Home
last modified time | relevance | path

Searched refs:sotype (Results 1 – 10 of 10) sorted by relevance

/xnu-8019.80.24/bsd/nfs/
H A Dkrpc_subr.c219 u_int sotype, u_int prog, u_int vers, u_int func, in krpc_call() argument
248 if ((error = sock_socket(AF_INET, sotype, 0, 0, 0, &so))) { in krpc_call()
267 if (from_p && (sotype == SOCK_DGRAM)) { in krpc_call()
312 if (sotype == SOCK_STREAM) { in krpc_call()
344 if (sotype == SOCK_STREAM) { in krpc_call()
358 if (sotype == SOCK_STREAM) { in krpc_call()
393 if (sotype == SOCK_STREAM) { in krpc_call()
432 if (sotype == SOCK_STREAM) { in krpc_call()
584 if (sotype == SOCK_STREAM) { in krpc_call()
H A Dnfs_boot.c152 nfs_boot_getfh(__unused struct nfs_diskless *nd, __unused int v3, __unused int sotype) in nfs_boot_getfh() argument
186 static int md_mount(struct sockaddr_in *mdsin, char *path, int v3, int sotype,
312 nfs_boot_getfh(struct nfs_diskless *nd, int v3, int sotype) in nfs_boot_getfh() argument
317 nd->nd_root.ndm_sotype = sotype; in nfs_boot_getfh()
329 nd->nd_private.ndm_sotype = sotype; in nfs_boot_getfh()
722 int sotype, in md_mount() argument
736 int proto = (sotype == SOCK_STREAM) ? IPPROTO_TCP : IPPROTO_UDP; in md_mount()
767 error = krpc_call(mdsin, sotype, RPCPROG_MNT, mntversion, RPCMNT_MOUNT, &m, NULL); in md_mount()
847 int v3, sotype; in nfs_mountroot() local
866 sotype = SOCK_STREAM; in nfs_mountroot()
[all …]
H A Dkrpc.h38 int krpc_call(struct sockaddr_in *sin, u_int sotype,
H A Dnfs_vfsops.c1048 args.sotype = tempargs.sotype; in nfs_convert_old_nfs_args()
1344 xb_add_string(error, &xb, ((args.sotype == SOCK_DGRAM) ? "udp" : "tcp"), 3); in nfs_convert_old_nfs_args()
2605 char sotype[16]; in mountnfs() local
2607 *sotype = '\0'; in mountnfs()
2609 if (!error && ((val < 3) || (val > sizeof(sotype)))) { in mountnfs()
2613 error = xb_get_bytes(&xb, sotype, val, 0); in mountnfs()
2615 sotype[val] = '\0'; in mountnfs()
2616 if (!strcmp(sotype, "tcp")) { in mountnfs()
2618 } else if (!strcmp(sotype, "udp")) { in mountnfs()
2620 } else if (!strcmp(sotype, "tcp4")) { in mountnfs()
[all …]
H A Dnfs_socket.c544 uint8_t sotype, in nfs_socket_create() argument
599 nso->nso_sotype = sotype; in nfs_socket_create()
653 vfs_statfs(nmp->nm_mountp)->f_mntfromname, error, nso, naddr, sotype, in nfs_socket_create()
659 sotype, resvport ? "r" : "", port, protocol, vers); in nfs_socket_create()
1236 uint8_t sotype = nmp->nm_sotype ? nmp->nm_sotype : SOCK_STREAM; in nfs_connect() local
1277 nss.nss_sotype = sotype; in nfs_connect()
1398 sotype = SOCK_DGRAM; in nfs_connect()
3345 int error, error2, sotype, rexmit, slpflag = 0, needrecon; in nfs_send() local
3372 sotype = nmp->nm_sotype; in nfs_send()
3465 if (sotype == SOCK_DGRAM) { in nfs_send()
[all …]
H A Dnfs_syscalls.c940 int error = 0, sodomain, sotype, soprotocol, on = 1; in nfssvc_addsock() local
950 sock_gettype(so, &sodomain, &sotype, &soprotocol); in nfssvc_addsock()
963 if (sotype == SOCK_STREAM) { in nfssvc_addsock()
980 sobufsize = min(sbmaxsize, (sotype == SOCK_DGRAM) ? NFS_UDPSOCKBUF : NFSRV_TCPSOCKBUF); in nfssvc_addsock()
1037 if (sotype == SOCK_STREAM) { in nfssvc_addsock()
1095 slp->ns_sotype = sotype; in nfssvc_addsock()
H A Dnfs.h293 int sotype; /* Socket type */ member
341 int sotype; /* Socket type */ member
H A Dnfs_subs.c1278 nfsm_rpchead2(__unused struct nfsmount *nmp, int sotype, int prog, int vers, int proc, int auth_typ… in nfsm_rpchead2() argument
1322 if (sotype == SOCK_STREAM) { /* also include room for any RPC Record Mark */ in nfsm_rpchead2()
1356 if (sotype == SOCK_STREAM) { in nfsm_rpchead2()
1455 if (sotype == SOCK_STREAM) { in nfsm_rpchead2()
/xnu-8019.80.24/bsd/security/audit/
H A Daudit.h218 void audit_arg_socket(struct kaudit_record *ar, int sodomain, int sotype,
H A Daudit_arg.c317 audit_arg_socket(struct kaudit_record *ar, int sodomain, int sotype, in audit_arg_socket() argument
321 ar->k_ar.ar_arg_sockinfo.sai_type = sotype; in audit_arg_socket()