/netbsd-src/external/bsd/unbound/dist/daemon/ |
H A D | daemon.c | 197 struct daemon* 200 struct daemon* daemon = (struct daemon*)calloc(1, in daemon_init() local 201 sizeof(struct daemon)); in daemon_init() 206 if(!daemon) in daemon_init() 256 daemon->need_to_exit = 0; in daemon_init() 257 modstack_init(&daemon->mods); in daemon_init() 258 if(!(daemon->env = (struct module_env*)calloc(1, in daemon_init() 259 sizeof(*daemon->env)))) { in daemon_init() 260 free(daemon); in daemon_init() 264 if(!edns_known_options_init(daemon->env)) { in daemon_init() [all …]
|
H A D | unbound.c | 301 apply_settings(struct daemon* daemon, struct config_file* cfg, in apply_settings() argument 311 daemon_apply_cfg(daemon, cfg); in apply_settings() 437 if(daemon(1, 0) != 0) in detach() 470 perform_setup(struct daemon* daemon, struct config_file* cfg, int debug_mode, in perform_setup() argument 491 if(!(daemon->rc = daemon_remote_create(cfg))) in perform_setup() 494 if(!(daemon->listen_sslctx = listen_sslctx_create( in perform_setup() 498 if (!SSL_CTX_set_cipher_list(daemon->listen_sslctx, cfg->tls_ciphers)) { in perform_setup() 504 if (!SSL_CTX_set_ciphersuites(daemon->listen_sslctx, cfg->tls_ciphersuites)) { in perform_setup() 511 if(!listen_sslctx_setup_ticket_keys(daemon->listen_sslctx, cfg->tls_session_ticket_keys.first)) { in perform_setup() 516 if(!(daemon->connect_sslctx = connect_sslctx_create(NULL, NULL, in perform_setup() [all …]
|
H A D | daemon.h | 76 struct daemon { struct 155 struct daemon* daemon_init(void); 163 int daemon_open_shared_ports(struct daemon* daemon); 170 void daemon_fork(struct daemon* daemon); 177 void daemon_cleanup(struct daemon* daemon); 183 void daemon_delete(struct daemon* daemon); 190 void daemon_apply_cfg(struct daemon* daemon, struct config_file* cfg);
|
H A D | worker.h | 58 struct daemon; 86 struct daemon* daemon; member 147 struct worker* worker_create(struct daemon* daemon, int id, int* ports, int n);
|
H A D | worker.c | 139 superac = alloc_get_mem(&worker->daemon->superalloc); in worker_mem_report() 167 me += acl_list_get_mem(worker->daemon->acl); in worker_mem_report() 319 worker->daemon->cfg->harden_large_queries) { in worker_check_request() 753 if((worker->daemon->use_response_ip || worker->daemon->use_rpz) && in answer_from_cache() 1304 *acladdr = acl_addr_lookup(worker->daemon->acl, in deny_refuse_all() 1307 *acladdr = acl_addr_lookup(worker->daemon->acl, in deny_refuse_all() 1415 repinfo->max_udp_size = worker->daemon->cfg->max_udp_size; in worker_handle_request() 1416 if(!dnsc_handle_curved_request(worker->daemon->dnscenv, repinfo)) { in worker_handle_request() 1443 worker->daemon->dnscenv->provider_name) == 0)) { in worker_handle_request() 1446 worker->daemon->dnscenv->provider_name, in worker_handle_request() [all …]
|
H A D | remote.c | 764 print_mem(RES* ssl, struct worker* worker, struct daemon* daemon, in print_mem() argument 781 msg = slabhash_get_mem(daemon->env->msg_cache); in print_mem() 782 rrset = slabhash_get_mem(&daemon->env->rrset_cache->table); in print_mem() 793 if(daemon->dnscenv) { in print_mem() 795 daemon->dnscenv->shared_secrets_cache); in print_mem() 796 dnscrypt_nonce = slabhash_get_mem(daemon->dnscenv->nonces_cache); in print_mem() 851 timeval_subtract(&up, &now, &worker->daemon->time_boot); in print_uptime() 852 timeval_subtract(&dt, &now, &worker->daemon->time_last_stat); in print_uptime() 854 worker->daemon->time_last_stat = now; in print_uptime() 1086 struct daemon* daemon = worker->daemon; in do_stats() local [all …]
|
/netbsd-src/external/bsd/unbound/dist/util/shm_side/ |
H A D | shm_main.c | 83 int shm_main_init(struct daemon* daemon) in shm_main_init() argument 90 if(!daemon) in shm_main_init() 92 if(!daemon->cfg->shm_enable) in shm_main_init() 94 if(daemon->cfg->stat_interval == 0) in shm_main_init() 98 shm_size = (sizeof(struct ub_stats_info) * (daemon->num + 1)); in shm_main_init() 101 daemon->shm_info = (struct shm_main_info*)calloc(1, shm_size); in shm_main_init() 104 if(!daemon->shm_info) { in shm_main_init() 109 daemon->shm_info->key = daemon->cfg->shm_key; in shm_main_init() 112 daemon->shm_info->id_ctl = shmget(daemon->shm_info->key, sizeof(int), SHM_R); in shm_main_init() 113 daemon->shm_info->id_arr = shmget(daemon->shm_info->key + 1, sizeof(int), SHM_R); in shm_main_init() [all …]
|
H A D | shm_main.h | 44 struct daemon; 64 int shm_main_init(struct daemon* daemon); 65 void shm_main_shutdown(struct daemon* daemon);
|
/netbsd-src/external/bsd/unbound/dist/winrc/ |
H A D | win_svc.c | 304 service_init(int r, struct daemon** d, struct config_file** c) in service_init() 307 struct daemon* daemon = NULL; in service_init() local 317 if(r) daemon = *d; in service_init() 318 else daemon = daemon_init(); in service_init() 319 if(!daemon) return 0; in service_init() 325 if(!config_read(cfg, service_cfgfile, daemon->chroot)) { in service_init() 352 daemon_apply_cfg(daemon, cfg); in service_init() 355 if(!(daemon->rc = daemon_remote_create(cfg))) { in service_init() 357 daemon_delete(daemon); in service_init() 362 if(!(daemon->listen_sslctx = listen_sslctx_create( in service_init() [all …]
|
/netbsd-src/usr.sbin/tcpdchk/ |
H A D | inetcf.c | 196 char daemon[BUFSIZ]; in inet_chk() local 261 snprintf(daemon, sizeof(daemon), "%s/%s", REAL_DAEMON_DIR, arg0); in inet_chk() 262 if (check_path(daemon, &st) < 0) { in inet_chk() 266 tcpd_warn("%s: not executable", daemon); in inet_chk() 277 snprintf(daemon, sizeof(daemon), "%s/%s", REAL_DAEMON_DIR, arg0); in inet_chk() 278 if (STR_EQ(path, daemon)) { in inet_chk() 280 } else if (check_path(daemon, &st) >= 0) { in inet_chk() 285 tcpd_warn("%s: file lookup: %m", daemon); in inet_chk()
|
/netbsd-src/external/ibm-public/postfix/dist/mantools/ |
H A D | manlint.stop | 69 man/man8/anvil.8:11:\fBanvil\fR [generic Postfix daemon options] 70 man/man8/bounce.8:11:\fBbounce\fR [generic Postfix daemon options] 71 man/man8/cleanup.8:11:\fBcleanup\fR [generic Postfix daemon options] 72 man/man8/discard.8:11:\fBdiscard\fR [generic Postfix daemon options] 73 man/man8/error.8:11:\fBerror\fR [generic Postfix daemon options] 74 man/man8/flush.8:11:\fBflush\fR [generic Postfix daemon options] 75 man/man8/lmtp.8:11:\fBlmtp\fR [generic Postfix daemon options] 77 man/man8/local.8:11:\fBlocal\fR [generic Postfix daemon options] 81 man/man8/oqmgr.8:11:\fBoqmgr\fR [generic Postfix daemon options] 82 man/man8/pickup.8:11:\fBpickup\fR [generic Postfix daemon options] [all …]
|
/netbsd-src/usr.sbin/tcpdmatch/ |
H A D | tcpdmatch.c | 69 char *daemon; in main() local 119 daemon = strrchr(argv[optind], '/') + 1; in main() 120 tcpd_warn("%s: daemon name normalized to: %s", argv[optind], daemon); in main() 122 daemon = argv[optind]; in main() 146 switch (inet_get(daemon)) { in main() 148 tcpd_warn("%s: no such process name in %s", daemon, inetcf); in main() 151 tcpd_warn("%s: service possibly not wrapped", daemon); in main() 166 request_init(&request, RQ_DAEMON, daemon, RQ_USER, user, RQ_FILE, 1, 0); in main()
|
/netbsd-src/usr.sbin/faithd/ |
H A D | README | 15 To perform relays, FAITH daemon needs to be executed on a router between 16 your local IPv6 site and outside IPv4 network. The daemon needs to be 23 node that runs FAITH-daemon (usually a router) 50 inet6d, disable that daemon. Comment out the line from "inet6d.conf" 104 (6) To see if "faithd" works, watch "/var/log/daemon". Note: please 106 in "/var/log/daemon". 109 daemon.* /var/log/daemon 144 node that runs FAITH-daemon (usually a router) v
|
/netbsd-src/external/bsd/unbound/dist/ |
H A D | Makefile.in | 189 DAEMON_SRC=daemon/acl_list.c daemon/cachedump.c daemon/daemon.c \ 190 daemon/remote.c daemon/stats.c daemon/unbound.c daemon/worker.c @WIN_DAEMON_SRC@ 191 DAEMON_OBJ=acl_list.lo cachedump.lo daemon.lo \ 212 daemon/worker.c daemon/acl_list.c \ 213 daemon/daemon.c daemon/stats.c \ 217 daemon.lo stats.lo shm_main.lo $(COMMON_OBJ_WITHOUT_NETCALL) ub_event.lo $(SLDNS_OBJ) \ 752 …$(srcdir)/services/authzone.h $(srcdir)/daemon/stats.h $(srcdir)/util/timehist.h $(srcdir)/libunbo… 770 …$(srcdir)/sldns/sbuffer.h $(srcdir)/util/config_file.h $(srcdir)/daemon/stats.h $(srcdir)/util/tim… 821 …$(srcdir)/daemon/stats.h $(srcdir)/util/timehist.h $(srcdir)/libunbound/unbound.h $(srcdir)/respip… 833 …$(srcdir)/daemon/stats.h $(srcdir)/util/timehist.h $(srcdir)/libunbound/unbound.h $(srcdir)/respip… [all …]
|
/netbsd-src/usr.sbin/bootp/bootpd/ |
H A D | syslog.conf | 17 daemon,syslog,lpr,news,uucp,cron.err /dev/console 21 daemon.notice;syslog,news,uucp,cron.err /var/adm/messages 25 *.alert;kern.err;daemon.err;user.none operator
|
/netbsd-src/external/bsd/blocklist/ |
H A D | README | 4 communicate with a packet filter via a daemon to enforce opening and 26 The network daemon (for example sshd) communicates to blocklistd, via 29 daemon needs to do is to call: 40 contact the blocklist daemon, since the verification 48 is kept with the server. In that case the daemon can provide the 75 so that if the daemon is restarted, it remembers what connections 77 npf too for example), you can use -f. To watch the daemon at work,
|
/netbsd-src/external/bsd/unbound/dist/contrib/ |
H A D | drop-tld.diff | 1 diff --git a/daemon/worker.c b/daemon/worker.c 3 --- a/daemon/worker.c 4 +++ b/daemon/worker.c
|
H A D | unbound-fuzzme.patch | 86 @@ -1183,6 +1192,15 @@ stats.lo stats.o: $(srcdir)/daemon/stats.c config.h $(srcdir)/daemon/stats.h… 92 + $(srcdir)/daemon/remote.h $(srcdir)/util/config_file.h \ 99 …unbound.lo unbound.o: $(srcdir)/daemon/unbound.c config.h $(srcdir)/util/log.h $(srcdir)/daemon/da… 101 $(srcdir)/daemon/remote.h \
|
/netbsd-src/lib/libwrap/ |
H A D | update.c | 69 ptr = request->daemon; in request_fill() 108 (void)strlcpy(request->daemon, unknown, sizeof(request->daemon)); in VARARGS()
|
H A D | eval.c | 135 char *daemon = eval_daemon(request); in eval_server() local 138 (void)snprintf(both, sizeof both, "%s@%s", daemon, host); in eval_server() 141 return (daemon); in eval_server()
|
H A D | hosts_ctl.c | 32 hosts_ctl(char *daemon, char *name, char *addr, char *user) in hosts_ctl() argument 37 RQ_DAEMON, daemon, in hosts_ctl()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | RAND_egd.pod | 5 RAND_egd, RAND_egd_bytes, RAND_query_egd_bytes - query entropy gathering daemon 40 daemon on success, or -1 if the connection failed or the daemon did not 43 RAND_query_egd_bytes() returns the number of bytes read from the daemon on
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | RAND_egd.pod | 5 RAND_egd, RAND_egd_bytes, RAND_query_egd_bytes - query entropy gathering daemon 40 daemon on success, or -1 if the connection failed or the daemon did not 43 RAND_query_egd_bytes() returns the number of bytes read from the daemon on
|
/netbsd-src/external/bsd/ppp/dist/ |
H A D | SETUP | 80 daemon (or local2 if it has been compiled with debugging enabled); 84 add `daemon.notice' on the left. This line should end up something 87 *.err;kern.debug;daemon,local2,auth.notice;mail.crit /dev/console 90 priority info or higher for facility daemon, like this: 92 *.err;kern.debug;daemon.info;local2,auth.notice;mail.crit /dev/console 96 daemon,local2.debug /etc/ppp/ppp-log
|
/netbsd-src/lib/libc/gen/ |
H A D | daemon.c | 48 __weak_alias(daemon,_daemon) in __weak_alias() argument 52 daemon(int nochdir, int noclose) in __weak_alias()
|