Searched refs:kc (Results 1 - 25 of 34) sorted by relevance

12

/freebsd-current/sys/kgssapi/krb5/
H A Dkrb5_mech.c224 is_initiator(struct krb5_context *kc) argument
226 return (kc->kc_more_flags & LOCAL);
233 is_acceptor(struct krb5_context *kc) argument
235 return !(kc->kc_more_flags & LOCAL);
239 get_initiator_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp) argument
242 if (is_initiator(kc))
243 copy_key(&kc->kc_local_subkey, kdp);
245 copy_key(&kc->kc_remote_subkey, kdp);
247 copy_key(&kc->kc_keyblock, kdp);
251 get_acceptor_subkey(struct krb5_context *kc, struc argument
261 get_keys(struct krb5_context *kc) argument
399 struct krb5_context *kc = (struct krb5_context *)ctx; local
409 struct krb5_context *kc = (struct krb5_context *)ctx; local
497 struct krb5_context *kc = (struct krb5_context *)ctx; local
772 krb5_sequence_check(struct krb5_context *kc, uint32_t seq) argument
858 krb5_get_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf **micp, uint8_t sgn_alg[2]) argument
945 krb5_get_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf **micp) argument
1012 struct krb5_context *kc = (struct krb5_context *)ctx; local
1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument
1138 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument
1221 struct krb5_context *kc = (struct krb5_context *)ctx; local
1249 krb5_wrap_old(struct krb5_context *kc, int conf_req_flag, struct mbuf **mp, int *conf_state, uint8_t sgn_alg[2], uint8_t seal_alg[2]) argument
1397 krb5_wrap_new(struct krb5_context *kc, int conf_req_flag, struct mbuf **mp, int *conf_state) argument
1548 struct krb5_context *kc = (struct krb5_context *)ctx; local
1600 krb5_unwrap_old(struct krb5_context *kc, struct mbuf **mp, int *conf_state, uint8_t sgn_alg[2], uint8_t seal_alg[2]) argument
1775 krb5_unwrap_new(struct krb5_context *kc, struct mbuf **mp, int *conf_state) argument
1975 struct krb5_context *kc = (struct krb5_context *)ctx; local
2022 struct krb5_context *kc = (struct krb5_context *)ctx; local
[all...]
/freebsd-current/contrib/bearssl/inc/
H A Dbearssl_hmac.h79 * \param kc HMAC key context to initialise.
84 void br_hmac_key_init(br_hmac_key_context *kc,
93 * \param kc HMAC key context.
97 const br_hmac_key_context *kc)
99 return kc->dig_vtable;
133 * \param kc HMAC key context (already initialised with the key).
137 const br_hmac_key_context *kc, size_t out_len);
96 br_hmac_key_get_digest( const br_hmac_key_context *kc) argument
/freebsd-current/contrib/bearssl/src/rand/
H A Dhmac_drbg.c47 br_hmac_key_context kc; local
55 br_hmac_key_init(&kc, dig, ctx->K, hlen);
60 br_hmac_init(&hc, &kc, 0);
79 br_hmac_init(&hc, &kc, 0);
84 br_hmac_key_init(&kc, dig, ctx->K, hlen);
85 br_hmac_init(&hc, &kc, 0);
95 br_hmac_key_context kc; local
106 br_hmac_key_init(&kc, dig, ctx->K, hlen);
107 br_hmac_init(&hc, &kc, 0);
113 br_hmac_key_init(&kc, di
[all...]
/freebsd-current/contrib/bearssl/src/ssl/
H A Dprf.c36 br_hmac_key_context kc; local
46 br_hmac_key_init(&kc, dig, secret, secret_len);
47 br_hmac_init(&hc, &kc, 0);
54 br_hmac_init(&hc, &kc, 0);
69 br_hmac_init(&hc, &kc, 0);
/freebsd-current/contrib/sendmail/libsm/
H A Dmemstat.c91 static kstat_ctl_t *kc;
109 kc = kstat_open();
110 if (kc == NULL)
112 kst = kstat_lookup(kc, "unix", 0,
134 if (kc == NULL)
136 r = kstat_close(kc);
162 if (kc == NULL || kst == NULL)
164 if (kstat_read(kc, kst, NULL) == -1)
/freebsd-current/contrib/bearssl/src/mac/
H A Dhmac.c57 br_hmac_key_init(br_hmac_key_context *kc, argument
63 kc->dig_vtable = dig;
72 process_key(&hc.vtable, kc->ksi, key, key_len, 0x36);
73 process_key(&hc.vtable, kc->kso, key, key_len, 0x5C);
79 const br_hmac_key_context *kc, size_t out_len)
84 dig = kc->dig_vtable;
87 dig->set_state(&ctx->dig.vtable, kc->ksi, (uint64_t)blen);
88 memcpy(ctx->kso, kc->kso, sizeof kc->kso);
78 br_hmac_init(br_hmac_context *ctx, const br_hmac_key_context *kc, size_t out_len) argument
/freebsd-current/contrib/bearssl/src/kdf/
H A Dhkdf.c34 br_hmac_key_context kc; local
42 br_hmac_key_init(&kc, digest_vtable, salt, salt_len);
43 br_hmac_init(&hc->u.hmac_ctx, &kc, 0);
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dks_keychain.c110 struct kc_rsa *kc = RSA_get_app_data(rsa); local
115 SecKeyRef privKeyRef = (SecKeyRef)kc->item;
143 sig.Length = kc->keysize;
162 struct kc_rsa *kc = RSA_get_app_data(rsa); local
167 SecKeyRef privKeyRef = (SecKeyRef)kc->item;
202 out.Length = kc->keysize;
257 struct kc_rsa *kc; local
266 kc = calloc(1, sizeof(*kc));
267 if (kc
[all...]
/freebsd-current/contrib/wpa/src/utils/
H A Dpcsc_funcs.h20 unsigned char *sres, unsigned char *kc);
H A Dpcsc_funcs.c1231 * @kc: 8-byte buffer for Kc
1239 * successfully, SRES and Kc values will be written into sres and kc buffers.
1242 unsigned char *sres, unsigned char *kc)
1296 os_memcpy(kc, buf + 4, 8);
1310 os_memcpy(kc, buf + 6, 8);
1314 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8);
1241 scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, unsigned char *sres, unsigned char *kc) argument
/freebsd-current/sys/i386/i386/
H A Dcopyout.c133 vm_offset_t kc; member in struct:copyinstr_arg0
149 *(char *)ca->kc = c;
151 ca->kc++;
167 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc = (vm_offset_t)kaddr;
188 vm_offset_t kc; member in struct:copyin_arg0
198 bcopy((void *)kva, (void *)ca->kc, ca->len);
214 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc = (vm_offset_t)kaddr;
215 plen < len; uc += ca.len, ca.kc += ca.len, plen += ca.len) {
233 bcopy((void *)ca->kc, (void *)kva, ca->len);
249 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc
[all...]
/freebsd-current/sys/kern/
H A Dkern_event.c689 kqtimer_sched_callout(struct kq_timer_cb_data *kc) argument
691 callout_reset_sbt_on(&kc->c, kc->next, 0, filt_timerexpire, kc->kn,
692 kc->cpuid, C_ABSOLUTE);
698 struct kq_timer_cb_data *kc, *kc1; local
707 TAILQ_FOREACH_SAFE(kc, &p->p_kqtim_stop, link, kc1) {
708 TAILQ_REMOVE(&p->p_kqtim_stop, kc, link);
709 kc->flags &= ~KQ_TIMER_CB_ENQUEUED;
710 if (kc
720 struct kq_timer_cb_data *kc; local
811 struct kq_timer_cb_data *kc; local
847 struct kq_timer_cb_data *kc; local
863 struct kq_timer_cb_data *kc; local
892 struct kq_timer_cb_data *kc; local
[all...]
H A Dkern_ktrace.c821 struct ktr_csw *kc; local
829 kc = &req->ktr_data.ktr_csw;
830 kc->out = out;
831 kc->user = user;
833 strlcpy(kc->wmesg, wmesg, sizeof(kc->wmesg));
835 bzero(kc->wmesg, sizeof(kc->wmesg));
/freebsd-current/contrib/wpa/src/crypto/
H A Dmilenage.h18 u8 *kc);
H A Dmilenage.c232 * @kc: Buffer for Kc = 64-bit Kc
235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument
244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8];
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pool_checkpoint/
H A Dcheckpoint_capacity.ksh84 log_must zdb -e -p $FILEDISKDIR -kc $NESTEDPOOL
H A Dpool_checkpoint.kshlib343 log_must zdb -e -p $FILEDISKDIR -kc $NESTEDPOOL
/freebsd-current/cddl/contrib/opensolaris/cmd/lockstat/
H A Dsym.c111 kstat_ctl_t *kc; local
115 if ((kc = kstat_open()) == NULL)
118 for (ksp = kc->kc_chain; ksp; ksp = ksp->ks_next) {
133 (void) kstat_close(kc);
/freebsd-current/contrib/wpa/src/eap_server/
H A Deap_sim_db.h42 u8 *_rand, u8 *kc, u8 *sres,
/freebsd-current/contrib/wpa/src/eap_peer/
H A Deap_sim.c26 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
149 os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN);
213 if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0)
216 data->kc[i], EAP_SIM_KC_LEN);
264 data->sres[0], data->kc[0]) ||
266 data->sres[1], data->kc[1]) ||
269 data->sres[2], data->kc[2]))) {
303 data->sres[i], data->kc[i])) {
314 data->kc[i], EAP_SIM_KC_LEN);
333 os_memcpy(data->kc[
[all...]
/freebsd-current/contrib/wpa/hostapd/
H A Dhlr_auc_gw.c74 u8 kc[8]; member in struct:gsm_triplet
326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) {
617 u8 _rand[16], sres[4], kc[8]; local
621 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
640 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->kc, 8);
684 u8 _rand[16], sres[4], kc[8]; local
688 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
690 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
/freebsd-current/sys/compat/linuxkpi/common/src/
H A Dlinux_80211_macops.c681 struct ieee80211_key_conf *kc)
692 LKPI_80211_TRACE_MO("hw %p cmd %d vif %p sta %p kc %p", hw, cmd, vif, sta, kc);
693 error = lhw->ops->set_key(hw, cmd, vif, sta, kc);
679 lkpi_80211_mo_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *kc) argument
H A Dlinux_80211.c246 lsta->kc, lsta->state, lsta->added_to_drv, lsta->in_mgd);
722 struct ieee80211_key_conf *kc;
733 memset(&kc, 0, sizeof(kc));
734 kc = malloc(sizeof(*kc) + k->wk_keylen, M_LKPI80211, M_WAITOK | M_ZERO);
735 kc->cipher = lkpi_net80211_to_l80211_cipher_suite(
737 kc->keyidx = k->wk_keyix;
739 kc->hw_key_idx = /* set by hw and needs to be passed for TX */;
741 atomic64_set(&kc
721 struct ieee80211_key_conf *kc; local
[all...]
/freebsd-current/contrib/wpa/wpa_supplicant/
H A Deapol_test.c1069 unsigned char kc[8]; local
1111 if (scard_gsm_auth(scard, _rand, sres, kc))
1115 if (scard_gsm_auth(scard, _rand, sres, kc))
1177 unsigned char kc[8]; local
1211 if (scard_gsm_auth(scard, _rand, sres, kc))
1219 printf("%02X", kc[j]);
/freebsd-current/contrib/wpa/src/eap_common/
H A Deap_sim_common.h77 int num_chal, const u8 *kc, u8 *mk);

Completed in 186 milliseconds

12