/bind-9.11.3/lib/irs/ |
H A D | context.c | 9 /* $Id: context.c,v 1.3 2009/09/02 23:48:02 tbox Exp $ */ 27 #include <irs/context.h> 56 * An IRS context is a thread-specific object, and does not need to 130 irs_context_t *context = arg; local 132 irs_context_destroy(&context); 169 irs_context_t *context; local 181 context = irs_g_context; 187 context = isc_thread_key_getspecific(irs_context_key); 188 if (context == NULL) { 189 result = irs_context_create(&context); 208 irs_context_t *context; local 307 irs_context_t *context; local 335 irs_context_getmctx(irs_context_t *context) argument 342 irs_context_getappctx(irs_context_t *context) argument 349 irs_context_gettaskmgr(irs_context_t *context) argument 356 irs_context_gettimermgr(irs_context_t *context) argument 363 irs_context_gettask(irs_context_t *context) argument 370 irs_context_getdnsclient(irs_context_t *context) argument 377 irs_context_getresconf(irs_context_t *context) argument 384 irs_context_getdnsconf(irs_context_t *context) argument [all...] |
/bind-9.11.3/lib/isc/ |
H A D | sha1.c | 46 #define EVP_MD_CTX_new() &(context->_ctx) 51 isc_sha1_init(isc_sha1_t *context) argument 53 INSIST(context != NULL); 55 context->ctx = EVP_MD_CTX_new(); 56 RUNTIME_CHECK(context->ctx != NULL); 57 if (EVP_DigestInit(context->ctx, EVP_sha1()) != 1) { 63 isc_sha1_invalidate(isc_sha1_t *context) { argument 64 EVP_MD_CTX_free(context->ctx); 65 context->ctx = NULL; 69 isc_sha1_update(isc_sha1_t *context, cons argument 82 isc_sha1_final(isc_sha1_t *context, unsigned char *digest) argument 324 isc_sha1_init(isc_sha1_t *context) argument 339 isc_sha1_invalidate(isc_sha1_t *context) argument 347 isc_sha1_update(isc_sha1_t *context, const unsigned char *data, unsigned int len) argument 381 isc_sha1_final(isc_sha1_t *context, unsigned char *digest) argument [all...] |
H A D | sha2.c | 66 #define EVP_MD_CTX_new() &(context->_ctx) 72 isc_sha224_init(isc_sha224_t *context) { argument 73 if (context == (isc_sha224_t *)0) { 76 context->ctx = EVP_MD_CTX_new(); 77 RUNTIME_CHECK(context->ctx != NULL); 78 if (EVP_DigestInit(context->ctx, EVP_sha224()) != 1) { 84 isc_sha224_invalidate(isc_sha224_t *context) { argument 85 EVP_MD_CTX_free(context->ctx); 86 context->ctx = NULL; 90 isc_sha224_update(isc_sha224_t *context, cons argument 106 isc_sha224_final(isc_uint8_t digest[], isc_sha224_t *context) argument 120 isc_sha256_init(isc_sha256_t *context) argument 132 isc_sha256_invalidate(isc_sha256_t *context) argument 138 isc_sha256_update(isc_sha256_t *context, const isc_uint8_t *data, size_t len) argument 154 isc_sha256_final(isc_uint8_t digest[], isc_sha256_t *context) argument 168 isc_sha512_init(isc_sha512_t *context) argument 180 isc_sha512_invalidate(isc_sha512_t *context) argument 185 isc_sha512_update(isc_sha512_t *context, const isc_uint8_t *data, size_t len) argument 200 isc_sha512_final(isc_uint8_t digest[], isc_sha512_t *context) argument 214 isc_sha384_init(isc_sha384_t *context) argument 226 isc_sha384_invalidate(isc_sha384_t *context) argument 232 isc_sha384_update(isc_sha384_t *context, const isc_uint8_t* data, size_t len) argument 248 isc_sha384_final(isc_uint8_t digest[], isc_sha384_t *context) argument 264 isc_sha224_init(isc_sha224_t *context) argument 277 isc_sha224_invalidate(isc_sha224_t *context) argument 289 isc_sha224_update(isc_sha224_t *context, const isc_uint8_t* data, size_t len) argument 307 isc_sha224_final(isc_uint8_t digest[], isc_sha224_t *context) argument 330 isc_sha256_init(isc_sha256_t *context) argument 343 isc_sha256_invalidate(isc_sha256_t *context) argument 355 isc_sha256_update(isc_sha256_t *context, const isc_uint8_t* data, size_t len) argument 373 isc_sha256_final(isc_uint8_t digest[], isc_sha256_t *context) argument 396 isc_sha512_init(isc_sha512_t *context) argument 409 isc_sha512_invalidate(isc_sha512_t *context) argument 421 isc_sha512_update(isc_sha512_t *context, const isc_uint8_t* data, size_t len) argument 439 isc_sha512_final(isc_uint8_t digest[], isc_sha512_t *context) argument 462 isc_sha384_init(isc_sha384_t *context) argument 475 isc_sha384_invalidate(isc_sha384_t *context) argument 487 isc_sha384_update(isc_sha384_t *context, const isc_uint8_t* data, size_t len) argument 505 isc_sha384_final(isc_uint8_t digest[], isc_sha384_t *context) argument 864 isc_sha224_init(isc_sha224_t *context) argument 875 isc_sha224_invalidate(isc_sha224_t *context) argument 880 isc_sha224_update(isc_sha224_t *context, const isc_uint8_t* data, size_t len) argument 885 isc_sha224_final(isc_uint8_t digest[], isc_sha224_t *context) argument 894 isc_sha256_init(isc_sha256_t *context) argument 905 isc_sha256_invalidate(isc_sha256_t *context) argument 946 isc_sha256_transform(isc_sha256_t *context, const isc_uint32_t* data) argument 1008 isc_sha256_transform(isc_sha256_t *context, const isc_uint32_t* data) argument 1092 isc_sha256_update(isc_sha256_t *context, const isc_uint8_t *data, size_t len) argument 1148 isc_sha256_final(isc_uint8_t digest[], isc_sha256_t *context) argument 1220 isc_sha512_init(isc_sha512_t *context) argument 1231 isc_sha512_invalidate(isc_sha512_t *context) argument 1271 isc_sha512_transform(isc_sha512_t *context, const isc_uint64_t* data) argument 1330 isc_sha512_transform(isc_sha512_t *context, const isc_uint64_t* data) argument 1411 isc_sha512_update(isc_sha512_t *context, const isc_uint8_t *data, size_t len) argument 1466 isc_sha512_last(isc_sha512_t *context) argument 1511 isc_sha512_final(isc_uint8_t digest[], isc_sha512_t *context) argument 1543 isc_sha384_init(isc_sha384_t *context) argument 1554 isc_sha384_invalidate(isc_sha384_t *context) argument 1559 isc_sha384_update(isc_sha384_t *context, const isc_uint8_t* data, size_t len) argument 1564 isc_sha384_final(isc_uint8_t digest[], isc_sha384_t *context) argument 1601 isc_sha224_end(isc_sha224_t *context, char buffer[]) argument 1634 isc_sha224_t context; local 1642 isc_sha256_end(isc_sha256_t *context, char buffer[]) argument 1675 isc_sha256_t context; local 1683 isc_sha512_end(isc_sha512_t *context, char buffer[]) argument 1716 isc_sha512_t context; local 1724 isc_sha384_end(isc_sha384_t *context, char buffer[]) argument 1757 isc_sha384_t context; local [all...] |
/bind-9.11.3/contrib/idn/idnkit-1.0-src/lib/ |
H A D | checker.c | 70 void *context; member in struct:__anon70 234 ctx->schemes[i].destroy(ctx->schemes[i].context); 328 ctx->schemes[ctx->nschemes].context = scheme_context; 385 r = (ctx->schemes[i].lookup)(ctx->schemes[i].context, ucs4,
|
H A D | mapper.c | 72 void *context; member in struct:__anon72 204 ctx->schemes[i].destroy(ctx->schemes[i].context); 304 ctx->schemes[ctx->nschemes].context = scheme_context; 410 r = (ctx->schemes[i].map)(ctx->schemes[i].context, src, dst,
|
/bind-9.11.3/lib/dns/ |
H A D | gssapictx.c | 219 gss_log(ISC_LOG_ERROR, "Unable to initialise krb5 context"); 534 * context. This is used to return gssapi error messages back up the 607 gss_log(3, "Failure initiating security context: %s", 610 gss_log(3, "Failure initiating security context"); 664 gss_ctx_id_t context = GSS_C_NO_CONTEXT; local 674 context = GSS_C_NO_CONTEXT; 676 context = *ctxout; 711 gret = gss_accept_sec_context(&minor, &context, cred, &gintoken, 787 *ctxout = context; 823 /* Delete the context fro [all...] |
H A D | tkey.c | 539 * Limit keys to 1 hour or the context's lifetime whichever 1048 gss_ctx_id_t *context, isc_boolean_t win2k, 1062 REQUIRE(context != NULL); 1066 result = dst_gssapi_initctx(gname, NULL, &token, context, 1275 dns_name_t *gname, gss_ctx_id_t *context, 1328 RETERR(dst_gssapi_initctx(gname, &intoken, outtoken, context, 1331 RETERR(dst_key_fromgssapi(dns_rootname, *context, rmsg->mctx, 1408 dns_name_t *server, gss_ctx_id_t *context, 1456 result = dst_gssapi_initctx(server, &intoken, &outtoken, context, 1493 RETERR(dst_key_fromgssapi(dns_rootname, *context, rms 1046 dns_tkey_buildgssquery(dns_message_t *msg, dns_name_t *name, dns_name_t *gname, isc_buffer_t *intoken, isc_uint32_t lifetime, gss_ctx_id_t *context, isc_boolean_t win2k, isc_mem_t *mctx, char **err_message) argument 1274 dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *gname, gss_ctx_id_t *context, isc_buffer_t *outtoken, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, char **err_message) argument 1407 dns_tkey_gssnegotiate(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *server, gss_ctx_id_t *context, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, isc_boolean_t win2k, char **err_message) argument [all...] |
/bind-9.11.3/unit/atf-src/atf-c/ |
H A D | tc.c | 62 struct context { struct 75 static void context_init(struct context *, const atf_tc_t *, const char *); 83 static void error_in_expect(struct context *, const char *, ...) 85 static void validate_expect(struct context *); 86 static void expected_failure(struct context *, atf_dynstr_t *) 88 static void fail_requirement(struct context *, atf_dynstr_t *) 90 static void fail_check(struct context *, atf_dynstr_t *); 91 static void pass(struct context *) 93 static void skip(struct context *, atf_dynstr_t *) 99 static void errno_test(struct context *, cons [all...] |
/bind-9.11.3/bin/nsupdate/ |
H A D | nsupdate.c | 224 gss_ctx_id_t context; member in struct:nsu_gssinfo 233 dns_request_t **request, gss_ctx_id_t context); 2827 gss_ctx_id_t context; local 2905 context = GSS_C_NO_CONTEXT; 2907 &context, use_win2k_gsstsig, 2918 send_gssrequest(kserver, rmsg, &request, context); 2931 dns_request_t **request, gss_ctx_id_t context) 2944 reqinfo->context = context; 2972 gss_ctx_id_t context; local 2930 send_gssrequest(isc_sockaddr_t *destaddr, dns_message_t *msg, dns_request_t **request, gss_ctx_id_t context) argument [all...] |