Home
last modified time | relevance | path

Searched refs:ki (Results 1 – 25 of 27) sorted by relevance

12

/dragonfly/crypto/openssh/
H A Dssh-pkcs11-helper.c68 struct pkcs11_keyinfo *ki; in add_key() local
70 ki = xcalloc(1, sizeof(*ki)); in add_key()
72 ki->key = k; in add_key()
82 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki = nxt) { in del_keys_by_name()
86 free(ki->providername); in del_keys_by_name()
87 free(ki->label); in del_keys_by_name()
88 sshkey_free(ki->key); in del_keys_by_name()
89 free(ki); in del_keys_by_name()
98 struct pkcs11_keyinfo *ki; in lookup_key() local
102 ki->providername, ki->label); in lookup_key()
[all …]
/dragonfly/bin/ps/
H A Dps.h37 #define KI_PROC(ki, f) ((ki)->ki_proc->kp_ ## f) argument
38 #define KI_LWP(ki, f) ((ki)->ki_proc->kp_lwp.kl_ ## f) argument
H A Dps.c539 dynsizevars(KINFO *ki) in dynsizevars() argument
549 i = (v->sproc)( ki); in dynsizevars()
573 getfmt(char **(*fn) (kvm_t *, const struct kinfo_proc *, int), KINFO *ki, char in getfmt() argument
579 fmt_argv((*fn)(kd, ki->ki_proc, termwidth), comm, maxlen)) == NULL) in getfmt()
585 saveuser(KINFO *ki) in saveuser() argument
591 ki->ki_args = getfmt(kvm_getargv, ki, KI_PROC(ki, comm), in saveuser()
594 ki->ki_args = NULL; in saveuser()
597 ki->ki_env = getfmt(kvm_getenvv, ki, NULL, 0); in saveuser()
599 ki->ki_env = NULL; in saveuser()
/dragonfly/sys/crypto/rijndael/
H A Dtest00.c43 keyInstance ki; in main() local
53 rijndael_makeKey(&ki, DIR_DECRYPT, 128, key); in main()
56 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, out); in main()
60 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, in); in main()
/dragonfly/sys/dev/misc/kbdmux/
H A Dkbdmux.c891 keyboard_info_t *ki; in kbdmux_ioctl() local
899 ki = (keyboard_info_t *) arg; in kbdmux_ioctl()
901 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || in kbdmux_ioctl()
902 strcmp(ki->kb_name, "*") == 0) { in kbdmux_ioctl()
907 if (k->kbd->kb_unit == ki->kb_unit && in kbdmux_ioctl()
920 ki->kb_name, in kbdmux_ioctl()
921 ki->kb_unit, in kbdmux_ioctl()
952 ki = (keyboard_info_t *) arg; in kbdmux_ioctl()
954 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || in kbdmux_ioctl()
955 strcmp(ki->kb_name, "*") == 0) { in kbdmux_ioctl()
[all …]
/dragonfly/crypto/libressl/crypto/rc2/
H A Drc2_skey.c98 RC2_INT *ki; in RC2_set_key() local
135 ki= &(key->data[63]); in RC2_set_key()
137 *(ki--)=((k[i]<<8)|k[i-1])&0xffff; in RC2_set_key()
/dragonfly/lib/libtelnet/
H A Dencrypt.c168 } ki[2] = { variable
696 encrypt_keyid(&ki[1], keyid, len); in encrypt_enc_keyid()
702 encrypt_keyid(&ki[0], keyid, len); in encrypt_dec_keyid()
757 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; in encrypt_send_keyid()
821 for (i = 0; i < ki[0].keylen; ++i) { in encrypt_start_output()
822 if ((*p++ = ki[0].keyid[i]) == IAC) in encrypt_start_output()
875 for (i = 0; i < ki[1].keylen; ++i) { in encrypt_send_request_start()
876 if ((*p++ = ki[1].keyid[i]) == IAC) in encrypt_send_request_start()
/dragonfly/sys/kern/
H A Dkern_proc.c1595 struct kinfo_proc ki; in sysctl_out_proc() local
1601 bzero(&ki, sizeof(ki)); in sysctl_out_proc()
1603 fill_kinfo_proc(p, &ki); in sysctl_out_proc()
1609 fill_kinfo_lwp(lp, &ki.kp_lwp); in sysctl_out_proc()
1612 error = SYSCTL_OUT(req, &ki, sizeof(ki)); in sysctl_out_proc()
1613 bzero(&ki.kp_lwp, sizeof(ki.kp_lwp)); in sysctl_out_proc()
1625 ki.kp_lwp.kl_tid = -1; in sysctl_out_proc()
1633 error = SYSCTL_OUT(req, &ki, sizeof(ki)); in sysctl_out_proc()
1644 struct kinfo_proc ki; in sysctl_out_proc_kthread() local
1647 fill_kinfo_proc_kthread(td, &ki); in sysctl_out_proc_kthread()
[all …]
/dragonfly/contrib/less/
H A Dcommand.c974 int ki = 0; in getcc_repl() local
981 keys[ki] = c; in getcc_repl()
982 if (c != orig[ki] || ki >= sizeof(keys)-1) in getcc_repl()
987 while (ki > 0) in getcc_repl()
988 (*gr_ungetc)(keys[ki--]); in getcc_repl()
991 if (orig[++ki] == '\0') in getcc_repl()
995 ki = strlen(repl)-1; in getcc_repl()
996 while (ki > 0) in getcc_repl()
997 (*gr_ungetc)(repl[ki--]); in getcc_repl()
/dragonfly/usr.bin/ktrdump/
H A Dktrdump.c654 struct ktr_info *ki; in dump_callback() local
663 if ((ki = kvm_ktrinfo(entry->ktr_info, &infoctx))) { in dump_callback()
664 ev.fmt = kvm_string(ki->kf_format, &fmtctx); in dump_callback()
670 ev.fmtdatalen = ki->kf_data_size; in dump_callback()
688 struct ktr_info *ki = (void *)ctx->save_buf; in kvm_ktrinfo() local
693 if (kvm_read(kd, (uintptr_t)kptr, ki, sizeof(*ki)) == -1) { in kvm_ktrinfo()
694 bzero(ki, sizeof(*ki)); in kvm_ktrinfo()
699 return(ki); in kvm_ktrinfo()
/dragonfly/sys/dev/misc/kbd/
H A Dkbd.c188 keyboard_info_t ki; in kbd_register() local
218 bzero(&ki, sizeof(ki)); in kbd_register()
219 strcpy(ki.kb_name, kbd->kb_name); in kbd_register()
220 ki.kb_unit = kbd->kb_unit; in kbd_register()
221 kbd_ioctl(mux, KBADDKBD, (caddr_t) &ki); in kbd_register()
235 bzero(&ki, sizeof(ki)); in kbd_register()
236 strcpy(ki.kb_name, kbd->kb_name); in kbd_register()
237 ki.kb_unit = kbd->kb_unit; in kbd_register()
238 kbd_ioctl(mux, KBADDKBD, (caddr_t) &ki); in kbd_register()
/dragonfly/usr.bin/ee/nls/hu_HU.ISO8859-2/
H A Dee.msg63 53 "expand : tabok kifejt�se noexpand: ne fejtse ki a tabokat "
66 56 "+# :ugr�s sorra # -i :info ablak ki -e :tabkifejt�s ki -h :kiemel�s ki"
72 62 "help : s�g� |file : f�jln�v megjelen�t�se |line : sor # ki�r�sa "
/dragonfly/contrib/cryptsetup/lib/
H A Dsetup.c197 crypt_keyslot_info ki; in verify_other_keyslot() local
207 ki = crypt_keyslot_status(cd, keyIndex); in verify_other_keyslot()
215 if (ki == CRYPT_SLOT_ACTIVE) in verify_other_keyslot()
290 crypt_keyslot_info ki; in luks_remove_helper() local
304 ki = crypt_keyslot_status(cd, key_slot); in luks_remove_helper()
305 if (ki == CRYPT_SLOT_INVALID) { in luks_remove_helper()
311 if (ki <= CRYPT_SLOT_INACTIVE) { in luks_remove_helper()
1619 crypt_keyslot_info ki; in crypt_keyslot_destroy() local
1628 ki = crypt_keyslot_status(cd, keyslot); in crypt_keyslot_destroy()
1629 if (ki == CRYPT_SLOT_INVALID) { in crypt_keyslot_destroy()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_eke_common.c468 os_memcpy(sess->ki, buf + ke_len, ki_len); in eap_eke_derive_ke_ki()
469 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); in eap_eke_derive_ke_ki()
628 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) in eap_eke_prot()
660 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, in eap_eke_decrypt_prot()
726 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN); in eap_eke_session_clean()
H A Deap_eke_common.h70 u8 ki[EAP_EKE_MAX_KI_LEN]; member
/dragonfly/contrib/ncurses/ncurses/tty/
H A Dlib_twait.c195 KBDKEYINFO ki; in _nc_timed_wait() local
378 || (KbdPeek(&ki, 0) == 0 in _nc_timed_wait()
379 && (ki.fbStatus & KBDTRF_FINAL_CHAR_IN)))) { in _nc_timed_wait()
/dragonfly/contrib/cryptsetup/luks/
H A Dkeymanage.c639 crypt_keyslot_info ki = LUKS_keyslot_info(hdr, keyIndex); in LUKS_open_key() local
645 log_dbg("Trying to open key slot %d [%d].", keyIndex, (int)ki); in LUKS_open_key()
647 if (ki < CRYPT_SLOT_ACTIVE) in LUKS_open_key()
859 crypt_keyslot_info ki = LUKS_keyslot_info(hdr, keyslot); in LUKS_keyslot_set() local
861 if (ki == CRYPT_SLOT_INVALID) in LUKS_keyslot_set()
/dragonfly/usr.bin/calendar/calendars/hr_HR.UTF-8/
H A Dcalendar.praznici21 /* katolički blagdani */
/dragonfly/gnu/usr.bin/rcs/lib/
H A Drcslex.c650 register char const *ki; local
651 for (ki=key; ki<kn; )
652 savech_(*ki++)
/dragonfly/contrib/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.c1241 struct ieee802_1x_mka_ki *ki) in ieee802_1x_mka_get_lpn() argument
1248 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) { in ieee802_1x_mka_get_lpn()
1375 struct ieee802_1x_mka_ki ki; in ieee802_1x_mka_decode_sak_use_body() local
1424 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); in ieee802_1x_mka_decode_sak_use_body()
1425 ki.kn = be_to_host32(body->lkn); in ieee802_1x_mka_decode_sak_use_body()
1428 if (is_ki_equal(&sa_key->key_identifier, &ki)) { in ieee802_1x_mka_decode_sak_use_body()
2898 struct ieee802_1x_mka_ki *ki) in ieee802_1x_kay_delete_sas() argument
2914 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) in ieee802_1x_kay_delete_sas()
2922 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) in ieee802_1x_kay_delete_sas()
2930 if (is_ki_equal(&sa_key->key_identifier, ki)) { in ieee802_1x_kay_delete_sas()
H A Dieee802_1x_kay.h270 struct ieee802_1x_mka_ki *ki);
/dragonfly/lib/libthread_db/
H A Dlibthread_xu.c294 pt_ta_tsd_iter(const td_thragent_t *ta, td_key_iter_f *ki, void *arg) in pt_ta_tsd_iter() argument
317 ret = (ki)(i, destructor, arg); in pt_ta_tsd_iter()
/dragonfly/lib/libc/nls/
H A Dhu_HU.ISO8859-2.msg105 49 A k�rt c�m nem oszthat� ki
/dragonfly/sys/dev/misc/syscons/
H A Dsyscons.c4394 keyboard_info_t ki; in sc_allocate_keyboard() local
4408 bzero(&ki, sizeof(ki)); in sc_allocate_keyboard()
4409 strcpy(ki.kb_name, k->kb_name); in sc_allocate_keyboard()
4410 ki.kb_unit = k->kb_unit; in sc_allocate_keyboard()
4412 kbd_ioctl(k0, KBADDKBD, (caddr_t) &ki); in sc_allocate_keyboard()
/dragonfly/share/misc/
H A Diso639260 ki kik kik Kikuyu; Gikuyu

12