Searched refs:context (Results 151 - 175 of 1494) sorted by relevance

1234567891011>>

/freebsd-current/contrib/llvm-project/compiler-rt/lib/hwasan/
H A Dhwasan_exceptions.cpp25 _Unwind_Context* context);
32 typedef uintptr_t GetGRFn(_Unwind_Context* context, int index);
33 typedef uintptr_t GetCFAFn(_Unwind_Context* context);
39 _Unwind_Context* context,
45 context);
56 uptr fp = get_gr(context, 6); // rbp
58 uptr fp = get_gr(context, 29); // x29
60 uptr fp = get_gr(context, 8); // x8
64 uptr sp = get_cfa(context);
36 __hwasan_personality_wrapper(int version, _Unwind_Action actions, uint64_t exception_class, _Unwind_Exception* unwind_exception, _Unwind_Context* context, PersonalityFn* real_personality, GetGRFn* get_gr, GetCFAFn* get_cfa) argument
/freebsd-current/crypto/heimdal/lib/kadm5/
H A Dinit_s.c40 kadm5_s_init_with_context(krb5_context context, argument
50 ret = _kadm5_s_init_context(&ctx, realm_params, context);
64 ret = hdb_create(ctx->context, &ctx->db, ctx->config.dbname);
67 ret = hdb_set_master_keyfile (ctx->context,
82 ret = krb5_parse_name(ctx->context, client_name, &ctx->caller);
95 kadm5_s_init_with_password_ctx(krb5_context context, argument
104 return kadm5_s_init_with_context(context,
122 krb5_context context; local
126 ret = krb5_init_context(&context);
129 ret = kadm5_s_init_with_password_ctx(context,
147 kadm5_s_init_with_skey_ctx(krb5_context context, const char *client_name, const char *keytab, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
174 krb5_context context; local
199 kadm5_s_init_with_creds_ctx(krb5_context context, const char *client_name, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
226 krb5_context context; local
[all...]
H A Dinit_c.c69 krb5_context context)
78 krb5_add_et_list (context, initialize_kadm5_error_table_r);
80 (*ctx)->context = context;
87 ret = krb5_get_default_realm((*ctx)->context, &(*ctx)->realm);
97 ret = krb5_get_krb_admin_hst (context, &(*ctx)->realm, &hostlist);
104 krb5_free_krbhst (context, hostlist);
126 (*ctx)->kadmind_port = krb5_getportbyname (context, "kerberos-adm",
132 get_kadm_ticket(krb5_context context, argument
142 ret = krb5_parse_name(context, server_nam
67 _kadm5_c_init_context(kadm5_client_context **ctx, kadm5_config_params *params, krb5_context context) argument
153 get_new_cache(krb5_context context, krb5_principal client, const char *password, krb5_prompter_fct prompter, const char *keytab, const char *server_name, krb5_ccache *ret_cache) argument
242 get_cache_principal(krb5_context context, krb5_ccache *id, krb5_principal *client) argument
316 _kadm5_c_get_cred_cache(krb5_context context, const char *client_name, const char *server_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, krb5_ccache *ret_cache) argument
418 krb5_context context = ctx->context; local
557 kadm5_c_init_with_context(krb5_context context, const char *client_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
618 krb5_context context; local
646 kadm5_c_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
690 kadm5_c_init_with_skey_ctx(krb5_context context, const char *client_name, const char *keytab, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
735 kadm5_c_init_with_creds_ctx(krb5_context context, const char *client_name, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
[all...]
H A Dad.c54 #define CTX2LP(context) ((LDAP *)((context)->ldap_conn))
55 #define CTX2BASE(context) ((context)->base_dn)
226 check_ldap(kadm5_ad_context *context, int ret) argument
232 LDAP *lp = CTX2LP(context);
234 context->ldap_conn = NULL;
235 free(context->base_dn);
236 context->base_dn = NULL;
264 kadm5_ad_context *context local
433 ad_find_entry(kadm5_ad_context *context, const char *fqdn, const char *pn, char **name) argument
482 ad_get_cred(kadm5_ad_context *context, const char *password) argument
513 kadm5_ad_context *context = server_handle; local
543 get_fqdn(krb5_context context, const krb5_principal p) argument
567 kadm5_ad_context *context = server_handle; local
799 kadm5_ad_context *context = server_handle; local
841 kadm5_ad_context *context = server_handle; local
866 kadm5_ad_context *context = server_handle; local
877 kadm5_ad_context *context = server_handle; local
1023 kadm5_ad_context *context = server_handle; local
1051 kadm5_ad_context *context = server_handle; local
1061 kadm5_ad_context *context = server_handle; local
1233 kadm5_ad_context *context = server_handle; local
1316 kadm5_ad_context *context = server_handle; local
1327 kadm5_ad_context *context = server_handle; local
1351 kadm5_ad_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
1422 krb5_context context; local
[all...]
/freebsd-current/crypto/heimdal/lib/krb5/
H A Drd_req.c38 decrypt_tkt_enc_part (krb5_context context, argument
48 ret = krb5_crypto_init(context, key, 0, &crypto);
51 ret = krb5_decrypt_EncryptedData (context,
56 krb5_crypto_destroy(context, crypto);
62 krb5_set_error_message(context, ret,
70 decrypt_authenticator (krb5_context context, argument
81 ret = krb5_crypto_init(context, key, 0, &crypto);
84 ret = krb5_decrypt_EncryptedData (context,
91 ret = krb5_decrypt_EncryptedData (context,
96 krb5_crypto_destroy(context, crypt
107 krb5_decode_ap_req(krb5_context context, const krb5_data *inbuf, krb5_ap_req *ap_req) argument
135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument
171 find_etypelist(krb5_context context, krb5_auth_context auth_context, EtypeList *etypes) argument
224 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument
273 krb5_verify_authenticator_checksum(krb5_context context, krb5_auth_context ac, void *data, size_t len) argument
315 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
336 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument
545 krb5_rd_req_in_ctx_alloc(krb5_context context, krb5_rd_req_in_ctx *ctx) argument
572 krb5_rd_req_in_set_keytab(krb5_context context, krb5_rd_req_in_ctx in, krb5_keytab keytab) argument
593 krb5_rd_req_in_set_pac_check(krb5_context context, krb5_rd_req_in_ctx in, krb5_boolean flag) argument
603 krb5_rd_req_in_set_keyblock(krb5_context context, krb5_rd_req_in_ctx in, krb5_keyblock *keyblock) argument
612 krb5_rd_req_out_get_ap_req_options(krb5_context context, krb5_rd_req_out_ctx out, krb5_flags *ap_req_options) argument
621 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument
629 krb5_rd_req_out_get_keyblock(krb5_context context, krb5_rd_req_out_ctx out, krb5_keyblock **keyblock) argument
649 krb5_rd_req_out_get_server(krb5_context context, krb5_rd_req_out_ctx out, krb5_principal *principal) argument
657 krb5_rd_req_in_ctx_free(krb5_context context, krb5_rd_req_in_ctx ctx) argument
672 krb5_rd_req_out_ctx_free(krb5_context context, krb5_rd_req_out_ctx ctx) argument
688 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
733 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
778 get_key_from_keytab(krb5_context context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keytab keytab, krb5_keyblock **out_key) argument
840 krb5_rd_req_ctx(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_rd_req_in_ctx inctx, krb5_rd_req_out_ctx *outctx) argument
[all...]
H A Drd_safe.c37 verify_checksum(krb5_context context, argument
58 krb5_abortx(context, "internal error in ASN.1 encoder");
67 ret = krb5_crypto_init(context, key, 0, &crypto);
70 ret = krb5_verify_checksum (context,
76 krb5_crypto_destroy(context, crypto);
84 krb5_rd_safe(krb5_context context, argument
100 krb5_set_error_message(context, KRB5_RC_REQUIRED,
115 krb5_clear_error_message (context);
120 krb5_clear_error_message (context);
123 if (!krb5_checksum_is_keyed(context, saf
[all...]
H A Dkeyblock.c54 * @param context a Kerberos 5 context
61 krb5_free_keyblock_contents(krb5_context context, argument
76 * @param context a Kerberos 5 context
83 krb5_free_keyblock(krb5_context context, argument
87 krb5_free_keyblock_contents(context, keyblock);
96 * @param context a Kerberos 5 context
106 krb5_copy_keyblock_contents (krb5_context context, argument
128 krb5_copy_keyblock(krb5_context context, const krb5_keyblock *inblock, krb5_keyblock **to) argument
174 krb5_keyblock_init(krb5_context context, krb5_enctype type, const void *data, size_t size, krb5_keyblock *key) argument
[all...]
H A Dtest_config.c38 check_config_file(krb5_context context, char *filelist, char **res, int def) argument
52 krb5_err(context, 1, ret, "prepend_config_files");
56 krb5_errx(context, 1, "'%s' != '%s'", pp[i], res[i]);
59 krb5_errx(context, 1, "pp ended before res list");
67 krb5_err(context, 1, ret, "get_default_config_files");
71 krb5_errx(context, 1, "'%s' != '%s'", pp[i], deflist[j]);
74 krb5_errx(context, 1, "pp ended before def list");
79 krb5_errx(context, 1, "pp ended after res (and def) list");
102 krb5_context context; local
106 ret = krb5_init_context(&context);
192 krb5_context context; local
[all...]
H A Dinit_creds_pw.c90 free_paid(krb5_context context, struct pa_info_data *ppaid) argument
92 krb5_free_salt(context, ppaid->salt);
94 krb5_free_data(context, ppaid->s2kparams);
98 default_s2k_func(krb5_context context, krb5_enctype type, argument
107 _krb5_debug(context, 5, "krb5_get_init_creds: using default_s2k_func");
119 ret = krb5_string_to_key_data_salt_opaque(context, type, password,
129 free_init_creds_ctx(krb5_context context, krb5_init_creds_context ctx) argument
144 krb5_free_cred_contents(context, &ctx->cred);
151 free_paid(context, ctx->ppaid);
158 get_config_time (krb5_context context, argument
182 init_cred(krb5_context context, krb5_creds *cred, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options) argument
231 report_expiration(krb5_context context, krb5_prompter_fct prompter, krb5_data *data, const char *str, time_t now) argument
255 process_last_request(krb5_context context, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument
347 get_init_creds_common(krb5_context context, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument
477 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument
599 krb5_keyblock_key_proc(krb5_context context, krb5_keytype type, krb5_data *salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
613 init_as_req(krb5_context context, KDCOptions opts, const krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, AS_REQ *a) argument
723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
754 pa_etype_info2(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
803 pa_etype_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
855 pa_pw_or_afs3_salt(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
905 process_pa_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, METHOD_DATA *md) argument
926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument
980 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc keyproc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument
1029 pa_data_to_md_ts_enc(krb5_context context, const AS_REQ *a, const krb5_principal client, krb5_get_init_creds_ctx *ctx, struct pa_info_data *ppaid, METHOD_DATA *md) argument
1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1084 pa_data_to_md_pkinit(krb5_context context, const AS_REQ *a, const krb5_principal client, int win2k, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument
1109 pa_data_add_pac_request(krb5_context context, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument
1147 process_pa_data_to_md(krb5_context context, const krb5_creds *creds, const AS_REQ *a, krb5_get_init_creds_ctx *ctx, METHOD_DATA *in_md, METHOD_DATA **out_md, krb5_prompter_fct prompter, void *prompter_data) argument
1249 process_pa_data_to_key(krb5_context context, krb5_get_init_creds_ctx *ctx, krb5_creds *creds, AS_REQ *a, AS_REP *rep, const krb5_krbhst_info *hi, krb5_keyblock **key) argument
1346 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *rctx) argument
1400 krb5_init_creds_set_service(krb5_context context, krb5_init_creds_context ctx, const char *service) argument
1451 krb5_init_creds_set_password(krb5_context context, krb5_init_creds_context ctx, const char *password) argument
1475 keytab_key_proc(krb5_context context, krb5_enctype enctype, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument
1517 krb5_init_creds_set_keytab(krb5_context context, krb5_init_creds_context ctx, krb5_keytab keytab) argument
1600 keyblock_key_proc(krb5_context context, krb5_enctype enctype, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument
1609 krb5_init_creds_set_keyblock(krb5_context context, krb5_init_creds_context ctx, krb5_keyblock *keyblock) argument
1641 krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data *in, krb5_data *out, krb5_krbhst_info *hostinfo, unsigned int *flags) argument
1854 krb5_init_creds_get_creds(krb5_context context, krb5_init_creds_context ctx, krb5_creds *cred) argument
1870 krb5_init_creds_get_error(krb5_context context, krb5_init_creds_context ctx, KRB_ERROR *error) argument
1893 krb5_init_creds_free(krb5_context context, krb5_init_creds_context ctx) argument
1910 krb5_init_creds_get(krb5_context context, krb5_init_creds_context ctx) argument
1958 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
2064 krb5_get_init_creds_keyblock(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keyblock *keyblock, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
2111 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab keytab, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
[all...]
H A Dconvert_creds.c45 * @param context Kerberos 5 context.
56 krb524_convert_creds_kdc(krb5_context context,
62 krb5_set_error_message(context, EINVAL,
71 * @param context Kerberos 5 context.
83 krb524_convert_creds_kdc_ccache(krb5_context context,
90 krb5_set_error_message(context, EINVAL,
H A Dget_port.c37 krb5_getportbyname (krb5_context context, argument
46 krb5_warnx(context, "%s/%s unknown service, using default port %d",
H A Dsalt-aes.c39 AES_string_to_key(krb5_context context, argument
67 krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
73 krb5_set_error_message (context, ret, N_("malloc: out of memory", ""));
82 _krb5_free_key_data(context, &kd, et);
83 krb5_set_error_message(context, KRB5_PROG_KEYTYPE_NOSUPP,
88 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos"));
90 ret = krb5_copy_keyblock_contents(context, kd.key, key);
91 _krb5_free_key_data(context, &kd, et);
H A Dtest_kuserok.c60 krb5_context context; local
82 ret = krb5_init_context(&context);
89 ret = krb5_parse_name(context, argv[0], &principal);
91 krb5_err(context, 1, ret, "krb5_parse_name");
93 ret = krb5_unparse_name(context, principal, &p);
95 krb5_err(context, 1, ret, "krb5_unparse_name");
97 ret = krb5_kuserok(context, principal, argv[1]);
99 krb5_free_context(context);
/freebsd-current/crypto/heimdal/kdc/
H A Dkx509.c62 verify_req_hash(krb5_context context, argument
70 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
78 krb5_set_error_message(context, ENOMEM,
79 "HMAC context malloc failed");
86 krb5_abortx(context, "runtime error, hmac buffer wrong size in kx509");
93 krb5_set_error_message(context, KRB5KDC_ERR_PREAUTH_FAILED,
101 calculate_reply_hash(krb5_context context, argument
110 krb5_set_error_message(context, ENOMEM,
111 "HMAC context malloc failed");
120 krb5_set_error_message(context, ENOME
149 build_certificate(krb5_context context, krb5_kdc_configuration *config, const krb5_data *key, time_t endtime, krb5_principal principal, krb5_data *certificate) argument
290 _kdc_do_kx509(krb5_context context, krb5_kdc_configuration *config, const struct Kx509Request *req, krb5_data *reply, const char *from, struct sockaddr *addr) argument
[all...]
H A Dwindc.c44 krb5_kdc_windc_init(krb5_context context) argument
49 ret = _krb5_plugin_find(context, PLUGIN_TYPE_DATA, "windc", &list);
59 (*windcft->init)(context, &windcctx);
64 krb5_set_error_message(context, ENOENT, "Did not find any WINDC plugin");
74 _kdc_pac_generate(krb5_context context, argument
81 return (windcft->pac_generate)(windcctx, context, client, pac);
85 _kdc_pac_verify(krb5_context context, argument
99 ret = windcft->pac_verify(windcctx, context,
109 _kdc_check_access(krb5_context context, argument
117 return kdc_check_flags(context, confi
[all...]
H A Dmisc.c39 _kdc_db_fetch(krb5_context context, argument
59 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
69 krb5_set_error_message(context, ret,
76 ret = krb5_parse_name(context, principal->name.name_string.val[0],
86 ret = config->db[i]->hdb_open(context, config->db[i], O_RDONLY, 0);
88 const char *msg = krb5_get_error_message(context, ret);
89 kdc_log(context, config, 0, "Failed to open database: %s", msg);
90 krb5_free_error_message(context, msg);
94 ret = config->db[i]->hdb_fetch_kvno(context,
101 krb5_free_principal(context, enterprise_principa
118 _kdc_free_ent(krb5_context context, hdb_entry_ex *ent) argument
130 _kdc_get_preferred_key(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *h, const char *name, krb5_enctype *enctype, Key **key) argument
[all...]
/freebsd-current/crypto/heimdal/kadmin/
H A Dkadmin.c96 krb5_context context; variable
131 krb5_warn(context, ret, "kadm5_get_privs");
153 ret = krb5_init_context(&context);
172 asprintf(&config_file, "%s/kdc.conf", hdb_db_dir(context));
179 krb5_err(context, 1, ret, "getting configuration files");
181 ret = krb5_set_config_files(context, files);
184 krb5_err(context, 1, ret, "reading configuration files");
188 krb5_set_default_realm(context, realm); /* XXX should be fixed
212 kadm5_setup_passwd_quality_check (context,
216 ret = kadm5_add_passwd_quality_verifier(context,
[all...]
/freebsd-current/crypto/heimdal/lib/gssapi/ntlm/
H A Dkdc.c43 krb5_context context; member in struct:ntlmkrb5
62 get_ccache(krb5_context context, int *destroy, krb5_ccache *id) argument
75 ret = krb5_cc_resolve(context, cache, id);
82 ret = krb5_sname_to_principal(context, NULL, "host",
87 ret = krb5_cc_cache_match(context, principal, id);
92 ret = krb5_kt_default(context, &kt);
103 ret = krb5_cc_new_unique(context, "MEMORY", NULL, id);
107 ret = krb5_get_init_creds_opt_alloc(context, &opt);
110 ret = krb5_get_init_creds_keytab (context,
117 krb5_get_init_creds_opt_free(context, op
[all...]
/freebsd-current/contrib/ldns/
H A Dsha2.c315 void ldns_sha256_init(ldns_sha256_CTX* context) { argument
316 if (context == (ldns_sha256_CTX*)0) {
319 MEMCPY_BCOPY(context->state, ldns_sha256_initial_hash_value, LDNS_SHA256_DIGEST_LENGTH);
320 MEMSET_BZERO(context->buffer, LDNS_SHA256_BLOCK_LENGTH);
321 context->bitcount = 0;
361 static void ldns_sha256_Transform(ldns_sha256_CTX* context, argument
367 W256 = (sha2_word32*)context->buffer;
370 a = context->state[0];
371 b = context->state[1];
372 c = context
420 ldns_sha256_Transform(ldns_sha256_CTX* context, const sha2_word32* data) argument
502 ldns_sha256_update(ldns_sha256_CTX* context, const sha2_byte *data, size_t len) argument
557 ldns_sha256_final(sha2_byte digest[LDNS_SHA256_DIGEST_LENGTH], ldns_sha256_CTX* context) argument
634 ldns_sha512_init(ldns_sha512_CTX* context) argument
679 ldns_sha512_Transform(ldns_sha512_CTX* context, const sha2_word64* data) argument
735 ldns_sha512_Transform(ldns_sha512_CTX* context, const sha2_word64* data) argument
815 ldns_sha512_update(ldns_sha512_CTX* context, const sha2_byte *data, size_t len) argument
865 ldns_sha512_Last(ldns_sha512_CTX* context) argument
908 ldns_sha512_final(sha2_byte digest[LDNS_SHA512_DIGEST_LENGTH], ldns_sha512_CTX* context) argument
948 ldns_sha384_init(ldns_sha384_CTX* context) argument
957 ldns_sha384_update(ldns_sha384_CTX* context, const sha2_byte* data, size_t len) argument
961 ldns_sha384_final(sha2_byte digest[LDNS_SHA384_DIGEST_LENGTH], ldns_sha384_CTX* context) argument
[all...]
/freebsd-current/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.c55 krb5_context context; local
71 rv = krb5_init_context(&context);
73 const char *msg = krb5_get_error_message(context, rv);
75 krb5_free_error_message(context, msg);
78 rv = get_su_principal(context, user, ruser, &su_principal_name, &su_principal);
82 rv = krb5_kuserok(context, su_principal, user);
83 pamret = rv ? auth_krb5(pamh, context, su_principal_name, su_principal) : PAM_AUTH_ERR;
85 krb5_free_principal(context, su_principal);
86 krb5_free_context(context);
100 * context
112 auth_krb5(pam_handle_t *pamh, krb5_context context, const char *su_principal_name, krb5_principal su_principal) argument
181 get_su_principal(krb5_context context, const char *target_user, const char *current_user, char **su_principal_name, krb5_principal *su_principal) argument
[all...]
/freebsd-current/crypto/heimdal/admin/
H A Dpurge.c55 if (krb5_principal_compare (context, princ, e->principal))
76 krb5_errx (context, 1, "malloc: out of memory");
77 ret = krb5_copy_principal (context, princ, &e->principal);
79 krb5_err (context, 1, ret, "krb5_copy_principal");
91 krb5_free_principal (context, head->principal);
115 krb5_warnx(context, "unparasable time `%s'", opt->age_string);
122 ret = krb5_kt_start_seq_get(context, keytab, &cursor);
124 krb5_warn(context, ret, "%s", keytab_string);
128 while(krb5_kt_next_entry(context, keytab, &entry, &cursor) == 0) {
130 krb5_kt_free_entry(context,
[all...]
/freebsd-current/crypto/heimdal/lib/hdb/
H A Dhdb-keytab.c49 hkt_close(krb5_context context, HDB *db) argument
56 ret = krb5_kt_close(context, k->keytab);
63 hkt_destroy(krb5_context context, HDB *db) argument
68 ret = hdb_clear_master_key (context, db);
79 hkt_lock(krb5_context context, HDB *db, int operation) argument
85 hkt_unlock(krb5_context context, HDB *db) argument
91 hkt_firstkey(krb5_context context, HDB *db, argument
98 hkt_nextkey(krb5_context context, HDB * db, unsigned flags, argument
105 hkt_open(krb5_context context, HDB * db, int flags, mode_t mode) argument
112 ret = krb5_kt_resolve(context,
120 hkt_fetch_kvno(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex * entry) argument
174 hkt_store(krb5_context context, HDB * db, unsigned flags, hdb_entry_ex * entry) argument
182 hdb_keytab_create(krb5_context context, HDB ** db, const char *arg) argument
[all...]
/freebsd-current/crypto/heimdal/kuser/
H A Dkinit.c213 get_server(krb5_context context, argument
220 return krb5_parse_name(context, server, princ);
222 realm = krb5_principal_get_realm(context, client);
223 return krb5_make_principal(context, princ, realm,
228 renew_validate(krb5_context context, argument
241 ret = krb5_cc_get_principal(context, cache, &in.client);
243 krb5_warn(context, ret, "krb5_cc_get_principal");
246 ret = get_server(context, in.client, server, &in.server);
248 krb5_warn(context, ret, "get_server");
257 krb5_get_credentials(context, KRB5_GC_CACHE
325 store_ntlmkey(krb5_context context, krb5_ccache id, const char *domain, struct ntlm_buf *buf) argument
348 get_new_tickets(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_deltat ticket_life, int interactive) argument
651 ticket_lifetime(krb5_context context, krb5_ccache cache, krb5_principal client, const char *server) argument
688 krb5_context context; member in struct:renew_ctx
728 krb5_context context; local
[all...]
/freebsd-current/crypto/heimdal/lib/gssapi/krb5/
H A Daccept_sec_context.c40 validate_keytab(krb5_context context, const char *name, krb5_keytab *id) argument
44 ret = krb5_kt_resolve(context, name, id);
48 ret = krb5_kt_have_content(context, *id);
50 krb5_kt_close(context, *id);
60 krb5_context context; local
65 ret = _gsskrb5_init(&context);
72 krb5_kt_close(context, _gsskrb5_keytab);
76 ret = krb5_kt_default(context, &_gsskrb5_keytab);
81 ret = validate_keytab(context, identity, &_gsskrb5_keytab);
92 ret = validate_keytab(context,
105 _gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor) argument
152 gsskrb5_accept_delegated_token(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, gss_cred_id_t * delegated_cred_handle ) argument
232 gsskrb5_acceptor_ready(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, gss_cred_id_t *delegated_cred_handle) argument
287 send_error_token(OM_uint32 *minor_status, krb5_context context, krb5_error_code kret, krb5_principal server, krb5_data *indata, gss_buffer_t output_token) argument
347 gsskrb5_acceptor_start(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, const gss_cred_id_t acceptor_cred_handle, const gss_buffer_t input_token_buffer, const gss_channel_bindings_t input_chan_bindings, gss_name_t * src_name, gss_OID * mech_type, gss_buffer_t output_token, OM_uint32 * ret_flags, OM_uint32 * time_rec, gss_cred_id_t * delegated_cred_handle) argument
676 acceptor_wait_for_dcestyle(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, const gss_cred_id_t acceptor_cred_handle, const gss_buffer_t input_token_buffer, const gss_channel_bindings_t input_chan_bindings, gss_name_t * src_name, gss_OID * mech_type, gss_buffer_t output_token, OM_uint32 * ret_flags, OM_uint32 * time_rec, gss_cred_id_t * delegated_cred_handle) argument
852 krb5_context context; local
[all...]
/freebsd-current/contrib/ntp/include/
H A Dintreswork.h18 void *context, const char *name,
25 const char *service, void *context);

Completed in 191 milliseconds

1234567891011>>