/macosx-10.10.1/Heimdal-398.1.2/appl/kx/ |
H A D | context.c | 39 * Set the common part of the context `kc' 43 context_set (kx_context *kc, const char *host, const char *user, int port, argument 46 kc->thisaddr = (struct sockaddr*)&kc->__ss_this; 47 kc->thataddr = (struct sockaddr*)&kc->__ss_that; 48 kc->host = host; 49 kc->user = user; 50 kc->port = port; 51 kc 61 context_destroy(kx_context *kc) argument 67 context_authenticate(kx_context *kc, int s) argument 73 context_userok(kx_context *kc, char *user) argument 79 kx_read(kx_context *kc, int fd, void *buf, size_t len) argument 85 kx_write(kx_context *kc, int fd, const void *buf, size_t len) argument 91 copy_encrypted(kx_context *kc, int fd1, int fd2) argument [all...] |
H A D | krb5.c | 51 #define K5DATA(kc) ((krb5_kx_context*)kc->data) 52 #define CONTEXT(kc) (K5DATA(kc)->context) 86 krb5_destroy (kx_context *kc) argument 88 if (K5DATA(kc)->keyblock) 89 krb5_free_keyblock (CONTEXT(kc), K5DATA(kc)->keyblock); 90 if (K5DATA(kc)->crypto) 91 krb5_crypto_destroy (CONTEXT(kc), K5DAT 106 krb5_authenticate(kx_context *kc, int s) argument 164 krb5_read(kx_context *kc, int fd, void *buf, size_t len) argument 208 krb5_write(kx_context *kc, int fd, const void *buf, size_t len) argument 245 copy_out(kx_context *kc, int from_fd, int to_fd) argument 266 copy_in(kx_context *kc, int from_fd, int to_fd) argument 289 krb5_copy_encrypted(kx_context *kc, int fd1, int fd2) argument 328 krb5_userok(kx_context *kc, char *user) argument 346 krb5_make_context(kx_context *kc) argument 380 recv_v5_auth(kx_context *kc, int sock, u_char *buf) argument [all...] |
H A D | kxd.c | 65 fatal (kx_context *kc, int fd, char *format, ...) argument 80 kx_write (kc, fd, msg, p - msg); 110 recv_conn (int sock, kx_context *kc, argument 125 memset(kc, 0, sizeof(*kc)); 130 addrlen = sizeof(kc->__ss_this); 131 kc->thisaddr = (struct sockaddr*)&kc->__ss_this; 132 if (getsockname (sock, kc->thisaddr, &addrlen) < 0) { 136 kc 280 passive_session(kx_context *kc, int fd, int sock, int cookiesp) argument 293 active_session(kx_context *kc, int fd, int sock, int cookiesp) argument 308 doit_conn(kx_context *kc, int fd, int meta_sock, int flags, int cookiesp) argument 388 check_user_console(kx_context *kc, int fd) argument 446 doit_passive(kx_context *kc, int sock, int flags, int dispnr, int nsockets, struct x_socket *sockets, int tcp_flag) argument 632 doit_active(kx_context *kc, int sock, int flags, int tcp_flag) argument [all...] |
H A D | kx.h | 181 int (*authenticate)(struct kx_context *kc, int s); 182 int (*userok)(struct kx_context *kc, char *user); 183 ssize_t (*read)(struct kx_context *kc, 185 ssize_t (*write)(struct kx_context *kc, 187 int (*copy_encrypted)(struct kx_context *kc, 189 void (*destroy)(struct kx_context *kc); 207 context_set (kx_context *kc, const char *host, const char *user, int port, 211 context_destroy (kx_context *kc); 214 context_authenticate (kx_context *kc, int s); 217 context_userok (kx_context *kc, cha [all...] |
H A D | kx.c | 95 connect_host (kx_context *kc) argument 110 snprintf (portstr, sizeof(portstr), "%u", ntohs(kc->port)); 112 error = getaddrinfo (kc->host, portstr, &hints, &ai); 114 warnx ("%s: %s", kc->host, gai_strerror(error)); 123 warn ("connect(%s)", kc->host); 138 err(1, "getsockname(%s)", kc->host); 139 memcpy (&kc->__ss_this, thisaddr, sizeof(kc->__ss_this)); 140 kc->thisaddr_len = addrlen; 141 memcpy (&kc 156 passive_session(int xserver, int fd, kx_context *kc) argument 165 active_session(int xserver, int fd, kx_context *kc) argument 206 doit_passive(kx_context *kc) argument 344 doit_active(kx_context *kc) argument 559 doit(kx_context *kc, int passive_flag) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/krbtool/ |
H A D | identPicker.h | 48 SecKeychainRef kc, // NULL means use default list 58 SecKeychainRef kc, // NULL means use default list
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/testKeychainAPI/ |
H A D | run.sh | 3 HOME=/tmp/kc$$ 12 rm -rf /tmp/kc$$
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | identPicker.h | 72 SecKeychainRef kc, // NULL means use default list 83 SecKeychainRef kc, // NULL means use default list
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/regressions/kc/ |
H A D | kc-50-thread.c | 32 SecKeychainRef kc; local 33 result = SecKeychainCopyDefault(&kc); 34 CFRelease(kc); 75 ok_leaks("kc-50-thread");
|
/macosx-10.10.1/lsof-53/lsof/lib/ |
H A D | rnch.c | 326 struct ncache *kc; local 500 for (i = iNc * 16, kc = &nc, kf = kp, lc = Ncache, n = 0; kp; ) 502 for (i = n = 0, kc = kca, lc = Ncache; i < Nc; i++, kc++) 508 if (kread(kp, (char *)kc, sizeof(nc))) 510 if ((kp = (KA_T)kc->NCACHE_NXT) == kf) 514 if (!kc->NCACHE_VP || (len = kc->NCACHE_NAMLEN) < 1) 518 if (NegVN && ((KA_T)kc->NCACHE_VP == NegVN)) 539 if (!kc [all...] |
H A D | rnam.c | 287 struct NCACHE *kc; local 413 for (i = iNc * 16, kc = &nc, lc = Ncache, n = 0; kp; ) 415 for (i = n = 0, kc = kca, lc = Ncache; i < Nc; i++, kc++) 421 if (kread(kp, (char *)kc, sizeof(nc))) 423 if ((kp = (KA_T)kc->NCACHE_NXT) == kf) 427 if (!kc->NCACHE_NODEADDR) 429 if ((len = kc->NCACHE_NMLEN) < 1 || len > NCHNAMLEN) 431 if (len < 3 && kc->NCACHE_NM[0] == '.') { 432 if (len == 1 || (len == 2 && kc [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_keychain.c | 90 struct kc_rsa *kc = RSA_get_app_data(rk_UNCONST(rsa)); local 95 SecKeyRef privKeyRef = kc->pkey; 134 sig.Length = kc->keysize; 158 struct kc_rsa *kc = RSA_get_app_data(rsa); local 163 SecKeyRef privKeyRef = kc->pkey; 191 sig.Length = kc->keysize; 210 struct kc_rsa *kc = RSA_get_app_data(rsa); local 215 SecKeyRef privKeyRef = kc->pkey; 249 out.Length = kc->keysize; 273 struct kc_rsa *kc local 307 struct kc_rsa *kc = RSA_get_app_data(rsa); local 330 struct kc_rsa *kc = RSA_get_app_data(rsa); local 391 struct kc_rsa *kc; local [all...] |
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | SIMAccess.c | 163 uint8_t kc[SIM_KC_SIZE * N_TRIPLETS]; local 166 if (SIMAuthenticateGSM(rand, N_TRIPLETS, kc, sres) == false) { 171 print_data(kc, sizeof(kc));
|
H A D | eapsim_plugin.c | 123 CFArrayRef kc; member in struct:__anon8391 475 CFArrayRef kc; local 479 my_CFRelease(&sim_static_p->kc); 485 kc = copy_data_array(properties, 502 if (kc == NULL || sres == NULL) { 505 count = CFArrayGetCount(kc); 511 sim_static_p->kc = kc; 517 my_CFRelease(&kc); 567 if (context->sim_static.kc ! 1017 uint8_t kc[SIM_KC_SIZE * EAPSIM_MAX_RANDS]; local [all...] |
/macosx-10.10.1/vim-55/runtime/ftplugin/ |
H A D | kwt.vim | 20 set efm+=kc%.%#:\ error\ at\ %f:%l:\ %m
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | KCCursor.cpp | 200 Keychain &kc = *mCurrent; local 201 Mutex* mutex = kc->getKeychainMutex(); 212 Keychain &kc = *mCurrent; local 213 Mutex* mutex = kc->getKeychainMutex(); 290 Keychain &kc = *mCurrent; local 291 StLock<Mutex> _mutexLocker(*kc->getKeychainMutex());
|
H A D | defaultcreds.cpp | 182 bool operator () (Keychain kc) { return kc->database()->dl()->guid() != guid; } argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | KCCursor.cpp | 200 Keychain &kc = *mCurrent; local 201 Mutex* mutex = kc->getKeychainMutex(); 212 Keychain &kc = *mCurrent; local 213 Mutex* mutex = kc->getKeychainMutex(); 290 Keychain &kc = *mCurrent; local 291 StLock<Mutex> _mutexLocker(*kc->getKeychainMutex());
|
H A D | defaultcreds.cpp | 182 bool operator () (Keychain kc) { return kc->database()->dl()->guid() != guid; } argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | KCCursor.cpp | 200 Keychain &kc = *mCurrent; local 201 Mutex* mutex = kc->getKeychainMutex(); 212 Keychain &kc = *mCurrent; local 213 Mutex* mutex = kc->getKeychainMutex(); 290 Keychain &kc = *mCurrent; local 291 StLock<Mutex> _mutexLocker(*kc->getKeychainMutex());
|
H A D | defaultcreds.cpp | 182 bool operator () (Keychain kc) { return kc->database()->dl()->guid() != guid; } argument
|
/macosx-10.10.1/screen-22/screen/ |
H A D | loadav.c | 188 static kstat_ctl_t *kc; variable 193 loadok = (kc = kstat_open()) != 0; 203 kstat_chain_update(kc); 204 if ((ks = kstat_lookup(kc, "unix", -1, "system_misc")) == 0 || kstat_read(kc, ks, (void *)0) == -1)
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/libiberty/testsuite/ |
H A D | test-demangle.c | 286 enum gnu_v3_ctor_kinds kc; local 288 kc = is_gnu_v3_mangled_ctor (inp); 289 sprintf (buf, "%d", (int) kc);
|
/macosx-10.10.1/emacs-93/emacs/src/ |
H A D | getloadavg.c | 527 kstat_ctl_t *kc; 531 kc = kstat_open (); 532 if (kc == 0) 534 ksp = kstat_lookup (kc, "unix", 0, "system_misc"); 537 if (kstat_read (kc, ksp, 0) == -1) 568 kstat_close (kc); 525 kstat_ctl_t *kc; local
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/kcTime/ |
H A D | kcTime.cpp | 118 SecKeychainRef kc; local 119 ortn = SecKeychainOpen(kcName[dex], &kc); 121 SecKeychainDelete(kc);
|