/freebsd/sys/fs/tarfs/ |
H A D | tarfs_vfsops.c | 349 TARFS_DPF(ALLOC, "%s: creating %.*s\n", __func__, in tarfs_lookup_path() 407 TARFS_DPF(ALLOC, "%s: Freeing mount structure %p\n", __func__, tmp); in tarfs_free_mount() 409 TARFS_DPF(ALLOC, "%s: freeing tarfs_node structures\n", __func__); in tarfs_free_mount() 416 TARFS_DPF(ALLOC, "%s: deleting unr header\n", __func__); in tarfs_free_mount() 421 TARFS_DPF(ALLOC, "%s: freeing structure\n", __func__); in tarfs_free_mount() 491 TARFS_DPF(ALLOC, "%s: GNU tar format at %zu\n", __func__, in tarfs_alloc_one() 496 TARFS_DPF(ALLOC, "%s: unsupported TAR format at %zu\n", in tarfs_alloc_one() 504 TARFS_DPF(ALLOC, "%s: header checksum failed at %zu\n", in tarfs_alloc_one() 513 TARFS_DPF(ALLOC, "%s: invalid file mode at %zu\n", in tarfs_alloc_one() 521 TARFS_DPF(ALLOC, "%s: invalid UID at %zu\n", in tarfs_alloc_one() [all …]
|
H A D | tarfs_io.c | 238 TARFS_DPF(ALLOC, "%s: resized zio index\n", __func__); in tarfs_zio_update_index() 620 TARFS_DPF(ALLOC, "%s: allocated zio\n", __func__); in tarfs_zio_init() 630 TARFS_DPF(ALLOC, "%s: allocated zio index\n", __func__); in tarfs_zio_init() 700 TARFS_DPF(ALLOC, "%s: failed to lock znode", __func__); in tarfs_zio_fini() 710 TARFS_DPF(ALLOC, "%s: freeing zstd state\n", __func__); in tarfs_zio_fini() 716 TARFS_DPF(ALLOC, "%s: freeing index\n", __func__); in tarfs_zio_fini() 719 TARFS_DPF(ALLOC, "%s: freeing zio\n", __func__); in tarfs_zio_fini()
|
H A D | tarfs_subr.c | 172 TARFS_DPF(ALLOC, "%s(%.*s)\n", __func__, (int)namelen, name); in tarfs_alloc_node() 520 TARFS_DPF(ALLOC, "%s: %.*s = 0x%06x\n", __func__, in tarfs_strtofflags() 527 TARFS_DPF(ALLOC, "%s: %.*s = 0x??????\n", in tarfs_strtofflags()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | get_for_creds.c | 293 ALLOC(enc_krb_cred_part.timestamp, 1); in krb5_get_forwarded_creds() 300 ALLOC(enc_krb_cred_part.usec, 1); in krb5_get_forwarded_creds() 344 ALLOC(enc_krb_cred_part.r_address, 1); in krb5_get_forwarded_creds() 366 ALLOC(krb_cred_info->prealm, 1); in krb5_get_forwarded_creds() 368 ALLOC(krb_cred_info->pname, 1); in krb5_get_forwarded_creds() 370 ALLOC(krb_cred_info->flags, 1); in krb5_get_forwarded_creds() 372 ALLOC(krb_cred_info->authtime, 1); in krb5_get_forwarded_creds() 374 ALLOC(krb_cred_info->starttime, 1); in krb5_get_forwarded_creds() 376 ALLOC(krb_cred_info->endtime, 1); in krb5_get_forwarded_creds() 378 ALLOC(krb_cred_info->renew_till, 1); in krb5_get_forwarded_creds() [all …]
|
H A D | build_auth.c | 82 ALLOC(*auth_data, 1); in make_etypelist() 137 ALLOC(auth.seq_number, 1); in _krb5_build_authenticator() 148 ALLOC(auth.cksum, 1); in _krb5_build_authenticator()
|
H A D | krb5_locl.h | 188 #define ALLOC(X, N) (X) = calloc((N), sizeof(*(X))) macro 189 #define ALLOC_SEQ(X, N) do { (X)->len = (N); ALLOC((X)->val, (N)); } while(0)
|
H A D | generate_subkey.c | 57 ALLOC(*subkey, 1); in krb5_generate_subkey_extended()
|
H A D | auth_context.c | 42 ALLOC(p, 1); in krb5_auth_con_init() 48 ALLOC(p->authenticator, 1); in krb5_auth_con_init() 396 ALLOC(auth_context->keyblock, 1);
|
H A D | salt-aes.c | 65 ALLOC(kd.key, 1); in AES_string_to_key()
|
H A D | data.c | 178 ALLOC(*outdata, 1); in krb5_copy_data()
|
H A D | mk_rep.c | 81 ALLOC(body.seq_number, 1); in krb5_mk_rep()
|
H A D | get_in_tkt.c | 197 ALLOC(a->req_body.till, 1); in init_as_req() 250 ALLOC(a->padata, 1); in init_as_req() 289 ALLOC(a->padata, 1); in init_as_req()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | mit_dump.c | 283 ALLOC(ent.entry.max_life); in mit_prop_dump() 288 ALLOC(ent.entry.max_renew); in mit_prop_dump() 293 ALLOC(ent.entry.valid_end); in mit_prop_dump() 298 ALLOC(ent.entry.pw_end); in mit_prop_dump() 323 ALLOC(ent.entry.extensions); in mit_prop_dump() 341 ALLOC(ent.entry.modified_by); in mit_prop_dump() 382 ALLOC(ent.entry.keys.val[i].mkvno); in mit_prop_dump() 396 ALLOC(ent.entry.keys.val[i].salt); in mit_prop_dump()
|
H A D | headers.h | 109 #undef ALLOC 110 #define ALLOC(X) ((X) = calloc(1, sizeof(*(X)))) macro
|
H A D | kerberos5.c | 42 ALLOC(*t); in _kdc_fix_time() 479 ALLOC(ent->salttype); in make_etype_info_entry() 496 ALLOC(ent->salttype); in make_etype_info_entry() 569 ALLOC(ent->salt); in make_etype_info2_entry() 588 ALLOC(ent->s2kparams); in make_etype_info2_entry() 607 ALLOC(ent->s2kparams); in make_etype_info2_entry() 990 ALLOC(rep.padata); in _kdc_as_rep() 1553 ALLOC(et.starttime); in _kdc_as_rep() 1574 ALLOC(b->rtime); in _kdc_as_rep() 1591 ALLOC(et.renew_till); in _kdc_as_rep() [all …]
|
H A D | kx509.c | 408 ALLOC(rep.certificate); in _kdc_do_kx509() 412 ALLOC(rep.hash); in _kdc_do_kx509()
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | kadmin_locl.h | 102 #undef ALLOC 103 #define ALLOC(X) ((X) = malloc(sizeof(*(X)))) macro
|
/freebsd/crypto/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 45 ALLOC(nt.u.negTokenResp.negResult, 1); in send_reject() 111 ALLOC(nt.u.negTokenInit.negHints, 1); in send_supported_mechs() 118 ALLOC(nt.u.negTokenInit.negHints->hintName, 1); in send_supported_mechs() 169 ALLOC(nt.u.negTokenResp.negResult, 1); in send_accept() 190 ALLOC(nt.u.negTokenResp.supportedMech, 1); in send_accept() 211 ALLOC(nt.u.negTokenResp.responseToken, 1); in send_accept() 232 ALLOC(nt.u.negTokenResp.mechListMIC, 1); in send_accept()
|
H A D | spnego_locl.h | 76 #define ALLOC(X, N) (X) = calloc((N), sizeof(*(X))) macro
|
H A D | init_sec_context.c | 101 ALLOC(nt.u.negTokenResp.negResult, 1); in spnego_reply_internal() 116 ALLOC(nt.u.negTokenResp.responseToken, 1); in spnego_reply_internal() 138 ALLOC(nt.u.negTokenResp.mechListMIC, 1); in spnego_reply_internal() 278 ALLOC(ni.mechToken, 1); in spnego_initial()
|
/freebsd/lib/libc/rpc/ |
H A D | svc_dg.c | 452 #define ALLOC(type, size) \ macro 526 uc = ALLOC(struct cl_cache, 1); in svc_dg_enablecache() 534 uc->uc_entries = ALLOC(cache_ptr, size * SPARSENESS); in svc_dg_enablecache() 542 uc->uc_fifo = ALLOC(cache_ptr, size); in svc_dg_enablecache() 603 victim = ALLOC(struct cache_node, 1); in cache_set() 642 victim->cache_addr.buf = ALLOC(char, xprt->xp_rtaddr.len); in cache_set()
|
H A D | auth_des.c | 61 #define ALLOC(object_type) (object_type *) mem_alloc(sizeof(object_type)) macro 158 auth = ALLOC(AUTH); in authdes_pk_seccreate() 163 ad = ALLOC(struct ad_private); in authdes_pk_seccreate()
|
/freebsd/usr.bin/fortune/strfile/ |
H A D | strfile.c | 73 #define ALLOC(ptr, sz) do { \ macro 184 ALLOC(Firstch, Num_pts); in main() 328 ALLOC(Seekpts, Num_pts + 1); in add_offset()
|
/freebsd/usr.sbin/fifolog/lib/ |
H A D | fifolog_write_poll.c | 47 #define ALLOC(ptr, size) do { \ macro 158 ALLOC(&f->obuf, f->obufsize); in fifolog_write_open() 161 ALLOC(&f->ibuf, f->ibufsize); in fifolog_write_open()
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | cms.c | 56 #define ALLOC(X, N) (X) = calloc((N), sizeof(*(X))) macro 57 #define ALLOC_SEQ(X, N) do { (X)->len = (N); ALLOC((X)->val, (N)); } while(0) 90 ALLOC(ci.content, 1); in hx509_cms_wrap_ContentInfo() 624 ALLOC(enc_alg->parameters, 1); in hx509_cms_envelope_1() 1265 ALLOC(signer_info->signedAttrs, 1); in sig_process() 1503 ALLOC(sigctx.sd.encapContentInfo.eContent, 1); in hx509_cms_create_signed() 1556 ALLOC(sigctx.sd.certificates, 1); in hx509_cms_create_signed()
|