/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/mips/include/asm/ |
H A D | spinlock_types.h | 15 * bits 16..31 : ticket 20 u16 ticket; member in struct:__anon9799::__anon9800 24 u16 ticket;
|
H A D | spinlock.h | 23 * These are fair FIFO ticket locks 67 "1: ll %[ticket], %[ticket_ptr] \n" 68 " addu %[my_ticket], %[ticket], %[inc] \n" 72 " srl %[my_ticket], %[ticket], 16 \n" 73 " andi %[ticket], %[ticket], 0xffff \n" 75 " bne %[ticket], %[my_ticket], 4f \n" 76 " subu %[ticket], %[my_ticket], %[ticket] \n" 79 "4: andi %[ticket], [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | afs_settoken.c | 53 DATA_BLOB *ticket, struct ClearToken *ct) 135 DEBUG(10, ("Could not get ticket\n")); 139 *ticket = blob; 157 DATA_BLOB ticket) 169 memcpy(p, &ticket.length, sizeof(uint32)); 171 memcpy(p, ticket.data, ticket.length); 172 p += ticket.length; 213 DATA_BLOB ticket; local 218 if (!afs_decode_token(token_string, &cell, &ticket, 52 afs_decode_token(const char *string, char **cell, DATA_BLOB *ticket, struct ClearToken *ct) argument 155 afs_settoken(const char *cell, const struct ClearToken *ctok, DATA_BLOB ticket) argument [all...] |
H A D | afs.c | 42 static char *afs_encode_token(const char *cell, const DATA_BLOB ticket, argument 51 base64_ticket = base64_encode_data_blob(ticket); 65 DEBUG(10, ("Got ticket string:\n%s\n", result)); 73 /* Create a ClearToken and an encrypted ticket. ClearToken has not yet the 77 DATA_BLOB *ticket, struct ClearToken *ct) 97 /* Build the ticket. This is going to be encrypted, so in our 176 *ticket = data_blob(clear_ticket, len); 183 DATA_BLOB ticket; local 187 if (!afs_createtoken(username, cell, &ticket, &ct)) 190 result = afs_encode_token(cell, ticket, 76 afs_createtoken(const char *username, const char *cell, DATA_BLOB *ticket, struct ClearToken *ct) argument 216 DATA_BLOB ticket; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/iwmc3200wifi/ |
H A D | rx.h | 48 struct iwm_rx_ticket *ticket; member in struct:iwm_rx_ticket_node
|
H A D | rx.c | 314 iwm_rx_ticket_node_alloc(struct iwm_priv *iwm, struct iwm_rx_ticket *ticket) argument 320 IWM_ERR(iwm, "Couldn't allocate ticket node\n"); 324 ticket_node->ticket = kmemdup(ticket, sizeof(struct iwm_rx_ticket), 326 if (!ticket_node->ticket) { 327 IWM_ERR(iwm, "Couldn't allocate RX ticket\n"); 339 kfree(ticket_node->ticket); 390 struct iwm_rx_ticket_node *ticket, *nt; local 395 list_for_each_entry_safe(ticket, nt, &iwm->rx_tickets, node) { 396 list_del(&ticket 418 struct iwm_rx_ticket *ticket = local 1516 struct iwm_rx_ticket *ticket = ticket_node->ticket; local 1673 struct iwm_rx_ticket_node *ticket, *next; local [all...] |
H A D | debugfs.c | 268 struct iwm_rx_ticket_node *ticket; local 284 list_for_each_entry(ticket, &iwm->rx_tickets, node) { 286 ticket->ticket->id); 288 ticket->ticket->action); 290 ticket->ticket->flags);
|
H A D | trace.h | 230 struct iwm_rx_ticket *ticket = 234 __entry->id = le16_to_cpu(ticket->id); 235 __entry->action = le16_to_cpu(ticket->action); 236 __entry->flags = le16_to_cpu(ticket->flags); 241 IWM_PR_FMT " Rx ticket: id 0x%x, action %s, %s 0x%x%s",
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/ia64/include/asm/ |
H A D | spinlock.h | 43 int *p = (int *)&lock->lock, ticket, serve; local 45 ticket = ia64_fetchadd(1, p, acq); 47 if (!(((ticket >> TICKET_SHIFT) ^ ticket) & TICKET_MASK)) 55 if (!(((serve >> TICKET_SHIFT) ^ ticket) & TICKET_MASK)) 80 int *p = (int *)&lock->lock, ticket; local 85 asm volatile ("ld4.c.nc %0=[%1]" : "=r"(ticket) : "r"(p) : "memory"); 86 if (!(((ticket >> TICKET_SHIFT) ^ ticket) & TICKET_MASK))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/keys/ |
H A D | rxrpc-type.h | 29 u32 start; /* time at which ticket starts */ 30 u32 expiry; /* time at which ticket expires */ 33 u16 ticket_len; /* length of ticket[] */ 35 u8 ticket[0]; /* the encrypted ticket */ member in struct:rxkad_key 69 s32 is_skey; /* T if ticket is encrypted in another ticket's 74 u16 ticket_len; /* length of ticket */ 75 u16 ticket2_len; /* length of second ticket */ 80 u8 *ticket; /* krb member in struct:rxk5_key 108 u8 ticket[0]; member in struct:rxrpc_key_data_v1 [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/xfs/ |
H A D | xfs_log.c | 44 STATIC int xlog_commit_record(struct log *log, struct xlog_ticket *ticket, 60 xlog_ticket_t *ticket, 76 xlog_ticket_t *ticket); 78 xlog_ticket_t *ticket); 80 xlog_ticket_t *ticket); 210 * This routine is called when a user of a log manager ticket is done with 211 * the reservation. If the ticket was ever used, then a commit record for 214 * a given ticket. If the ticket was one with a permanent reservation, then 226 struct xlog_ticket *ticket, 224 xfs_log_done( struct xfs_mount *mp, struct xlog_ticket *ticket, struct xlog_in_core **iclog, uint flags) argument 322 xfs_log_reserve( struct xfs_mount *mp, int unit_bytes, int cnt, struct xlog_ticket **ticket, __uint8_t client, uint flags, uint t_type) argument 1204 xlog_commit_record( struct log *log, struct xlog_ticket *ticket, struct xlog_in_core **iclog, xfs_lsn_t *commitlsnp) argument 1545 xlog_print_tic_res( struct xfs_mount *mp, struct xlog_ticket *ticket) argument 1658 xlog_write_calc_vec_length( struct xlog_ticket *ticket, struct xfs_log_vec *log_vector) argument 1693 xlog_write_start_rec( struct xlog_op_header *ophdr, struct xlog_ticket *ticket) argument 1712 xlog_write_setup_ophdr( struct log *log, struct xlog_op_header *ophdr, struct xlog_ticket *ticket, uint flags) argument 1752 xlog_write_setup_copy( struct xlog_ticket *ticket, struct xlog_op_header *ophdr, int space_available, int space_required, int *copy_off, int *copy_len, int *last_was_partial_copy, int *bytes_consumed) argument 1880 xlog_write( struct log *log, struct xfs_log_vec *log_vector, struct xlog_ticket *ticket, xfs_lsn_t *start_lsn, struct xlog_in_core **commit_iclog, uint flags) argument 2435 xlog_state_get_iclog_space(xlog_t *log, int len, xlog_in_core_t **iclogp, xlog_ticket_t *ticket, int *continued_write, int *logoffsetp) argument 2806 xlog_regrant_reserve_log_space(xlog_t *log, xlog_ticket_t *ticket) argument 2855 xlog_ungrant_log_space(xlog_t *log, xlog_ticket_t *ticket) argument 3321 xfs_log_ticket_put( xlog_ticket_t *ticket) argument 3332 xfs_log_ticket_get( xlog_ticket_t *ticket) argument [all...] |
H A D | xfs_log_cil.c | 86 if (log->l_cilp->xc_ctx->ticket) 87 xfs_log_ticket_put(log->l_cilp->xc_ctx->ticket); 96 * Allocate a new ticket. Failing to get a new ticket makes it really hard to 101 * We don't reserve any space for the ticket - we are going to steal whatever 103 * the space required, we need to set the current reservation of the ticket to 130 * Here we allocate a log ticket to track space usage during a CIL push. This 131 * ticket is passed to xlog_write() directly so that we don't slowly leak log 142 log->l_cilp->xc_ctx->ticket = xlog_cil_ticket_alloc(log); 150 * consumed by the item. Add the space to the checkpoint ticket an 160 xlog_cil_insert( struct log *log, struct xlog_ticket *ticket, struct xfs_log_item *item, struct xfs_log_vec *lv) argument 304 xlog_cil_insert_items( struct log *log, struct xfs_log_vec *log_vector, struct xlog_ticket *ticket, xfs_lsn_t *start_lsn) argument [all...] |
H A D | xfs_log.h | 143 struct xlog_ticket *ticket, 173 struct xlog_ticket **ticket, 180 struct xlog_ticket *ticket, 189 struct xlog_ticket *xfs_log_ticket_get(struct xlog_ticket *ticket); 190 void xfs_log_ticket_put(struct xlog_ticket *ticket);
|
H A D | xfs_log_priv.h | 132 * Flags to log ticket 247 sv_t t_wait; /* ticket wait queue : 20 */ 251 atomic_t t_ref; /* ticket reference count : 4 */ 392 struct xlog_ticket *ticket; /* chkpt ticket */ member in struct:xfs_cil_ctx 445 * logged in order to prevent checkpoint ticket overruns. 455 * transaction ticket is transferred to the CIL ctx commit ticket to cover the 459 * checkpoint transaction ticket is specific to the checkpoint context, rather 559 void xlog_print_tic_res(struct xfs_mount *mp, struct xlog_ticket *ticket); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | kerberos_verify.c | 36 Try to verify a ticket using the system keytab... the system keytab has kvno -1 entries, so 43 const DATA_BLOB *ticket, 92 * try verifying the ticket using that principal. */ 115 packet.length = ticket->length; 116 packet.data = (char *)ticket->data; 131 * has sucessfully decrypted the ticket but the 132 * ticket is not valid yet (due to clockskew) 202 Try to verify a ticket using the secrets.tdb. 208 const DATA_BLOB *ticket, 247 packet.length = ticket 41 ads_keytab_verify_ticket(krb5_context context, krb5_auth_context auth_context, const DATA_BLOB *ticket, krb5_ticket **pp_tkt, krb5_keyblock **keyblock, krb5_error_code *perr) argument 205 ads_secrets_verify_ticket(krb5_context context, krb5_auth_context auth_context, krb5_principal host_princ, const DATA_BLOB *ticket, krb5_ticket **pp_tkt, krb5_keyblock **keyblock, krb5_error_code *perr) argument 303 ads_verify_ticket(TALLOC_CTX *mem_ctx, const char *realm, time_t time_offset, const DATA_BLOB *ticket, char **principal, PAC_DATA **pac_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | clispnego.c | 275 generate a krb5 GSS-API wrapper packet given a ticket 277 DATA_BLOB spnego_gen_krb5_wrap(const DATA_BLOB ticket, const uint8 tok_id[2]) argument 288 asn1_write(&data, ticket.data, ticket.length); 303 parse a krb5 GSS-API wrapper packet giving a ticket 305 BOOL spnego_parse_krb5_wrap(DATA_BLOB blob, DATA_BLOB *ticket, uint8 tok_id[2]) argument 322 *ticket = data_blob(NULL, data_remaining); 323 asn1_read(&data, ticket->data, ticket->length); 331 data_blob_free(ticket); [all...] |
H A D | clikrb5.c | 348 if (tkt->ticket.authorization_data && 349 tkt->ticket.authorization_data->len) 351 for (i = 0; i < tkt->ticket.authorization_data->len; i++) { 353 if (tkt->ticket.authorization_data->val[i].ad_type != 356 tkt->ticket.authorization_data->val[i].ad_type)); 360 auth_data_wrapped = data_blob(tkt->ticket.authorization_data->val[i].ad_data.data, 361 tkt->ticket.authorization_data->val[i].ad_data.length); 581 /* obtain ticket & session key */ 590 /* This can commonly fail on smbd startup with no ticket in the cache. 606 /* cope with ticket bein 652 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire) argument 989 krb5_rd_req_return_keyblock_from_keytab(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_keyblock **keyblock) argument 1488 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-key.c | 110 memcpy(&token->kad->ticket, &xdr[8], tktlen); 124 token->kad->ticket[0], token->kad->ticket[1], 125 token->kad->ticket[2], token->kad->ticket[3], 126 token->kad->ticket[4], token->kad->ticket[5], 127 token->kad->ticket[6], token->kad->ticket[7]); 184 kfree(rxk5->ticket); [all...] |
H A D | rxkad.c | 658 iov[2].iov_base = (void *) s2->ticket; 817 * decrypt the kerberos IV ticket in the response 820 void *ticket, size_t ticket_len, 852 ASSERTCMP((unsigned long) ticket & 7UL, ==, 0); 860 sg_init_one(&sg[0], ticket, ticket_len); 863 p = ticket; 879 /* extract the ticket flags */ 899 /* get the IPv4 address of the entity that requested the ticket */ 904 /* get the session key from the ticket */ 910 /* get the ticket' 819 rxkad_decrypt_ticket(struct rxrpc_connection *conn, void *ticket, size_t ticket_len, struct rxrpc_crypt *_session_key, time_t *_expiry, u32 *_abort_code) argument 1007 void *ticket; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | krb5_asn.h | 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.h | 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
H A D | krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 124 * ticket[3] Ticket, 135 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/krb5/ |
H A D | krb5_asn.h | 124 * ticket[3] Ticket, 135 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/octeon/ |
H A D | cvmx-cmd-queue.h | 65 * queues. The lock uses a "ticket / now serving" model to 127 /* You have lock when this is your ticket */ 148 * ll/sc used to get a ticket. If this is not the case, the update 152 uint64_t ticket[(CVMX_CMD_QUEUE_END >> 16) * 256]; member in struct:__anon15517 249 "li %[ticket], 1\n" 251 "baddu %[ticket], %[my_ticket]\n" 252 "sc %[ticket], %[ticket_ptr]\n" 253 "beqz %[ticket], 1b\n" 255 /* Load the current now_serving ticket */ 256 "lbu %[ticket], [all...] |