *progress) argument [all...] |
H A D | easy-tls.h | 46 int fd; member in struct:tls_start_proxy_args
|
H A D | test.c | 24 test_process_init(int fd, int client_p, void *apparg) argument 26 fprintf(stderr, "test_process_init(fd = %d, client_p = %d, apparg = %p)\n", fd, client_p, apparg); 39 int s, fd, r; local 100 fd = s; 101 fprintf(stderr, "Connect (fd = %d).\n", fd); 141 fd = accept(s, NULL, 0); 142 if (fd == -1) { 147 fprintf(stderr, "Accept (fd [all...] |
H A D | test.h | 5 void test_process_init(int fd, int client_p, void *apparg);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ |
H A D | e_os.h | 494 # define SHUTDOWN(fd) close(fd) 495 # define SHUTDOWN2(fd) close(fd) 521 # define SHUTDOWN(fd) { shutdown((fd),0); closesocket(fd); } 522 # define SHUTDOWN2(fd) { shutdown((fd),2); closesocket(fd); } [all...] |
/netbsd-6-1-5-RELEASE/distrib/utils/sysinst/ |
H A D | mbr.c | 1445 int fd, i; local 1467 fd = opendisk(disk, O_RDONLY, diskpath, sizeof(diskpath), 0); 1468 if (fd < 0) 1472 if (pread(fd, mbrs, sizeof *mbrs, 1530 fd, mbri->sector + mbrp->mbrp_start, NULL)); 1590 if (fd >= 0) 1591 close(fd); 1604 int fd, i, ret = 0; local 1615 fd = opendisk(disk, O_WRONLY, diskpath, sizeof(diskpath), 0); 1616 if (fd < [all...] |