| /src/sys/crypto/adiantum/ |
| adiantum.h | 43 uint8_t kt[16]; /* Poly1305 tweak key */ member in struct:adiantum
|
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| list.c | 161 char kt[1024]; local 167 if((ret = krb5_kt_default_name(context, kt, sizeof(kt))) != 0) { 171 keytab_string = kt;
|
| /src/crypto/external/apache2/openssl/dist/crypto/idea/ |
| i_skey.c | 24 register IDEA_INT *kt, *kf, r0, r1, r2; local 26 kt = &(ks->data[0][0]); 27 n2s(key, kt[0]); 28 n2s(key, kt[1]); 29 n2s(key, kt[2]); 30 n2s(key, kt[3]); 31 n2s(key, kt[4]); 32 n2s(key, kt[5]); 33 n2s(key, kt[6]); 34 n2s(key, kt[7]) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/idea/ |
| i_skey.c | 25 register IDEA_INT *kt, *kf, r0, r1, r2; local 27 kt = &(ks->data[0][0]); 28 n2s(key, kt[0]); 29 n2s(key, kt[1]); 30 n2s(key, kt[2]); 31 n2s(key, kt[3]); 32 n2s(key, kt[4]); 33 n2s(key, kt[5]); 34 n2s(key, kt[6]); 35 n2s(key, kt[7]) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/idea/ |
| i_skey.c | 18 register IDEA_INT *kt, *kf, r0, r1, r2; local 20 kt = &(ks->data[0][0]); 21 n2s(key, kt[0]); 22 n2s(key, kt[1]); 23 n2s(key, kt[2]); 24 n2s(key, kt[3]); 25 n2s(key, kt[4]); 26 n2s(key, kt[5]); 27 n2s(key, kt[6]); 28 n2s(key, kt[7]) [all...] |
| /src/sys/miscfs/kernfs/ |
| kernfs_vfsops.c | 228 const struct kern_target *kt; local 232 KASSERT(key_len == sizeof(kt)); 233 memcpy(&kt, key, key_len); 264 kfs->kfs_type = kt->kt_tag; 266 kfs->kfs_fileno = KERNFS_FILENO(kt, kt->kt_tag, kfs->kfs_cookie); 267 kfs->kfs_kt = kt; 268 kfs->kfs_mode = kt->kt_mode; 272 vp->v_type = kt->kt_vtype; 275 if (kt->kt_tag == KFSkern [all...] |
| kernfs_vnops.c | 355 const struct kern_target *kt; local 358 kt = kfs->kfs_kt; 382 int *ip = kt->kt_data; 389 char *cp = kt->kt_data; 502 const struct kern_target *kt; local 528 kt = &kern_targets[i]; 529 if (cnp->cn_namelen == kt->kt_namlen && 530 memcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) 536 kt = &dkt->dkt_kt; 543 error = vcache_get(dvp->v_mount, &kt, sizeof(kt), vpp) 904 const struct kern_target *kt; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| keytab_any.c | 39 krb5_keytab kt; member in struct:any_data 52 if(a->kt) 53 krb5_kt_close(context, a->kt); 83 ret = krb5_kt_resolve (context, buf, &a->kt); 139 ret = krb5_kt_start_seq_get(context, ed->a->kt, &ed->cursor); 163 ret = krb5_kt_next_entry(context, ed->a->kt, entry, &ed->cursor); 169 ret2 = krb5_kt_end_seq_get (context, ed->a->kt, &ed->cursor); 173 ret2 = krb5_kt_start_seq_get(context, ed->a->kt, &ed->cursor); 194 ret = krb5_kt_end_seq_get(context, ed->a->kt, &ed->cursor); 208 ret = krb5_kt_add_entry(context, a->kt, entry) [all...] |
| test_ap-req.c | 172 krb5_keytab kt; local 210 ret = krb5_kt_resolve(context, keytab, &kt); 219 test_ap(context, sprincipal, server, kt, id, 0); 220 test_ap(context, sprincipal, server, kt, id, AP_OPTS_MUTUAL_REQUIRED); 223 krb5_kt_close(context, kt);
|
| test_canon.c | 57 krb5_keytab kt = NULL; local 146 retval = krb5_kt_default(context, &kt); 150 retval = krb5_kt_get_entry(context, kt, princ, 0, 0, &ktent); 172 if (kt) 173 krb5_kt_close(context, kt);
|
| keytab.c | 299 const char *kt; local 302 kt = default_ktname(context); 304 if (strncasecmp(kt, "ANY:", 4) == 0) { 305 size_t len = strcspn(kt + 4, ","); 310 strlcpy(name, kt + 4, namesize); 315 kt = context->default_keytab_modify; 316 if (strlcpy (name, kt, namesize) >= namesize) {
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| kdc.c | 68 krb5_keytab kt = NULL; local 94 ret = krb5_kt_default(context, &kt); 115 kt, 133 krb5_kt_close(context, kt); 146 if (kt) 147 krb5_kt_close(context, kt);
|
| /src/crypto/external/bsd/heimdal/dist/lib/kafs/ |
| afskrb5.c | 50 v5_to_kt(krb5_creds *cred, uid_t uid, struct kafs_token *kt, int local524) 54 kt->ticket = NULL; 80 kt->ticket = buf; 81 kt->ticket_len = buf_len; 85 kt->ticket = malloc(cred->ticket.length); 86 if (kt->ticket == NULL) 88 kt->ticket_len = cred->ticket.length; 89 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len); 100 kt->ct.HandShakeKey) 211 struct kafs_token kt; local 343 struct kafs_token kt; local [all...] |
| /src/lib/libtelnet/ |
| kerberos5.c | 157 krb5_keytab kt; local 160 ret = krb5_kt_default(telnet_context, &kt); 164 ret = krb5_kt_start_seq_get(telnet_context, kt, &cursor); 166 krb5_kt_close(telnet_context, kt); 169 krb5_kt_end_seq_get(telnet_context, kt, &cursor); 170 krb5_kt_close(telnet_context, kt);
|
| /src/sys/external/bsd/drm2/dist/drm/i915/gt/ |
| selftest_timeline.c | 263 ktime_t kt; local 275 kt = ktime_get(); 285 kt = ktime_sub(ktime_get(), kt); 287 __func__, count, (long long)div64_ul(ktime_to_ns(kt), count)); 288 prng32_1M = div64_ul(ktime_to_ns(kt) << 20, count); 293 kt = ktime_get(); 301 kt = ktime_sub(ktime_get(), kt); 302 kt = ktime_sub_ns(kt, (count * prng32_1M * 2) >> 20) [all...] |
| /src/sys/external/bsd/drm2/dist/drm/nouveau/ |
| nouveau_fence.c | 300 ktime_t kt; local 312 kt = sleep_time; 313 schedule_hrtimeout(&kt, HRTIMER_MODE_REL);
|
| /src/usr.sbin/eeprom/ |
| eehandlers.c | 103 #define BARF(kt) { \ 104 badval((kt), arg); \ 109 #define FAILEDREAD(kt) { \ 111 warnx("failed to read field `%s'", (kt)->kt_keyword); \ 116 #define FAILEDWRITE(kt) { \ 118 warnx("failed to update field `%s'", (kt)->kt_keyword); \ 474 struct keytabent kt; local 476 kt.kt_keyword = "enable_banner"; 477 kt.kt_offset = EE_BANNER_ENABLE_LOC; 478 kt.kt_handler = ee_notsupp 594 struct keytabent kt; local 633 struct keytabent kt; local [all...] |
| /src/usr.sbin/ldpd/ |
| conffile.c | 289 int kt = atoi(line); local 290 if (kt <= 0) 292 ldp_keepalive_time = kt;
|
| socketops.c | 1084 struct ka_tlv kt; local 1086 kt.type = htons(LDP_KEEPALIVE); 1087 kt.length = htons(sizeof(kt.messageid)); 1088 kt.messageid = htonl(get_message_id()); 1090 send_tlv(p, (struct tlv *) (void *) &kt);
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kimpersonate.c | 151 create_krb5_tickets(krb5_context context, krb5_keytab kt) 168 ret = krb5_kt_get_entry(context, kt, server_principal, 0, etype, &entry); 273 setup_env(krb5_context context, krb5_keytab *kt) 278 ret = krb5_kt_resolve(context, keytab_file, kt); 280 ret = krb5_kt_default(context, kt); 368 krb5_keytab kt; local 394 setup_env(context, &kt); 397 create_krb5_tickets(context, kt); 399 krb5_kt_close(context, kt);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| mkey.c | 356 krb5_keytab kt; local 361 ret = krb5_kt_resolve(context, filename, &kt); 366 ret = krb5_kt_add_entry(context, kt, &p->keytab); 369 krb5_kt_close(context, kt);
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| init_c.c | 198 krb5_keytab kt; local 200 ret = krb5_kt_default(context, &kt); 202 ret = krb5_kt_resolve(context, keytab, &kt); 210 kt, 214 krb5_kt_close(context, kt);
|
| /src/sys/dist/pf/net/ |
| pf_if.c | 517 struct pfr_ktable *kt; local 523 kt = dyn->pfid_kt; 525 if (kt->pfrkt_larg != pfi_update) { 527 pfi_table_update(kt, kif, dyn->pfid_net, dyn->pfid_iflags); 528 kt->pfrkt_larg = pfi_update; 530 pfr_dynaddr_update(kt, dyn); 534 pfi_table_update(struct pfr_ktable *kt, struct pfi_kif *kif, int net, int flags) 547 if ((e = pfr_set_addrs(&kt->pfrkt_t, pfi_buffer, pfi_buffer_cnt, &size2, 550 "into table %s: %d\n", pfi_buffer_cnt, kt->pfrkt_name, e);
|
| pf_table.c | 238 struct pfr_ktable *kt; local 245 kt = pfr_lookup_table(tbl); 246 if (kt == NULL || !(kt->pfrkt_flags & PFR_TFLAG_ACTIVE)) 248 if (kt->pfrkt_flags & PFR_TFLAG_CONST) 250 pfr_enqueue_addrs(kt, &workq, ndel, 0); 255 pfr_remove_kentries(kt, &workq); 258 if (kt->pfrkt_cnt) { 260 kt->pfrkt_cnt); 261 kt->pfrkt_cnt = 0 271 struct pfr_ktable *kt, *tmpkt; local 351 struct pfr_ktable *kt; local 442 struct pfr_ktable *kt, *tmpkt; local 558 struct pfr_ktable *kt; local 596 struct pfr_ktable *kt; local 635 struct pfr_ktable *kt; local 685 struct pfr_ktable *kt; local 1519 struct pfr_ktable *kt, *rt, *shadow, key; local 1917 struct pfr_ktable *kt; local 2090 struct pfr_ktable *kt, *rt; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kdc-tester.c | 283 krb5_keytab kt = NULL; local 285 ret = krb5_kt_resolve(kdc_context, heim_string_get_utf8(keytab), &kt); 293 ret = copy_keytab(kdc_context, kt, ktmem); 297 krb5_kt_close(kdc_context, kt);
|