/dragonfly/crypto/openssh/ |
H A D | ssh-pkcs11-helper.c | 68 struct pkcs11_keyinfo *ki; in add_key() local 70 ki = xcalloc(1, sizeof(*ki)); in add_key() 72 ki->key = k; in add_key() 82 for (ki = TAILQ_FIRST(&pkcs11_keylist); ki; ki = nxt) { in del_keys_by_name() 86 free(ki->providername); in del_keys_by_name() 87 free(ki->label); in del_keys_by_name() 88 sshkey_free(ki->key); in del_keys_by_name() 89 free(ki); in del_keys_by_name() 98 struct pkcs11_keyinfo *ki; in lookup_key() local 102 ki->providername, ki->label); in lookup_key() [all …]
|
/dragonfly/bin/ps/ |
H A D | ps.h | 37 #define KI_PROC(ki, f) ((ki)->ki_proc->kp_ ## f) argument 38 #define KI_LWP(ki, f) ((ki)->ki_proc->kp_lwp.kl_ ## f) argument
|
H A D | ps.c | 539 dynsizevars(KINFO *ki) in dynsizevars() argument 549 i = (v->sproc)( ki); in dynsizevars() 573 getfmt(char **(*fn) (kvm_t *, const struct kinfo_proc *, int), KINFO *ki, char in getfmt() argument 579 fmt_argv((*fn)(kd, ki->ki_proc, termwidth), comm, maxlen)) == NULL) in getfmt() 585 saveuser(KINFO *ki) in saveuser() argument 591 ki->ki_args = getfmt(kvm_getargv, ki, KI_PROC(ki, comm), in saveuser() 594 ki->ki_args = NULL; in saveuser() 597 ki->ki_env = getfmt(kvm_getenvv, ki, NULL, 0); in saveuser() 599 ki->ki_env = NULL; in saveuser()
|
/dragonfly/sys/crypto/rijndael/ |
H A D | test00.c | 43 keyInstance ki; in main() local 53 rijndael_makeKey(&ki, DIR_DECRYPT, 128, key); in main() 56 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, out); in main() 60 rijndael_blockDecrypt(&ci, &ki, in, LL * 8, in); in main()
|
/dragonfly/sys/dev/misc/kbdmux/ |
H A D | kbdmux.c | 891 keyboard_info_t *ki; in kbdmux_ioctl() local 899 ki = (keyboard_info_t *) arg; in kbdmux_ioctl() 901 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || in kbdmux_ioctl() 902 strcmp(ki->kb_name, "*") == 0) { in kbdmux_ioctl() 907 if (k->kbd->kb_unit == ki->kb_unit && in kbdmux_ioctl() 920 ki->kb_name, in kbdmux_ioctl() 921 ki->kb_unit, in kbdmux_ioctl() 952 ki = (keyboard_info_t *) arg; in kbdmux_ioctl() 954 if (ki == NULL || ki->kb_unit < 0 || ki->kb_name[0] == '\0' || in kbdmux_ioctl() 955 strcmp(ki->kb_name, "*") == 0) { in kbdmux_ioctl() [all …]
|
/dragonfly/crypto/libressl/crypto/rc2/ |
H A D | rc2_skey.c | 98 RC2_INT *ki; in RC2_set_key() local 135 ki= &(key->data[63]); in RC2_set_key() 137 *(ki--)=((k[i]<<8)|k[i-1])&0xffff; in RC2_set_key()
|
/dragonfly/lib/libtelnet/ |
H A D | encrypt.c | 168 } ki[2] = { variable 696 encrypt_keyid(&ki[1], keyid, len); in encrypt_enc_keyid() 702 encrypt_keyid(&ki[0], keyid, len); in encrypt_dec_keyid() 757 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1]; in encrypt_send_keyid() 821 for (i = 0; i < ki[0].keylen; ++i) { in encrypt_start_output() 822 if ((*p++ = ki[0].keyid[i]) == IAC) in encrypt_start_output() 875 for (i = 0; i < ki[1].keylen; ++i) { in encrypt_send_request_start() 876 if ((*p++ = ki[1].keyid[i]) == IAC) in encrypt_send_request_start()
|
/dragonfly/sys/kern/ |
H A D | kern_proc.c | 1595 struct kinfo_proc ki; in sysctl_out_proc() local 1601 bzero(&ki, sizeof(ki)); in sysctl_out_proc() 1603 fill_kinfo_proc(p, &ki); in sysctl_out_proc() 1609 fill_kinfo_lwp(lp, &ki.kp_lwp); in sysctl_out_proc() 1612 error = SYSCTL_OUT(req, &ki, sizeof(ki)); in sysctl_out_proc() 1613 bzero(&ki.kp_lwp, sizeof(ki.kp_lwp)); in sysctl_out_proc() 1625 ki.kp_lwp.kl_tid = -1; in sysctl_out_proc() 1633 error = SYSCTL_OUT(req, &ki, sizeof(ki)); in sysctl_out_proc() 1644 struct kinfo_proc ki; in sysctl_out_proc_kthread() local 1647 fill_kinfo_proc_kthread(td, &ki); in sysctl_out_proc_kthread() [all …]
|
/dragonfly/contrib/less/ |
H A D | command.c | 974 int ki = 0; in getcc_repl() local 981 keys[ki] = c; in getcc_repl() 982 if (c != orig[ki] || ki >= sizeof(keys)-1) in getcc_repl() 987 while (ki > 0) in getcc_repl() 988 (*gr_ungetc)(keys[ki--]); in getcc_repl() 991 if (orig[++ki] == '\0') in getcc_repl() 995 ki = strlen(repl)-1; in getcc_repl() 996 while (ki > 0) in getcc_repl() 997 (*gr_ungetc)(repl[ki--]); in getcc_repl()
|
/dragonfly/usr.bin/ktrdump/ |
H A D | ktrdump.c | 654 struct ktr_info *ki; in dump_callback() local 663 if ((ki = kvm_ktrinfo(entry->ktr_info, &infoctx))) { in dump_callback() 664 ev.fmt = kvm_string(ki->kf_format, &fmtctx); in dump_callback() 670 ev.fmtdatalen = ki->kf_data_size; in dump_callback() 688 struct ktr_info *ki = (void *)ctx->save_buf; in kvm_ktrinfo() local 693 if (kvm_read(kd, (uintptr_t)kptr, ki, sizeof(*ki)) == -1) { in kvm_ktrinfo() 694 bzero(ki, sizeof(*ki)); in kvm_ktrinfo() 699 return(ki); in kvm_ktrinfo()
|
/dragonfly/sys/dev/misc/kbd/ |
H A D | kbd.c | 188 keyboard_info_t ki; in kbd_register() local 218 bzero(&ki, sizeof(ki)); in kbd_register() 219 strcpy(ki.kb_name, kbd->kb_name); in kbd_register() 220 ki.kb_unit = kbd->kb_unit; in kbd_register() 221 kbd_ioctl(mux, KBADDKBD, (caddr_t) &ki); in kbd_register() 235 bzero(&ki, sizeof(ki)); in kbd_register() 236 strcpy(ki.kb_name, kbd->kb_name); in kbd_register() 237 ki.kb_unit = kbd->kb_unit; in kbd_register() 238 kbd_ioctl(mux, KBADDKBD, (caddr_t) &ki); in kbd_register()
|
/dragonfly/usr.bin/ee/nls/hu_HU.ISO8859-2/ |
H A D | ee.msg | 63 53 "expand : tabok kifejt�se noexpand: ne fejtse ki a tabokat " 66 56 "+# :ugr�s sorra # -i :info ablak ki -e :tabkifejt�s ki -h :kiemel�s ki" 72 62 "help : s�g� |file : f�jln�v megjelen�t�se |line : sor # ki�r�sa "
|
/dragonfly/contrib/cryptsetup/lib/ |
H A D | setup.c | 197 crypt_keyslot_info ki; in verify_other_keyslot() local 207 ki = crypt_keyslot_status(cd, keyIndex); in verify_other_keyslot() 215 if (ki == CRYPT_SLOT_ACTIVE) in verify_other_keyslot() 290 crypt_keyslot_info ki; in luks_remove_helper() local 304 ki = crypt_keyslot_status(cd, key_slot); in luks_remove_helper() 305 if (ki == CRYPT_SLOT_INVALID) { in luks_remove_helper() 311 if (ki <= CRYPT_SLOT_INACTIVE) { in luks_remove_helper() 1619 crypt_keyslot_info ki; in crypt_keyslot_destroy() local 1628 ki = crypt_keyslot_status(cd, keyslot); in crypt_keyslot_destroy() 1629 if (ki == CRYPT_SLOT_INVALID) { in crypt_keyslot_destroy() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 468 os_memcpy(sess->ki, buf + ke_len, ki_len); in eap_eke_derive_ke_ki() 469 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ki", sess->ki, ki_len); in eap_eke_derive_ke_ki() 628 eap_eke_mac(sess->mac, sess->ki, e, data_len + pad, pos) < 0) in eap_eke_prot() 660 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, in eap_eke_decrypt_prot() 726 os_memset(sess->ki, 0, EAP_EKE_MAX_KI_LEN); in eap_eke_session_clean()
|
H A D | eap_eke_common.h | 70 u8 ki[EAP_EKE_MAX_KI_LEN]; member
|
/dragonfly/contrib/ncurses/ncurses/tty/ |
H A D | lib_twait.c | 195 KBDKEYINFO ki; in _nc_timed_wait() local 378 || (KbdPeek(&ki, 0) == 0 in _nc_timed_wait() 379 && (ki.fbStatus & KBDTRF_FINAL_CHAR_IN)))) { in _nc_timed_wait()
|
/dragonfly/contrib/cryptsetup/luks/ |
H A D | keymanage.c | 639 crypt_keyslot_info ki = LUKS_keyslot_info(hdr, keyIndex); in LUKS_open_key() local 645 log_dbg("Trying to open key slot %d [%d].", keyIndex, (int)ki); in LUKS_open_key() 647 if (ki < CRYPT_SLOT_ACTIVE) in LUKS_open_key() 859 crypt_keyslot_info ki = LUKS_keyslot_info(hdr, keyslot); in LUKS_keyslot_set() local 861 if (ki == CRYPT_SLOT_INVALID) in LUKS_keyslot_set()
|
/dragonfly/usr.bin/calendar/calendars/hr_HR.UTF-8/ |
H A D | calendar.praznici | 21 /* katolički blagdani */
|
/dragonfly/gnu/usr.bin/rcs/lib/ |
H A D | rcslex.c | 650 register char const *ki; local 651 for (ki=key; ki<kn; ) 652 savech_(*ki++)
|
/dragonfly/contrib/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 1241 struct ieee802_1x_mka_ki *ki) in ieee802_1x_mka_get_lpn() argument 1248 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) { in ieee802_1x_mka_get_lpn() 1375 struct ieee802_1x_mka_ki ki; in ieee802_1x_mka_decode_sak_use_body() local 1424 os_memcpy(ki.mi, body->lsrv_mi, sizeof(ki.mi)); in ieee802_1x_mka_decode_sak_use_body() 1425 ki.kn = be_to_host32(body->lkn); in ieee802_1x_mka_decode_sak_use_body() 1428 if (is_ki_equal(&sa_key->key_identifier, &ki)) { in ieee802_1x_mka_decode_sak_use_body() 2898 struct ieee802_1x_mka_ki *ki) in ieee802_1x_kay_delete_sas() argument 2914 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) in ieee802_1x_kay_delete_sas() 2922 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) in ieee802_1x_kay_delete_sas() 2930 if (is_ki_equal(&sa_key->key_identifier, ki)) { in ieee802_1x_kay_delete_sas()
|
H A D | ieee802_1x_kay.h | 270 struct ieee802_1x_mka_ki *ki);
|
/dragonfly/lib/libthread_db/ |
H A D | libthread_xu.c | 294 pt_ta_tsd_iter(const td_thragent_t *ta, td_key_iter_f *ki, void *arg) in pt_ta_tsd_iter() argument 317 ret = (ki)(i, destructor, arg); in pt_ta_tsd_iter()
|
/dragonfly/lib/libc/nls/ |
H A D | hu_HU.ISO8859-2.msg | 105 49 A k�rt c�m nem oszthat� ki
|
/dragonfly/sys/dev/misc/syscons/ |
H A D | syscons.c | 4394 keyboard_info_t ki; in sc_allocate_keyboard() local 4408 bzero(&ki, sizeof(ki)); in sc_allocate_keyboard() 4409 strcpy(ki.kb_name, k->kb_name); in sc_allocate_keyboard() 4410 ki.kb_unit = k->kb_unit; in sc_allocate_keyboard() 4412 kbd_ioctl(k0, KBADDKBD, (caddr_t) &ki); in sc_allocate_keyboard()
|
/dragonfly/share/misc/ |
H A D | iso639 | 260 ki kik kik Kikuyu; Gikuyu
|