HomeSort by: relevance | last modified time | path
    Searched defs:kc (Results 1 - 18 of 18) sorted by relevancy

  /src/lib/libcurses/
getstr.c 164 char *ostr, ec, kc; local
172 kc = killchar();
218 } else if (c == kc) {
get_wstr.c 160 wchar_t *ostr, ec, kc, sc[ 2 ]; local
171 if (killwchar(&kc) == ERR)
214 } else if (wc == kc) {
  /src/external/gpl3/gcc.old/dist/gcc/config/sparc/
driver-sparc.cc 111 kstat_ctl_t *kc; local
127 kc = kstat_open ();
128 if (kc != NULL)
130 ksp = kstat_lookup (kc, CONST_CAST2 (char *, const char *, "cpu_info"),
133 && kstat_read (kc, ksp, NULL) != -1
140 kstat_close (kc);
  /src/sys/dev/wscons/
wskbdutil.c 417 wskbd_get_mapentry(const struct wskbd_mapdata *mapdata, int kc,
445 KS_VALUE(*kp) == kc) {
492 int i, s, kc, stack_ptr; local
533 kc = KS_VALUE(*kp);
538 (*map)[kc].command = *kp;
550 fillmapentry(kp, i, &(*map)[kc]);
  /src/sys/arch/hpcmips/vr/
vrkiu.c 348 struct vrkiu_chip *kc = ic; local
351 kc->kc_hpckbd = kbdif;
353 kc->kc_enabled = 1;
361 struct vrkiu_chip *kc = ic; local
365 while ((vrkiu_read(kc, KIUSCANS) & KIUSCANS_SSTAT_MASK) ==
370 vrkiu_scan(kc);
  /src/lib/libc/resolv/
res_init.c 196 struct kevent kc; local
201 EV_SET(&kc, ext->resfd, EVFILT_VNODE,
204 (void)kevent(ext->kq, &kc, 1, NULL, 0, &ts);
  /src/sys/kern/
subr_kcpuset.c 195 kcpuset_impl_t *kc; local
197 kc = kmem_alloc(kc_memsize, KM_SLEEP);
198 kc->kc_refcnt = 1;
199 kc->kc_next = NULL;
202 memset(&kc->kc_field, 0, kc_bitsize);
206 KASSERT((uint8_t *)kc + KC_BITS_OFF == (uint8_t *)&kc->kc_field);
207 return &kc->kc_field;
232 kcpuset_impl_t *kc; local
238 kc = KC_GETSTRUCT(kcp)
252 kcpuset_impl_t *kc = KC_GETSTRUCT(kcp); local
261 kcpuset_impl_t *kc = KC_GETSTRUCT(kcp); local
    [all...]
kern_ktrace.c 840 struct ktr_csw *kc; local
888 if (ktealloc(&kte, (void *)&kc, l, KTR_CSW, sizeof(*kc)))
891 kc->out = 1;
892 kc->user = ((l->l_pflag & LP_KTRCSWUSER) != 0);
915 if (ktealloc(&kte, (void *)&kc, l, KTR_CSW, sizeof(*kc)))
918 kc->out = 0;
919 kc->user = user;
  /src/external/apache2/mDNSResponder/dist/DSO/
dso.c 201 dso_keepalive_context_t kc; local
202 memset(&kc, 0, sizeof kc);
203 dso->cb(dso->context, &kc, dso, kDSOEventType_Keepalive);
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_sim.c 28 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
663 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
692 data->num_chal, (const u8 *) data->kc, data->mk);
eap_sim_db.c 44 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member in struct:eap_sim_db_pending::__anon6096::__anon6097
464 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ...
466 * (IMSI = ASCII string, Kc/SRES/RAND = hex string)
496 if (hexstr2bin(start, entry->u.sim.kc[num_chal],
908 * @kc: Buffer for Kc values
927 u8 *_rand, u8 *kc, u8 *sres,
971 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN);
  /src/external/gpl2/gmake/dist/
getloadavg.c 518 kstat_ctl_t *kc;
522 kc = kstat_open ();
523 if (kc == 0)
525 ksp = kstat_lookup (kc, "unix", 0, "system_misc");
528 if (kstat_read (kc, ksp, 0) == -1)
559 kstat_close (kc);
516 kstat_ctl_t *kc; local
  /src/external/bsd/wpa/dist/hostapd/
hlr_auc_gw.c 34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
37 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex
74 u8 kc[8]; member in struct:gsm_triplet
295 /* Parse IMSI:Kc:SRES:RAND */
324 /* Kc */
326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) {
327 printf("%s:%d - Invalid Kc\n", fname, line);
617 u8 _rand[16], sres[4], kc[8]; local
621 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8)
684 u8 _rand[16], sres[4], kc[8]; local
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_sim.c 28 u8 kc[3][EAP_SIM_KC_LEN]; member in struct:eap_sim_data
181 os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN);
248 if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0)
250 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
251 data->kc[i], EAP_SIM_KC_LEN);
299 data->sres[0], data->kc[0]) ||
301 data->sres[1], data->kc[1]) ||
304 data->sres[2], data->kc[2]))) {
338 data->sres[i], data->kc[i])) {
348 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/
eapol_test.c 1100 unsigned char kc[8]; local
1142 if (scard_gsm_auth(scard, _rand, sres, kc))
1146 if (scard_gsm_auth(scard, _rand, sres, kc))
1208 unsigned char kc[8]; local
1242 if (scard_gsm_auth(scard, _rand, sres, kc))
1245 /* IMSI:Kc:SRES:RAND */
1250 printf("%02X", kc[j]);
  /src/external/bsd/top/dist/machine/
m_sunos5.c 190 static kstat_ctl_t *kc = NULL; variable
750 if ((ks = kstat_lookup(kc, module, instance, name)) == NULL)
758 new_kcid = kstat_read(kc, ks, buf);
768 kcid = kstat_chain_update(kc);
811 for (ks = kc->kc_chain; ks != NULL; ks = ks->ks_next)
819 new_kcid = kstat_read(kc, ks, cbuf);
827 kcid = kstat_chain_update(kc);
1085 ks = kstat_lookup(kc, "unix", 0, "system_pages");
1089 kstat_read(kc, ks, 0) != -1 &&
1226 if ((kc = kstat_open()) == NULL
    [all...]
  /src/external/gpl2/xcvs/dist/src/
server.c 7501 krb5_context kc;
7505 krb5_init_context (&kc);
7508 || krb5_parse_name (kc, ((gss_buffer_t) &desc)->value, &p) != 0
7509 || krb5_aname_to_localname (kc, p, sizeof buf, buf) != 0
7510 || krb5_kuserok (kc, p, buf) != TRUE)
7514 krb5_free_principal (kc, p);
7515 krb5_free_context (kc);
7500 krb5_context kc; local
  /src/external/gpl3/gcc.old/dist/gcc/
genrecog.cc 1796 the conditions in KC hold. TEST is known to occur along the
1799 negative proof that hoisting isn't safe, but only KC can be used
1803 safe_to_hoist_p (decision *d, const rtx_test &test, known_conditions *kc)
1831 if (!kc->set_operands[test.u.opno])
1844 return test.pos->arg < kc->peep2_count;
1847 return kc->position_tests[test.pos->base->id] & TESTED_CODE;
1850 return kc->position_tests[test.pos->base->id] & TESTED_VECLEN;
1862 return kc->position_tests[test.pos->id] & TESTED_CODE;
1884 with a single transition. KC are the conditions that are known to
1890 known_conditions *kc, vec <transition *> *where
2214 known_conditions kc; local
    [all...]

Completed in 122 milliseconds