/freebsd-current/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 224 is_initiator(struct krb5_context *kc) argument 226 return (kc->kc_more_flags & LOCAL); 233 is_acceptor(struct krb5_context *kc) argument 235 return !(kc->kc_more_flags & LOCAL); 239 get_initiator_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp) argument 242 if (is_initiator(kc)) 243 copy_key(&kc->kc_local_subkey, kdp); 245 copy_key(&kc->kc_remote_subkey, kdp); 247 copy_key(&kc->kc_keyblock, kdp); 251 get_acceptor_subkey(struct krb5_context *kc, struc argument 261 get_keys(struct krb5_context *kc) argument 399 struct krb5_context *kc = (struct krb5_context *)ctx; local 409 struct krb5_context *kc = (struct krb5_context *)ctx; local 497 struct krb5_context *kc = (struct krb5_context *)ctx; local 772 krb5_sequence_check(struct krb5_context *kc, uint32_t seq) argument 858 krb5_get_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf **micp, uint8_t sgn_alg[2]) argument 945 krb5_get_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf **micp) argument 1012 struct krb5_context *kc = (struct krb5_context *)ctx; local 1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument 1138 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument 1221 struct krb5_context *kc = (struct krb5_context *)ctx; local 1249 krb5_wrap_old(struct krb5_context *kc, int conf_req_flag, struct mbuf **mp, int *conf_state, uint8_t sgn_alg[2], uint8_t seal_alg[2]) argument 1397 krb5_wrap_new(struct krb5_context *kc, int conf_req_flag, struct mbuf **mp, int *conf_state) argument 1548 struct krb5_context *kc = (struct krb5_context *)ctx; local 1600 krb5_unwrap_old(struct krb5_context *kc, struct mbuf **mp, int *conf_state, uint8_t sgn_alg[2], uint8_t seal_alg[2]) argument 1775 krb5_unwrap_new(struct krb5_context *kc, struct mbuf **mp, int *conf_state) argument 1975 struct krb5_context *kc = (struct krb5_context *)ctx; local 2022 struct krb5_context *kc = (struct krb5_context *)ctx; local [all...] |
/freebsd-current/contrib/bearssl/inc/ |
H A D | bearssl_hmac.h | 79 * \param kc HMAC key context to initialise. 84 void br_hmac_key_init(br_hmac_key_context *kc, 93 * \param kc HMAC key context. 97 const br_hmac_key_context *kc) 99 return kc->dig_vtable; 133 * \param kc HMAC key context (already initialised with the key). 137 const br_hmac_key_context *kc, size_t out_len); 96 br_hmac_key_get_digest( const br_hmac_key_context *kc) argument
|
/freebsd-current/contrib/bearssl/src/rand/ |
H A D | hmac_drbg.c | 47 br_hmac_key_context kc; local 55 br_hmac_key_init(&kc, dig, ctx->K, hlen); 60 br_hmac_init(&hc, &kc, 0); 79 br_hmac_init(&hc, &kc, 0); 84 br_hmac_key_init(&kc, dig, ctx->K, hlen); 85 br_hmac_init(&hc, &kc, 0); 95 br_hmac_key_context kc; local 106 br_hmac_key_init(&kc, dig, ctx->K, hlen); 107 br_hmac_init(&hc, &kc, 0); 113 br_hmac_key_init(&kc, di [all...] |
/freebsd-current/contrib/bearssl/src/ssl/ |
H A D | prf.c | 36 br_hmac_key_context kc; local 46 br_hmac_key_init(&kc, dig, secret, secret_len); 47 br_hmac_init(&hc, &kc, 0); 54 br_hmac_init(&hc, &kc, 0); 69 br_hmac_init(&hc, &kc, 0);
|
/freebsd-current/contrib/sendmail/libsm/ |
H A D | memstat.c | 91 static kstat_ctl_t *kc; 109 kc = kstat_open(); 110 if (kc == NULL) 112 kst = kstat_lookup(kc, "unix", 0, 134 if (kc == NULL) 136 r = kstat_close(kc); 162 if (kc == NULL || kst == NULL) 164 if (kstat_read(kc, kst, NULL) == -1)
|
/freebsd-current/contrib/bearssl/src/mac/ |
H A D | hmac.c | 57 br_hmac_key_init(br_hmac_key_context *kc, argument 63 kc->dig_vtable = dig; 72 process_key(&hc.vtable, kc->ksi, key, key_len, 0x36); 73 process_key(&hc.vtable, kc->kso, key, key_len, 0x5C); 79 const br_hmac_key_context *kc, size_t out_len) 84 dig = kc->dig_vtable; 87 dig->set_state(&ctx->dig.vtable, kc->ksi, (uint64_t)blen); 88 memcpy(ctx->kso, kc->kso, sizeof kc->kso); 78 br_hmac_init(br_hmac_context *ctx, const br_hmac_key_context *kc, size_t out_len) argument
|
/freebsd-current/contrib/bearssl/src/kdf/ |
H A D | hkdf.c | 34 br_hmac_key_context kc; local 42 br_hmac_key_init(&kc, digest_vtable, salt, salt_len); 43 br_hmac_init(&hc->u.hmac_ctx, &kc, 0);
|
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 110 struct kc_rsa *kc = RSA_get_app_data(rsa); local 115 SecKeyRef privKeyRef = (SecKeyRef)kc->item; 143 sig.Length = kc->keysize; 162 struct kc_rsa *kc = RSA_get_app_data(rsa); local 167 SecKeyRef privKeyRef = (SecKeyRef)kc->item; 202 out.Length = kc->keysize; 257 struct kc_rsa *kc; local 266 kc = calloc(1, sizeof(*kc)); 267 if (kc [all...] |
/freebsd-current/contrib/wpa/src/utils/ |
H A D | pcsc_funcs.h | 20 unsigned char *sres, unsigned char *kc);
|
H A D | pcsc_funcs.c | 1231 * @kc: 8-byte buffer for Kc 1239 * successfully, SRES and Kc values will be written into sres and kc buffers. 1242 unsigned char *sres, unsigned char *kc) 1296 os_memcpy(kc, buf + 4, 8); 1310 os_memcpy(kc, buf + 6, 8); 1314 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8); 1241 scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, unsigned char *sres, unsigned char *kc) argument
|
/freebsd-current/sys/i386/i386/ |
H A D | copyout.c | 133 vm_offset_t kc; member in struct:copyinstr_arg0 149 *(char *)ca->kc = c; 151 ca->kc++; 167 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc = (vm_offset_t)kaddr; 188 vm_offset_t kc; member in struct:copyin_arg0 198 bcopy((void *)kva, (void *)ca->kc, ca->len); 214 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc = (vm_offset_t)kaddr; 215 plen < len; uc += ca.len, ca.kc += ca.len, plen += ca.len) { 233 bcopy((void *)ca->kc, (void *)kva, ca->len); 249 for (plen = 0, uc = (vm_offset_t)udaddr, ca.kc [all...] |
/freebsd-current/sys/kern/ |
H A D | kern_event.c | 689 kqtimer_sched_callout(struct kq_timer_cb_data *kc) argument 691 callout_reset_sbt_on(&kc->c, kc->next, 0, filt_timerexpire, kc->kn, 692 kc->cpuid, C_ABSOLUTE); 698 struct kq_timer_cb_data *kc, *kc1; local 707 TAILQ_FOREACH_SAFE(kc, &p->p_kqtim_stop, link, kc1) { 708 TAILQ_REMOVE(&p->p_kqtim_stop, kc, link); 709 kc->flags &= ~KQ_TIMER_CB_ENQUEUED; 710 if (kc 720 struct kq_timer_cb_data *kc; local 811 struct kq_timer_cb_data *kc; local 847 struct kq_timer_cb_data *kc; local 863 struct kq_timer_cb_data *kc; local 892 struct kq_timer_cb_data *kc; local [all...] |
H A D | kern_ktrace.c | 821 struct ktr_csw *kc; local 829 kc = &req->ktr_data.ktr_csw; 830 kc->out = out; 831 kc->user = user; 833 strlcpy(kc->wmesg, wmesg, sizeof(kc->wmesg)); 835 bzero(kc->wmesg, sizeof(kc->wmesg));
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | milenage.h | 18 u8 *kc);
|
H A D | milenage.c | 232 * @kc: Buffer for Kc = 64-bit Kc 235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8];
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pool_checkpoint/ |
H A D | checkpoint_capacity.ksh | 84 log_must zdb -e -p $FILEDISKDIR -kc $NESTEDPOOL
|
H A D | pool_checkpoint.kshlib | 343 log_must zdb -e -p $FILEDISKDIR -kc $NESTEDPOOL
|
/freebsd-current/cddl/contrib/opensolaris/cmd/lockstat/ |
H A D | sym.c | 111 kstat_ctl_t *kc; local 115 if ((kc = kstat_open()) == NULL) 118 for (ksp = kc->kc_chain; ksp; ksp = ksp->ks_next) { 133 (void) kstat_close(kc);
|
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres,
|
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap_sim.c | 26 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 149 os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN); 213 if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0) 216 data->kc[i], EAP_SIM_KC_LEN); 264 data->sres[0], data->kc[0]) || 266 data->sres[1], data->kc[1]) || 269 data->sres[2], data->kc[2]))) { 303 data->sres[i], data->kc[i])) { 314 data->kc[i], EAP_SIM_KC_LEN); 333 os_memcpy(data->kc[ [all...] |
/freebsd-current/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 74 u8 kc[8]; member in struct:gsm_triplet 326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) { 617 u8 _rand[16], sres[4], kc[8]; local 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8); 640 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->kc, 8); 684 u8 _rand[16], sres[4], kc[8]; local 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 690 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
|
/freebsd-current/sys/compat/linuxkpi/common/src/ |
H A D | linux_80211_macops.c | 681 struct ieee80211_key_conf *kc) 692 LKPI_80211_TRACE_MO("hw %p cmd %d vif %p sta %p kc %p", hw, cmd, vif, sta, kc); 693 error = lhw->ops->set_key(hw, cmd, vif, sta, kc); 679 lkpi_80211_mo_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *kc) argument
|
H A D | linux_80211.c | 246 lsta->kc, lsta->state, lsta->added_to_drv, lsta->in_mgd); 722 struct ieee80211_key_conf *kc; 733 memset(&kc, 0, sizeof(kc)); 734 kc = malloc(sizeof(*kc) + k->wk_keylen, M_LKPI80211, M_WAITOK | M_ZERO); 735 kc->cipher = lkpi_net80211_to_l80211_cipher_suite( 737 kc->keyidx = k->wk_keyix; 739 kc->hw_key_idx = /* set by hw and needs to be passed for TX */; 741 atomic64_set(&kc 721 struct ieee80211_key_conf *kc; local [all...] |
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 1069 unsigned char kc[8]; local 1111 if (scard_gsm_auth(scard, _rand, sres, kc)) 1115 if (scard_gsm_auth(scard, _rand, sres, kc)) 1177 unsigned char kc[8]; local 1211 if (scard_gsm_auth(scard, _rand, sres, kc)) 1219 printf("%02X", kc[j]);
|
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 77 int num_chal, const u8 *kc, u8 *mk);
|