| /src/lib/libcurses/ |
| getstr.c | 164 char *ostr, ec, kc; local 172 kc = killchar(); 218 } else if (c == kc) {
|
| get_wstr.c | 160 wchar_t *ostr, ec, kc, sc[ 2 ]; local 171 if (killwchar(&kc) == ERR) 214 } else if (wc == kc) {
|
| /src/external/gpl3/gcc.old/dist/gcc/config/sparc/ |
| driver-sparc.cc | 111 kstat_ctl_t *kc; local 127 kc = kstat_open (); 128 if (kc != NULL) 130 ksp = kstat_lookup (kc, CONST_CAST2 (char *, const char *, "cpu_info"), 133 && kstat_read (kc, ksp, NULL) != -1 140 kstat_close (kc);
|
| /src/sys/dev/wscons/ |
| wskbdutil.c | 417 wskbd_get_mapentry(const struct wskbd_mapdata *mapdata, int kc, 445 KS_VALUE(*kp) == kc) { 492 int i, s, kc, stack_ptr; local 533 kc = KS_VALUE(*kp); 538 (*map)[kc].command = *kp; 550 fillmapentry(kp, i, &(*map)[kc]);
|
| /src/sys/arch/hpcmips/vr/ |
| vrkiu.c | 348 struct vrkiu_chip *kc = ic; local 351 kc->kc_hpckbd = kbdif; 353 kc->kc_enabled = 1; 361 struct vrkiu_chip *kc = ic; local 365 while ((vrkiu_read(kc, KIUSCANS) & KIUSCANS_SSTAT_MASK) == 370 vrkiu_scan(kc);
|
| /src/lib/libc/resolv/ |
| res_init.c | 196 struct kevent kc; local 201 EV_SET(&kc, ext->resfd, EVFILT_VNODE, 204 (void)kevent(ext->kq, &kc, 1, NULL, 0, &ts);
|
| /src/sys/kern/ |
| subr_kcpuset.c | 195 kcpuset_impl_t *kc; local 197 kc = kmem_alloc(kc_memsize, KM_SLEEP); 198 kc->kc_refcnt = 1; 199 kc->kc_next = NULL; 202 memset(&kc->kc_field, 0, kc_bitsize); 206 KASSERT((uint8_t *)kc + KC_BITS_OFF == (uint8_t *)&kc->kc_field); 207 return &kc->kc_field; 232 kcpuset_impl_t *kc; local 238 kc = KC_GETSTRUCT(kcp) 252 kcpuset_impl_t *kc = KC_GETSTRUCT(kcp); local 261 kcpuset_impl_t *kc = KC_GETSTRUCT(kcp); local [all...] |
| kern_ktrace.c | 840 struct ktr_csw *kc; local 888 if (ktealloc(&kte, (void *)&kc, l, KTR_CSW, sizeof(*kc))) 891 kc->out = 1; 892 kc->user = ((l->l_pflag & LP_KTRCSWUSER) != 0); 915 if (ktealloc(&kte, (void *)&kc, l, KTR_CSW, sizeof(*kc))) 918 kc->out = 0; 919 kc->user = user;
|
| /src/external/apache2/mDNSResponder/dist/DSO/ |
| dso.c | 201 dso_keepalive_context_t kc; local 202 memset(&kc, 0, sizeof kc); 203 dso->cb(dso->context, &kc, dso, kDSOEventType_Keepalive);
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_sim.c | 28 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 663 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm); 692 data->num_chal, (const u8 *) data->kc, data->mk);
|
| eap_sim_db.c | 44 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon6096::__anon6097 464 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ... 466 * (IMSI = ASCII string, Kc/SRES/RAND = hex string) 496 if (hexstr2bin(start, entry->u.sim.kc[num_chal], 908 * @kc: Buffer for Kc values 927 u8 *_rand, u8 *kc, u8 *sres, 971 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN);
|
| /src/external/gpl2/gmake/dist/ |
| getloadavg.c | 518 kstat_ctl_t *kc; 522 kc = kstat_open (); 523 if (kc == 0) 525 ksp = kstat_lookup (kc, "unix", 0, "system_misc"); 528 if (kstat_read (kc, ksp, 0) == -1) 559 kstat_close (kc); 516 kstat_ctl_t *kc; local
|
| /src/external/bsd/wpa/dist/hostapd/ |
| hlr_auc_gw.c | 34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 37 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex 74 u8 kc[8]; member in struct:gsm_triplet 295 /* Parse IMSI:Kc:SRES:RAND */ 324 /* Kc */ 326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) { 327 printf("%s:%d - Invalid Kc\n", fname, line); 617 u8 _rand[16], sres[4], kc[8]; local 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8) 684 u8 _rand[16], sres[4], kc[8]; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_sim.c | 28 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data 181 os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN); 248 if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0) 250 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc", 251 data->kc[i], EAP_SIM_KC_LEN); 299 data->sres[0], data->kc[0]) || 301 data->sres[1], data->kc[1]) || 304 data->sres[2], data->kc[2]))) { 338 data->sres[i], data->kc[i])) { 348 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc", [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| eapol_test.c | 1100 unsigned char kc[8]; local 1142 if (scard_gsm_auth(scard, _rand, sres, kc)) 1146 if (scard_gsm_auth(scard, _rand, sres, kc)) 1208 unsigned char kc[8]; local 1242 if (scard_gsm_auth(scard, _rand, sres, kc)) 1245 /* IMSI:Kc:SRES:RAND */ 1250 printf("%02X", kc[j]);
|
| /src/external/bsd/top/dist/machine/ |
| m_sunos5.c | 190 static kstat_ctl_t *kc = NULL; variable 750 if ((ks = kstat_lookup(kc, module, instance, name)) == NULL) 758 new_kcid = kstat_read(kc, ks, buf); 768 kcid = kstat_chain_update(kc); 811 for (ks = kc->kc_chain; ks != NULL; ks = ks->ks_next) 819 new_kcid = kstat_read(kc, ks, cbuf); 827 kcid = kstat_chain_update(kc); 1085 ks = kstat_lookup(kc, "unix", 0, "system_pages"); 1089 kstat_read(kc, ks, 0) != -1 && 1226 if ((kc = kstat_open()) == NULL [all...] |
| /src/external/gpl2/xcvs/dist/src/ |
| server.c | 7501 krb5_context kc; 7505 krb5_init_context (&kc); 7508 || krb5_parse_name (kc, ((gss_buffer_t) &desc)->value, &p) != 0 7509 || krb5_aname_to_localname (kc, p, sizeof buf, buf) != 0 7510 || krb5_kuserok (kc, p, buf) != TRUE) 7514 krb5_free_principal (kc, p); 7515 krb5_free_context (kc); 7500 krb5_context kc; local
|
| /src/external/gpl3/gcc.old/dist/gcc/ |
| genrecog.cc | 1796 the conditions in KC hold. TEST is known to occur along the 1799 negative proof that hoisting isn't safe, but only KC can be used 1803 safe_to_hoist_p (decision *d, const rtx_test &test, known_conditions *kc) 1831 if (!kc->set_operands[test.u.opno]) 1844 return test.pos->arg < kc->peep2_count; 1847 return kc->position_tests[test.pos->base->id] & TESTED_CODE; 1850 return kc->position_tests[test.pos->base->id] & TESTED_VECLEN; 1862 return kc->position_tests[test.pos->id] & TESTED_CODE; 1884 with a single transition. KC are the conditions that are known to 1890 known_conditions *kc, vec <transition *> *where 2214 known_conditions kc; local [all...] |