| /src/external/bsd/openldap/dist/servers/slapd/back-mdb/ |
| key.c | 48 int kbuf[2]; local 55 key.mv_size = sizeof(kbuf); 56 key.mv_data = kbuf; 57 kbuf[1] = 0; 58 memcpy(kbuf, k->bv_val, k->bv_len);
|
| id2entry.c | 473 char kbuf[sizeof(ID) + sizeof(unsigned short)]; local 476 memcpy( kbuf, &e->e_id, sizeof(ID) ); 477 memset( kbuf+sizeof(ID), 0, sizeof(unsigned short) ); 478 key.mv_data = kbuf; 479 key.mv_size = sizeof(kbuf);
|
| idl.c | 428 int kbuf[2]; local 442 kbuf[1] = 0; 450 key.mv_size = sizeof(kbuf); 451 key.mv_data = kbuf; 587 int kbuf[2]; local 600 kbuf[1] = 0; 608 key.mv_size = sizeof(kbuf); 609 key.mv_data = kbuf;
|
| /src/distrib/utils/more/ |
| decode.c | 129 static char kbuf[MAX_CMDLEN+1]; variable 130 static char *kp = kbuf; 139 kp = kbuf; 152 * Append the new command character to the command string in kbuf. 166 * Search a command table for the current command string (in kbuf). 175 for (p = table, q = kbuf; p < endtable; p++, q++) { 202 q = kbuf-1;
|
| /src/crypto/external/bsd/openssh/dist/ |
| kexdh.c | 76 u_char *kbuf = NULL; local 94 if ((kbuf = malloc(klen)) == NULL || 99 if ((kout = DH_compute_key(kbuf, dh_pub, kex->dh)) < 0 || 100 BN_bin2bn(kbuf, kout, shared_secret) == NULL) { 105 dump_digest("shared secret", kbuf, kout); 109 freezero(kbuf, klen);
|
| kexecdh.c | 145 u_char *kbuf = NULL; local 175 if ((kbuf = malloc(klen)) == NULL || 180 if (ECDH_compute_key(kbuf, klen, dh_pub, key, NULL) != (int)klen || 181 BN_bin2bn(kbuf, klen, shared_secret) == NULL) { 186 dump_digest("shared secret", kbuf, klen); 195 freezero(kbuf, klen);
|
| ssh-sk-client.c | 236 struct sshbuf *kbuf = NULL, *req = NULL, *resp = NULL; local 241 if ((kbuf = sshbuf_new()) == NULL || 247 if ((r = sshkey_private_serialize(key, kbuf)) != 0) { 251 if ((r = sshbuf_put_stringb(req, kbuf)) != 0 || 283 sshbuf_free(kbuf); 297 struct sshbuf *kbuf = NULL, *abuf = NULL, *req = NULL, *resp = NULL; local 308 (kbuf = sshbuf_new()) == NULL || 329 if ((r = sshbuf_get_stringb(resp, kbuf)) != 0 || 340 if ((r = sshkey_private_deserialize(kbuf, &key)) != 0) { 356 sshbuf_free(kbuf); 394 struct sshbuf *kbuf = NULL, *req = NULL, *resp = NULL; local [all...] |
| ssh-sk-helper.c | 112 struct sshbuf *resp, *kbuf; local 120 if ((r = sshbuf_froms(req, &kbuf)) != 0 || 130 if ((r = sshkey_private_deserialize(kbuf, &key)) != 0) 157 sshbuf_free(kbuf); 173 struct sshbuf *challenge, *attest, *kbuf, *resp; local 177 (kbuf = sshbuf_new()) == NULL) 210 if ((r = sshkey_private_serialize(key, kbuf)) != 0) 213 (r = sshbuf_put_stringb(resp, kbuf)) != 0 || 219 sshbuf_free(kbuf); 235 struct sshbuf *kbuf, *resp local [all...] |
| sshd-session.c | 606 struct sshbuf *kbuf; local 624 if ((r = sshbuf_froms(hostkeys, &kbuf)) != 0) 626 if (sshbuf_len(kbuf) != 0 && 627 (r = sshkey_private_deserialize(kbuf, &k)) != 0) 630 sshbuf_free(kbuf);
|
| /src/external/bsd/ntp/dist/sntp/ |
| crypto.c | 218 char kbuf[200]; local 241 if (NULL == fgets(kbuf, sizeof(kbuf), keyf)) 244 kbuf[sizeof(kbuf) - 1] = '\0'; 245 octothorpe = strchr(kbuf, '#'); 250 scan_cnt = sscanf(kbuf, "%d %15s %128s",
|
| /src/lib/libcrypt/ |
| hmac.c | 250 unsigned char kbuf[BUFSIZ]; local 259 X2B(key, kbuf);
|
| /src/regress/sys/kern/getcwd/ |
| getcwd.c | 230 check1((dir), kbuf, #call, (call), (ret), (err)) 236 char kbuf[1024]; local 250 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), -1, EACCES); 263 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), 20, 0); 275 char kbuf[1024]; local 289 CHECK ("/tmp/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 15, 0); 303 CHECK ("/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 11, 0) 337 static char kbuf[1024]; local 436 char kbuf[MAXPATHLEN]; local [all...] |
| /src/sys/compat/netbsd32/ |
| netbsd32_signal.c | 669 } *kbuf; local 674 if (ktealloc(&kte, (void *)&kbuf, l, KTR_PSIG, sizeof(*kbuf))) 677 kbuf->kp.signo = (char)sig; 678 NETBSD32PTR32(kbuf->kp.action, action); 679 kbuf->kp.mask = *mask; 682 kbuf->kp.code = KSI_TRAPCODE(ksi); 683 (void)memset(&kbuf->si, 0, sizeof(kbuf->si)); 684 netbsd32_ksi_to_ksi32(&kbuf->si._info, &ksi->ksi_info) [all...] |
| /src/external/bsd/openldap/dist/libraries/liblmdb/ |
| mdb_load.c | 41 static MDB_val kbuf, dbuf; variable 385 kbuf.mv_size = mdb_env_get_maxkeysize(env) * 2 + 2; 386 kbuf.mv_data = malloc(kbuf.mv_size * 2); 387 k0buf.mv_size = kbuf.mv_size; 388 k0buf.mv_data = (char *)kbuf.mv_data + kbuf.mv_size; 427 rc = readline(&key, &kbuf);
|
| mplay.c | 37 char *dbuf, *kbuf; variable 308 kbuf = malloc(maxkey+2); 392 inhex(ptr+1, kbuf); 393 key.mv_data = kbuf; 428 inhex(ptr+1, kbuf); 429 key.mv_data = kbuf; 455 inhex(ptr+1, kbuf); 456 key.mv_data = kbuf;
|
| /src/sys/dev/iscsi/ |
| iscsi_ioctl.c | 1350 void *kbuf = NULL; local 1380 kbuf = kmem_zalloc(datalen, KM_SLEEP); 1382 error = copyin(par->req.databuf, kbuf, datalen); 1384 kmem_free(kbuf, datalen); 1393 if (kbuf) { 1395 (void) copyout(kbuf, par->req.databuf, datalen); 1397 kmem_free(kbuf, datalen);
|
| /src/sys/dev/ic/ |
| mlx.c | 1722 void *kbuf; local 1728 kbuf = NULL; 1748 kbuf = malloc(mu->mu_datasize, M_DEVBUF, M_WAITOK); 1749 if (kbuf == NULL) { 1756 rv = copyin(mu->mu_buf, kbuf, mu->mu_datasize); 1765 rv = mlx_ccb_map(mlx, mc, kbuf, mu->mu_datasize, mu->mu_bufdir); 1783 dcdb = (struct mlx_dcdb *)kbuf; 1824 if (kbuf != NULL) { 1826 rv = copyout(kbuf, mu->mu_buf, mu->mu_datasize); 1833 if (kbuf != NULL [all...] |
| /src/sys/external/bsd/drm/dist/shared-core/ |
| radeon_state.c | 2873 char *kbuf = NULL; local 2895 kbuf = drm_alloc(cmdbuf->bufsz, DRM_MEM_DRIVER); 2896 if (kbuf == NULL) 2898 if (DRM_COPY_FROM_USER(kbuf, (void __user *)cmdbuf->buf, 2900 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER); 2903 cmdbuf->buf = kbuf; 2913 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER); 3020 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER); 3028 drm_free(kbuf, orig_bufsz, DRM_MEM_DRIVER);
|
| /src/sys/kern/ |
| kern_ktrace.c | 808 } *kbuf; local 813 if (ktealloc(&kte, (void *)&kbuf, l, KTR_PSIG, sizeof(*kbuf))) 816 memset(&kbuf->kp, 0, sizeof(kbuf->kp)); 817 kbuf->kp.signo = (char)sig; 818 kbuf->kp.action = action; 819 kbuf->kp.mask = *mask; 822 kbuf->kp.code = KSI_TRAPCODE(ksi); 823 (void)memset(&kbuf->si, 0, sizeof(kbuf->si)) [all...] |
| kern_proc.c | 2075 } *kbuf; local 2109 kelem_size = elem_size = sizeof(kbuf->kproc); 2117 kelem_size = sizeof(kbuf->kproc2); 2122 kbuf = kmem_zalloc(sizeof(*kbuf), KM_SLEEP); 2246 fill_proc(p, &kbuf->kproc.kp_proc, allowaddr); 2247 fill_eproc(p, &kbuf->kproc.kp_eproc, zombie, 2250 fill_kproc2(p, &kbuf->kproc2, zombie, 2259 error = sysctl_copyout(l, kbuf, dp, 2301 kmem_free(kbuf, sizeof(*kbuf)) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/store/ |
| loader_file.c | 332 char kbuf[PEM_BUFSIZE]; local 358 if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE,
|
| /src/sys/dev/marvell/ |
| mvxpsec.c | 2783 uint8_t kbuf[64]; local 2798 SHA1Final(kbuf, &sha1); 2799 key8 = kbuf;
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_linux.cc | 317 struct kernel_stat kbuf; 318 int res = internal_syscall(SYSCALL(stat), path, &kbuf); 319 kernel_stat_to_stat(&kbuf, (struct stat *)buf); 342 struct kernel_stat kbuf; 343 int res = internal_syscall(SYSCALL(lstat), path, &kbuf); 344 kernel_stat_to_stat(&kbuf, (struct stat *)buf); 362 struct kernel_stat kbuf; local 363 int res = internal_syscall(SYSCALL(fstat), fd, &kbuf); 364 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
|
| /src/crypto/external/apache2/openssl/dist/engines/ |
| e_loader_attic.c | 443 char kbuf[PEM_BUFSIZE]; local 468 if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE,
|
| /src/crypto/external/bsd/openssl/dist/engines/ |
| e_loader_attic.c | 443 char kbuf[PEM_BUFSIZE]; local 468 if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE,
|