/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-pkcs11-helper.c | 62 struct pkcs11_keyinfo *ki; local 64 ki = xcalloc(1, sizeof(*ki)); 65 ki->providername = xstrdup(name); 66 ki->key = k; 67 TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next); 73 struct pkcs11_keyinfo *ki, *nxt; local 75 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki 90 struct pkcs11_keyinfo *ki; local [all...] |
/freebsd-13-stable/sys/crypto/rijndael/ |
H A D | test00.c | 43 keyInstance ki; local 53 rijndael_makeKey(&ki, DIR_DECRYPT, 128, key); 56 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, out); 60 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, in);
|
/freebsd-13-stable/sys/geom/bde/ |
H A D | g_bde_crypt.c | 82 g_bde_kkey(struct g_bde_softc *sc, keyInstance *ki, int dir, off_t sector) argument 107 AES_makekey(ki, dir, G_BDE_KKEYBITS, buf); 125 keyInstance ki; local 133 g_bde_kkey(sc, &ki, DIR_DECRYPT, wp->offset + o); 134 AES_decrypt(&ci, &ki, d, skey, sizeof skey); 136 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey); 137 AES_decrypt(&ci, &ki, d, d, sc->sectorsize); 141 bzero(&ki, sizeof ki); 159 keyInstance ki; local 199 keyInstance ki; local [all...] |
H A D | g_bde_lock.c | 311 keyInstance ki; local 317 AES_makekey(&ki, DIR_ENCRYPT, G_BDE_KKEYBITS, sha2 + 0); 318 AES_encrypt(&ci, &ki, buf, output, sizeof buf); 321 explicit_bzero(&ki, sizeof ki); 328 keyInstance ki; local 333 AES_makekey(&ki, DIR_DECRYPT, G_BDE_KKEYBITS, sha2 + 0); 334 AES_decrypt(&ci, &ki, input, buf, sizeof buf); 338 explicit_bzero(&ki, sizeof ki); 362 keyInstance ki; local [all...] |
H A D | g_bde.h | 186 AES_makekey(keyInstance *ki, int dir, u_int len, const void *key) argument 190 error = rijndael_makeKey(ki, dir, len, key); 195 AES_encrypt(cipherInstance *ci, keyInstance *ki, const void *in, void *out, u_int len) argument 199 error = rijndael_blockEncrypt(ci, ki, in, len * 8, out); 204 AES_decrypt(cipherInstance *ci, keyInstance *ki, const void *in, void *out, u_int len) argument 208 error = rijndael_blockDecrypt(ci, ki, in, len * 8, out);
|
/freebsd-13-stable/bin/ps/ |
H A D | ps.c | 1032 descendant_sort(KINFO *ki, int items) argument 1045 if (ki[src].ki_d.level) { 1050 if (!ki[src + nsrc].ki_d.level) 1054 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_pid) 1056 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_ppid) 1066 if (ki[dst + ndst].ki_d.level <= ki[dst].ki_d.level) 1070 ki[ 1210 format_output(KINFO *ki) argument 1252 fmt(char **(*fn)(kvm_t *, const struct kinfo_proc *, int), KINFO *ki, char *comm, char *thread, int maxlen) argument 1265 saveuser(KINFO *ki) argument [all...] |
/freebsd-13-stable/sys/kern/ |
H A D | vfs_aio.c | 282 #define AIO_LOCK(ki) mtx_lock(&(ki)->kaio_mtx) 283 #define AIO_UNLOCK(ki) mtx_unlock(&(ki)->kaio_mtx) 284 #define AIO_LOCK_ASSERT(ki, f) mtx_assert(&(ki)->kaio_mtx, (f)) 285 #define AIO_MTX(ki) (&(ki)->kaio_mtx) 439 struct kaioinfo *ki; local 441 ki 496 struct kaioinfo *ki; local 579 aio_cancel_job(struct proc *p, struct kaioinfo *ki, struct kaiocb *job) argument 635 struct kaioinfo *ki; local 697 struct kaioinfo *ki; local 877 struct kaioinfo *ki; local 946 struct kaioinfo *ki; local 991 struct kaioinfo *ki; local 1015 struct kaioinfo *ki; local 1028 struct kaioinfo *ki; local 1071 struct kaioinfo *ki; local 1217 struct kaioinfo *ki; local 1506 struct kaioinfo *ki; local 1770 struct kaioinfo *ki; local 1783 struct kaioinfo *ki; local 1845 struct kaioinfo *ki = userp->p_aioinfo; local 1862 struct kaioinfo *ki = userp->p_aioinfo; local 1910 struct kaioinfo *ki; local 1957 struct kaioinfo *ki; local 2043 struct kaioinfo *ki; local 2120 struct kaioinfo *ki; local 2227 struct kaioinfo *ki; local 2438 struct kaioinfo *ki; local 2508 struct kaioinfo *ki; local [all...] |
H A D | kern_proc.c | 1387 freebsd32_kinfo_proc_out(const struct kinfo_proc *ki, struct kinfo_proc32 *ki32) argument 1393 CP(*ki, *ki32, ki_layout); 1394 PTRTRIM_CP(*ki, *ki32, ki_args); 1395 PTRTRIM_CP(*ki, *ki32, ki_paddr); 1396 PTRTRIM_CP(*ki, *ki32, ki_addr); 1397 PTRTRIM_CP(*ki, *ki32, ki_tracep); 1398 PTRTRIM_CP(*ki, *ki32, ki_textvp); 1399 PTRTRIM_CP(*ki, *ki32, ki_fd); 1400 PTRTRIM_CP(*ki, *ki32, ki_vmspace); 1401 PTRTRIM_CP(*ki, *ki3 1510 struct kinfo_proc ki; local 1555 struct kinfo_proc ki; local [all...] |
/freebsd-13-stable/crypto/openssl/crypto/md5/asm/ |
H A D | md5-586.pl | 57 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 60 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one 64 &comment("R0 $ki"); 71 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 85 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 87 &comment("R1 $ki"); 94 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2); 107 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_; 112 &comment("R2 $ki"); 122 &mov($tmp2,&DWP($xo[$ki [all...] |
/freebsd-13-stable/sys/dev/kbdmux/ |
H A D | kbdmux.c | 1017 keyboard_info_t *ki; local 1028 ki = (keyboard_info_t *) arg; 1030 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || 1031 strcmp(ki->kb_name, "*") == 0) 1037 if (k->kbd->kb_unit == ki->kb_unit && 1038 strcmp(k->kbd->kb_name, ki->kb_name) == 0) 1056 ki->kb_name, 1057 ki [all...] |
/freebsd-13-stable/lib/libjail/ |
H A D | jail.c | 572 int i, ai, ki, jid, arrays, sanity; local 607 ki = ai; 608 jiov[ki].iov_base = jp_key->jp_name; 609 jiov[ki].iov_len = strlen(jp_key->jp_name) + 1; 610 ki++; 611 jiov[ki].iov_base = jp_key->jp_value; 612 jiov[ki].iov_len = (jp_key->jp_ctltype & CTLTYPE) == CTLTYPE_STRING 614 ki++; 615 jiov[ki].iov_base = __DECONST(char *, "errmsg"); 616 jiov[ki] [all...] |
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 172 } ki[2] = { variable in typeref:struct:key_info 777 encrypt_keyid(&ki[1], keyid, len); 782 encrypt_keyid(&ki[0], keyid, len); 793 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; 857 for (i = 0; i < ki[0].keylen; ++i) { 858 if ((*p++ = ki[0].keyid[i]) == IAC) 911 for (i = 0; i < ki[1].keylen; ++i) { 912 if ((*p++ = ki[1].keyid[i]) == IAC)
|
/freebsd-13-stable/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 176 } ki[2] = { variable in typeref:struct:key_info 704 encrypt_keyid(&ki[1], keyid, len); 710 encrypt_keyid(&ki[0], keyid, len); 765 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; 829 for (i = 0; i < ki[0].keylen; ++i) { 830 if ((*p++ = ki[0].keyid[i]) == IAC) 883 for (i = 0; i < ki[1].keylen; ++i) { 884 if ((*p++ = ki[1].keyid[i]) == IAC)
|
/freebsd-13-stable/crypto/openssl/crypto/rc2/ |
H A D | rc2_skey.c | 53 RC2_INT *ki; local 91 ki = &(key->data[63]); 93 *(ki--) = ((k[i] << 8) | k[i - 1]) & 0xffff;
|
/freebsd-13-stable/contrib/less/ |
H A D | command.c | 937 int ki = 0; local 944 keys[ki] = c; 945 if (c != orig[ki] || ki >= sizeof(keys)-1) 950 while (ki > 0) 951 (*gr_ungetc)(keys[ki--]); 954 if (orig[++ki] == '\0') 958 ki = strlen(repl)-1; 959 while (ki > 0) 960 (*gr_ungetc)(repl[ki [all...] |
/freebsd-13-stable/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 85 u8 ki[16]; member in struct:milenage_parameters 126 " ki CHAR(32) NOT NULL," 173 if (os_strcmp(col[i], "ki") == 0 && argv[i] && 174 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) { 175 printf("Invalid ki value in database\n"); 439 hexstr2bin(pos, m->ki, 16)) { 539 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16); 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 688 gsm_milenage(m->opc, m->ki, _ran [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
|
H A D | eap_eke_common.c | 468 os_memcpy(sess->ki, buf + ke_len, ki_len); 469 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); 628 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) 660 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 726 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN);
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 146 PKCS8PrivateKeyInfo ki; local 151 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 160 &ki.privateKeyAlgorithm, 162 &ki.privateKey, 164 free_PKCS8PrivateKeyInfo(&ki);
|
H A D | ks_p12.c | 75 PKCS8PrivateKeyInfo ki; local 83 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 89 &ki.privateKeyAlgorithm, 91 &ki.privateKey, 93 free_PKCS8PrivateKeyInfo(&ki);
|
/freebsd-13-stable/usr.sbin/jail/ |
H A D | command.c | 879 struct kinfo_proc *ki; local 895 ki = kvm_getprocs(kd, KERN_PROC_PROC, 0, &pcnt); 896 if (ki == NULL) 900 if (ki[i].ki_jid == j->jid && 901 kill(ki[i].ki_pid, SIGTERM) == 0) { 902 (void)add_proc(j, ki[i].ki_pid); 908 printf(" %d", ki[i].ki_pid);
|
/freebsd-13-stable/contrib/ncurses/ncurses/tty/ |
H A D | lib_twait.c | 195 KBDKEYINFO ki; local 378 || (KbdPeek(&ki, 0) == 0 379 && (ki.fbStatus & KBDTRF_FINAL_CHAR_IN)))) {
|
/freebsd-13-stable/tests/sys/fs/fusefs/ |
H A D | mockfs.cc | 825 struct kinfo_proc *ki; 828 ki = kinfo_getproc(pid); 829 if (ki == NULL) 835 if (0 == strncmp("aiod", ki->ki_comm, 4)) 837 free(ki);
|
/freebsd-13-stable/sys/dev/kbd/ |
H A D | kbd.c | 202 keyboard_info_t ki; local 230 bzero(&ki, sizeof(ki)); 231 strcpy(ki.kb_name, kbd->kb_name); 232 ki.kb_unit = kbd->kb_unit; 234 (void)kbdd_ioctl(mux, KBADDKBD, (caddr_t) &ki);
|
/freebsd-13-stable/contrib/wpa/src/pae/ |
H A D | ieee802_1x_kay.h | 270 struct ieee802_1x_mka_ki *ki);
|