/freebsd-13-stable/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 226 is_initiator(struct krb5_context *kc) argument 228 return (kc->kc_more_flags & LOCAL); 235 is_acceptor(struct krb5_context *kc) argument 237 return !(kc->kc_more_flags & LOCAL); 241 get_initiator_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp) argument 244 if (is_initiator(kc)) 245 copy_key(&kc->kc_local_subkey, kdp); 247 copy_key(&kc->kc_remote_subkey, kdp); 249 copy_key(&kc->kc_keyblock, kdp); 253 get_acceptor_subkey(struct krb5_context *kc, struc argument 263 get_keys(struct krb5_context *kc) argument 401 struct krb5_context *kc = (struct krb5_context *)ctx; local 411 struct krb5_context *kc = (struct krb5_context *)ctx; local 499 struct krb5_context *kc = (struct krb5_context *)ctx; local 774 krb5_sequence_check(struct krb5_context *kc, uint32_t seq) argument 860 krb5_get_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf **micp, uint8_t sgn_alg[2]) argument 947 krb5_get_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf **micp) argument 1014 struct krb5_context *kc = (struct krb5_context *)ctx; local 1043 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument 1141 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument 1224 struct krb5_context *kc = (struct krb5_context *)ctx; local 1252 krb5_wrap_old(struct krb5_context *kc, int conf_req_flag, struct mbuf **mp, int *conf_state, uint8_t sgn_alg[2], uint8_t seal_alg[2]) argument 1400 krb5_wrap_new(struct krb5_context *kc, int conf_req_flag, struct mbuf **mp, int *conf_state) argument 1551 struct krb5_context *kc = (struct krb5_context *)ctx; local 1603 krb5_unwrap_old(struct krb5_context *kc, struct mbuf **mp, int *conf_state, uint8_t sgn_alg[2], uint8_t seal_alg[2]) argument 1778 krb5_unwrap_new(struct krb5_context *kc, struct mbuf **mp, int *conf_state) argument 1979 struct krb5_context *kc = (struct krb5_context *)ctx; local 2026 struct krb5_context *kc = (struct krb5_context *)ctx; local [all...] |
/freebsd-13-stable/contrib/bearssl/inc/ |
H A D | bearssl_hmac.h | 79 * \param kc HMAC key context to initialise. 84 void br_hmac_key_init(br_hmac_key_context *kc, 93 * \param kc HMAC key context. 97 const br_hmac_key_context *kc) 99 return kc->dig_vtable; 133 * \param kc HMAC key context (already initialised with the key). 137 const br_hmac_key_context *kc, size_t out_len); 96 br_hmac_key_get_digest( const br_hmac_key_context *kc) argument
|
/freebsd-13-stable/contrib/bearssl/src/rand/ |
H A D | hmac_drbg.c | 47 br_hmac_key_context kc; local 55 br_hmac_key_init(&kc, dig, ctx->K, hlen); 60 br_hmac_init(&hc, &kc, 0); 79 br_hmac_init(&hc, &kc, 0); 84 br_hmac_key_init(&kc, dig, ctx->K, hlen); 85 br_hmac_init(&hc, &kc, 0); 95 br_hmac_key_context kc; local 106 br_hmac_key_init(&kc, dig, ctx->K, hlen); 107 br_hmac_init(&hc, &kc, 0); 113 br_hmac_key_init(&kc, di [all...] |
/freebsd-13-stable/contrib/bearssl/src/ssl/ |
H A D | prf.c | 36 br_hmac_key_context kc; local 46 br_hmac_key_init(&kc, dig, secret, secret_len); 47 br_hmac_init(&hc, &kc, 0); 54 br_hmac_init(&hc, &kc, 0); 69 br_hmac_init(&hc, &kc, 0);
|
/freebsd-13-stable/contrib/sendmail/libsm/ |
H A D | memstat.c | 91 static kstat_ctl_t *kc; 109 kc = kstat_open(); 110 if (kc == NULL) 112 kst = kstat_lookup(kc, "unix", 0, 134 if (kc == NULL) 136 r = kstat_close(kc); 162 if (kc == NULL || kst == NULL) 164 if (kstat_read(kc, kst, NULL) == -1)
|
/freebsd-13-stable/contrib/bearssl/src/mac/ |
H A D | hmac.c | 57 br_hmac_key_init(br_hmac_key_context *kc, argument 63 kc->dig_vtable = dig; 72 process_key(&hc.vtable, kc->ksi, key, key_len, 0x36); 73 process_key(&hc.vtable, kc->kso, key, key_len, 0x5C); 79 const br_hmac_key_context *kc, size_t out_len) 84 dig = kc->dig_vtable; 87 dig->set_state(&ctx->dig.vtable, kc->ksi, (uint64_t)blen); 88 memcpy(ctx->kso, kc->kso, sizeof kc->kso); 78 br_hmac_init(br_hmac_context *ctx, const br_hmac_key_context *kc, size_t out_len) argument
|
/freebsd-13-stable/contrib/bearssl/src/kdf/ |
H A D | hkdf.c | 34 br_hmac_key_context kc; local 42 br_hmac_key_init(&kc, digest_vtable, salt, salt_len); 43 br_hmac_init(&hc->u.hmac_ctx, &kc, 0);
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 110 struct kc_rsa *kc = RSA_get_app_data(rsa); local 115 SecKeyRef privKeyRef = (SecKeyRef)kc->item; 143 sig.Length = kc->keysize; 162 struct kc_rsa *kc = RSA_get_app_data(rsa); local 167 SecKeyRef privKeyRef = (SecKeyRef)kc->item; 202 out.Length = kc->keysize; 257 struct kc_rsa *kc; local 266 kc = calloc(1, sizeof(*kc)); 267 if (kc [all...] |
/freebsd-13-stable/contrib/wpa/src/utils/ |
H A D | pcsc_funcs.h | 20 unsigned char *sres, unsigned char *kc);
|
H A D | pcsc_funcs.c | 1231 * @kc: 8-byte buffer for Kc 1239 * successfully, SRES and Kc values will be written into sres and kc buffers. 1242 unsigned char *sres, unsigned char *kc) 1296 os_memcpy(kc, buf + 4, 8); 1310 os_memcpy(kc, buf + 6, 8); 1314 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8); 1241 scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, unsigned char *sres, unsigned char *kc) argument
|
/freebsd-13-stable/sys/i386/i386/ |
H A D | copyout.c | 137 vm_offset_t kc; member in struct:copyinstr_arg0 153 *(char *)ca->kc = c; 155 ca->kc++; 171 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc = (vm_offset_t)kaddr; 192 vm_offset_t kc; member in struct:copyin_arg0 202 bcopy((void *)kva, (void *)ca->kc, ca->len); 218 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc = (vm_offset_t)kaddr; 219 plen < len; uc += ca.len, ca.kc += ca.len, plen += ca.len) { 237 bcopy((void *)ca->kc, (void *)kva, ca->len); 253 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc [all...] |
/freebsd-13-stable/sys/kern/ |
H A D | kern_event.c | 692 kqtimer_sched_callout(struct kq_timer_cb_data *kc) argument 694 callout_reset_sbt_on(&kc->c, kc->next, 0, filt_timerexpire, kc->kn, 695 kc->cpuid, C_ABSOLUTE); 701 struct kq_timer_cb_data *kc, *kc1; local 710 TAILQ_FOREACH_SAFE(kc, &p->p_kqtim_stop, link, kc1) { 711 TAILQ_REMOVE(&p->p_kqtim_stop, kc, link); 712 kc->flags &= ~KQ_TIMER_CB_ENQUEUED; 713 if (kc 723 struct kq_timer_cb_data *kc; local 814 struct kq_timer_cb_data *kc; local 844 struct kq_timer_cb_data *kc; local 860 struct kq_timer_cb_data *kc; local 879 struct kq_timer_cb_data *kc; local [all...] |
H A D | kern_ktrace.c | 817 struct ktr_csw *kc; local 825 kc = &req->ktr_data.ktr_csw; 826 kc->out = out; 827 kc->user = user; 829 strlcpy(kc->wmesg, wmesg, sizeof(kc->wmesg)); 831 bzero(kc->wmesg, sizeof(kc->wmesg));
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | milenage.h | 18 u8 *kc);
|
H A D | milenage.c | 232 * @kc: Buffer for Kc = 64-bit Kc 235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8];
|
/freebsd-13-stable/cddl/contrib/opensolaris/cmd/lockstat/ |
H A D | sym.c | 116 kstat_ctl_t *kc; local 120 if ((kc = kstat_open()) == NULL) 123 for (ksp = kc->kc_chain; ksp; ksp = ksp->ks_next) { 138 (void) kstat_close(kc);
|
/freebsd-13-stable/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pool_checkpoint/ |
H A D | checkpoint_capacity.ksh | 84 log_must zdb -e -p $FILEDISKDIR -kc $NESTEDPOOL
|
H A D | pool_checkpoint.kshlib | 343 log_must zdb -e -p $FILEDISKDIR -kc $NESTEDPOOL
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres,
|
H A D | eap_sim_db.c | 44 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon6493::__anon6494 496 if (hexstr2bin(start, entry->u.sim.kc[num_chal], 908 * @kc: Buffer for Kc values 927 u8 *_rand, u8 *kc, u8 *sres, 971 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN); 925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_sim.c | 26 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 147 os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN); 211 if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0) 214 data->kc[i], EAP_SIM_KC_LEN); 262 data->sres[0], data->kc[0]) || 264 data->sres[1], data->kc[1]) || 267 data->sres[2], data->kc[2]))) { 301 data->sres[i], data->kc[i])) { 312 data->kc[i], EAP_SIM_KC_LEN); 331 os_memcpy(data->kc[ [all...] |
/freebsd-13-stable/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 74 u8 kc[8]; member in struct:gsm_triplet 326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) { 617 u8 _rand[16], sres[4], kc[8]; local 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8); 640 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->kc, 8); 684 u8 _rand[16], sres[4], kc[8]; local 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 690 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
|
/freebsd-13-stable/share/mk/ |
H A D | bsd.cpu.mk | 141 # accept either mips4kc or 4kc, mostly for historical reasons 143 # 4kc, 24kc, 34kc, 74kc, 1004kc, octeon, octeon+, octeon2, octeon3,
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 1070 unsigned char kc[8]; local 1112 if (scard_gsm_auth(scard, _rand, sres, kc)) 1116 if (scard_gsm_auth(scard, _rand, sres, kc)) 1178 unsigned char kc[8]; local 1212 if (scard_gsm_auth(scard, _rand, sres, kc)) 1220 printf("%02X", kc[j]);
|
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 77 int num_chal, const u8 *kc, u8 *mk);
|