/freebsd-11-stable/contrib/gdb/gdb/config/i386/ |
H A D | nm-i386.h | 61 extern int i386_insert_hw_breakpoint (CORE_ADDR addr, void *shadow); 65 extern int i386_remove_hw_breakpoint (CORE_ADDR addr, void *shadow); 110 #define target_insert_hw_breakpoint(addr, shadow) \ 111 i386_insert_hw_breakpoint (addr, shadow) 113 #define target_remove_hw_breakpoint(addr, shadow) \ 114 i386_remove_hw_breakpoint (addr, shadow)
|
/freebsd-11-stable/crypto/heimdal/lib/roken/ |
H A D | k_getpwnam.c | 38 #include <shadow.h>
|
H A D | k_getpwuid.c | 38 #include <shadow.h>
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/hwasan/ |
H A D | hwasan_dynamic_shadow.cpp | 10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory 89 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); local 91 // shadow == resolver is how Android KitKat and older handles ifunc. 92 // shadow == 0 just in case. 93 return shadow != 0 && shadow != resolver; 112 // The resolver might be called multiple times. Map the shadow just once. 113 static __sanitizer::uptr shadow = 0; local 114 if (!shadow) 115 shadow [all...] |
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | asan_poisoning.h | 26 // Poisons the shadow memory for "size" bytes starting from "addr". 29 // Poisons the shadow memory for "redzone_size" bytes starting from 50 // for mapping shadow and zeroing out pages doesn't "just work", so we should 83 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); local 84 for (uptr i = 0; i < redzone_size; i += SHADOW_GRANULARITY, shadow++) { 86 *shadow = 0; // fully addressable 88 *shadow = (SHADOW_GRANULARITY == 128) ? 0xff : value; // unaddressable 91 *shadow = poison_partial ? static_cast<u8>(size - i) : 0;
|
H A D | asan_premap_shadow.cpp | 11 // Reserve shadow memory with an ifunc resolver. 54 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); local 56 // shadow == resolver is how Android KitKat and older handles ifunc. 57 // shadow == 0 just in case. 58 if (shadow == 0 || shadow == resolver) 66 // The resolver may be called multiple times. Map the shadow just once. 73 // the shadow mapping.
|
H A D | asan_descriptions.h | 89 static const char *const ShadowNames[] = {"low shadow", "shadow gap", 90 "high shadow"}; 170 // a shadow, global (variable), stack, or heap address. 192 ShadowAddressDescription shadow; member in union:__asan::AddressDescription::AddressDescriptionData::__anon970 216 return data.shadow.addr; 232 return data.shadow.Print(); 247 return data.kind == kAddressKindShadow ? &data.shadow : nullptr;
|
H A D | asan_debugging.cpp | 88 if (auto shadow = descr.AsShadow()) { 90 switch (shadow->kind) { 92 region_kind = "low shadow"; 95 region_kind = "shadow gap"; 98 region_kind = "high shadow";
|
/freebsd-11-stable/contrib/libreadline/examples/rlfe/ |
H A D | Makefile.in | 79 shadow: 80 mkdir shadow; 81 cd shadow; ln -s ../*.[ch] ../*.in ../*.sh ../configure ../doc ../terminfo ../etc . 82 rm -f shadow/term.h shadow/tty.c shadow/comm.h shadow/osdef.h 83 echo "install all Makefiles and config:" > shadow/Makefile 84 echo " rm -f config.cache" >> shadow/Makefile 85 echo " sh ./configure" >> shadow/Makefil [all...] |
/freebsd-11-stable/sys/dev/bhnd/nvram/ |
H A D | bhnd_sprom.c | 117 /* Initialize SPROM shadow */ 118 if ((error = bhnd_sprom_init(&sc->shadow, sc->sprom_res, offset))) 162 bhnd_sprom_fini(&sc->shadow); 180 error = bhnd_sprom_getvar(&sc->shadow, name, buf, len); 199 error = bhnd_sprom_setvar(&sc->shadow, name, buf, len);
|
H A D | bhnd_spromvar.h | 65 uint8_t *sp_shadow; /**< sprom shadow */ 67 size_t sp_size; /**< shadow size */ 68 size_t sp_capacity; /**< shadow buffer capacity */ 80 struct bhnd_sprom shadow; /**< SPROM shadow */ member in struct:bhnd_sprom_softc 81 struct mtx mtx; /**< SPROM shadow mutex */
|
/freebsd-11-stable/crypto/heimdal/appl/login/ |
H A D | Makefile.am | 20 shadow.c \
|
H A D | login_locl.h | 79 #include <shadow.h>
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/msan/ |
H A D | msan.h | 51 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"}, 55 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"}, 56 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"}, 64 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL) 83 {0x01000000000ULL, 0x02000000000ULL, MappingDesc::SHADOW, "shadow-2"}, 85 {0x03000000000ULL, 0x04000000000ULL, MappingDesc::SHADOW, "shadow-1"}, 92 {0x09000000000ULL, 0x0A000000000ULL, MappingDesc::SHADOW, "shadow-3"}, 99 {0x17000000000ULL, 0x18000000000ULL, MappingDesc::SHADOW, "shadow-4"}, 104 {0x26000000000ULL, 0x27000000000ULL, MappingDesc::SHADOW, "shadow [all...] |
/freebsd-11-stable/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | msan_interface.h | 55 void __msan_partial_poison(const volatile void *data, void *shadow, 78 /* Print shadow and origin for the memory range to stderr in a human-readable 82 /* Print shadow for the memory range to stderr in a minimalistic 103 /* Update shadow for the application copy of size bytes from src to dst. 105 actual application memory, it only updates shadow and origin for such
|
/freebsd-11-stable/crypto/heimdal/appl/rsh/ |
H A D | rsh_locl.h | 76 #include <shadow.h>
|
/freebsd-11-stable/crypto/openssh/ |
H A D | auth-shadow.c | 28 #include <shadow.h> 84 * Checks password expiry for platforms that use shadow passwd files. 97 error("Could not get shadow information for %.100s", user);
|
/freebsd-11-stable/usr.sbin/ypserv/ |
H A D | Makefile.yp | 21 # If this machine does not wish to generate a linux-style shadow map 31 # master.passwd and shadow maps (which have real encrypted passwords 44 # Normally, the master.passwd.* and shadow.* maps are guarded against access 178 TARGETS+= shadow 213 shadow: shadow.byname shadow.byuid 235 @if [ ! $(NOPUSH) ]; then $(YPPUSH) -d $(DOMAIN) shadow.byname ; fi 236 @if [ ! $(NOPUSH) ]; then $(YPPUSH) -d $(DOMAIN) shadow.byuid ; fi 648 shadow [all...] |
/freebsd-11-stable/contrib/dialog/ |
H A D | util.c | 92 #define UseShadow(dw) ((dw) != 0 && (dw)->normal != 0 && (dw)->shadow != 0) 102 DATA(A_NORMAL, SHADOW, shadow, "Shadow"), 153 p->shadow = child; 168 delwin(p->shadow); 309 dialog_state.use_shadow = USE_SHADOW; /* shadow dialog boxes by default? */ 1481 * If we have wchgat(), use that for updating shadow attributes, to work with 1508 int y_want = y + getbegy(dw->shadow); 1509 int x_want = x + getbegx(dw->shadow); 1513 && dw->shadow != p->normal 1525 in_shadow(WINDOW *normal, WINDOW *shadow, in argument [all...] |
/freebsd-11-stable/contrib/gdb/gdb/ |
H A D | remote-st.c | 602 st2000_insert_breakpoint (CORE_ADDR addr, char *shadow) argument 615 st2000_read_inferior_memory (bp_addr, shadow, bp_size); 626 st2000_remove_breakpoint (CORE_ADDR addr, char *shadow) argument
|
H A D | i386-nat.c | 623 i386_insert_hw_breakpoint (CORE_ADDR addr, void *shadow) argument 638 i386_remove_hw_breakpoint (CORE_ADDR addr, void *shadow) argument
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | xcrypt.c | 48 # include <shadow.h>
|
/freebsd-11-stable/secure/usr.sbin/sshd/ |
H A D | Makefile | 15 loginrec.c auth-pam.c auth-shadow.c auth-sia.c md5crypt.c \
|
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf_table.c | 1500 struct pfr_ktable *kt, *rt, *shadow, key; local 1547 shadow = pfr_create_ktable(tbl, 0, 0); 1548 if (shadow == NULL) { 1556 if (pfr_lookup_addr(shadow, ad, 1) != NULL) 1559 (shadow->pfrkt_flags & PFR_TFLAG_COUNTERS) != 0); 1562 if (pfr_route_kentry(shadow, p)) { 1574 shadow->pfrkt_cnt = (flags & PFR_FLAG_ADDRSTOO) ? 1576 kt->pfrkt_shadow = shadow; 1578 pfr_clean_node_mask(shadow, &addrq); 1579 pfr_destroy_ktable(shadow, 1676 struct pfr_ktable *shadow = kt->pfrkt_shadow; local [all...] |
/freebsd-11-stable/contrib/dialog/samples/ |
H A D | wheel | 26 $DIALOG --backtitle "$TITLE" --no-shadow \
|