HomeSort by: relevance | last modified time | path
    Searched defs:kbuf (Results 1 - 25 of 30) sorted by relevancy

1 2

  /src/external/bsd/openldap/dist/servers/slapd/back-mdb/
key.c 48 int kbuf[2]; local
55 key.mv_size = sizeof(kbuf);
56 key.mv_data = kbuf;
57 kbuf[1] = 0;
58 memcpy(kbuf, k->bv_val, k->bv_len);
id2entry.c 473 char kbuf[sizeof(ID) + sizeof(unsigned short)]; local
476 memcpy( kbuf, &e->e_id, sizeof(ID) );
477 memset( kbuf+sizeof(ID), 0, sizeof(unsigned short) );
478 key.mv_data = kbuf;
479 key.mv_size = sizeof(kbuf);
idl.c 428 int kbuf[2]; local
442 kbuf[1] = 0;
450 key.mv_size = sizeof(kbuf);
451 key.mv_data = kbuf;
587 int kbuf[2]; local
600 kbuf[1] = 0;
608 key.mv_size = sizeof(kbuf);
609 key.mv_data = kbuf;
  /src/distrib/utils/more/
decode.c 129 static char kbuf[MAX_CMDLEN+1]; variable
130 static char *kp = kbuf;
139 kp = kbuf;
152 * Append the new command character to the command string in kbuf.
166 * Search a command table for the current command string (in kbuf).
175 for (p = table, q = kbuf; p < endtable; p++, q++) {
202 q = kbuf-1;
  /src/crypto/external/bsd/openssh/dist/
kexdh.c 76 u_char *kbuf = NULL; local
94 if ((kbuf = malloc(klen)) == NULL ||
99 if ((kout = DH_compute_key(kbuf, dh_pub, kex->dh)) < 0 ||
100 BN_bin2bn(kbuf, kout, shared_secret) == NULL) {
105 dump_digest("shared secret", kbuf, kout);
109 freezero(kbuf, klen);
kexecdh.c 145 u_char *kbuf = NULL; local
175 if ((kbuf = malloc(klen)) == NULL ||
180 if (ECDH_compute_key(kbuf, klen, dh_pub, key, NULL) != (int)klen ||
181 BN_bin2bn(kbuf, klen, shared_secret) == NULL) {
186 dump_digest("shared secret", kbuf, klen);
195 freezero(kbuf, klen);
ssh-sk-client.c 236 struct sshbuf *kbuf = NULL, *req = NULL, *resp = NULL; local
241 if ((kbuf = sshbuf_new()) == NULL ||
247 if ((r = sshkey_private_serialize(key, kbuf)) != 0) {
251 if ((r = sshbuf_put_stringb(req, kbuf)) != 0 ||
283 sshbuf_free(kbuf);
297 struct sshbuf *kbuf = NULL, *abuf = NULL, *req = NULL, *resp = NULL; local
308 (kbuf = sshbuf_new()) == NULL ||
329 if ((r = sshbuf_get_stringb(resp, kbuf)) != 0 ||
340 if ((r = sshkey_private_deserialize(kbuf, &key)) != 0) {
356 sshbuf_free(kbuf);
394 struct sshbuf *kbuf = NULL, *req = NULL, *resp = NULL; local
    [all...]
ssh-sk-helper.c 112 struct sshbuf *resp, *kbuf; local
120 if ((r = sshbuf_froms(req, &kbuf)) != 0 ||
130 if ((r = sshkey_private_deserialize(kbuf, &key)) != 0)
157 sshbuf_free(kbuf);
173 struct sshbuf *challenge, *attest, *kbuf, *resp; local
177 (kbuf = sshbuf_new()) == NULL)
210 if ((r = sshkey_private_serialize(key, kbuf)) != 0)
213 (r = sshbuf_put_stringb(resp, kbuf)) != 0 ||
219 sshbuf_free(kbuf);
235 struct sshbuf *kbuf, *resp local
    [all...]
sshd-session.c 606 struct sshbuf *kbuf; local
624 if ((r = sshbuf_froms(hostkeys, &kbuf)) != 0)
626 if (sshbuf_len(kbuf) != 0 &&
627 (r = sshkey_private_deserialize(kbuf, &k)) != 0)
630 sshbuf_free(kbuf);
  /src/external/bsd/ntp/dist/sntp/
crypto.c 218 char kbuf[200]; local
241 if (NULL == fgets(kbuf, sizeof(kbuf), keyf))
244 kbuf[sizeof(kbuf) - 1] = '\0';
245 octothorpe = strchr(kbuf, '#');
250 scan_cnt = sscanf(kbuf, "%d %15s %128s",
  /src/lib/libcrypt/
hmac.c 250 unsigned char kbuf[BUFSIZ]; local
259 X2B(key, kbuf);
  /src/regress/sys/kern/getcwd/
getcwd.c 230 check1((dir), kbuf, #call, (call), (ret), (err))
236 char kbuf[1024]; local
250 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), -1, EACCES);
263 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), 20, 0);
275 char kbuf[1024]; local
289 CHECK ("/tmp/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 15, 0);
303 CHECK ("/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 11, 0)
337 static char kbuf[1024]; local
436 char kbuf[MAXPATHLEN]; local
    [all...]
  /src/sys/compat/netbsd32/
netbsd32_signal.c 669 } *kbuf; local
674 if (ktealloc(&kte, (void *)&kbuf, l, KTR_PSIG, sizeof(*kbuf)))
677 kbuf->kp.signo = (char)sig;
678 NETBSD32PTR32(kbuf->kp.action, action);
679 kbuf->kp.mask = *mask;
682 kbuf->kp.code = KSI_TRAPCODE(ksi);
683 (void)memset(&kbuf->si, 0, sizeof(kbuf->si));
684 netbsd32_ksi_to_ksi32(&kbuf->si._info, &ksi->ksi_info)
    [all...]
  /src/external/bsd/openldap/dist/libraries/liblmdb/
mdb_load.c 41 static MDB_val kbuf, dbuf; variable
385 kbuf.mv_size = mdb_env_get_maxkeysize(env) * 2 + 2;
386 kbuf.mv_data = malloc(kbuf.mv_size * 2);
387 k0buf.mv_size = kbuf.mv_size;
388 k0buf.mv_data = (char *)kbuf.mv_data + kbuf.mv_size;
427 rc = readline(&key, &kbuf);
mplay.c 37 char *dbuf, *kbuf; variable
308 kbuf = malloc(maxkey+2);
392 inhex(ptr+1, kbuf);
393 key.mv_data = kbuf;
428 inhex(ptr+1, kbuf);
429 key.mv_data = kbuf;
455 inhex(ptr+1, kbuf);
456 key.mv_data = kbuf;
  /src/sys/dev/iscsi/
iscsi_ioctl.c 1350 void *kbuf = NULL; local
1380 kbuf = kmem_zalloc(datalen, KM_SLEEP);
1382 error = copyin(par->req.databuf, kbuf, datalen);
1384 kmem_free(kbuf, datalen);
1393 if (kbuf) {
1395 (void) copyout(kbuf, par->req.databuf, datalen);
1397 kmem_free(kbuf, datalen);
  /src/sys/dev/ic/
mlx.c 1722 void *kbuf; local
1728 kbuf = NULL;
1748 kbuf = malloc(mu->mu_datasize, M_DEVBUF, M_WAITOK);
1749 if (kbuf == NULL) {
1756 rv = copyin(mu->mu_buf, kbuf, mu->mu_datasize);
1765 rv = mlx_ccb_map(mlx, mc, kbuf, mu->mu_datasize, mu->mu_bufdir);
1783 dcdb = (struct mlx_dcdb *)kbuf;
1824 if (kbuf != NULL) {
1826 rv = copyout(kbuf, mu->mu_buf, mu->mu_datasize);
1833 if (kbuf != NULL
    [all...]
  /src/sys/external/bsd/drm/dist/shared-core/
radeon_state.c 2873 char *kbuf = NULL; local
2895 kbuf = drm_alloc(cmdbuf->bufsz, DRM_MEM_DRIVER);
2896 if (kbuf == NULL)
2898 if (DRM_COPY_FROM_USER(kbuf, (void __user *)cmdbuf->buf,
2900 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER);
2903 cmdbuf->buf = kbuf;
2913 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER);
3020 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER);
3028 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER);
  /src/sys/kern/
kern_ktrace.c 808 } *kbuf; local
813 if (ktealloc(&kte, (void *)&kbuf, l, KTR_PSIG, sizeof(*kbuf)))
816 memset(&kbuf->kp, 0, sizeof(kbuf->kp));
817 kbuf->kp.signo = (char)sig;
818 kbuf->kp.action = action;
819 kbuf->kp.mask = *mask;
822 kbuf->kp.code = KSI_TRAPCODE(ksi);
823 (void)memset(&kbuf->si, 0, sizeof(kbuf->si))
    [all...]
kern_proc.c 2075 } *kbuf; local
2109 kelem_size = elem_size = sizeof(kbuf->kproc);
2117 kelem_size = sizeof(kbuf->kproc2);
2122 kbuf = kmem_zalloc(sizeof(*kbuf), KM_SLEEP);
2246 fill_proc(p, &kbuf->kproc.kp_proc, allowaddr);
2247 fill_eproc(p, &kbuf->kproc.kp_eproc, zombie,
2250 fill_kproc2(p, &kbuf->kproc2, zombie,
2259 error = sysctl_copyout(l, kbuf, dp,
2301 kmem_free(kbuf, sizeof(*kbuf))
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/store/
loader_file.c 332 char kbuf[PEM_BUFSIZE]; local
358 if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE,
  /src/sys/dev/marvell/
mvxpsec.c 2783 uint8_t kbuf[64]; local
2798 SHA1Final(kbuf, &sha1);
2799 key8 = kbuf;
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_linux.cc 317 struct kernel_stat kbuf;
318 int res = internal_syscall(SYSCALL(stat), path, &kbuf);
319 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
342 struct kernel_stat kbuf;
343 int res = internal_syscall(SYSCALL(lstat), path, &kbuf);
344 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
362 struct kernel_stat kbuf; local
363 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf);
364 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
  /src/crypto/external/apache2/openssl/dist/engines/
e_loader_attic.c 443 char kbuf[PEM_BUFSIZE]; local
468 if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE,
  /src/crypto/external/bsd/openssl/dist/engines/
e_loader_attic.c 443 char kbuf[PEM_BUFSIZE]; local
468 if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE,

Completed in 68 milliseconds

1 2