/freebsd-11-stable/contrib/netbsd-tests/kernel/kqueue/ |
H A D | t_proc3.c | 61 struct kevent ke; local 66 EV_SET(&ke, (uintptr_t)getpid(), EVFILT_PROC, EV_ADD, NOTE_TRACK, 0, 0); 68 RL(kevent(kq, &ke, 1, NULL, 0, NULL)); 82 ke.ident = 0; 83 ke.fflags = 0; 84 ke.flags = EV_ENABLE; 86 RL(kevent(kq, NULL, 0, &ke, 1, &timeout)); 89 ATF_REQUIRE(ke.fflags & NOTE_CHILD); 90 ATF_REQUIRE((ke.fflags & NOTE_TRACKERR) == 0); 91 ATF_REQUIRE_EQ((pid_t)ke [all...] |
H A D | t_proc2.c | 94 struct kevent ke; local 109 EV_SET(&ke, (uintptr_t)pid, EVFILT_PROC, EV_ADD, NOTE_FORK|NOTE_TRACK, 112 RL(kevent(kq, &ke, 1, NULL, 0, &timeout)); 116 ke.ident = 0; 117 ke.fflags = 0; 118 ke.flags = EV_ENABLE; 120 RL(kevent(kq, NULL, 0, &ke, 1, &timeout)); 131 ATF_REQUIRE(ke.fflags & NOTE_TRACKERR);
|
/freebsd-11-stable/contrib/binutils/opcodes/ |
H A D | cgen-opc.c | 51 const CGEN_KEYWORD_ENTRY *ke; local 57 ke = kt->name_hash_table[hash_keyword_name (kt, name, 0)]; 63 while (ke != NULL) 66 p = ke->name; 74 return ke; 76 ke = ke->next_name; 90 const CGEN_KEYWORD_ENTRY *ke; local 95 ke = kt->value_hash_table[hash_keyword_value (kt, value)]; 97 while (ke ! 110 cgen_keyword_add(CGEN_KEYWORD *kt, CGEN_KEYWORD_ENTRY *ke) argument [all...] |
H A D | cgen-asm.c | 203 const CGEN_KEYWORD_ENTRY *ke; 238 ke = cgen_keyword_lookup_name (keyword_table, buf); 240 if (ke != NULL) 242 *valuep = ke->value; 244 if (ke->name[0] != 0) 202 const CGEN_KEYWORD_ENTRY *ke; local
|
/freebsd-11-stable/tools/regression/sockets/kqueue/ |
H A D | kqueue.c | 107 struct kevent ke; local 112 EV_SET(&ke, fd[0], EVFILT_READ, EV_ADD, 0, 0, NULL); 113 if (kevent(kq, &ke, 1, NULL, 0, NULL) == -1) 122 i = kevent(kq, NULL, 0, &ke, 1, &ts); 148 i = kevent(kq, NULL, 0, &ke, 1, &ts); 173 i = kevent(kq, NULL, 0, &ke, 1, &ts); 182 EV_SET(&ke, fd[0], EVFILT_READ, EV_DELETE, 0, 0, NULL); 183 if (kevent(kq, &ke, 1, NULL, 0, NULL) == -1) 192 struct kevent ke; local 197 EV_SET(&ke, f [all...] |
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf_table.c | 88 #define KENTRY_NETWORK(ke) ((ke)->pfrke_net < AF_BITS((ke)->pfrke_af)) 89 #define KENTRY_RNF_ROOT(ke) \ 90 ((((struct radix_node *)(ke))->rn_flags & RNF_ROOT) != 0) 137 const struct pfr_kentry *ke); 754 struct pfr_kentry *ke; local 768 ke = (struct pfr_kentry *)rn_lookup(&sa, &mask, head); 769 if (ke && KENTRY_RNF_ROOT(ke)) 782 pfr_create_kentry_counter(struct pfr_kentry *ke, int pfr_dir, int pfr_op) argument 800 struct pfr_kentry *ke; local 850 pfr_destroy_kentry(struct pfr_kentry *ke) argument 993 pfr_route_kentry(struct pfr_ktable *kt, struct pfr_kentry *ke) argument 1017 pfr_unroute_kentry(struct pfr_ktable *kt, struct pfr_kentry *ke) argument 1042 pfr_copyout_addr(struct pfr_addr *ad, const struct pfr_kentry *ke) argument 1057 pfr_copyout_astats(struct pfr_astats *as, const struct pfr_kentry *ke, const struct pfr_walktree *w) argument 1086 struct pfr_kentry *ke = (struct pfr_kentry *)rn; local 2038 struct pfr_kentry *ke = NULL; local 2092 struct pfr_kentry *ke = NULL; local 2206 struct pfr_kentry *ke, *ke2 = NULL; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto-arcfour.c | 135 struct _krb5_key_data ke; local 159 ke.key = &kb; 165 ret = _krb5_internal_hmac(NULL, c, cdata + 16, len - 16, 0, &ke, &cksum); 169 ke.key = &kb; 175 ret = _krb5_internal_hmac(NULL, c, data, 16, 0, &ke, &k3_c); 202 struct _krb5_key_data ke; local 227 ke.key = &kb; 233 ret = _krb5_internal_hmac(NULL, c, cdata, 16, 0, &ke, &k3_c); 242 ke.key = &kb; 248 ret = _krb5_internal_hmac(NULL, c, cdata + 16, len - 16, 0, &ke, [all...] |
/freebsd-11-stable/tests/sys/kern/pipe/ |
H A D | pipe_fstat_bug_test.c | 53 struct kevent event, ke; local 128 EV_SET(&ke, desc[0], EVFILT_READ, EV_ADD, 0, 0, NULL); 131 if (kevent(kq, &ke, 1, NULL, 0, NULL) != 0)
|
/freebsd-11-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 181 struct sshkey *ke; local 314 ASSERT_INT_EQ(sshkey_generate(KEY_ECDSA, 256, &ke), 0); 315 ASSERT_PTR_NE(ke, NULL); 316 ASSERT_PTR_NE(ke->ecdsa, NULL); 317 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); 318 ASSERT_PTR_NE(EC_KEY_get0_private_key(ke->ecdsa), NULL); 363 ASSERT_INT_EQ(sshkey_demote(ke, &k1), 0); 365 ASSERT_PTR_NE(ke, k1); 368 ASSERT_INT_EQ(k1->ecdsa_nid, ke->ecdsa_nid); 369 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke [all...] |
/freebsd-11-stable/tests/sys/aio/ |
H A D | aio_kqueue_test.c | 62 struct kevent ke, kq_returned; local 159 bzero(&ke, sizeof(ke)); 160 bzero(&kq_returned, sizeof(ke));
|
H A D | lio_kqueue_test.c | 66 struct kevent ke, kq_returned; local 156 bzero(&ke, sizeof(ke)); 157 bzero(&kq_returned, sizeof(ke)); 163 EV_SET(&ke, (uintptr_t)lio[j],
|
/freebsd-11-stable/contrib/sqlite3/tea/win/ |
H A D | nmakehlp.c | 614 unsigned char *ks, *ke, *vs, *ve; 617 ke = ks; 618 while (ke && *ke && !isspace(*ke)) ++ke; 619 vs = ke; 623 *ke = 0, *ve = 0; 606 unsigned char *ks, *ke, *vs, *ve; local
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | test_query.in | 119 echo "make sure entry is found (cert ke)" 124 echo "make sure entry is found (cert ke + ds)" 135 echo "make sure entry is not found (cert-ds ke)" 140 echo "make sure entry is not found (cert-ds ke + ds)" 146 echo "make sure entry is not found (cert-ke ds)" 149 FILE:$srcdir/data/test-ke-only.crt >/dev/null 2>/dev/null && exit 1 151 echo "make sure entry is found (cert-ke ke)" 154 FILE:$srcdir/data/test-ke-only.crt >/dev/null 2>/dev/null || exit 1 156 echo "make sure entry is not found (cert-ke k [all...] |
H A D | test_cms.in | 347 echo "create signed data (ke cert)" 349 --certificate=FILE:$srcdir/data/test-ke-only.crt,$srcdir/data/test-ke-only.key \ 353 echo "create signed data (sd + ke certs)" 355 --certificate=FILE:$srcdir/data/test-ke-only.crt,$srcdir/data/test-ke-only.key \ 360 echo "create signed data (ke + sd certs)" 363 --certificate=FILE:$srcdir/data/test-ke-only.crt,$srcdir/data/test-ke-only.key \
|
/freebsd-11-stable/lib/libutil/tests/ |
H A D | pidfile_test.c | 133 struct kevent event, ke; local 176 EV_SET(&ke, SIGINT, EVFILT_SIGNAL, EV_ADD, 0, 0, NULL); 178 if (kevent(kq, &ke, 1, NULL, 0, NULL) != 0)
|
/freebsd-11-stable/contrib/apr/poll/unix/ |
H A D | kqueue.c | 369 pollcb->pollset.ke = (struct kevent *) apr_pcalloc(p, 2 * size * sizeof(struct kevent)); 460 ret = kevent(pollcb->fd, NULL, 0, pollcb->pollset.ke, 2 * pollcb->nalloc, 471 apr_pollfd_t *pollfd = (apr_pollfd_t *)(pollcb->pollset.ke[i].udata); 480 pollfd->rtnevents = get_kqueue_revent(pollcb->pollset.ke[i].filter, 481 pollcb->pollset.ke[i].flags);
|
/freebsd-11-stable/usr.sbin/jail/ |
H A D | command.c | 216 struct kevent ke; local 245 switch (kevent(kq, NULL, 0, &ke, 1, tsp)) { 259 (void)waitpid(ke.ident, NULL, WNOHANG); 260 if ((j = find_proc(ke.ident))) { 261 j->pstatus = ke.data; 759 struct kevent ke; local 765 EV_SET(&ke, pid, EVFILT_PROC, EV_ADD, NOTE_EXIT, 0, NULL); 766 if (kevent(kq, &ke, 1, NULL, 0, NULL) < 0) { 804 struct kevent ke; local 812 EV_SET(&ke, p [all...] |
/freebsd-11-stable/usr.sbin/camdd/ |
H A D | camdd.c | 590 struct kevent *ke; local 632 ke = calloc(1, ke_size); 633 if (ke == NULL) { 638 bcopy(new_ke, ke, num_ke * sizeof(struct kevent)); 640 EV_SET(&ke[num_ke++], (uintptr_t)&dev->work_queue, EVFILT_USER, 642 EV_SET(&ke[num_ke++], (uintptr_t)&dev->peer_done_queue, EVFILT_USER, 644 EV_SET(&ke[num_ke++], SIGINFO, EVFILT_SIGNAL, EV_ADD|EV_ENABLE, 0,0,0); 645 EV_SET(&ke[num_ke++], SIGINT, EVFILT_SIGNAL, EV_ADD|EV_ENABLE, 0,0,0); 647 retval = kevent(dev->kq, ke, num_ke, NULL, 0, NULL); 1266 struct kevent ke; local 1518 struct kevent ke; local 1767 struct kevent ke; local 1969 struct kevent ke; local 3143 struct kevent ke; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.h | 69 u8 ke[EAP_EKE_MAX_KE_LEN]; member in struct:eap_eke_session
|
H A D | eap_eke_common.c | 466 os_memcpy(sess->ke, buf, ke_len); 467 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len); 627 if (aes_128_cbc_encrypt(sess->ke, iv, e, data_len + pad) < 0 || 675 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { 725 os_memset(sess->ke, 0, EAP_EKE_MAX_KE_LEN);
|
/freebsd-11-stable/contrib/apr/include/arch/unix/ |
H A D | apr_arch_poll_private.h | 140 struct kevent *ke; member in union:__anon14
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | validator.c | 2377 * @param ke: the key entry to return. It returns 2380 * validated. It returns ke=NULL if the DS response indicated that the 2387 struct key_entry_key** ke) 2432 *ke = key_entry_create_null(qstate->region, 2435 return (*ke) != NULL; 2440 *ke = key_entry_create_rrset(qstate->region, 2443 return (*ke) != NULL; 2471 *ke = key_entry_create_null(qstate->region, 2475 return (*ke) != NULL; 2479 *ke 2385 ds_response_to_ke(struct module_qstate* qstate, struct val_qstate* vq, int id, int rcode, struct dns_msg* msg, struct query_info* qinfo, struct key_entry_key** ke) argument [all...] |
/freebsd-11-stable/sys/dev/evdev/ |
H A D | cdev.c | 398 struct input_keymap_entry *ke; local 479 ke = (struct input_keymap_entry *)data; 480 evdev->ev_methods->ev_get_keycode(evdev, evdev->ev_softc, ke); 492 ke = (struct input_keymap_entry *)data; 493 evdev->ev_methods->ev_set_keycode(evdev, evdev->ev_softc, ke);
|
/freebsd-11-stable/contrib/wpa/src/utils/ |
H A D | eloop.c | 243 struct kevent ke; local 245 EV_SET(&ke, sock, event_type_kevent_filter(type), EV_ADD, 0, 0, 0); 246 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) == -1) { 386 struct kevent ke; local 418 EV_SET(&ke, sock, event_type_kevent_filter(table->type), EV_DELETE, 0, 420 if (kevent(eloop.kqueuefd, &ke, 1, NULL, 0, NULL) < 0) {
|
/freebsd-11-stable/usr.bin/truss/ |
H A D | syscalls.c | 1100 print_kevent(FILE *fp, struct kevent *ke) argument 1103 switch (ke->filter) { 1110 fprintf(fp, "%ju", (uintmax_t)ke->ident); 1113 fputs(strsig2(ke->ident), fp); 1116 fprintf(fp, "%p", (void *)ke->ident); 1119 print_integer_arg(sysdecode_kevent_filter, fp, ke->filter); 1121 print_mask_arg(sysdecode_kevent_flags, fp, ke->flags); 1123 sysdecode_kevent_fflags(fp, ke->filter, ke->fflags, 16); 1124 fprintf(fp, ",%p,%p", (void *)ke 2028 struct kevent *ke; local [all...] |