/freebsd-10.1-release/release/picobsd/tinyware/sps/ |
H A D | sps.c | 48 struct kinfo_proc *ki; local 69 ki = (struct kinfo_proc *)(t + (num - i - 1) * KINFO_PROC_SIZE); 70 mib[3] = ki->ki_pid; 77 sprintf(buf, "(%s)", ki->ki_comm); 83 if (strcmp(ki->ki_wmesg, "") == 0) { 86 strcpy(wmesg, ki->ki_wmesg); 88 ma = major(ki->ki_tdev); 89 mi = minor(ki->ki_tdev); 107 sprintf(pst, "%c", p_stat[ki->ki_stat]); 109 ki [all...] |
/freebsd-10.1-release/sys/kern/ |
H A D | vfs_aio.c | 309 #define AIO_LOCK(ki) mtx_lock(&(ki)->kaio_mtx) 310 #define AIO_UNLOCK(ki) mtx_unlock(&(ki)->kaio_mtx) 311 #define AIO_LOCK_ASSERT(ki, f) mtx_assert(&(ki)->kaio_mtx, (f)) 312 #define AIO_MTX(ki) (&(ki)->kaio_mtx) 582 struct kaioinfo *ki; local 584 ki 642 struct kaioinfo *ki; local 729 struct kaioinfo *ki; local 817 struct kaioinfo *ki; local 993 struct kaioinfo *ki; local 1068 struct kaioinfo *ki; local 1301 struct kaioinfo *ki; local 1574 struct kaioinfo *ki; local 1838 struct kaioinfo *ki = userp->p_aioinfo; local 1856 struct kaioinfo *ki = userp->p_aioinfo; local 1905 struct kaioinfo *ki; local 1955 struct kaioinfo *ki; local 2042 struct kaioinfo *ki; local 2142 struct kaioinfo *ki; local 2231 struct kaioinfo *ki; local 2450 struct kaioinfo *ki; local 2485 struct kaioinfo *ki; local 2567 struct kaioinfo *ki; local [all...] |
H A D | kern_proc.c | 1103 freebsd32_kinfo_proc_out(const struct kinfo_proc *ki, struct kinfo_proc32 *ki32) argument 1109 CP(*ki, *ki32, ki_layout); 1110 PTRTRIM_CP(*ki, *ki32, ki_args); 1111 PTRTRIM_CP(*ki, *ki32, ki_paddr); 1112 PTRTRIM_CP(*ki, *ki32, ki_addr); 1113 PTRTRIM_CP(*ki, *ki32, ki_tracep); 1114 PTRTRIM_CP(*ki, *ki32, ki_textvp); 1115 PTRTRIM_CP(*ki, *ki32, ki_fd); 1116 PTRTRIM_CP(*ki, *ki32, ki_vmspace); 1117 PTRTRIM_CP(*ki, *ki3 1191 struct kinfo_proc ki; local 1233 struct kinfo_proc ki; local [all...] |
/freebsd-10.1-release/crypto/openssh/ |
H A D | ssh-pkcs11-helper.c | 65 struct pkcs11_keyinfo *ki; local 67 ki = xcalloc(1, sizeof(*ki)); 68 ki->providername = xstrdup(name); 69 ki->key = k; 70 TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next); 76 struct pkcs11_keyinfo *ki, *nxt; local 78 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki 93 struct pkcs11_keyinfo *ki; local [all...] |
/freebsd-10.1-release/bin/ps/ |
H A D | ps.c | 985 descendant_sort(KINFO *ki, int items) argument 998 if (ki[src].ki_d.level) { 1003 if (!ki[src + nsrc].ki_d.level) 1007 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_pid) 1009 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_ppid) 1019 if (ki[dst + ndst].ki_d.level <= ki[dst].ki_d.level) 1023 ki[ 1163 format_output(KINFO *ki) argument 1205 fmt(char **(*fn)(kvm_t *, const struct kinfo_proc *, int), KINFO *ki, char *comm, char *thread, int maxlen) argument 1218 saveuser(KINFO *ki) argument [all...] |
/freebsd-10.1-release/sys/crypto/rijndael/ |
H A D | test00.c | 43 keyInstance ki; local 53 rijndael_makeKey(&ki, DIR_DECRYPT, 128, key); 56 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, out); 60 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, in);
|
/freebsd-10.1-release/sys/geom/bde/ |
H A D | g_bde_crypt.c | 80 g_bde_kkey(struct g_bde_softc *sc, keyInstance *ki, int dir, off_t sector) argument 105 AES_makekey(ki, dir, G_BDE_KKEYBITS, buf); 123 keyInstance ki; local 132 g_bde_kkey(sc, &ki, DIR_DECRYPT, wp->offset + o); 133 AES_decrypt(&ci, &ki, d, skey, sizeof skey); 135 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey); 136 AES_decrypt(&ci, &ki, d, d, sc->sectorsize); 140 bzero(&ki, sizeof ki); 158 keyInstance ki; local 199 keyInstance ki; local [all...] |
H A D | g_bde_lock.c | 309 keyInstance ki; local 315 AES_makekey(&ki, DIR_ENCRYPT, G_BDE_KKEYBITS, sha2 + 0); 316 AES_encrypt(&ci, &ki, buf, output, sizeof buf); 319 bzero(&ki, sizeof ki); 326 keyInstance ki; local 331 AES_makekey(&ki, DIR_DECRYPT, G_BDE_KKEYBITS, sha2 + 0); 332 AES_decrypt(&ci, &ki, input, buf, sizeof buf); 336 bzero(&ki, sizeof ki); 360 keyInstance ki; local [all...] |
H A D | g_bde.h | 185 AES_makekey(keyInstance *ki, int dir, u_int len, void *key) argument 189 error = rijndael_makeKey(ki, dir, len, key); 194 AES_encrypt(cipherInstance *ci, keyInstance *ki, void *in, void *out, u_int len) argument 198 error = rijndael_blockEncrypt(ci, ki, in, len * 8, out); 203 AES_decrypt(cipherInstance *ci, keyInstance *ki, void *in, void *out, u_int len) argument 207 error = rijndael_blockDecrypt(ci, ki, in, len * 8, out);
|
/freebsd-10.1-release/crypto/openssl/crypto/md5/asm/ |
H A D | md5-586.pl | 45 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 48 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one 52 &comment("R0 $ki"); 66 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 73 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 75 &comment("R1 $ki"); 82 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 96 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 101 &comment("R2 $ki"); 114 &mov($tmp2,&DWP($xo[$ki [all...] |
/freebsd-10.1-release/lib/libjail/ |
H A D | jail.c | 561 int i, ai, ki, jid, arrays, sanity; local 596 ki = ai; 597 jiov[ki].iov_base = jp_key->jp_name; 598 jiov[ki].iov_len = strlen(jp_key->jp_name) + 1; 599 ki++; 600 jiov[ki].iov_base = jp_key->jp_value; 601 jiov[ki].iov_len = (jp_key->jp_ctltype & CTLTYPE) == CTLTYPE_STRING 603 ki++; 604 *(const void **)&jiov[ki].iov_base = "errmsg"; 605 jiov[ki] [all...] |
/freebsd-10.1-release/sys/dev/kbdmux/ |
H A D | kbdmux.c | 945 keyboard_info_t *ki; local 956 ki = (keyboard_info_t *) arg; 958 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || 959 strcmp(ki->kb_name, "*") == 0) 965 if (k->kbd->kb_unit == ki->kb_unit && 966 strcmp(k->kbd->kb_name, ki->kb_name) == 0) 984 ki->kb_name, 985 ki [all...] |
/freebsd-10.1-release/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 180 } ki[2] = { variable in typeref:struct:key_info 708 encrypt_keyid(&ki[1], keyid, len); 714 encrypt_keyid(&ki[0], keyid, len); 769 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; 833 for (i = 0; i < ki[0].keylen; ++i) { 834 if ((*p++ = ki[0].keyid[i]) == IAC) 887 for (i = 0; i < ki[1].keylen; ++i) { 888 if ((*p++ = ki[1].keyid[i]) == IAC)
|
/freebsd-10.1-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 172 } ki[2] = { variable in typeref:struct:key_info 777 encrypt_keyid(&ki[1], keyid, len); 782 encrypt_keyid(&ki[0], keyid, len); 793 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; 857 for (i = 0; i < ki[0].keylen; ++i) { 858 if ((*p++ = ki[0].keyid[i]) == IAC) 911 for (i = 0; i < ki[1].keylen; ++i) { 912 if ((*p++ = ki[1].keyid[i]) == IAC)
|
/freebsd-10.1-release/crypto/openssl/crypto/rc2/ |
H A D | rc2_skey.c | 112 RC2_INT *ki; local 150 ki = &(key->data[63]); 152 *(ki--) = ((k[i] << 8) | k[i - 1]) & 0xffff;
|
/freebsd-10.1-release/sys/dev/kbd/ |
H A D | kbd.c | 195 keyboard_info_t ki; local 223 bzero(&ki, sizeof(ki)); 224 strcpy(ki.kb_name, kbd->kb_name); 225 ki.kb_unit = kbd->kb_unit; 227 (void)kbdd_ioctl(mux, KBADDKBD, (caddr_t) &ki); 240 bzero(&ki, sizeof(ki)); 241 strcpy(ki.kb_name, kbd->kb_name); 242 ki [all...] |
/freebsd-10.1-release/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 77 u8 ki[16]; member in struct:milenage_parameters 116 " ki CHAR(32) NOT NULL," 162 if (os_strcmp(col[i], "ki") == 0 && argv[i] && 163 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) { 164 printf("Invalid ki value in database\n"); 201 "SELECT ki,opc,amf,sqn FROM milenage WHERE imsi=%llu;", 461 if (strlen(pos) != 32 || hexstr2bin(pos, m->ki, 16)) { 564 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16); 647 gsm_milenage(m->opc, m->ki, _ran [all...] |
/freebsd-10.1-release/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 139 PKCS8PrivateKeyInfo ki; local 144 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 153 &ki.privateKeyAlgorithm, 155 &ki.privateKey, 157 free_PKCS8PrivateKeyInfo(&ki);
|
H A D | ks_p12.c | 75 PKCS8PrivateKeyInfo ki; local 83 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 89 &ki.privateKeyAlgorithm, 91 &ki.privateKey, 93 free_PKCS8PrivateKeyInfo(&ki);
|
H A D | cms.c | 237 KeyIdentifier *ki = &id->u.subjectKeyIdentifier; local 241 len = hex_encode(ki->data, ki->length, &keyid);
|
/freebsd-10.1-release/usr.sbin/jail/ |
H A D | command.c | 793 struct kinfo_proc *ki; local 809 ki = kvm_getprocs(kd, KERN_PROC_PROC, 0, &pcnt); 810 if (ki == NULL) 814 if (ki[i].ki_jid == j->jid && 815 kill(ki[i].ki_pid, SIGTERM) == 0) { 816 (void)add_proc(j, ki[i].ki_pid); 822 printf(" %d", ki[i].ki_pid);
|
/freebsd-10.1-release/sys/geom/ |
H A D | geom_aes.c | 98 g_aes_makekey(struct g_aes_softc *sc, off_t off, keyInstance *ki, int dir) argument 106 rijndael_makeKey(ki, dir, 128, sc->master_key); 128 rijndael_makeKey(ki, dir, 128, buf);
|
/freebsd-10.1-release/gnu/usr.bin/rcs/lib/ |
H A D | rcslex.c | 647 register char const *ki; local 648 for (ki=key; ki<kn; ) 649 savech_(*ki++)
|
/freebsd-10.1-release/sys/dev/vt/ |
H A D | vt_core.c | 865 keyboard_info_t ki; local 881 bzero(&ki, sizeof(ki)); 882 strncpy(ki.kb_name, k->kb_name, sizeof(ki.kb_name)); 883 ki.kb_name[sizeof(ki.kb_name) - 1] = '\0'; 884 ki.kb_unit = k->kb_unit; 886 kbdd_ioctl(k0, KBADDKBD, (caddr_t) &ki);
|
/freebsd-10.1-release/sbin/gbde/ |
H A D | gbde.c | 267 keyInstance ki; local 274 error = rijndael_makeKey(&ki, DIR_ENCRYPT, klen, key); 277 error = rijndael_blockEncrypt(&ci, &ki, d, len * 8, d);
|