/freebsd-current/crypto/heimdal/kcm/ |
H A D | glue.c | 48 kcmss_get_name(krb5_context context, argument 55 kcmss_resolve(krb5_context context, krb5_ccache *id, const char *res) argument 61 kcmss_gen_new(krb5_context context, krb5_ccache *id) argument 67 kcmss_initialize(krb5_context context, argument 76 ret = kcm_zero_ccache_data_internal(context, c); 80 ret = krb5_copy_principal(context, primary_principal, 87 kcmss_close(krb5_context context, argument 101 kcmss_destroy(krb5_context context, argument 109 ret = kcm_ccache_destroy(context, CACHENAME(id)); 115 kcmss_store_cred(krb5_context context, argument 131 kcmss_retrieve(krb5_context context, krb5_ccache id, krb5_flags which, const krb5_creds *mcred, krb5_creds *creds) argument 156 kcmss_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument 172 kcmss_get_first(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor) argument 186 kcmss_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument 210 kcmss_end_get(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor) argument 219 kcmss_remove_cred(krb5_context context, krb5_ccache id, krb5_flags which, krb5_creds *cred) argument 235 kcmss_set_flags(krb5_context context, krb5_ccache id, krb5_flags flags) argument 243 kcmss_get_version(krb5_context context, krb5_ccache id) argument 270 kcm_internal_ccache(krb5_context context, kcm_ccache c, krb5_ccache id) argument [all...] |
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | build_auth.c | 37 make_etypelist(krb5_context context, argument 47 ret = _krb5_init_etype(context, KRB5_PDU_NONE, 59 krb5_abortx(context, "internal error in ASN.1 encoder"); 65 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", "")); 79 krb5_abortx(context, "internal error in ASN.1 encoder"); 85 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", "")); 93 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", "")); 105 _krb5_build_authenticator (krb5_context context, argument 126 krb5_us_timeofday (context, &auth.ctime, &auth.cusec); 128 ret = krb5_auth_con_getlocalsubkey(context, auth_contex [all...] |
H A D | crypto-rand.c | 67 krb5_context context; local 71 if (!krb5_init_context(&context)) { 72 p = krb5_config_get_string(context, NULL, "libdefaults", 76 krb5_free_context(context);
|
H A D | free_host_realm.c | 39 * @param context A Kerberos 5 context. 48 krb5_free_host_realm(krb5_context context, argument
|
H A D | get_host_realm.c | 91 dns_find_realm(krb5_context context, argument 102 config_labels = krb5_config_get_strings(context, NULL, "libdefaults", 139 config_find_realm(krb5_context context, argument 143 char **tmp = krb5_config_get_strings (context, NULL, 162 _krb5_get_host_realm_int (krb5_context context, argument 170 dns_locate_enable = krb5_config_get_bool_default(context, NULL, TRUE, 173 if(config_find_realm(context, p, realms) == 0) { 177 if(dns_find_realm(context, q, realms) == 0) 184 if(dns_find_realm(context, p, realms) == 0) 193 krb5_set_error_message(context, ENOME 219 krb5_get_host_realm(krb5_context context, const char *targethost, krb5_realm **realms) argument [all...] |
H A D | net_read.c | 37 krb5_net_read (krb5_context context, argument
|
H A D | sock_principal.c | 37 krb5_sock_to_principal (krb5_context context, argument 51 krb5_set_error_message (context, ret, "getsockname: %s", strerror(ret)); 58 krb5_set_error_message (context, ret2, "getnameinfo: %s", gai_strerror(ret)); 62 ret = krb5_sname_to_principal (context,
|
H A D | mk_rep.c | 37 krb5_mk_rep(krb5_context context, argument 58 ret = krb5_auth_con_generatelocalsubkey(context, 66 ret = krb5_copy_keyblock(context, auth_context->local_subkey, 70 krb5_set_error_message(context, ENOMEM, 78 krb5_generate_seq_number (context, 83 krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 99 krb5_abortx(context, "internal error in ASN.1 encoder"); 100 ret = krb5_crypto_init(context, auth_context->keyblock, 106 ret = krb5_encrypt (context, 112 krb5_crypto_destroy(context, crypt [all...] |
H A D | pac.c | 71 krb5_clear_error_message(context); \ 83 HMAC_MD5_any_checksum(krb5_context context, argument 95 ret = krb5_copy_keyblock(context, key, &local_key.key); 101 krb5_free_keyblock(context, local_key.key); 106 ret = _krb5_HMAC_MD5_checksum(context, &local_key, data, len, usage, result); 110 krb5_free_keyblock(context, local_key.key); 115 static krb5_error_code pac_header_size(krb5_context context, argument 125 krb5_set_error_message(context, ret, "PAC has too many buffers"); 133 krb5_set_error_message(context, ret, "PAC has too many buffers"); 143 static krb5_error_code pac_aligned_size(krb5_context context, argument 170 krb5_pac_parse(krb5_context context, const void *ptr, size_t len, krb5_pac *pac) argument 315 krb5_pac_init(krb5_context context, krb5_pac *pac) argument 343 krb5_pac_add_buffer(krb5_context context, krb5_pac p, uint32_t type, const krb5_data *data) argument 452 krb5_pac_get_buffer(krb5_context context, krb5_pac p, uint32_t type, krb5_data *data) argument 482 krb5_pac_get_types(krb5_context context, krb5_pac p, size_t *len, uint32_t **types) argument 506 krb5_pac_free(krb5_context context, krb5_pac pac) argument 518 verify_checksum(krb5_context context, const struct PAC_INFO_BUFFER *sig, const krb5_data *data, void *ptr, size_t len, const krb5_keyblock *key) argument 611 create_checksum(krb5_context context, const krb5_keyblock *key, uint32_t cksumtype, void *data, size_t datalen, void *sig, size_t siglen) argument 672 verify_logonname(krb5_context context, const struct PAC_INFO_BUFFER *logon_name, const krb5_data *data, time_t authtime, krb5_const_principal principal) argument 781 build_logon_name(krb5_context context, time_t authtime, krb5_const_principal principal, krb5_data *logon) argument 896 krb5_pac_verify(krb5_context context, const krb5_pac pac, time_t authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument 981 fill_zeros(krb5_context context, krb5_storage *sp, size_t len) argument 1000 pac_checksum(krb5_context context, const krb5_keyblock *key, uint32_t *cksumtype, size_t *cksumsize) argument 1033 _krb5_pac_sign(krb5_context context, krb5_pac p, time_t authtime, krb5_principal principal, const krb5_keyblock *server_key, const krb5_keyblock *priv_key, krb5_data *data) argument [all...] |
H A D | codec.c | 39 krb5_decode_EncTicketPart (krb5_context context, 50 krb5_encode_EncTicketPart (krb5_context context, 61 krb5_decode_EncASRepPart (krb5_context context, 72 krb5_encode_EncASRepPart (krb5_context context, 83 krb5_decode_EncTGSRepPart (krb5_context context, 94 krb5_encode_EncTGSRepPart (krb5_context context, 105 krb5_decode_EncAPRepPart (krb5_context context, 116 krb5_encode_EncAPRepPart (krb5_context context, 127 krb5_decode_Authenticator (krb5_context context, 138 krb5_encode_Authenticator (krb5_context context, [all...] |
H A D | aname_to_localname.c | 37 krb5_aname_to_localname (krb5_context context, argument 48 ret = krb5_get_default_realms (context, &lrealms); 59 krb5_free_host_realm (context, lrealms); 72 ret = krb5_copy_principal(context, aname, &rootprinc); 76 userok = krb5_kuserok(context, rootprinc, res); 77 krb5_free_principal(context, rootprinc);
|
H A D | salt-arcfour.c | 37 ARCFOUR_string_to_key(krb5_context context, argument 52 krb5_set_error_message(context, ret, N_("malloc: out of memory", "")); 60 krb5_set_error_message (context, ret, 67 krb5_set_error_message (context, ENOMEM, 75 krb5_set_error_message (context, ret, 92 krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
|
/freebsd-current/crypto/heimdal/kadmin/ |
H A D | add_enctype.c | 54 krb5_warnx (context, "only random key is supported now"); 63 krb5_warnx (context, "out of memory"); 68 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); 70 krb5_warnx (context, "bad enctype \"%s\"", argv[i]); 75 ret = krb5_parse_name(context, princ_name, &princ_ent); 77 krb5_warn (context, ret, "krb5_parse_name %s", princ_name); 84 krb5_free_principal (context, princ_ent); 85 krb5_warnx (context, "no such principal: %s", princ_name); 92 krb5_warnx (context, "out of memory"); 101 krb5_warnx(context, "enctyp [all...] |
/freebsd-current/contrib/llvm-project/libunwind/include/ |
H A D | unwind_itanium.h | 45 _Unwind_Exception *exceptionObject, struct _Unwind_Context *context); 66 extern uintptr_t _Unwind_GetGR(struct _Unwind_Context *context, int index); 67 extern void _Unwind_SetGR(struct _Unwind_Context *context, int index, 69 extern uintptr_t _Unwind_GetIP(struct _Unwind_Context *context);
|
/freebsd-current/contrib/libcbor/src/cbor/ |
H A D | streaming.h | 27 * @param context An arbitrary pointer to allow for maintaining context. 31 const struct cbor_callbacks* callbacks, void* context);
|
/freebsd-current/contrib/llvm-project/compiler-rt/lib/ubsan/ |
H A D | ubsan_signals_standalone.cpp | 47 uptr pc, uptr bp, void *context, bool fast); 55 sig.context, common_flags()->fast_unwind_on_fatal); 58 static void UBsanOnDeadlySignal(int signo, void *siginfo, void *context) { argument 59 HandleDeadlySignal(siginfo, context, GetTid(), &OnStackUnwind, nullptr);
|
/freebsd-current/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_symbolizer_report_fuchsia.cpp | 27 void HandleDeadlySignal(void *siginfo, void *context, u32 tid, argument
|
/freebsd-current/crypto/heimdal/lib/gssapi/krb5/ |
H A D | prf.c | 45 krb5_context context; local 66 GSSAPI_KRB5_INIT (&context); 70 _gsskrb5i_get_acceptor_subkey(ctx, context, &key); 73 _gsskrb5i_get_initiator_subkey(ctx, context, &key); 87 ret = krb5_crypto_init(context, key, 0, &crypto); 88 krb5_free_keyblock (context, key); 98 krb5_crypto_destroy(context, crypto); 111 krb5_crypto_destroy(context, crypto); 124 ret = krb5_crypto_prf(context, crypto, &input, &output); 129 krb5_crypto_destroy(context, crypt [all...] |
/freebsd-current/crypto/heimdal/kuser/ |
H A D | klist.c | 77 print_cred(krb5_context context, krb5_creds *cred, rtbl_t ct, int do_flags) argument 83 krb5_timeofday (context, &sec); 98 ret = krb5_unparse_name (context, cred->server, &str); 100 krb5_err(context, 1, ret, "krb5_unparse_name"); 133 print_cred_verbose(krb5_context context, krb5_creds *cred) argument 140 krb5_timeofday (context, &sec); 142 ret = krb5_unparse_name(context, cred->server, &str); 148 ret = krb5_unparse_name(context, cred->client, &str); 160 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s); 172 ret = krb5_enctype_to_string(context, cre 227 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal, int do_verbose, int do_flags, int do_hidden) argument 332 check_for_tgt(krb5_context context, krb5_ccache ccache, krb5_principal principal, time_t *expiration) argument 449 display_v5_ccache(krb5_context context, krb5_ccache ccache, int do_test, int do_verbose, int do_flags, int do_hidden) argument 488 list_caches(krb5_context context) argument [all...] |
/freebsd-current/contrib/llvm-project/compiler-rt/lib/memprof/ |
H A D | memprof_descriptions.h | 23 void DescribeThread(MemprofThreadContext *context); 26 DescribeThread(t->context());
|
/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | server_glue.c | 57 kadm5_init_with_password_ctx(krb5_context context, argument 66 return kadm5_s_init_with_password_ctx(context, 95 kadm5_init_with_skey_ctx(krb5_context context, argument 104 return kadm5_s_init_with_skey_ctx(context, 133 kadm5_init_with_creds_ctx(krb5_context context, argument 142 return kadm5_s_init_with_creds_ctx(context,
|
H A D | client_glue.c | 57 kadm5_init_with_password_ctx(krb5_context context, argument 66 return kadm5_c_init_with_password_ctx(context, 95 kadm5_init_with_skey_ctx(krb5_context context, argument 104 return kadm5_c_init_with_skey_ctx(context, 133 kadm5_init_with_creds_ctx(krb5_context context, argument 142 return kadm5_c_init_with_creds_ctx(context,
|
/freebsd-current/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 45 krb5_context context = NULL; local 49 ret = krb5_init_context(&context); 53 ret = krb5_kcm_storage_request(context, KCM_OP_GET_NTLM_USER_LIST, &request); 57 ret = krb5_kcm_call(context, request, &response, &response_data); 95 if (context) 96 krb5_free_context(context);
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | kdf.c | 10 char *context; local 15 context = (char *) sodium_malloc(crypto_kdf_CONTEXTBYTES); 18 memcpy(context, "KDF test", strlen("KDF test")); 25 i, context, master_key); 35 i, context, master_key) == 0) { 46 sodium_free(context);
|
/freebsd-current/sys/dev/drm2/ |
H A D | drm_lock.c | 43 static int drm_lock_take(struct drm_lock_data *lock_data, unsigned int context); 64 if (lock->context == DRM_KERNEL_CONTEXT) { 65 DRM_ERROR("Process %d using kernel context %d\n", 66 DRM_CURRENTPID, lock->context); 71 lock->context, DRM_CURRENTPID, 87 if (drm_lock_take(&master->lock, lock->context)) { 107 DRM_DEBUG("%d %s\n", lock->context, 121 dev->sigdata.context = lock->context; 131 lock->context); 183 drm_lock_take(struct drm_lock_data *lock_data, unsigned int context) argument 232 drm_lock_transfer(struct drm_lock_data *lock_data, unsigned int context) argument 258 drm_lock_free(struct drm_lock_data *lock_data, unsigned int context) argument [all...] |