| /minix3/crypto/external/bsd/libsaslc/dist/src/ |
| H A D | xsess.c | 234 saslc_sess_t *sess; in saslc_sess_init() local 238 if ((sess = calloc(1, sizeof(*sess))) == NULL) { in saslc_sess_init() 244 if ((sess->mech = saslc__sess_choose_mech(ctx, mechs, sec_opts)) in saslc_sess_init() 249 m = saslc__mech_list_get(ctx->mechanisms, sess->mech->name); in saslc_sess_init() 257 if (sess->mech->create(sess) == -1) in saslc_sess_init() 261 if ((sess->prop = saslc__dict_create()) == NULL) { in saslc_sess_init() 266 sess->context = ctx; in saslc_sess_init() 269 saslc__msg_dbg("mechanism: %s\n", saslc_sess_getmech(sess)); in saslc_sess_init() 271 return sess; in saslc_sess_init() 273 free(sess); in saslc_sess_init() [all …]
|
| H A D | mech_gssapi.c | 95 saslc__mech_gssapi_create(saslc_sess_t *sess) in saslc__mech_gssapi_create() argument 99 c = sess->mech_sess = calloc(1, sizeof(*c)); in saslc__mech_gssapi_create() 103 sess->mech_sess = c; in saslc__mech_gssapi_create() 119 saslc__mech_gssapi_destroy(saslc_sess_t *sess) in saslc__mech_gssapi_destroy() argument 124 ms = sess->mech_sess; in saslc__mech_gssapi_destroy() 136 sess->mech_sess = NULL; in saslc__mech_gssapi_destroy() 193 saslc__mech_gssapi_set_err(saslc_sess_t *sess, int err, OM_uint32 maj_s, OM_uint32 min_s) in saslc__mech_gssapi_set_err() argument 196 saslc__error_set(ERR(sess), err, in saslc__mech_gssapi_set_err() 210 prep_output(saslc_sess_t *sess, gss_buffer_t outbuf, void **out, size_t *outlen) in prep_output() argument 229 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in prep_output() [all …]
|
| H A D | mech_digestmd5.c | 207 saslc_sess_t *sess; /* session: for error setting */ member 722 saslc__mech_digestmd5_digesturi(saslc_sess_t *sess, const char *serv_host) in saslc__mech_digestmd5_digesturi() argument 730 serv_type = saslc_sess_getprop(sess, SASLC_DIGESTMD5_SERVICE); in saslc__mech_digestmd5_digesturi() 732 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_digestmd5_digesturi() 736 serv_list = saslc_sess_getprop(sess, SASLC_DIGESTMD5_SERVNAME); in saslc__mech_digestmd5_digesturi() 769 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__mech_digestmd5_digesturi() 859 choose_realm(saslc_sess_t *sess, const char *hostname, list_t *realms) in choose_realm() argument 874 user_realms = saslc_sess_getprop(sess, SASLC_DIGESTMD5_REALM); in choose_realm() 887 saslc__error_set(ERR(sess), ERROR_MECH, in choose_realm() 895 saslc__error_set(ERR(sess), ERROR_MECH, in choose_realm() [all …]
|
| H A D | mech_plain.c | 73 saslc__mech_plain_cont(saslc_sess_t *sess, const void *in __unused, in saslc__mech_plain_cont() argument 80 authzid = saslc_sess_getprop(sess, SASLC_PLAIN_AUTHZID); in saslc__mech_plain_cont() 82 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_plain_cont() 87 if ((authcid = saslc_sess_getprop(sess, SASLC_PLAIN_AUTHCID)) in saslc__mech_plain_cont() 89 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_plain_cont() 94 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_plain_cont() 99 if ((passwd = saslc_sess_getprop(sess, SASLC_PLAIN_PASSWD)) in saslc__mech_plain_cont() 101 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_plain_cont() 106 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_plain_cont() 114 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__mech_plain_cont()
|
| H A D | buffer.c | 58 saslc_sess_t *sess; /* session pointer (for error messages) */ member 82 saslc_sess_t *sess; /* session pointer (for error messages) */ member 117 saslc__buffer_create(saslc_sess_t *sess, size_t maxbuf) in saslc__buffer_create() argument 125 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__buffer_create() 132 ctx->sess = sess; in saslc__buffer_create() 181 saslc__error_set(ERR(ctx->sess), ERROR_MECH, "buffer coding error"); in saslc__buffer_fetch() 217 saslc__buffer32_create(saslc_sess_t *sess, size_t maxbuf) in saslc__buffer32_create() argument 225 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__buffer32_create() 232 ctx->sess = sess; in saslc__buffer32_create() 256 saslc__error_set(ERR(ctx->sess), ERROR_BADARG, in saslc__buffer32_fetch() [all …]
|
| H A D | mech.c | 179 saslc__mech_strdup(saslc_sess_t *sess, char **out, size_t *outlen, in saslc__mech_strdup() argument 185 if ((value = saslc_sess_getprop(sess, name)) == NULL) { in saslc__mech_strdup() 186 saslc__error_set(ERR(sess), ERROR_MECH, error_msg); in saslc__mech_strdup() 193 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__mech_strdup() 208 saslc__mech_generic_create(saslc_sess_t *sess) in saslc__mech_generic_create() argument 213 saslc__error_set(ERR(sess), ERROR_NOMEM, NULL); in saslc__mech_generic_create() 216 sess->mech_sess = ms; in saslc__mech_generic_create() 226 saslc__mech_generic_destroy(saslc_sess_t *sess) in saslc__mech_generic_destroy() argument 229 free(sess->mech_sess); in saslc__mech_generic_destroy() 230 sess->mech_sess = NULL; in saslc__mech_generic_destroy()
|
| H A D | mech_crammd5.c | 70 saslc__mech_crammd5_cont(saslc_sess_t *sess, const void *in, size_t inlen, in saslc__mech_crammd5_cont() argument 83 if ((authcid = saslc_sess_getprop(sess, SASLC_CRAMMD5_AUTHCID)) in saslc__mech_crammd5_cont() 85 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_crammd5_cont() 89 if ((passwd = saslc_sess_getprop(sess, SASLC_CRAMMD5_PASSWD)) in saslc__mech_crammd5_cont() 91 saslc__error_set(ERR(sess), ERROR_MECH, in saslc__mech_crammd5_cont() 98 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__mech_crammd5_cont() 102 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); in saslc__mech_crammd5_cont()
|
| H A D | mech_login.c | 68 saslc__mech_login_cont(saslc_sess_t *sess, const void *in __unused, in saslc__mech_login_cont() argument 71 saslc__mech_sess_t *ms = sess->mech_sess; in saslc__mech_login_cont() 75 if (saslc__mech_strdup(sess, (char **)out, outlen, in saslc__mech_login_cont() 82 return saslc__mech_strdup(sess, (char **)out, outlen, in saslc__mech_login_cont()
|
| H A D | mech_external.c | 64 saslc__mech_external_cont(saslc_sess_t *sess, const void *in, size_t inlen, in saslc__mech_external_cont() argument 68 return saslc__mech_strdup(sess, (char **)out, outlen, in saslc__mech_external_cont()
|
| H A D | mech_anonymous.c | 68 saslc__mech_anonymous_cont(saslc_sess_t *sess, const void *in, size_t inlen, in saslc__mech_anonymous_cont() argument 72 return saslc__mech_strdup(sess, (char **)out, outlen, in saslc__mech_anonymous_cont()
|
| /minix3/crypto/external/bsd/libsaslc/dist/test/ |
| H A D | t_session.c | 53 saslc_sess_t *sess; in ATF_TC_BODY() local 57 ATF_CHECK(sess = saslc_sess_init(ctx, "PLAIN", NULL)); in ATF_TC_BODY() 58 if (sess != NULL) in ATF_TC_BODY() 59 saslc_sess_end(sess); in ATF_TC_BODY() 60 ATF_CHECK_EQ(sess = saslc_sess_init(ctx, "", NULL), NULL); in ATF_TC_BODY() 61 ATF_CHECK(sess = saslc_sess_init(ctx, "NOTEXISTS,LOGIN", NULL)); in ATF_TC_BODY() 62 if (sess != NULL) in ATF_TC_BODY() 63 saslc_sess_end(sess); in ATF_TC_BODY() 64 ATF_CHECK(sess = saslc_sess_init(ctx, "LOGIN,NOTEXISTS", NULL)); in ATF_TC_BODY() 65 if (sess != NULL) in ATF_TC_BODY() [all …]
|
| H A D | t_parser.c | 94 saslc_sess_t *sess; in ATF_TC_BODY() local 99 ATF_REQUIRE((sess = saslc_sess_init(ctx, "ANONYMOUS", NULL))); in ATF_TC_BODY() 100 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST")); in ATF_TC_BODY() 102 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST2")); in ATF_TC_BODY() 104 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST3")); in ATF_TC_BODY() 106 ATF_REQUIRE(val = saslc_sess_getprop(sess, "ID")); in ATF_TC_BODY() 108 saslc_sess_end(sess); in ATF_TC_BODY()
|
| H A D | example_client.c | 87 saslc_sess_t *sess; in main() local 124 if ((sess = saslc_sess_init(ctx, mechanism, NULL)) == NULL) in main() 141 if (saslc_sess_setprop(sess, option, var) < 0) in main() 151 cont = saslc_sess_cont(sess, input, input_len, (void **)&output, in main() 160 saslc_sess_end(sess); in main() 170 errx(EXIT_FAILURE, "%s", saslc_sess_strerror(sess)); in main()
|
| /minix3/crypto/external/bsd/libsaslc/dist/doc/ |
| H A D | library.txt | 35 int saslc_sess_setprop(saslc_sess_t *sess, const char *name, 38 on failure. In case of a failure sess errno is set. 40 NOTE: Property is added to the sess->prop dictionary. 43 const char *saslc_sess_getprop(saslc_sess_t *sess, const char *name); - 45 value on success and NULL on failure. In case of a failure sess errno is 48 NOTE: Property is taken from the sess->prop dictionary, if property not exist 49 then sess->context->prop is used with added sess->mech->name."-" prefix. 51 int saslc_sess_cont(saslc_sess_t *sess, const char *in, size_t inlen, 56 failure. In case of a failure sess errno is set. 59 IMPLEMENTATION: sess->mech->cont(sess, in, inlen, out, outlen) [all …]
|
| /minix3/crypto/external/bsd/openssl/dist/crypto/engine/ |
| H A D | eng_cryptodev.c | 280 struct session_op sess; in get_cryptodev_ciphers() local 287 memset(&sess, 0, sizeof(sess)); in get_cryptodev_ciphers() 288 sess.key = (void *) "123456789abcdefghijklmno"; in get_cryptodev_ciphers() 293 sess.cipher = ciphers[i].id; in get_cryptodev_ciphers() 294 sess.keylen = ciphers[i].keylen; in get_cryptodev_ciphers() 295 sess.mac = 0; in get_cryptodev_ciphers() 296 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && in get_cryptodev_ciphers() 297 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) in get_cryptodev_ciphers() 319 struct session_op sess; in get_cryptodev_digests() local 326 memset(&sess, 0, sizeof(sess)); in get_cryptodev_digests() [all …]
|
| /minix3/crypto/external/bsd/openssl/dist/crypto/evp/ |
| H A D | openbsd_hw.c | 269 session_op sess; 277 if (!dev_crypto_init(&md_data->sess)) 283 md_data->sess.mac = mac; 285 if (ioctl(fd, CIOCGSESSION, &md_data->sess) == -1) { 294 if (ioctl(fd, CIOCFSESSION, &md_data->sess.ses) == -1) { 364 return do_digest(md_data->sess.ses, md_data->md, data, len); 382 ret = do_digest(md_data->sess.ses, md, md_data->data, md_data->len);
|
| /minix3/crypto/external/bsd/openssl/dist/doc/ssl/ |
| H A D | SSL_CTX_sess_set_get_cb.pod | 18 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl, SSL_SESSION *sess); 19 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx, SSL_SESSION *sess); 22 int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess); 23 void (*remove_session_cb)(struct ssl_ctx_st *ctx, SSL_SESSION *sess); 59 B<sess>. If the callback returns B<0>, the session will be immediately 67 the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
|
| H A D | d2i_SSL_SESSION.pod | 56 i = i2d_SSL_SESSION(sess, NULL); 58 j = i2d_SSL_SESSION(sess, &temp);
|
| /minix3/crypto/external/bsd/openssl/dist/ssl/ |
| H A D | s2_clnt.c | 602 SSL_SESSION *sess; in client_master_key() local 615 sess = s->session; in client_master_key() 620 i = ssl_put_cipher_by_char(s, sess->cipher, p); in client_master_key() 625 sess->key_arg_length = i; in client_master_key() 632 if (RAND_pseudo_bytes(sess->key_arg, i) <= 0) in client_master_key() 637 sess->master_key_length = i; in client_master_key() 639 if (i > (int)sizeof(sess->master_key)) { in client_master_key() 644 if (RAND_bytes(sess->master_key, i) <= 0) { in client_master_key() 650 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) in client_master_key() 652 else if (SSL_C_IS_EXPORT(sess->cipher)) in client_master_key() [all …]
|
| H A D | ssl_sess.c | 159 SSL_SESSION *sess; in SSL_get1_session() local 166 sess = ssl->session; in SSL_get1_session() 167 if (sess) in SSL_get1_session() 168 sess->references++; in SSL_get1_session() 170 return (sess); in SSL_get1_session() 1214 SSL_SESSION *sess)) in SSL_CTX_sess_set_new_cb() argument 1219 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx)) (SSL *ssl, SSL_SESSION *sess) { in SSL_CTX_sess_get_new_cb() 1224 void (*cb) (SSL_CTX *ctx, SSL_SESSION *sess)) in SSL_CTX_sess_set_remove_cb() argument 1230 SSL_SESSION *sess) { in SSL_CTX_sess_get_remove_cb()
|
| /minix3/usr.bin/who/ |
| H A D | who.c | 74 uint16_t term, uint16_t xit, uint16_t sess, uint16_t type); 275 ep->term, ep->exit, ep->sess, ep->type); in eprint() 280 pid_t pid, uint16_t term, uint16_t xit, uint16_t sess, uint16_t type) in print() argument 336 (void)printf(" sess=%d", sess); in print()
|
| H A D | utmpentry.h | 55 uint16_t sess; member
|
| H A D | utmpentry.c | 295 e->sess = 0; in getentry() 325 e->sess = up->ut_session; in getentryx()
|
| /minix3/sys/fs/cd9660/ |
| H A D | cd9660_vfsops.c | 351 int sess = 0; in iso_mountfs() local 371 sess = label.d_partitions[DISKPART(dev)].p_cdsession; in iso_mountfs() 374 error = VOP_IOCTL(devvp, CDIOREADMSADDR, &sess, 0, FSCRED); in iso_mountfs() 376 sess = 0; /* never mind */ in iso_mountfs() 379 printf("isofs: session offset (part %"PRId32") %d\n", DISKPART(dev), sess); in iso_mountfs() 383 if ((error = bread(devvp, (iso_blknum+sess) * btodb(iso_bsize), in iso_mountfs() 436 isomp->volume_space_size += sess; in iso_mountfs()
|
| /minix3/lib/libkvm/ |
| H A D | kvm_proc.c | 333 struct session sess; in kvm_proclist() local 386 if (KREAD(kd, (u_long)pgrp.pg_session, &sess)) { in kvm_proclist() 391 if ((proc.p_lflag & PL_CONTROLT) && sess.s_ttyp != NULL) { in kvm_proclist() 392 if (KREAD(kd, (u_long)sess.s_ttyp, &tty)) { in kvm_proclist() 394 "can't read tty at %p", sess.s_ttyp); in kvm_proclist() 411 eproc.e_flag = sess.s_ttyvp ? EPROC_CTTY : 0; in kvm_proclist() 412 eproc.e_sid = sess.s_sid; in kvm_proclist() 413 if (sess.s_leader == p) in kvm_proclist()
|