HomeSort by: relevance | last modified time | path
    Searched defs:pac (Results 1 - 24 of 24) sorted by relevancy

  /src/external/bsd/jemalloc/dist/test/unit/
san_bump.c 19 pac_t *pac = &arena->pa_shard.pac; local
23 edata_t* edata = san_bump_alloc(tsdn, &sba, pac, pac_ehooks_get(pac),
44 edata_t *edata2 = san_bump_alloc(tsdn, &sba, pac, pac_ehooks_get(pac),
84 pac_t *pac = &arena->pa_shard.pac; local
87 edata_t* edata = san_bump_alloc(tsdn, &sba, pac, pac_ehooks_get(pac),
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
test_ap-req.c 50 {"verify-pac",0, arg_flag, &verify_pac,
51 "verify the PAC", NULL },
144 krb5_pac pac; local
151 krb5_err(context, 1, ret, "get pac");
153 ret = krb5_pac_parse(context, data.data, data.length, &pac);
155 krb5_err(context, 1, ret, "pac parse");
157 krb5_pac_free(context, pac);
test_pac.c 39 * This PAC and keys are copied (with permission) from Samba torture
101 * This pac from Christan Krause
168 krb5_pac pac; local
183 ret = krb5_pac_parse(context, saved_pac, sizeof(saved_pac), &pac);
187 ret = krb5_pac_verify(context, pac, authtime, p,
192 ret = _krb5_pac_sign(context, pac, authtime, p,
197 krb5_pac_free(context, pac);
199 ret = krb5_pac_parse(context, data.data, data.length, &pac);
204 ret = krb5_pac_verify(context, pac, authtime, p,
220 ret = krb5_pac_get_types(context, pac, &len, &list)
    [all...]
rd_req.c 542 * Set if krb5_rq_red() is going to check the Windows PAC or not
546 * @param flag flag to select if to check the pac (TRUE) or not (FALSE).
977 * Found a match, save the keyblock for PAC processing,
1007 /* If there is a PAC, verify its server signature */
1009 krb5_pac pac; local
1017 ret = krb5_pac_parse(context, data.data, data.length, &pac);
1023 pac,
1028 krb5_pac_free(context, pac);
pac.c 1 /* $NetBSD: pac.c,v 1.4 2023/06/19 21:41:44 christos Exp $ */
53 struct PACTYPE *pac; member in struct:krb5_pac_data
81 * HMAC-MD5 checksum over any key (needed for the PAC routines)
127 krb5_set_error_message(context, ret, "PAC has too many buffers");
135 krb5_set_error_message(context, ret, "PAC has too many buffers");
173 krb5_pac *pac)
197 krb5_set_error_message(context, ret, N_("PAC have too few buffer", ""));
203 N_("PAC have wrong version %d", ""),
213 p->pac = calloc(1, header_end);
214 if (p->pac == NULL)
    [all...]
  /src/external/bsd/jemalloc/dist/include/jemalloc/internal/
pa.h 11 #include "jemalloc/internal/pac.h"
19 * only such implementation is the PAC code ("page allocator classic"), but
44 * Stats specific to the PAC. For now, these are the only stats that
95 /* Allocates from a PAC. */
96 pac_t pac; member in struct:pa_shard_s
123 return ecache_npages_get(&shard->pac.ecache_muzzy) == 0 &&
124 pac_decay_ms_get(&shard->pac, extent_state_muzzy) <= 0;
197 * Morally, this should do both PAC decay and the HPA deferred work. For now,
198 * though, the arena, background thread, and PAC modules are tightly interwoven
  /src/external/bsd/jemalloc/include/jemalloc/internal/
pa.h 11 #include "jemalloc/internal/pac.h"
19 * only such implementation is the PAC code ("page allocator classic"), but
44 * Stats specific to the PAC. For now, these are the only stats that
95 /* Allocates from a PAC. */
96 pac_t pac; member in struct:pa_shard_s
123 return ecache_npages_get(&shard->pac.ecache_muzzy) == 0 &&
124 pac_decay_ms_get(&shard->pac, extent_state_muzzy) <= 0;
197 * Morally, this should do both PAC decay and the HPA deferred work. For now,
198 * though, the arena, background thread, and PAC modules are tightly interwoven
  /src/crypto/external/bsd/heimdal/dist/kdc/
windc.c 61 krb5_pac *pac; member in struct:generate_uc
72 return ft->pac_generate((void *)plug, context, uc->client, uc->pac);
79 krb5_pac *pac)
87 uc.pac = pac;
100 krb5_pac *pac; member in struct:verify_uc
116 uc->client, uc->server, uc->krbtgt, uc->pac);
130 krb5_pac *pac,
143 uc.pac = pac;
    [all...]
krb5tgs.c 322 krb5_pac pac; local
324 /* Found PAC */
328 &pac);
333 ret = krb5_pac_verify(context, pac, tkt->authtime,
337 krb5_pac_free(context, pac);
343 client, server, krbtgt, &pac, &signed_pac);
345 krb5_pac_free(context, pac);
350 * Only re-sign PAC if we could verify it with the PAC
352 * a PAC from cross realm from a Windows domain an
    [all...]
  /src/external/bsd/wpa/dist/src/eap_common/
eap_fast_common.h 21 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field
23 * in the general PAC TLV format (Section 4.2).
55 /* RFC 5422: 4.2.6 PAC-Type TLV */
58 /* User Authorization PAC */
61 /* Machine Authentication PAC */
88 u8 *pac; member in struct:eap_fast_tlv_parse
eap_teap_common.h 25 * RFC 7170: Section 4.2.12.1 - Formats for PAC Attributes
95 /* PAC TLV with PAC-Acknowledgement TLV attribute */
124 /* RFC 7170: 4.2.12.6 PAC-Type TLV */
191 u8 *pac; member in struct:eap_teap_tlv_parse
  /src/external/gpl3/gcc/dist/libgcc/config/arm/
pr-support.c 132 _uw pac; local
138 _UVRSD_UINT32, &pac);
140 ("autg %0, %1, %2" : : "r"(pac), "r"(lr), "r"(sp) :);
257 /* Pop PAC off the stack into VRS pseudo.pac. */
269 /* Use current VSP as modifier in PAC validation. */
unwind-arm.c 67 /* Holds value of pseudo registers eg. PAC. */
70 _uw pac; member in struct:pseudo_regs
87 /* Armv8.1-M Mainline PAC/AUTH values. This field should be in the same field
111 struct pseudo_regs pac; member in struct:__anon14225
189 *(_uw *) valuep = vrs->pseudo.pac;
224 vrs->pseudo.pac = *(_uw *) valuep;
272 vrs->pseudo.pac = *(ptr++);
  /src/sys/dev/pci/
viaide.c 988 struct pci_attach_args pac, *pa = &pac; local
990 pac = *cpa;
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
ntlm.h 124 gss_buffer_desc pac; member in struct:__anon817
  /src/external/bsd/jemalloc/dist/src/
pac.c 4 #include "jemalloc/internal/pac.h"
19 pac_decay_data_get(pac_t *pac, extent_state_t state,
23 *r_decay = &pac->decay_dirty;
24 *r_decay_stats = &pac->stats->decay_dirty;
25 *r_ecache = &pac->ecache_dirty;
28 *r_decay = &pac->decay_muzzy;
29 *r_decay_stats = &pac->stats->decay_muzzy;
30 *r_ecache = &pac->ecache_muzzy;
38 pac_init(tsdn_t *tsdn, pac_t *pac, base_t *base, emap_t *emap,
49 if (ecache_init(tsdn, &pac->ecache_dirty, extent_state_dirty, ind
167 pac_t *pac = (pac_t *)self; local
193 pac_t *pac = (pac_t *)self; local
231 pac_t *pac = (pac_t *)self; local
253 pac_t *pac = (pac_t *)self; local
298 pac_t *pac = (pac_t *)self; local
    [all...]
arena.c 98 size_t pac_mapped_sz = pac_mapped(&arena->pa_shard.pac);
209 &arena->pa_shard.pac.decay_dirty, 0);
220 if (decay_immediately(&arena->pa_shard.pac.decay_dirty)) {
427 pac_decay_all(tsdn, &arena->pa_shard.pac, decay, decay_stats,
439 bool epoch_advanced = pac_maybe_decay_purge(tsdn, &arena->pa_shard.pac,
459 return arena_decay_impl(tsdn, arena, &arena->pa_shard.pac.decay_dirty,
460 &arena->pa_shard.pac.stats->decay_dirty,
461 &arena->pa_shard.pac.ecache_dirty, is_background_thread, all);
470 return arena_decay_impl(tsdn, arena, &arena->pa_shard.pac.decay_muzzy,
471 &arena->pa_shard.pac.stats->decay_muzzy
783 pac_t *pac = &arena->pa_shard.pac; local
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_fast_pac.c 2 * EAP peer method: EAP-FAST PAC file processing
16 /* TODO: encrypt PAC-Key in the PAC file */
21 "wpa_supplicant EAP-FAST PAC file - version 1";
30 * Sequence of PAC entries:
31 * 2-octet PAC-Type (big endian)
32 * 32-octet PAC-Key
33 * 2-octet PAC-Opaque length (big endian)
34 * <variable len> PAC-Opaque data (length bytes)
35 * 2-octet PAC-Info length (big endian
73 struct eap_fast_pac *pac = pac_root; local
90 struct eap_fast_pac *pac, *prev; local
142 struct eap_fast_pac *pac; local
415 struct eap_fast_pac *pac = NULL; local
621 struct eap_fast_pac *pac; local
672 struct eap_fast_pac *pac, *prev; local
754 struct eap_fast_pac *pac, *prev; local
875 struct eap_fast_pac *pac; local
    [all...]
eap_teap_pac.c 2 * EAP peer method: EAP-TEAP PAC file processing
16 /* TODO: encrypt PAC-Key in the PAC file */
21 "wpa_supplicant EAP-TEAP PAC file - version 1";
30 * Sequence of PAC entries:
31 * 2-octet PAC-Type (big endian)
32 * 32-octet PAC-Key
33 * 2-octet PAC-Opaque length (big endian)
34 * <variable len> PAC-Opaque data (length bytes)
35 * 2-octet PAC-Info length (big endian
73 struct eap_teap_pac *pac = pac_root; local
90 struct eap_teap_pac *pac, *prev; local
142 struct eap_teap_pac *pac; local
416 struct eap_teap_pac *pac = NULL; local
625 struct eap_teap_pac *pac; local
676 struct eap_teap_pac *pac, *prev; local
758 struct eap_teap_pac *pac, *prev; local
879 struct eap_teap_pac *pac; local
    [all...]
eap_fast.c 49 int provisioning_allowed; /* Allowed PAC provisioning modes */
50 int provisioning; /* doing PAC provisioning (not the normal auth) */
61 struct eap_fast_pac *pac; member in struct:eap_fast_data
90 "new PAC-Key");
100 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
124 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
133 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
140 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
199 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured");
205 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0)
233 struct eap_fast_pac *pac, *prev; local
741 struct eap_tlv_hdr *pac; local
    [all...]
eap_teap.c 48 int provisioning_allowed; /* Allowed PAC provisioning modes */
49 int provisioning; /* doing PAC provisioning (not the normal auth) */
61 struct eap_teap_pac *pac; member in struct:eap_teap_data
93 "EAP-TEAP: Try to provision a new PAC-Key");
104 "EAP-TEAP: No PAC-Key available for using SessionTicket");
109 /* EAP-TEAP uses PAC-Key as the TLS master_secret */
128 "EAP-TEAP: Automatic PAC provisioning mode: %d",
137 wpa_printf(MSG_DEBUG, "EAP-TEAP: Maximum PAC list length: %lu",
144 "EAP-TEAP: Using binary format for PAC list");
173 /* Prevent PAC provisioning without mutual authenticatio
255 struct eap_teap_pac *pac, *prev; local
1215 struct teap_tlv_hdr *pac; local
    [all...]
  /src/external/gpl3/gcc/dist/gcc/config/arm/
arm-c.cc 249 unsigned int pac = 1; local
252 pac |= 0x4;
254 builtin_define_with_int_value ("__ARM_FEATURE_PAC_DEFAULT", pac);
  /src/external/bsd/ipf/dist/tools/
ipmon.c 1044 const void *pac; local
1070 pac = (const char *)buf + sizeof(*ipl) + sizeof(ipf);
1071 memcpy(&ip, pac, sizeof(ip));
1185 memcpy(&ip6, pac, sizeof(ip6));
1190 ehp = (const char *)pac + hl;
1222 memcpy(&tp, (const char *)pac + hl, sizeof(tp));
1256 memcpy(&ic, (const char *)pac + hl, sizeof(ic));
1264 memcpy(&ic, (const char *)pac + hl, sizeof(ic));
1275 const void *ipcp = (const char *)pac + 2 * hl + offsetof(struct icmp, icmp_ip);
1437 dumphex(conf->log, ipmonopts, (char *)pac,
    [all...]
  /src/external/bsd/libarchive/dist/libarchive/
archive_write_set_format_mtree.c 601 struct attr_counter *pac; local
607 for (pac = ac->prev; pac; pac = pac->prev) {
608 if (pac->count >= ac->count)
614 if (pac != NULL) {
615 ac->prev = pac;
616 ac->next = pac->next;
617 pac->next = ac
    [all...]

Completed in 53 milliseconds