| /freebsd/contrib/bmake/unit-tests/ |
| H A D | sh-flags.exp | 2 opt-______-tgt-___-cmd-___ 6 opt-______-tgt-___-cmd-__s 9 opt-______-tgt-___-cmd-_i_ 14 opt-______-tgt-___-cmd-_is 18 opt-______-tgt-___-cmd-a__ 22 opt-______-tgt-___-cmd-a_s 25 opt-______-tgt-___-cmd-ai_ 30 opt-______-tgt-___-cmd-ais 34 opt-______-tgt-__s-cmd-___ 37 opt-______-tgt-__s-cmd-__s [all …]
|
| H A D | sh-flags.mk | 25 tgt-always.yes= .MAKE 26 tgt-ignerr.yes= .IGNORE 27 tgt-silent.yes= .SILENT 90 .for tgt-always in no yes 91 .for tgt-ignerr in no yes 92 .for tgt-silent in no yes 97 target= ${OPT_TARGET}-tgt- 98 target+= ${letter.always.${tgt-always}:U_} 99 target+= ${letter.ignerr.${tgt-ignerr}:U_} 100 target+= ${letter.silent.${tgt-silent}:U_} [all …]
|
| H A D | deptgt-suffixes.exp | 7 # To: .tgt-right 10 # ".tgt-right" (num 3, ref 2) 14 # ".tgt-left" (num 4, ref 2) 19 # To: .tgt-left 23 .src-left.tgt-right: 26 .src-right.tgt-left: 31 : Making deptgt-suffixes.tgt-right from deptgt-suffixes.src-left. 33 : Making deptgt-suffixes.tgt-left from deptgt-suffixes.src-right.
|
| H A D | deptgt-suffixes.mk | 22 .SUFFIXES: .src-left .tgt-right 25 .src-left.tgt-right: 27 all: deptgt-suffixes.tgt-right 30 .SUFFIXES: .tgt-left .src-right 33 .src-right.tgt-left: 35 all: deptgt-suffixes.tgt-left
|
| /freebsd/usr.sbin/ppp/ |
| H A D | ua.h | 31 # define ua_htonl(src, tgt) (*(u_int32_t *)(tgt) = htonl(*(u_int32_t *)(src))) argument 32 # define ua_ntohl(src, tgt) (*(u_int32_t *)(tgt) = ntohl(*(u_int32_t *)(src))) argument 33 # define ua_htons(src, tgt) (*(u_int16_t *)(tgt) = htons(*(u_int16_t *)(src))) argument 34 # define ua_ntohs(src, tgt) (*(u_int16_t *)(tgt) = ntohs(*(u_int16_t *)(src))) argument 38 # define ua_htonl(src, tgt) \ argument 42 *(u_char *)(tgt) = __oh >> 24; \ 43 *((u_char *)(tgt) + 1) = (__oh >> 16) & 0xff; \ 44 *((u_char *)(tgt) + 2) = (__oh >> 8) & 0xff; \ 45 *((u_char *)(tgt) + 3) = __oh & 0xff; \ 48 # define ua_ntohl(src, tgt) \ argument [all …]
|
| H A D | filter.c | 99 ParseIcmp(int argc, char const *const *argv, struct filterent *tgt) in ParseIcmp() argument 107 tgt->f_srcop = tgt->f_dstop = OP_NONE; in ParseIcmp() 117 tgt->f_srcop = OP_EQ; in ParseIcmp() 118 tgt->f_srcport = type; in ParseIcmp() 119 tgt->f_dstop = OP_NONE; in ParseIcmp() 135 struct filterent *tgt) in ParseUdpOrTcp() argument 137 tgt->f_srcop = tgt->f_dstop = OP_NONE; in ParseUdpOrTcp() 138 tgt->f_estab = tgt->f_syn = tgt->f_finrst = 0; in ParseUdpOrTcp() 141 tgt->f_srcop = filter_Nam2Op(argv[1]); in ParseUdpOrTcp() 142 if (tgt->f_srcop == OP_NONE) { in ParseUdpOrTcp() [all …]
|
| /freebsd/contrib/elftoolchain/libelftc/ |
| H A D | elftc_bfdtarget.c | 38 Elftc_Bfd_Target *tgt; in elftc_bfd_find_target() local 40 for (tgt = _libelftc_targets; tgt->bt_name; tgt++) in elftc_bfd_find_target() 41 if (!strcmp(tgt_name, tgt->bt_name)) in elftc_bfd_find_target() 42 return (tgt); in elftc_bfd_find_target() 48 elftc_bfd_target_flavor(Elftc_Bfd_Target *tgt) in elftc_bfd_target_flavor() argument 51 return (tgt->bt_type); in elftc_bfd_target_flavor() 55 elftc_bfd_target_byteorder(Elftc_Bfd_Target *tgt) in elftc_bfd_target_byteorder() argument 58 return (tgt->bt_byteorder); in elftc_bfd_target_byteorder() 62 elftc_bfd_target_class(Elftc_Bfd_Target *tgt) in elftc_bfd_target_class() argument 65 return (tgt->bt_elfclass); in elftc_bfd_target_class() [all …]
|
| /freebsd/cddl/contrib/opensolaris/tools/ctf/cvt/ |
| H A D | iidesc.c | 75 iidesc_t *tgt = find->iif_tgt; in iidesc_cmp() local 77 if (src->ii_type != tgt->ii_type || in iidesc_cmp() 78 !streq(src->ii_name, tgt->ii_name)) in iidesc_cmp() 125 iidesc_t *tgt; in iidesc_dup() local 127 tgt = xmalloc(sizeof (iidesc_t)); in iidesc_dup() 128 bcopy(src, tgt, sizeof (iidesc_t)); in iidesc_dup() 130 tgt->ii_name = src->ii_name ? xstrdup(src->ii_name) : NULL; in iidesc_dup() 131 tgt->ii_owner = src->ii_owner ? xstrdup(src->ii_owner) : NULL; in iidesc_dup() 133 if (tgt->ii_nargs) { in iidesc_dup() 134 tgt->ii_args = xmalloc(sizeof (tdesc_t *) * tgt->ii_nargs); in iidesc_dup() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | fwd_tgt.c | 37 /* Get a TGT for use at the remote host */ 43 /* Should forwarded TGT also be forwardable? */ in krb5_fwd_tgt_creds() 49 krb5_creds creds, tgt; in krb5_fwd_tgt_creds() local 59 memset(&tgt, 0, sizeof(creds)); in krb5_fwd_tgt_creds() 104 /* fetch tgt directly from cache */ in krb5_fwd_tgt_creds() 107 &creds, &tgt); in krb5_fwd_tgt_creds() 112 /* tgt->client must be equal to creds.client */ in krb5_fwd_tgt_creds() 113 if (!krb5_principal_compare(context, tgt.client, creds.client)) { in krb5_fwd_tgt_creds() 118 if (!tgt.ticket.length) { in krb5_fwd_tgt_creds() 123 if (tgt.addresses && *tgt.addresses) { in krb5_fwd_tgt_creds() [all …]
|
| H A D | s4u_creds.c | 142 krb5_creds *tgt, in build_pa_for_user() argument 160 code = make_pa_for_user_checksum(context, &tgt->keyblock, in build_pa_for_user() 431 krb5_creds tgtq, s4u_creds, *tgt = NULL, *tgtptr; in krb5_get_self_cred_from_kdc() local 473 /* First, acquire a TGT to the user's realm. */ in krb5_get_self_cred_from_kdc() 482 code = krb5_get_credentials(context, options, ccache, &tgtq, &tgt); in krb5_get_self_cred_from_kdc() 486 tgtptr = tgt; in krb5_get_self_cred_from_kdc() 588 /* The authdata in this referral TGT will be copied into the final in krb5_get_self_cred_from_kdc() 640 krb5_free_creds(context, tgt); in krb5_get_self_cred_from_kdc() 784 /* Set *tgt_out to a local TGT for the client realm retrieved from ccache. */ 810 * fail unless the specified realm is the same as the TGT (or an alias to it). [all …]
|
| H A D | get_creds.c | 169 * 1. Get a TGT for the service principal's realm (STATE_GET_TGT). 171 * 3. In some cases, get a TGT for the fallback realm (STATE_GET_TGT again). 176 * after successfully obtaining the TGT, and the end_get_tgt() function 185 STATE_GET_TGT, /* Getting TGT for service realm */ 186 STATE_GET_TGT_OFFPATH, /* Getting TGT via off-path referrals */ 202 krb5_data start_realm; /* Realm of starting TGT in ccache */ 210 krb5_creds *cur_tgt; /* TGT to be used for next query */ 214 krb5_principal tgt_princ; /* Storage for TGT principal */ 215 krb5_creds tgt_in_creds; /* Container for TGT matching creds */ 319 /* Set up a request for a TGT for realm, using ctx->cur_tgt. */ [all …]
|
| H A D | send_tgs.c | 53 krb5_creds *tgt, krb5_keyblock *subkey, in tgs_construct_ap_req() argument 70 ret = krb5_c_make_checksum(context, 0, &tgt->keyblock, in tgs_construct_ap_req() 80 authent.client = tgt->client; in tgs_construct_ap_req() 81 authent.authorization_data = tgt->authdata; in tgs_construct_ap_req() 88 ret = krb5_encrypt_helper(context, &tgt->keyblock, in tgs_construct_ap_req() 94 ret = decode_krb5_ticket(&tgt->ticket, &ticket); in tgs_construct_ap_req() 121 krb5_creds *tgt, krb5_flags kdcoptions, in k5_make_tgs_req() argument 147 /* tgt's client principal must match the desired client principal. */ in k5_make_tgs_req() 148 if (!krb5_principal_compare(context, tgt->client, desired->client)) in k5_make_tgs_req() 151 /* tgt must be an actual credential, not a template. */ in k5_make_tgs_req() [all …]
|
| /freebsd/sys/dev/mpt/ |
| H A D | mpt_cam.c | 1011 " Port Page 2 Tgt %d: timo %x SF %x Flags %x\n", in mpt_read_config_info_spi() 1647 mpt_tgt_state_t *tgt = MPT_TGT_STATE(mpt, cmd_req); in mpt_execute_req_a64() local 1650 csio->scsi_status == SCSI_STATUS_OK && tgt->resid == 0) { in mpt_execute_req_a64() 1651 tgt->state = TGT_STATE_MOVING_DATA_AND_STATUS; in mpt_execute_req_a64() 1653 tgt->state = TGT_STATE_MOVING_DATA; in mpt_execute_req_a64() 1656 tgt->state = TGT_STATE_MOVING_DATA; in mpt_execute_req_a64() 2019 mpt_tgt_state_t *tgt = MPT_TGT_STATE(mpt, cmd_req); in mpt_execute_req() local 2022 csio->scsi_status == SCSI_STATUS_OK && tgt->resid == 0) { in mpt_execute_req() 2023 tgt->state = TGT_STATE_MOVING_DATA_AND_STATUS; in mpt_execute_req() 2025 tgt->state = TGT_STATE_MOVING_DATA; in mpt_execute_req() [all …]
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/acl/ |
| H A D | acl_common.kshlib | 73 function compare_acls #<src> <tgt> 76 typeset tgt=$2 78 (( ${#src} == 0 || ${#tgt} == 0 )) && return 1 79 [[ $src == $tgt ]] && return 0 82 typeset tmptgt=$TEST_BASE_DIR/compare_acls.tgt.$$ 85 get_acl $tgt > $tmptgt 96 get_compact_acl $tgt > $tmptgt 111 function compare_xattrs #<src> <tgt> 114 typeset tgt=$2 116 (( ${#src} == 0 || ${#tgt} == 0 )) && return 1 [all …]
|
| /freebsd/contrib/libarchive/libarchive/ |
| H A D | archive_write_set_format_warc.c | 111 static int _gen_uuid(warc_uuid_t *tgt); 355 _popul_ehdr(struct archive_string *tgt, size_t tsz, warc_essential_hdr_t hdr) in _popul_ehdr() 368 archive_strcpy(tgt, _ver); in _popul_ehdr() 370 archive_string_sprintf(tgt, "WARC-Type: %s\r\n", _typ[hdr.type]); in _popul_ehdr() 386 archive_string_sprintf(tgt, in _popul_ehdr() 392 xstrftime(tgt, "WARC-Date: %Y-%m-%dT%H:%M:%SZ\r\n", hdr.rtime); in _popul_ehdr() 395 xstrftime(tgt, "Last-Modified: %Y-%m-%dT%H:%M:%SZ\r\n", hdr.mtime); in _popul_ehdr() 420 archive_string_sprintf(tgt, "WARC-Record-ID: %s\r\n", hdr.recid); in _popul_ehdr() 423 archive_string_sprintf(tgt, "Content-Type: %s\r\n", hdr.cnttyp); in _popul_ehdr() 427 archive_string_sprintf(tgt, "Conten in _popul_ehdr() 353 _popul_ehdr(struct archive_string * tgt,size_t tsz,warc_essential_hdr_t hdr) _popul_ehdr() argument 433 _gen_uuid(warc_uuid_t * tgt) _gen_uuid() argument [all...] |
| /freebsd/tests/sys/cddl/zfs/tests/acl/ |
| H A D | acl_common.kshlib | 91 function compare_acls #<src> <tgt> 94 typeset tgt=$2 96 (( ${#src} == 0 || ${#tgt} == 0 )) && return 1 97 [[ $src == $tgt ]] && return 0 100 typeset tmptgt=$TMPDIR/compare_acls.tgt.${TESTCASE_ID} 103 get_acl $tgt > $tmptgt 114 get_compact_acl $tgt > $tmptgt 129 function compare_modes #<src> <tgt> 132 typeset tgt=$2 136 (( ${#src} == 0 || ${#tgt} == 0 )) && return 1 [all …]
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | cammac.c | 51 * verifier. tgt_key must be the decrypted first key data entry in tgt. Set 57 krb5_keyblock *server_key, krb5_db_entry *tgt, in cammac_create() argument 83 kdc_verifier.kvno = current_kvno(tgt); in cammac_create() 130 * Return true if cammac's KDC verifier is valid for enc_tkt, using tgt to 131 * retrieve the TGT key indicated by the verifier. tgt_key must be the 132 * decrypted first key data entry in tgt. 136 krb5_enc_tkt_part *enc_tkt, krb5_db_entry *tgt, in cammac_check_kdcver() argument 152 if (ver->kvno == current_kvno(tgt)) { in cammac_check_kdcver() 155 if (krb5_dbe_find_enctype(context, tgt, -1, -1, ver->kvno, &kd) != 0) in cammac_check_kdcver()
|
| H A D | tgs_policy.c | 67 "TGT NOT FORWARDABLE", KRB5KDC_ERR_BADOPTION }, 69 "TGT NOT PROXIABLE", KRB5KDC_ERR_BADOPTION }, 71 "TGT NOT POSTDATABLE", KRB5KDC_ERR_BADOPTION }, 159 *status = "TGT BASED NOT ALLOWED"; in check_tgs_svc_deny_all() 167 * A service principal can require certain TGT flags. 288 * (1) local TGT, local user, local server in check_tgs_s4u2self() 289 * (2) cross TGT, local user, issuing referral in check_tgs_s4u2self() 290 * (3) cross TGT, non-local user, issuing referral in check_tgs_s4u2self() 291 * (4) cross TGT, non-local user, local server in check_tgs_s4u2self() 305 /* A local server should not need a cross-realm TGT to impersonate in check_tgs_s4u2self() [all …]
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | krb5tgs.c | 376 KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) in check_tgs_flags() argument 381 if(!tgt->flags.invalid || tgt->starttime == NULL){ in check_tgs_flags() 386 if(*tgt->starttime > kdc_time){ in check_tgs_flags() 391 /* XXX tkt = tgt */ in check_tgs_flags() 393 }else if(tgt->flags.invalid){ in check_tgs_flags() 400 if(!tgt->flags.forwardable){ in check_tgs_flags() 408 if(!tgt->flags.forwardable){ in check_tgs_flags() 416 if(tgt->flags.forwarded) in check_tgs_flags() 420 if(!tgt->flags.proxiable){ in check_tgs_flags() 428 if(!tgt->flags.proxiable){ in check_tgs_flags() [all …]
|
| /freebsd/sbin/routed/ |
| H A D | parms.c | 460 get_passwd(char *tgt, in get_passwd() argument 489 return tgt; in get_passwd() 531 return tgt; in get_passwd() 554 #define PARS(str) (!strcasecmp(tgt, str)) in parse_parms() 555 #define PARSEQ(str) (!strncasecmp(tgt, str"=", sizeof(str))) in parse_parms() 563 char delim, *val0 = NULL, *tgt, *val, *p; in parse_parms() local 627 tgt = line + strspn(line, " ,\n\r"); in parse_parms() 628 if (*tgt == '\0' || *tgt == '#') in parse_parms() 630 line = tgt+strcspn(tgt, "= #,\n\r"); in parse_parms() 636 return bad_str(tgt); in parse_parms() [all …]
|
| /freebsd/crypto/krb5/src/clients/ksu/ |
| H A D | krb_auth_su.c | 42 krb5_creds tgt = { 0 }, tgtq = { 0 }; in krb5_auth_check() local 63 com_err(prog_name, retval, _("while creating tgt for local realm")); in krb5_auth_check() 67 if (auth_debug){ dump_principal(context, "local tgt principal name", tgtq.server ); } in krb5_auth_check() 70 &tgtq, &tgt); in krb5_auth_check() 72 if (! retval) retval = krb5_check_exp(context, tgt.times); in krb5_auth_check() 100 &tgt) == FALSE) { in krb5_auth_check() 123 retval = krb5_verify_init_creds(context, &tgt, NULL, NULL, NULL, in krb5_auth_check() 134 krb5_free_cred_contents(context, &tgt); in krb5_auth_check()
|
| /freebsd/crypto/openssl/crypto/cmp/ |
| H A D | cmp_util.c | 242 int ossl_cmp_asn1_octet_string_set1(ASN1_OCTET_STRING **tgt, in ossl_cmp_asn1_octet_string_set1() argument 247 if (tgt == NULL) { in ossl_cmp_asn1_octet_string_set1() 251 if (*tgt == src) /* self-assignment */ in ossl_cmp_asn1_octet_string_set1() 261 ASN1_OCTET_STRING_free(*tgt); in ossl_cmp_asn1_octet_string_set1() 262 *tgt = new; in ossl_cmp_asn1_octet_string_set1() 266 int ossl_cmp_asn1_octet_string_set1_bytes(ASN1_OCTET_STRING **tgt, in ossl_cmp_asn1_octet_string_set1_bytes() argument 271 if (tgt == NULL) { in ossl_cmp_asn1_octet_string_set1_bytes() 283 ASN1_OCTET_STRING_free(*tgt); in ossl_cmp_asn1_octet_string_set1_bytes() 284 *tgt = new; in ossl_cmp_asn1_octet_string_set1_bytes()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | get_cred.c | 745 krb5_creds *tgt, tmp_creds; in get_cred_kdc_capath_worker() local 809 NULL, NULL, &tgt, ret_tgts); in get_cred_kdc_capath_worker() 819 if (ok_as_delegate == 0 || tgt->flags.b.ok_as_delegate == 0) { in get_cred_kdc_capath_worker() 821 tgt->flags.b.ok_as_delegate = 0; in get_cred_kdc_capath_worker() 824 ret = add_cred(context, tgt, ret_tgts); in get_cred_kdc_capath_worker() 830 tgt_inst = tgt->server->name.name_string.val[1]; in get_cred_kdc_capath_worker() 842 ret = krb5_free_creds(context, tgt); in get_cred_kdc_capath_worker() 858 in_creds, tgt, impersonate_principal, in get_cred_kdc_capath_worker() 865 krb5_free_creds(context, tgt); in get_cred_kdc_capath_worker() 873 tgt = cc_get_cred(krbtgt/server_realm@any_realm) [all …]
|
| /freebsd/crypto/openssl/doc/internal/man3/ |
| H A D | ossl_cmp_asn1_octet_string_set1.pod | 13 int ossl_cmp_asn1_octet_string_set1(ASN1_OCTET_STRING **tgt, 15 int ossl_cmp_asn1_octet_string_set1_bytes(ASN1_OCTET_STRING **tgt, 21 referenced via the I<tgt> argument and assigns either a copy of 25 referenced via the I<tgt> argument and assigns either a copy of the given byte
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | k5-trace.h | 201 TRACE(c, "Getting initial TGT with changed password") 458 TRACE(c, "Received TGT for {data}; advancing current realm", realm) 459 #define TRACE_TKT_CREDS_CACHED_INTERMEDIATE_TGT(c, tgt) \ argument 460 TRACE(c, "Found cached TGT for intermediate realm: {creds}", tgt) 461 #define TRACE_TKT_CREDS_CACHED_SERVICE_TGT(c, tgt) \ argument 462 TRACE(c, "Found cached TGT for service realm: {creds}", tgt) 470 #define TRACE_TKT_CREDS_LOCAL_TGT(c, tgt) \ argument 471 TRACE(c, "Starting with TGT for client realm: {creds}", tgt) 473 TRACE(c, "Received non-TGT referral response ({princ}); trying " \ 476 TRACE(c, "Received TGT for offpath realm {data}", realm) [all …]
|