/freebsd-10-stable/release/picobsd/tinyware/sps/ |
H A D | sps.c | 48 struct kinfo_proc *ki; local 69 ki = (struct kinfo_proc *)(t + (num - i - 1) * KINFO_PROC_SIZE); 70 mib[3] = ki->ki_pid; 77 sprintf(buf, "(%s)", ki->ki_comm); 83 if (strcmp(ki->ki_wmesg, "") == 0) { 86 strcpy(wmesg, ki->ki_wmesg); 88 ma = major(ki->ki_tdev); 89 mi = minor(ki->ki_tdev); 107 sprintf(pst, "%c", p_stat[ki->ki_stat]); 109 ki [all...] |
/freebsd-10-stable/crypto/openssh/ |
H A D | ssh-pkcs11-helper.c | 65 struct pkcs11_keyinfo *ki; local 67 ki = xcalloc(1, sizeof(*ki)); 68 ki->providername = xstrdup(name); 69 ki->key = k; 70 TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next); 76 struct pkcs11_keyinfo *ki, *nxt; local 78 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki 93 struct pkcs11_keyinfo *ki; local [all...] |
/freebsd-10-stable/sys/crypto/rijndael/ |
H A D | test00.c | 43 keyInstance ki; local 53 rijndael_makeKey(&ki, DIR_DECRYPT, 128, key); 56 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, out); 60 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, in);
|
/freebsd-10-stable/bin/ps/ |
H A D | ps.c | 985 descendant_sort(KINFO *ki, int items) argument 998 if (ki[src].ki_d.level) { 1003 if (!ki[src + nsrc].ki_d.level) 1007 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_pid) 1009 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_ppid) 1019 if (ki[dst + ndst].ki_d.level <= ki[dst].ki_d.level) 1023 ki[ 1163 format_output(KINFO *ki) argument 1205 fmt(char **(*fn)(kvm_t *, const struct kinfo_proc *, int), KINFO *ki, char *comm, char *thread, int maxlen) argument 1218 saveuser(KINFO *ki) argument [all...] |
/freebsd-10-stable/sys/geom/bde/ |
H A D | g_bde_crypt.c | 80 g_bde_kkey(struct g_bde_softc *sc, keyInstance *ki, int dir, off_t sector) argument 105 AES_makekey(ki, dir, G_BDE_KKEYBITS, buf); 123 keyInstance ki; local 132 g_bde_kkey(sc, &ki, DIR_DECRYPT, wp->offset + o); 133 AES_decrypt(&ci, &ki, d, skey, sizeof skey); 135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey); 136 AES_decrypt(&ci, &ki, d, d, sc->sectorsize); 140 bzero(&ki, sizeof ki); 158 keyInstance ki; local 199 keyInstance ki; local [all...] |
H A D | g_bde_lock.c | 309 keyInstance ki; local 315 AES_makekey(&ki, DIR_ENCRYPT, G_BDE_KKEYBITS, sha2 + 0); 316 AES_encrypt(&ci, &ki, buf, output, sizeof buf); 319 bzero(&ki, sizeof ki); 326 keyInstance ki; local 331 AES_makekey(&ki, DIR_DECRYPT, G_BDE_KKEYBITS, sha2 + 0); 332 AES_decrypt(&ci, &ki, input, buf, sizeof buf); 336 bzero(&ki, sizeof ki); 360 keyInstance ki; local [all...] |
H A D | g_bde.h | 185 AES_makekey(keyInstance *ki, int dir, u_int len, void *key) argument 189 error = rijndael_makeKey(ki, dir, len, key); 194 AES_encrypt(cipherInstance *ci, keyInstance *ki, void *in, void *out, u_int len) argument 198 error = rijndael_blockEncrypt(ci, ki, in, len * 8, out); 203 AES_decrypt(cipherInstance *ci, keyInstance *ki, void *in, void *out, u_int len) argument 207 error = rijndael_blockDecrypt(ci, ki, in, len * 8, out);
|
/freebsd-10-stable/sys/kern/ |
H A D | vfs_aio.c | 311 #define AIO_LOCK(ki) mtx_lock(&(ki)->kaio_mtx) 312 #define AIO_UNLOCK(ki) mtx_unlock(&(ki)->kaio_mtx) 313 #define AIO_LOCK_ASSERT(ki, f) mtx_assert(&(ki)->kaio_mtx, (f)) 314 #define AIO_MTX(ki) (&(ki)->kaio_mtx) 583 struct kaioinfo *ki; local 585 ki 643 struct kaioinfo *ki; local 730 struct kaioinfo *ki; local 818 struct kaioinfo *ki; local 994 struct kaioinfo *ki; local 1069 struct kaioinfo *ki; local 1303 struct kaioinfo *ki; local 1592 struct kaioinfo *ki; local 1854 struct kaioinfo *ki = userp->p_aioinfo; local 1872 struct kaioinfo *ki = userp->p_aioinfo; local 1921 struct kaioinfo *ki; local 1971 struct kaioinfo *ki; local 2058 struct kaioinfo *ki; local 2158 struct kaioinfo *ki; local 2247 struct kaioinfo *ki; local 2449 struct kaioinfo *ki; local 2490 struct kaioinfo *ki; local [all...] |
H A D | kern_proc.c | 1132 freebsd32_kinfo_proc_out(const struct kinfo_proc *ki, struct kinfo_proc32 *ki32) argument 1138 CP(*ki, *ki32, ki_layout); 1139 PTRTRIM_CP(*ki, *ki32, ki_args); 1140 PTRTRIM_CP(*ki, *ki32, ki_paddr); 1141 PTRTRIM_CP(*ki, *ki32, ki_addr); 1142 PTRTRIM_CP(*ki, *ki32, ki_tracep); 1143 PTRTRIM_CP(*ki, *ki32, ki_textvp); 1144 PTRTRIM_CP(*ki, *ki32, ki_fd); 1145 PTRTRIM_CP(*ki, *ki32, ki_vmspace); 1146 PTRTRIM_CP(*ki, *ki3 1222 struct kinfo_proc ki; local 1268 struct kinfo_proc ki; local [all...] |
/freebsd-10-stable/crypto/openssl/crypto/md5/asm/ |
H A D | md5-586.pl | 45 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 48 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one 52 &comment("R0 $ki"); 66 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 73 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 75 &comment("R1 $ki"); 82 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 96 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 101 &comment("R2 $ki"); 114 &mov($tmp2,&DWP($xo[$ki [all...] |
/freebsd-10-stable/sys/dev/kbdmux/ |
H A D | kbdmux.c | 953 keyboard_info_t *ki; local 964 ki = (keyboard_info_t *) arg; 966 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || 967 strcmp(ki->kb_name, "*") == 0) 973 if (k->kbd->kb_unit == ki->kb_unit && 974 strcmp(k->kbd->kb_name, ki->kb_name) == 0) 992 ki->kb_name, 993 ki [all...] |
/freebsd-10-stable/lib/libjail/ |
H A D | jail.c | 574 int i, ai, ki, jid, arrays, sanity; local 609 ki = ai; 610 jiov[ki].iov_base = jp_key->jp_name; 611 jiov[ki].iov_len = strlen(jp_key->jp_name) + 1; 612 ki++; 613 jiov[ki].iov_base = jp_key->jp_value; 614 jiov[ki].iov_len = (jp_key->jp_ctltype & CTLTYPE) == CTLTYPE_STRING 616 ki++; 617 *(const void **)&jiov[ki].iov_base = "errmsg"; 618 jiov[ki] [all...] |
/freebsd-10-stable/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 180 } ki[2] = { variable in typeref:struct:key_info 708 encrypt_keyid(&ki[1], keyid, len); 714 encrypt_keyid(&ki[0], keyid, len); 769 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; 833 for (i = 0; i < ki[0].keylen; ++i) { 834 if ((*p++ = ki[0].keyid[i]) == IAC) 887 for (i = 0; i < ki[1].keylen; ++i) { 888 if ((*p++ = ki[1].keyid[i]) == IAC)
|
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 172 } ki[2] = { variable in typeref:struct:key_info 777 encrypt_keyid(&ki[1], keyid, len); 782 encrypt_keyid(&ki[0], keyid, len); 793 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; 857 for (i = 0; i < ki[0].keylen; ++i) { 858 if ((*p++ = ki[0].keyid[i]) == IAC) 911 for (i = 0; i < ki[1].keylen; ++i) { 912 if ((*p++ = ki[1].keyid[i]) == IAC)
|
/freebsd-10-stable/crypto/openssl/crypto/rc2/ |
H A D | rc2_skey.c | 112 RC2_INT *ki; local 150 ki = &(key->data[63]); 152 *(ki--) = ((k[i] << 8) | k[i - 1]) & 0xffff;
|
/freebsd-10-stable/contrib/less/ |
H A D | command.c | 851 int ki = 0; local 858 keys[ki] = c; 859 if (c != orig[ki] || ki >= sizeof(keys)-1) 864 while (ki > 0) 865 (*gr_ungetc)(keys[ki--]); 868 if (orig[++ki] == '\0') 872 ki = strlen(repl)-1; 873 while (ki > 0) 874 (*gr_ungetc)(repl[ki [all...] |
/freebsd-10-stable/sys/dev/kbd/ |
H A D | kbd.c | 195 keyboard_info_t ki; local 223 bzero(&ki, sizeof(ki)); 224 strcpy(ki.kb_name, kbd->kb_name); 225 ki.kb_unit = kbd->kb_unit; 227 (void)kbdd_ioctl(mux, KBADDKBD, (caddr_t) &ki); 240 bzero(&ki, sizeof(ki)); 241 strcpy(ki.kb_name, kbd->kb_name); 242 ki [all...] |
/freebsd-10-stable/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 77 u8 ki[16]; member in struct:milenage_parameters 116 " ki CHAR(32) NOT NULL," 162 if (os_strcmp(col[i], "ki") == 0 && argv[i] && 163 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) { 164 printf("Invalid ki value in database\n"); 201 "SELECT ki,opc,amf,sqn FROM milenage WHERE imsi=%llu;", 461 if (strlen(pos) != 32 || hexstr2bin(pos, m->ki, 16)) { 564 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16); 647 gsm_milenage(m->opc, m->ki, _ran [all...] |
/freebsd-10-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 139 PKCS8PrivateKeyInfo ki; local 144 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 153 &ki.privateKeyAlgorithm, 155 &ki.privateKey, 157 free_PKCS8PrivateKeyInfo(&ki);
|
H A D | ks_p12.c | 75 PKCS8PrivateKeyInfo ki; local 83 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 89 &ki.privateKeyAlgorithm, 91 &ki.privateKey, 93 free_PKCS8PrivateKeyInfo(&ki);
|
/freebsd-10-stable/usr.sbin/jail/ |
H A D | command.c | 844 struct kinfo_proc *ki; local 860 ki = kvm_getprocs(kd, KERN_PROC_PROC, 0, &pcnt); 861 if (ki == NULL) 865 if (ki[i].ki_jid == j->jid && 866 kill(ki[i].ki_pid, SIGTERM) == 0) { 867 (void)add_proc(j, ki[i].ki_pid); 873 printf(" %d", ki[i].ki_pid);
|
/freebsd-10-stable/sys/geom/ |
H A D | geom_aes.c | 98 g_aes_makekey(struct g_aes_softc *sc, off_t off, keyInstance *ki, int dir) argument 106 rijndael_makeKey(ki, dir, 128, sc->master_key); 128 rijndael_makeKey(ki, dir, 128, buf);
|
/freebsd-10-stable/gnu/usr.bin/rcs/lib/ |
H A D | rcslex.c | 647 register char const *ki; local 648 for (ki=key; ki<kn; ) 649 savech_(*ki++)
|
/freebsd-10-stable/sys/dev/vt/ |
H A D | vt_core.c | 897 keyboard_info_t ki; local 912 bzero(&ki, sizeof(ki)); 913 strncpy(ki.kb_name, k->kb_name, sizeof(ki.kb_name)); 914 ki.kb_name[sizeof(ki.kb_name) - 1] = '\0'; 915 ki.kb_unit = k->kb_unit; 917 kbdd_ioctl(k0, KBADDKBD, (caddr_t) &ki);
|
/freebsd-10-stable/sbin/gbde/ |
H A D | gbde.c | 267 keyInstance ki; local 274 error = rijndael_makeKey(&ki, DIR_ENCRYPT, klen, key); 277 error = rijndael_blockEncrypt(&ci, &ki, d, len * 8, d);
|