| /src/external/bsd/jemalloc/dist/test/unit/ |
| san_bump.c | 19 pac_t *pac = &arena->pa_shard.pac; local 23 edata_t* edata = san_bump_alloc(tsdn, &sba, pac, pac_ehooks_get(pac), 44 edata_t *edata2 = san_bump_alloc(tsdn, &sba, pac, pac_ehooks_get(pac), 84 pac_t *pac = &arena->pa_shard.pac; local 87 edata_t* edata = san_bump_alloc(tsdn, &sba, pac, pac_ehooks_get(pac), [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_ap-req.c | 50 {"verify-pac",0, arg_flag, &verify_pac, 51 "verify the PAC", NULL }, 144 krb5_pac pac; local 151 krb5_err(context, 1, ret, "get pac"); 153 ret = krb5_pac_parse(context, data.data, data.length, &pac); 155 krb5_err(context, 1, ret, "pac parse"); 157 krb5_pac_free(context, pac);
|
| test_pac.c | 39 * This PAC and keys are copied (with permission) from Samba torture 101 * This pac from Christan Krause 168 krb5_pac pac; local 183 ret = krb5_pac_parse(context, saved_pac, sizeof(saved_pac), &pac); 187 ret = krb5_pac_verify(context, pac, authtime, p, 192 ret = _krb5_pac_sign(context, pac, authtime, p, 197 krb5_pac_free(context, pac); 199 ret = krb5_pac_parse(context, data.data, data.length, &pac); 204 ret = krb5_pac_verify(context, pac, authtime, p, 220 ret = krb5_pac_get_types(context, pac, &len, &list) [all...] |
| rd_req.c | 542 * Set if krb5_rq_red() is going to check the Windows PAC or not 546 * @param flag flag to select if to check the pac (TRUE) or not (FALSE). 977 * Found a match, save the keyblock for PAC processing, 1007 /* If there is a PAC, verify its server signature */ 1009 krb5_pac pac; local 1017 ret = krb5_pac_parse(context, data.data, data.length, &pac); 1023 pac, 1028 krb5_pac_free(context, pac);
|
| pac.c | 1 /* $NetBSD: pac.c,v 1.4 2023/06/19 21:41:44 christos Exp $ */ 53 struct PACTYPE *pac; member in struct:krb5_pac_data 81 * HMAC-MD5 checksum over any key (needed for the PAC routines) 127 krb5_set_error_message(context, ret, "PAC has too many buffers"); 135 krb5_set_error_message(context, ret, "PAC has too many buffers"); 173 krb5_pac *pac) 197 krb5_set_error_message(context, ret, N_("PAC have too few buffer", "")); 203 N_("PAC have wrong version %d", ""), 213 p->pac = calloc(1, header_end); 214 if (p->pac == NULL) [all...] |
| /src/external/bsd/jemalloc/dist/include/jemalloc/internal/ |
| pa.h | 11 #include "jemalloc/internal/pac.h" 19 * only such implementation is the PAC code ("page allocator classic"), but 44 * Stats specific to the PAC. For now, these are the only stats that 95 /* Allocates from a PAC. */ 96 pac_t pac; member in struct:pa_shard_s 123 return ecache_npages_get(&shard->pac.ecache_muzzy) == 0 && 124 pac_decay_ms_get(&shard->pac, extent_state_muzzy) <= 0; 197 * Morally, this should do both PAC decay and the HPA deferred work. For now, 198 * though, the arena, background thread, and PAC modules are tightly interwoven
|
| /src/external/bsd/jemalloc/include/jemalloc/internal/ |
| pa.h | 11 #include "jemalloc/internal/pac.h" 19 * only such implementation is the PAC code ("page allocator classic"), but 44 * Stats specific to the PAC. For now, these are the only stats that 95 /* Allocates from a PAC. */ 96 pac_t pac; member in struct:pa_shard_s 123 return ecache_npages_get(&shard->pac.ecache_muzzy) == 0 && 124 pac_decay_ms_get(&shard->pac, extent_state_muzzy) <= 0; 197 * Morally, this should do both PAC decay and the HPA deferred work. For now, 198 * though, the arena, background thread, and PAC modules are tightly interwoven
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| windc.c | 61 krb5_pac *pac; member in struct:generate_uc 72 return ft->pac_generate((void *)plug, context, uc->client, uc->pac); 79 krb5_pac *pac) 87 uc.pac = pac; 100 krb5_pac *pac; member in struct:verify_uc 116 uc->client, uc->server, uc->krbtgt, uc->pac); 130 krb5_pac *pac, 143 uc.pac = pac; [all...] |
| krb5tgs.c | 322 krb5_pac pac; local 324 /* Found PAC */ 328 &pac); 333 ret = krb5_pac_verify(context, pac, tkt->authtime, 337 krb5_pac_free(context, pac); 343 client, server, krbtgt, &pac, &signed_pac); 345 krb5_pac_free(context, pac); 350 * Only re-sign PAC if we could verify it with the PAC 352 * a PAC from cross realm from a Windows domain an [all...] |
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_fast_common.h | 21 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field 23 * in the general PAC TLV format (Section 4.2). 55 /* RFC 5422: 4.2.6 PAC-Type TLV */ 58 /* User Authorization PAC */ 61 /* Machine Authentication PAC */ 88 u8 *pac; member in struct:eap_fast_tlv_parse
|
| eap_teap_common.h | 25 * RFC 7170: Section 4.2.12.1 - Formats for PAC Attributes 95 /* PAC TLV with PAC-Acknowledgement TLV attribute */ 124 /* RFC 7170: 4.2.12.6 PAC-Type TLV */ 191 u8 *pac; member in struct:eap_teap_tlv_parse
|
| /src/external/gpl3/gcc/dist/libgcc/config/arm/ |
| pr-support.c | 132 _uw pac; local 138 _UVRSD_UINT32, &pac); 140 ("autg %0, %1, %2" : : "r"(pac), "r"(lr), "r"(sp) :); 257 /* Pop PAC off the stack into VRS pseudo.pac. */ 269 /* Use current VSP as modifier in PAC validation. */
|
| unwind-arm.c | 67 /* Holds value of pseudo registers eg. PAC. */ 70 _uw pac; member in struct:pseudo_regs 87 /* Armv8.1-M Mainline PAC/AUTH values. This field should be in the same field 111 struct pseudo_regs pac; member in struct:__anon14225 189 *(_uw *) valuep = vrs->pseudo.pac; 224 vrs->pseudo.pac = *(_uw *) valuep; 272 vrs->pseudo.pac = *(ptr++);
|
| /src/sys/dev/pci/ |
| viaide.c | 988 struct pci_attach_args pac, *pa = &pac; local 990 pac = *cpa;
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| ntlm.h | 124 gss_buffer_desc pac; member in struct:__anon817
|
| /src/external/bsd/jemalloc/dist/src/ |
| pac.c | 4 #include "jemalloc/internal/pac.h" 19 pac_decay_data_get(pac_t *pac, extent_state_t state, 23 *r_decay = &pac->decay_dirty; 24 *r_decay_stats = &pac->stats->decay_dirty; 25 *r_ecache = &pac->ecache_dirty; 28 *r_decay = &pac->decay_muzzy; 29 *r_decay_stats = &pac->stats->decay_muzzy; 30 *r_ecache = &pac->ecache_muzzy; 38 pac_init(tsdn_t *tsdn, pac_t *pac, base_t *base, emap_t *emap, 49 if (ecache_init(tsdn, &pac->ecache_dirty, extent_state_dirty, ind 167 pac_t *pac = (pac_t *)self; local 193 pac_t *pac = (pac_t *)self; local 231 pac_t *pac = (pac_t *)self; local 253 pac_t *pac = (pac_t *)self; local 298 pac_t *pac = (pac_t *)self; local [all...] |
| arena.c | 98 size_t pac_mapped_sz = pac_mapped(&arena->pa_shard.pac); 209 &arena->pa_shard.pac.decay_dirty, 0); 220 if (decay_immediately(&arena->pa_shard.pac.decay_dirty)) { 427 pac_decay_all(tsdn, &arena->pa_shard.pac, decay, decay_stats, 439 bool epoch_advanced = pac_maybe_decay_purge(tsdn, &arena->pa_shard.pac, 459 return arena_decay_impl(tsdn, arena, &arena->pa_shard.pac.decay_dirty, 460 &arena->pa_shard.pac.stats->decay_dirty, 461 &arena->pa_shard.pac.ecache_dirty, is_background_thread, all); 470 return arena_decay_impl(tsdn, arena, &arena->pa_shard.pac.decay_muzzy, 471 &arena->pa_shard.pac.stats->decay_muzzy 783 pac_t *pac = &arena->pa_shard.pac; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_fast_pac.c | 2 * EAP peer method: EAP-FAST PAC file processing 16 /* TODO: encrypt PAC-Key in the PAC file */ 21 "wpa_supplicant EAP-FAST PAC file - version 1"; 30 * Sequence of PAC entries: 31 * 2-octet PAC-Type (big endian) 32 * 32-octet PAC-Key 33 * 2-octet PAC-Opaque length (big endian) 34 * <variable len> PAC-Opaque data (length bytes) 35 * 2-octet PAC-Info length (big endian 73 struct eap_fast_pac *pac = pac_root; local 90 struct eap_fast_pac *pac, *prev; local 142 struct eap_fast_pac *pac; local 415 struct eap_fast_pac *pac = NULL; local 621 struct eap_fast_pac *pac; local 672 struct eap_fast_pac *pac, *prev; local 754 struct eap_fast_pac *pac, *prev; local 875 struct eap_fast_pac *pac; local [all...] |
| eap_teap_pac.c | 2 * EAP peer method: EAP-TEAP PAC file processing 16 /* TODO: encrypt PAC-Key in the PAC file */ 21 "wpa_supplicant EAP-TEAP PAC file - version 1"; 30 * Sequence of PAC entries: 31 * 2-octet PAC-Type (big endian) 32 * 32-octet PAC-Key 33 * 2-octet PAC-Opaque length (big endian) 34 * <variable len> PAC-Opaque data (length bytes) 35 * 2-octet PAC-Info length (big endian 73 struct eap_teap_pac *pac = pac_root; local 90 struct eap_teap_pac *pac, *prev; local 142 struct eap_teap_pac *pac; local 416 struct eap_teap_pac *pac = NULL; local 625 struct eap_teap_pac *pac; local 676 struct eap_teap_pac *pac, *prev; local 758 struct eap_teap_pac *pac, *prev; local 879 struct eap_teap_pac *pac; local [all...] |
| eap_fast.c | 49 int provisioning_allowed; /* Allowed PAC provisioning modes */ 50 int provisioning; /* doing PAC provisioning (not the normal auth) */ 61 struct eap_fast_pac *pac; member in struct:eap_fast_data 90 "new PAC-Key"); 100 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 124 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 133 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 140 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 199 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured"); 205 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) 233 struct eap_fast_pac *pac, *prev; local 741 struct eap_tlv_hdr *pac; local [all...] |
| eap_teap.c | 48 int provisioning_allowed; /* Allowed PAC provisioning modes */ 49 int provisioning; /* doing PAC provisioning (not the normal auth) */ 61 struct eap_teap_pac *pac; member in struct:eap_teap_data 93 "EAP-TEAP: Try to provision a new PAC-Key"); 104 "EAP-TEAP: No PAC-Key available for using SessionTicket"); 109 /* EAP-TEAP uses PAC-Key as the TLS master_secret */ 128 "EAP-TEAP: Automatic PAC provisioning mode: %d", 137 wpa_printf(MSG_DEBUG, "EAP-TEAP: Maximum PAC list length: %lu", 144 "EAP-TEAP: Using binary format for PAC list"); 173 /* Prevent PAC provisioning without mutual authenticatio 255 struct eap_teap_pac *pac, *prev; local 1215 struct teap_tlv_hdr *pac; local [all...] |
| /src/external/gpl3/gcc/dist/gcc/config/arm/ |
| arm-c.cc | 249 unsigned int pac = 1; local 252 pac |= 0x4; 254 builtin_define_with_int_value ("__ARM_FEATURE_PAC_DEFAULT", pac);
|
| /src/external/bsd/ipf/dist/tools/ |
| ipmon.c | 1044 const void *pac; local 1070 pac = (const char *)buf + sizeof(*ipl) + sizeof(ipf); 1071 memcpy(&ip, pac, sizeof(ip)); 1185 memcpy(&ip6, pac, sizeof(ip6)); 1190 ehp = (const char *)pac + hl; 1222 memcpy(&tp, (const char *)pac + hl, sizeof(tp)); 1256 memcpy(&ic, (const char *)pac + hl, sizeof(ic)); 1264 memcpy(&ic, (const char *)pac + hl, sizeof(ic)); 1275 const void *ipcp = (const char *)pac + 2 * hl + offsetof(struct icmp, icmp_ip); 1437 dumphex(conf->log, ipmonopts, (char *)pac, [all...] |
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_write_set_format_mtree.c | 601 struct attr_counter *pac; local 607 for (pac = ac->prev; pac; pac = pac->prev) { 608 if (pac->count >= ac->count) 614 if (pac != NULL) { 615 ac->prev = pac; 616 ac->next = pac->next; 617 pac->next = ac [all...] |