/freebsd-11.0-release/contrib/sendmail/libmilter/ |
H A D | handler.c | 21 ** ctx -- context structure 28 mi_handle_session(ctx) 29 SMFICTX_PTR ctx; 33 if (ctx == NULL) 35 ctx->ctx_id = (sthread_t) sthread_get_id(); 42 if (pthread_detach(ctx->ctx_id) != 0) 45 ret = mi_engine(ctx); 46 mi_clr_ctx(ctx); 47 ctx = NULL;
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | aes-encblock.c | 25 void *ctx; local 26 ctx = aes_encrypt_init(key, 16); 27 if (ctx == NULL) 29 aes_encrypt(ctx, in, out); 30 aes_encrypt_deinit(ctx);
|
/freebsd-11.0-release/contrib/serf/buckets/ |
H A D | deflate_buckets.c | 86 deflate_context_t *ctx; local 88 ctx = serf_bucket_mem_alloc(allocator, sizeof(*ctx)); 89 ctx->stream = stream; 90 ctx->stream_status = APR_SUCCESS; 91 ctx->inflate_stream = serf_bucket_aggregate_create(allocator); 92 ctx->format = format; 93 ctx->crc = 0; 95 memset(&ctx->zstream, 0, sizeof(ctx 122 deflate_context_t *ctx = bucket->data; local 143 deflate_context_t *ctx = bucket->data; local [all...] |
H A D | response_buckets.c | 48 static int expect_body(response_context_t *ctx) argument 50 if (ctx->head_req) 54 if (ctx->sl.code >= 100 && ctx->sl.code < 200) 58 if (ctx->sl.code == 204) 64 if (ctx->sl.code == 304) 74 response_context_t *ctx; local 76 ctx = serf_bucket_mem_alloc(allocator, sizeof(*ctx)); 77 ctx 92 response_context_t *ctx = bucket->data; local 106 response_context_t *ctx = bucket->data; local 120 fetch_line(response_context_t *ctx, int acceptable) argument 125 parse_status_line(response_context_t *ctx, serf_bucket_alloc_t *allocator) argument 156 fetch_headers(serf_bucket_t *bkt, response_context_t *ctx) argument 210 run_machine(serf_bucket_t *bkt, response_context_t *ctx) argument 337 wait_for_body(serf_bucket_t *bkt, response_context_t *ctx) argument 359 response_context_t *ctx = bucket->data; local 368 response_context_t *ctx = bkt->data; local 399 response_context_t *ctx = bucket->data; local 431 response_context_t *ctx = bucket->data; local 445 response_context_t *ctx = bucket->data; local [all...] |
H A D | dechunk_buckets.c | 44 dechunk_context_t *ctx; local 46 ctx = serf_bucket_mem_alloc(allocator, sizeof(*ctx)); 47 ctx->stream = stream; 48 ctx->state = STATE_SIZE; 50 serf_linebuf_init(&ctx->linebuf); 52 return serf_bucket_create(&serf_bucket_type_dechunk, allocator, ctx); 57 dechunk_context_t *ctx = bucket->data; local 59 serf_bucket_destroy(ctx->stream); 68 dechunk_context_t *ctx local [all...] |
H A D | bwtp_buckets.c | 68 frame_context_t *ctx; local 70 ctx = serf_bucket_mem_alloc(allocator, sizeof(*ctx)); 71 ctx->type = 0; 72 ctx->open = 0; 73 ctx->channel = channel; 74 ctx->phrase = "CLOSED"; 75 ctx->headers = serf_bucket_headers_create(allocator); 77 return serf_bucket_create(&serf_bucket_type_bwtp_frame, allocator, ctx); 85 frame_context_t *ctx; local 102 frame_context_t *ctx; local 119 frame_context_t *ctx; local 135 frame_context_t *ctx = bucket->data; local 140 incoming_context_t *ctx = bucket->data; local 152 frame_context_t *ctx = bucket->data; local 157 incoming_context_t *ctx = bucket->data; local 169 frame_context_t *ctx = bucket->data; local 174 incoming_context_t *ctx = bucket->data; local 186 frame_context_t *ctx = bucket->data; local 191 incoming_context_t *ctx = bucket->data; local 221 frame_context_t *ctx = bucket->data; local 317 incoming_context_t *ctx; local 335 incoming_context_t *ctx = bucket->data; local 349 fetch_line(incoming_context_t *ctx, int acceptable) argument 354 parse_status_line(incoming_context_t *ctx, serf_bucket_alloc_t *allocator) argument 403 fetch_headers(serf_bucket_t *bkt, incoming_context_t *ctx) argument 449 run_machine(serf_bucket_t *bkt, incoming_context_t *ctx) argument 518 wait_for_body(serf_bucket_t *bkt, incoming_context_t *ctx) argument 540 incoming_context_t *ctx = bucket->data; local 549 incoming_context_t *ctx = bucket->data; local 572 incoming_context_t *ctx = bucket->data; local [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/evp/ |
H A D | bio_b64.c | 116 BIO_B64_CTX *ctx; local 118 ctx = (BIO_B64_CTX *)OPENSSL_malloc(sizeof(BIO_B64_CTX)); 119 if (ctx == NULL) 122 ctx->buf_len = 0; 123 ctx->tmp_len = 0; 124 ctx->tmp_nl = 0; 125 ctx->buf_off = 0; 126 ctx->cont = 1; 127 ctx->start = 1; 128 ctx 151 BIO_B64_CTX *ctx; local 365 BIO_B64_CTX *ctx; local 476 BIO_B64_CTX *ctx; local [all...] |
H A D | pmeth_fn.c | 67 #define M_check_autoarg(ctx, arg, arglen, err) \ 68 if (ctx->pmeth->flags & EVP_PKEY_FLAG_AUTOARGLEN) { \ 69 size_t pksize = (size_t)EVP_PKEY_size(ctx->pkey); \ 85 int EVP_PKEY_sign_init(EVP_PKEY_CTX *ctx) argument 88 if (!ctx || !ctx->pmeth || !ctx->pmeth->sign) { 93 ctx->operation = EVP_PKEY_OP_SIGN; 94 if (!ctx->pmeth->sign_init) 96 ret = ctx 102 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen) argument 119 EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx) argument 136 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, const unsigned char *tbs, size_t tbslen) argument 152 EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx) argument 169 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument 186 EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx) argument 203 EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) argument 220 EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx) argument 237 EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) argument 254 EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx) argument 271 EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument 335 EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) argument [all...] |
H A D | digest.c | 125 void EVP_MD_CTX_init(EVP_MD_CTX *ctx) argument 127 memset(ctx, '\0', sizeof *ctx); 132 EVP_MD_CTX *ctx = OPENSSL_malloc(sizeof *ctx); local 134 if (ctx) 135 EVP_MD_CTX_init(ctx); 137 return ctx; 140 int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type) argument 142 EVP_MD_CTX_init(ctx); 146 EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl) argument 253 EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) argument 263 EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) argument 272 EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) argument 354 EVP_MD_CTX ctx; local 367 EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) argument 376 EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) argument [all...] |
H A D | bio_ok.c | 177 BIO_OK_CTX *ctx; local 179 ctx = (BIO_OK_CTX *)OPENSSL_malloc(sizeof(BIO_OK_CTX)); 180 if (ctx == NULL) 183 ctx->buf_len = 0; 184 ctx->buf_off = 0; 185 ctx->buf_len_save = 0; 186 ctx->buf_off_save = 0; 187 ctx->cont = 1; 188 ctx->finished = 0; 189 ctx 216 BIO_OK_CTX *ctx; local 299 BIO_OK_CTX *ctx; local 362 BIO_OK_CTX *ctx; local 479 BIO_OK_CTX *ctx; local 515 BIO_OK_CTX *ctx; local 557 BIO_OK_CTX *ctx; local 584 BIO_OK_CTX *ctx; local [all...] |
/freebsd-11.0-release/sys/crypto/siphash/ |
H A D | siphash.c | 55 static void SipRounds(SIPHASH_CTX *ctx, int final); 58 SipHash_InitX(SIPHASH_CTX *ctx, int rc, int rf) argument 61 ctx->v[0] = 0x736f6d6570736575ull; 62 ctx->v[1] = 0x646f72616e646f6dull; 63 ctx->v[2] = 0x6c7967656e657261ull; 64 ctx->v[3] = 0x7465646279746573ull; 65 ctx->buf.b64 = 0; 66 ctx->bytes = 0; 67 ctx->buflen = 0; 68 ctx 74 SipHash_SetKey(SIPHASH_CTX *ctx, const uint8_t key[static SIPHASH_KEY_LENGTH]) argument 94 SipBuf(SIPHASH_CTX *ctx, const uint8_t **src, size_t len, int final) argument 120 SipHash_Update(SIPHASH_CTX *ctx, const void *src, size_t len) argument 170 SipHash_Final(uint8_t dst[static SIPHASH_DIGEST_LENGTH], SIPHASH_CTX *ctx) argument 182 SipHash_End(SIPHASH_CTX *ctx) argument 199 SipHashX(SIPHASH_CTX *ctx, int rc, int rf, const uint8_t key[static SIPHASH_KEY_LENGTH], const void *src, size_t len) argument 213 SipRounds(SIPHASH_CTX *ctx, int final) argument [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | delete_sec_context.c | 42 gsskrb5_ctx ctx; local 56 ctx = (gsskrb5_ctx) *context_handle; 59 HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex); 61 krb5_auth_con_free (context, ctx->auth_context); 62 krb5_auth_con_free (context, ctx->deleg_auth_context); 63 if (ctx->kcred) 64 krb5_free_creds(context, ctx->kcred); 65 if(ctx->source) 66 krb5_free_principal (context, ctx->source); 67 if(ctx [all...] |
H A D | ticket_flags.c | 38 gsskrb5_ctx ctx, 41 if (ctx == NULL) { 45 HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex); 47 if (ctx->ticket == NULL) { 48 HEIMDAL_MUTEX_unlock(&ctx->ctx_id_mutex); 53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags); 54 HEIMDAL_MUTEX_unlock(&ctx->ctx_id_mutex); 37 _gsskrb5_get_tkt_flags(OM_uint32 *minor_status, gsskrb5_ctx ctx, OM_uint32 *tkt_flags) argument
|
/freebsd-11.0-release/contrib/ipfilter/lib/ |
H A D | save_nothing.c | 28 void *ctx; local 34 ctx = calloc(1, sizeof(void *)); 36 return ctx; 41 nothing_destroy(ctx) 42 void *ctx; 44 free(ctx); 49 nothing_send(ctx, msg) 50 void *ctx; 54 ctx = ctx; /* gc [all...] |
H A D | save_file.c | 33 file_opts_t *ctx; local 35 ctx = calloc(1, sizeof(*ctx)); 36 if (ctx == NULL) 40 ctx->ref = 1; 42 ctx->raw = 1; 43 ctx->path = strdup(strings[0] + 6); 44 ctx->fp = fopen(ctx->path, "ab"); 46 ctx [all...] |
/freebsd-11.0-release/contrib/libarchive/libarchive/ |
H A D | archive_hmac.c | 51 __hmac_sha1_init(archive_hmac_sha1_ctx *ctx, const uint8_t *key, size_t key_len) argument 53 CCHmacInit(ctx, kCCHmacAlgSHA1, key, key_len); 58 __hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data, argument 61 CCHmacUpdate(ctx, data, data_len); 65 __hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len) argument 67 CCHmacFinal(ctx, out); 72 __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx) argument 74 memset(ctx, 0, sizeof(*ctx)); 80 __hmac_sha1_init(archive_hmac_sha1_ctx *ctx, cons argument 122 __hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data, size_t data_len) argument 129 __hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len) argument 137 __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx) argument 149 __hmac_sha1_init(archive_hmac_sha1_ctx *ctx, const uint8_t *key, size_t key_len) argument 156 __hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data, size_t data_len) argument 163 __hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len) argument 169 __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx) argument 177 __hmac_sha1_init(archive_hmac_sha1_ctx *ctx, const uint8_t *key, size_t key_len) argument 185 __hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data, size_t data_len) argument 192 __hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len) argument 200 __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx) argument 210 __hmac_sha1_init(archive_hmac_sha1_ctx *ctx, const uint8_t *key, size_t key_len) argument 219 __hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data, size_t data_len) argument 228 __hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len) argument 236 __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx) argument [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/ |
H A D | LPdir_unix.c | 66 const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory) argument 70 if (ctx == NULL || directory == NULL) { 76 if (*ctx == NULL) { 77 *ctx = (LP_DIR_CTX *)malloc(sizeof(LP_DIR_CTX)); 78 if (*ctx == NULL) { 82 memset(*ctx, '\0', sizeof(LP_DIR_CTX)); 84 (*ctx)->dir = opendir(directory); 85 if ((*ctx)->dir == NULL) { 87 free(*ctx); 88 *ctx 105 LP_find_file_end(LP_DIR_CTX **ctx) argument [all...] |
/freebsd-11.0-release/contrib/unbound/libunbound/ |
H A D | unbound.h | 46 * ctx = ub_ctx_create(); 47 * err = ub_ctx_add_ta(ctx, "..."); 48 * err = ub_ctx_add_ta(ctx, "..."); 50 * ... call ub_ctx_delete(ctx); when you want to stop. 53 * int err = ub_resolve(ctx, "www.example.com", ... 58 * err = ub_resolve_async(ctx, "www.example.com", ... my_callback); 60 * ... and when either ub_poll(ctx) is true 61 * ... or when the file descriptor ub_fd(ctx) is readable, 63 * ub_process(ctx); 68 * ub_wait(ctx); [all...] |
/freebsd-11.0-release/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 29 EVP_MD_CTX *ctx; local 37 ctx = EVP_MD_CTX_new(); 38 if (!(ctx && EVP_DigestInit(ctx, EVP_get_digestbynid(type)))) { 41 EVP_MD_CTX_free(ctx); 44 EVP_DigestUpdate(ctx, key, cache_secretsize); 45 EVP_DigestUpdate(ctx, (u_char *)pkt, length); 46 EVP_DigestFinal(ctx, digest, &len); 47 EVP_MD_CTX_free(ctx); 72 EVP_MD_CTX *ctx; local 113 EVP_MD_CTX *ctx; local [all...] |
/freebsd-11.0-release/lib/libc/gen/ |
H A D | trivial-getcontextx.c | 43 __fillcontextx2(char *ctx) argument 50 __fillcontextx(char *ctx) argument 54 ucp = (ucontext_t *)ctx; 63 char *ctx; local 66 ctx = malloc(__getcontextx_size()); 67 if (ctx == NULL) 69 if (__fillcontextx(ctx) == -1) { 71 free(ctx); 75 return ((ucontext_t *)ctx);
|
/freebsd-11.0-release/contrib/ntp/lib/isc/ |
H A D | hmacmd5.c | 38 isc_hmacmd5_init(isc_hmacmd5_t *ctx, const unsigned char *key, argument 41 HMAC_Init(ctx, (const void *) key, (int) len, EVP_md5()); 45 isc_hmacmd5_invalidate(isc_hmacmd5_t *ctx) { argument 46 HMAC_CTX_cleanup(ctx); 50 isc_hmacmd5_update(isc_hmacmd5_t *ctx, const unsigned char *buf, argument 53 HMAC_Update(ctx, buf, (int) len); 57 isc_hmacmd5_sign(isc_hmacmd5_t *ctx, unsigned char *digest) { argument 58 HMAC_Final(ctx, digest, NULL); 59 HMAC_CTX_cleanup(ctx); 72 isc_hmacmd5_init(isc_hmacmd5_t *ctx, cons argument 95 isc_hmacmd5_invalidate(isc_hmacmd5_t *ctx) argument 105 isc_hmacmd5_update(isc_hmacmd5_t *ctx, const unsigned char *buf, unsigned int len) argument 115 isc_hmacmd5_sign(isc_hmacmd5_t *ctx, unsigned char *digest) argument 138 isc_hmacmd5_verify(isc_hmacmd5_t *ctx, unsigned char *digest) argument 143 isc_hmacmd5_verify2(isc_hmacmd5_t *ctx, unsigned char *digest, size_t len) argument [all...] |
/freebsd-11.0-release/sys/crypto/camellia/ |
H A D | camellia-api.c | 39 camellia_set_key(camellia_ctx *ctx, const u_char *key, int bits) argument 42 Camellia_Ekeygen(bits, key, ctx->subkey); 43 ctx->bits = bits; 47 camellia_decrypt(const camellia_ctx *ctx, const u_char *src, u_char *dst) argument 50 Camellia_DecryptBlock(ctx->bits, src, ctx->subkey, dst); 54 camellia_encrypt(const camellia_ctx *ctx, const u_char *src, u_char *dst) argument 57 Camellia_EncryptBlock(ctx->bits, src, ctx->subkey, dst);
|
/freebsd-11.0-release/contrib/wpa/src/utils/ |
H A D | edit.h | 12 int edit_init(void (*cmd_cb)(void *ctx, char *cmd), 13 void (*eof_cb)(void *ctx), 14 char ** (*completion_cb)(void *ctx, const char *cmd, int pos), 15 void *ctx, const char *history_file, const char *ps); 17 int (*filter_cb)(void *ctx, const char *cmd));
|
/freebsd-11.0-release/crypto/openssl/crypto/cmac/ |
H A D | cmac.c | 97 CMAC_CTX *ctx; local 98 ctx = OPENSSL_malloc(sizeof(CMAC_CTX)); 99 if (!ctx) 101 EVP_CIPHER_CTX_init(&ctx->cctx); 102 ctx->nlast_block = -1; 103 return ctx; 106 void CMAC_CTX_cleanup(CMAC_CTX *ctx) argument 109 if (FIPS_mode() && !ctx->cctx.engine) { 110 FIPS_cmac_ctx_cleanup(ctx); 114 EVP_CIPHER_CTX_cleanup(&ctx 122 CMAC_CTX_get0_cipher_ctx(CMAC_CTX *ctx) argument 127 CMAC_CTX_free(CMAC_CTX *ctx) argument 151 CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, const EVP_CIPHER *cipher, ENGINE *impl) argument 218 CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen) argument 262 CMAC_Final(CMAC_CTX *ctx, unsigned char *out, size_t *poutlen) argument 294 CMAC_resume(CMAC_CTX *ctx) argument [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/ts/ |
H A D | ts_verify_ctx.c | 66 TS_VERIFY_CTX *ctx = local 68 if (ctx) 69 memset(ctx, 0, sizeof(TS_VERIFY_CTX)); 72 return ctx; 75 void TS_VERIFY_CTX_init(TS_VERIFY_CTX *ctx) argument 77 OPENSSL_assert(ctx != NULL); 78 memset(ctx, 0, sizeof(TS_VERIFY_CTX)); 81 void TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx) argument 83 if (!ctx) 86 TS_VERIFY_CTX_cleanup(ctx); 90 TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) argument 112 TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) argument [all...] |