Searched refs:ki (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-13-stable/crypto/openssh/
H A Dssh-pkcs11-helper.c62 struct pkcs11_keyinfo *ki; local
64 ki = xcalloc(1, sizeof(*ki));
65 ki->providername = xstrdup(name);
66 ki->key = k;
67 TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next);
73 struct pkcs11_keyinfo *ki, *nxt; local
75 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki
90 struct pkcs11_keyinfo *ki; local
[all...]
/freebsd-13-stable/sys/crypto/rijndael/
H A Dtest00.c43 keyInstance ki; local
53 rijndael_makeKey(&ki, DIR_DECRYPT, 128, key);
56 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, out);
60 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, in);
/freebsd-13-stable/sys/geom/bde/
H A Dg_bde_crypt.c82 g_bde_kkey(struct g_bde_softc *sc, keyInstance *ki, int dir, off_t sector) argument
107 AES_makekey(ki, dir, G_BDE_KKEYBITS, buf);
125 keyInstance ki; local
133 g_bde_kkey(sc, &ki, DIR_DECRYPT, wp->offset + o);
134 AES_decrypt(&ci, &ki, d, skey, sizeof skey);
136 AES_makekey(&ki, DIR_DECRYPT, G_BDE_SKEYBITS, skey);
137 AES_decrypt(&ci, &ki, d, d, sc->sectorsize);
141 bzero(&ki, sizeof ki);
159 keyInstance ki; local
199 keyInstance ki; local
[all...]
H A Dg_bde_lock.c311 keyInstance ki; local
317 AES_makekey(&ki, DIR_ENCRYPT, G_BDE_KKEYBITS, sha2 + 0);
318 AES_encrypt(&ci, &ki, buf, output, sizeof buf);
321 explicit_bzero(&ki, sizeof ki);
328 keyInstance ki; local
333 AES_makekey(&ki, DIR_DECRYPT, G_BDE_KKEYBITS, sha2 + 0);
334 AES_decrypt(&ci, &ki, input, buf, sizeof buf);
338 explicit_bzero(&ki, sizeof ki);
362 keyInstance ki; local
[all...]
H A Dg_bde.h186 AES_makekey(keyInstance *ki, int dir, u_int len, const void *key) argument
190 error = rijndael_makeKey(ki, dir, len, key);
195 AES_encrypt(cipherInstance *ci, keyInstance *ki, const void *in, void *out, u_int len) argument
199 error = rijndael_blockEncrypt(ci, ki, in, len * 8, out);
204 AES_decrypt(cipherInstance *ci, keyInstance *ki, const void *in, void *out, u_int len) argument
208 error = rijndael_blockDecrypt(ci, ki, in, len * 8, out);
/freebsd-13-stable/bin/ps/
H A Dps.c1032 descendant_sort(KINFO *ki, int items) argument
1045 if (ki[src].ki_d.level) {
1050 if (!ki[src + nsrc].ki_d.level)
1054 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_pid)
1056 if (ki[dst].ki_p->ki_pid == ki[src].ki_p->ki_ppid)
1066 if (ki[dst + ndst].ki_d.level <= ki[dst].ki_d.level)
1070 ki[
1210 format_output(KINFO *ki) argument
1252 fmt(char **(*fn)(kvm_t *, const struct kinfo_proc *, int), KINFO *ki, char *comm, char *thread, int maxlen) argument
1265 saveuser(KINFO *ki) argument
[all...]
/freebsd-13-stable/sys/kern/
H A Dvfs_aio.c282 #define AIO_LOCK(ki) mtx_lock(&(ki)->kaio_mtx)
283 #define AIO_UNLOCK(ki) mtx_unlock(&(ki)->kaio_mtx)
284 #define AIO_LOCK_ASSERT(ki, f) mtx_assert(&(ki)->kaio_mtx, (f))
285 #define AIO_MTX(ki) (&(ki)->kaio_mtx)
439 struct kaioinfo *ki; local
441 ki
496 struct kaioinfo *ki; local
579 aio_cancel_job(struct proc *p, struct kaioinfo *ki, struct kaiocb *job) argument
635 struct kaioinfo *ki; local
697 struct kaioinfo *ki; local
877 struct kaioinfo *ki; local
946 struct kaioinfo *ki; local
991 struct kaioinfo *ki; local
1015 struct kaioinfo *ki; local
1028 struct kaioinfo *ki; local
1071 struct kaioinfo *ki; local
1217 struct kaioinfo *ki; local
1506 struct kaioinfo *ki; local
1770 struct kaioinfo *ki; local
1783 struct kaioinfo *ki; local
1845 struct kaioinfo *ki = userp->p_aioinfo; local
1862 struct kaioinfo *ki = userp->p_aioinfo; local
1910 struct kaioinfo *ki; local
1957 struct kaioinfo *ki; local
2043 struct kaioinfo *ki; local
2120 struct kaioinfo *ki; local
2227 struct kaioinfo *ki; local
2438 struct kaioinfo *ki; local
2508 struct kaioinfo *ki; local
[all...]
H A Dkern_proc.c1387 freebsd32_kinfo_proc_out(const struct kinfo_proc *ki, struct kinfo_proc32 *ki32) argument
1393 CP(*ki, *ki32, ki_layout);
1394 PTRTRIM_CP(*ki, *ki32, ki_args);
1395 PTRTRIM_CP(*ki, *ki32, ki_paddr);
1396 PTRTRIM_CP(*ki, *ki32, ki_addr);
1397 PTRTRIM_CP(*ki, *ki32, ki_tracep);
1398 PTRTRIM_CP(*ki, *ki32, ki_textvp);
1399 PTRTRIM_CP(*ki, *ki32, ki_fd);
1400 PTRTRIM_CP(*ki, *ki32, ki_vmspace);
1401 PTRTRIM_CP(*ki, *ki3
1510 struct kinfo_proc ki; local
1555 struct kinfo_proc ki; local
[all...]
/freebsd-13-stable/crypto/openssl/crypto/md5/asm/
H A Dmd5-586.pl57 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_;
60 &mov($tmp2,&DWP($xo[$ki]*4,$K,"",0)) if $pos < 0; # very first one
64 &comment("R0 $ki");
71 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2);
85 local($pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_;
87 &comment("R1 $ki");
94 &mov($tmp2,&DWP($xo[$ki+1]*4,$K,"",0)) if ($pos != 2);
107 local($n,$pos,$a,$b,$c,$d,$K,$ki,$s,$t)=@_;
112 &comment("R2 $ki");
122 &mov($tmp2,&DWP($xo[$ki
[all...]
/freebsd-13-stable/sys/dev/kbdmux/
H A Dkbdmux.c1017 keyboard_info_t *ki; local
1028 ki = (keyboard_info_t *) arg;
1030 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' ||
1031 strcmp(ki->kb_name, "*") == 0)
1037 if (k->kbd->kb_unit == ki->kb_unit &&
1038 strcmp(k->kbd->kb_name, ki->kb_name) == 0)
1056 ki->kb_name,
1057 ki
[all...]
/freebsd-13-stable/lib/libjail/
H A Djail.c572 int i, ai, ki, jid, arrays, sanity; local
607 ki = ai;
608 jiov[ki].iov_base = jp_key->jp_name;
609 jiov[ki].iov_len = strlen(jp_key->jp_name) + 1;
610 ki++;
611 jiov[ki].iov_base = jp_key->jp_value;
612 jiov[ki].iov_len = (jp_key->jp_ctltype & CTLTYPE) == CTLTYPE_STRING
614 ki++;
615 jiov[ki].iov_base = __DECONST(char *, "errmsg");
616 jiov[ki]
[all...]
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c172 } ki[2] = { variable in typeref:struct:key_info
777 encrypt_keyid(&ki[1], keyid, len);
782 encrypt_keyid(&ki[0], keyid, len);
793 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
857 for (i = 0; i < ki[0].keylen; ++i) {
858 if ((*p++ = ki[0].keyid[i]) == IAC)
911 for (i = 0; i < ki[1].keylen; ++i) {
912 if ((*p++ = ki[1].keyid[i]) == IAC)
/freebsd-13-stable/contrib/telnet/libtelnet/
H A Dencrypt.c176 } ki[2] = { variable in typeref:struct:key_info
704 encrypt_keyid(&ki[1], keyid, len);
710 encrypt_keyid(&ki[0], keyid, len);
765 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
829 for (i = 0; i < ki[0].keylen; ++i) {
830 if ((*p++ = ki[0].keyid[i]) == IAC)
883 for (i = 0; i < ki[1].keylen; ++i) {
884 if ((*p++ = ki[1].keyid[i]) == IAC)
/freebsd-13-stable/crypto/openssl/crypto/rc2/
H A Drc2_skey.c53 RC2_INT *ki; local
91 ki = &(key->data[63]);
93 *(ki--) = ((k[i] << 8) | k[i - 1]) & 0xffff;
/freebsd-13-stable/contrib/less/
H A Dcommand.c937 int ki = 0; local
944 keys[ki] = c;
945 if (c != orig[ki] || ki >= sizeof(keys)-1)
950 while (ki > 0)
951 (*gr_ungetc)(keys[ki--]);
954 if (orig[++ki] == '\0')
958 ki = strlen(repl)-1;
959 while (ki > 0)
960 (*gr_ungetc)(repl[ki
[all...]
/freebsd-13-stable/contrib/wpa/hostapd/
H A Dhlr_auc_gw.c85 u8 ki[16]; member in struct:milenage_parameters
126 " ki CHAR(32) NOT NULL,"
173 if (os_strcmp(col[i], "ki") == 0 && argv[i] &&
174 hexstr2bin(argv[i], m->ki, sizeof(m->ki))) {
175 printf("Invalid ki value in database\n");
439 hexstr2bin(pos, m->ki, 16)) {
539 pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16);
621 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
688 gsm_milenage(m->opc, m->ki, _ran
[all...]
/freebsd-13-stable/contrib/wpa/src/eap_common/
H A Deap_eke_common.h70 u8 ki[EAP_EKE_MAX_KI_LEN]; member in struct:eap_eke_session
H A Deap_eke_common.c468 os_memcpy(sess->ki, buf + ke_len, ki_len);
469 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len);
628 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0)
660 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size,
726 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN);
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dks_file.c146 PKCS8PrivateKeyInfo ki; local
151 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL);
160 &ki.privateKeyAlgorithm,
162 &ki.privateKey,
164 free_PKCS8PrivateKeyInfo(&ki);
H A Dks_p12.c75 PKCS8PrivateKeyInfo ki; local
83 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL);
89 &ki.privateKeyAlgorithm,
91 &ki.privateKey,
93 free_PKCS8PrivateKeyInfo(&ki);
/freebsd-13-stable/usr.sbin/jail/
H A Dcommand.c879 struct kinfo_proc *ki; local
895 ki = kvm_getprocs(kd, KERN_PROC_PROC, 0, &pcnt);
896 if (ki == NULL)
900 if (ki[i].ki_jid == j->jid &&
901 kill(ki[i].ki_pid, SIGTERM) == 0) {
902 (void)add_proc(j, ki[i].ki_pid);
908 printf(" %d", ki[i].ki_pid);
/freebsd-13-stable/contrib/ncurses/ncurses/tty/
H A Dlib_twait.c195 KBDKEYINFO ki; local
378 || (KbdPeek(&ki, 0) == 0
379 && (ki.fbStatus & KBDTRF_FINAL_CHAR_IN)))) {
/freebsd-13-stable/tests/sys/fs/fusefs/
H A Dmockfs.cc825 struct kinfo_proc *ki;
828 ki = kinfo_getproc(pid);
829 if (ki == NULL)
835 if (0 == strncmp("aiod", ki->ki_comm, 4))
837 free(ki);
/freebsd-13-stable/sys/dev/kbd/
H A Dkbd.c202 keyboard_info_t ki; local
230 bzero(&ki, sizeof(ki));
231 strcpy(ki.kb_name, kbd->kb_name);
232 ki.kb_unit = kbd->kb_unit;
234 (void)kbdd_ioctl(mux, KBADDKBD, (caddr_t) &ki);
/freebsd-13-stable/contrib/wpa/src/pae/
H A Dieee802_1x_kay.h270 struct ieee802_1x_mka_ki *ki);

Completed in 191 milliseconds

12