/freebsd/sys/netpfil/pf/ |
H A D | pf_table.c | 217 struct pfr_ktable *kt; in pfr_clr_addrs() local 225 kt = pfr_lookup_table(tbl); in pfr_clr_addrs() 226 if (kt == NULL || !(kt->pfrkt_flags & PFR_TFLAG_ACTIVE)) in pfr_clr_addrs() 228 if (kt->pfrkt_flags & PFR_TFLAG_CONST) in pfr_clr_addrs() 230 pfr_enqueue_addrs(kt, &workq, ndel, 0); in pfr_clr_addrs() 233 pfr_remove_kentries(kt, &workq); in pfr_clr_addrs() 234 KASSERT(kt->pfrkt_cnt == 0, ("%s: non-null pfrkt_cnt", __func__)); in pfr_clr_addrs() 243 struct pfr_ktable *kt, *tmpkt; in pfr_add_addrs() local 255 kt = pfr_lookup_table(tbl); in pfr_add_addrs() 256 if (kt == NULL || !(kt->pfrkt_flags & PFR_TFLAG_ACTIVE)) in pfr_add_addrs() [all …]
|
H A D | pf_if.c | 667 struct pfr_ktable *kt; in pfi_dynaddr_update() local 674 kt = dyn->pfid_kt; in pfi_dynaddr_update() 676 if (kt->pfrkt_larg != V_pfi_update) { in pfi_dynaddr_update() 678 pfi_table_update(kt, kif, dyn->pfid_net, dyn->pfid_iflags); in pfi_dynaddr_update() 679 kt->pfrkt_larg = V_pfi_update; in pfi_dynaddr_update() 681 pfr_dynaddr_update(kt, dyn); in pfi_dynaddr_update() 685 pfi_table_update(struct pfr_ktable *kt, struct pfi_kkif *kif, int net, int flags) in pfi_table_update() argument 701 if ((e = pfr_set_addrs(&kt->pfrkt_t, V_pfi_buffer, V_pfi_buffer_cnt, &size2, in pfi_table_update() 704 __func__, V_pfi_buffer_cnt, kt->pfrkt_name, e); in pfi_table_update()
|
/freebsd/contrib/bearssl/src/kdf/ |
H A D | shake.c | 68 uint64_t t, kt; in process_block() local 178 kt = A[ 6] | A[12]; in process_block() 179 c0 = A[ 0] ^ kt; in process_block() 180 kt = bnn | A[18]; in process_block() 181 c1 = A[ 6] ^ kt; in process_block() 182 kt = A[18] & A[24]; in process_block() 183 c2 = A[12] ^ kt; in process_block() 184 kt = A[24] | A[ 0]; in process_block() 185 c3 = A[18] ^ kt; in process_block() 186 kt = A[ 0] & A[ 6]; in process_block() [all …]
|
/freebsd/sys/compat/linuxkpi/common/include/linux/ |
H A D | ktime.h | 43 ktime_to_ns(ktime_t kt) in ktime_to_ns() argument 45 return (kt); in ktime_to_ns() 55 ktime_divns(const ktime_t kt, int64_t div) in ktime_divns() argument 57 return (kt / div); in ktime_divns() 61 ktime_to_us(ktime_t kt) in ktime_to_us() argument 63 return (ktime_divns(kt, NSEC_PER_USEC)); in ktime_to_us() 67 ktime_to_ms(ktime_t kt) in ktime_to_ms() argument 69 return (ktime_divns(kt, NSEC_PER_MSEC)); in ktime_to_ms() 79 ktime_to_timeval(ktime_t kt) in ktime_to_timeval() argument 81 return (ns_to_timeval(kt)); in ktime_to_timeval() [all …]
|
/freebsd/crypto/openssl/crypto/idea/ |
H A D | i_skey.c | 24 register IDEA_INT *kt, *kf, r0, r1, r2; in IDEA_set_encrypt_key() local 26 kt = &(ks->data[0][0]); in IDEA_set_encrypt_key() 27 n2s(key, kt[0]); in IDEA_set_encrypt_key() 28 n2s(key, kt[1]); in IDEA_set_encrypt_key() 29 n2s(key, kt[2]); in IDEA_set_encrypt_key() 30 n2s(key, kt[3]); in IDEA_set_encrypt_key() 31 n2s(key, kt[4]); in IDEA_set_encrypt_key() 32 n2s(key, kt[5]); in IDEA_set_encrypt_key() 33 n2s(key, kt[6]); in IDEA_set_encrypt_key() 34 n2s(key, kt[7]); in IDEA_set_encrypt_key() [all …]
|
/freebsd/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 48 v5_to_kt(krb5_creds *cred, uid_t uid, struct kafs_token *kt, int local524) in v5_to_kt() argument 52 kt->ticket = NULL; in v5_to_kt() 82 kt->ticket = buf; in v5_to_kt() 83 kt->ticket_len = buf_len; in v5_to_kt() 87 kt->ticket = malloc(cred->ticket.length); in v5_to_kt() 88 if (kt->ticket == NULL) in v5_to_kt() 90 kt->ticket_len = cred->ticket.length; in v5_to_kt() 91 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len); in v5_to_kt() 99 kt->ct.AuthHandle = kvno; in v5_to_kt() 100 memcpy(kt->ct.HandShakeKey, cred->session.keyvalue.data, 8); in v5_to_kt() [all …]
|
H A D | common.c | 344 const char *realm, uid_t uid, struct kafs_token *kt) in _kafs_try_get_cred() argument 348 ret = (*data->get_cred)(data, user, cell, realm, uid, kt); in _kafs_try_get_cred() 371 struct kafs_token *kt) in _kafs_get_cred() argument 403 cell, realm_hint, uid, kt); in _kafs_get_cred() 406 NULL, realm_hint, uid, kt); in _kafs_get_cred() 418 cell, realm, uid, kt); in _kafs_get_cred() 427 NULL, realm, uid, kt); in _kafs_get_cred() 438 NULL, CELL, uid, kt); in _kafs_get_cred() 441 cell, CELL, uid, kt); in _kafs_get_cred() 454 cell, vl_realm, uid, kt); in _kafs_get_cred() [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | keytab_any.c | 37 krb5_keytab kt; member 50 if(a->kt) in free_list() 51 krb5_kt_close(context, a->kt); in free_list() 82 ret = krb5_kt_resolve (context, buf, &a->kt); in any_resolve() 140 ret = krb5_kt_start_seq_get(context, ed->a->kt, &ed->cursor); in any_start_seq_get() 164 ret = krb5_kt_next_entry(context, ed->a->kt, entry, &ed->cursor); in any_next_entry() 170 ret2 = krb5_kt_end_seq_get (context, ed->a->kt, &ed->cursor); in any_next_entry() 174 ret2 = krb5_kt_start_seq_get(context, ed->a->kt, &ed->cursor); in any_next_entry() 195 ret = krb5_kt_end_seq_get(context, ed->a->kt, &ed->cursor); in any_end_seq_get() 209 ret = krb5_kt_add_entry(context, a->kt, entry); in any_add_entry() [all …]
|
H A D | keytab.c | 287 const char *kt = NULL; in krb5_kt_default_modify_name() local 290 kt = context->default_keytab; in krb5_kt_default_modify_name() 302 kt = context->default_keytab_modify; in krb5_kt_default_modify_name() 303 if (strlcpy (name, kt, namesize) >= namesize) { in krb5_kt_default_modify_name()
|
/freebsd/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 215 for kt in $PLAIN_TYPES; do 221 $sign_opts $OBJ/cert_host_key_${kt} || 222 fatal "couldn't sign cert_host_key_${kt}" 225 echo HostKey $OBJ/cert_host_key_${kt} 226 echo HostCertificate $OBJ/cert_host_key_${kt}-cert.pub 296 for kt in $PLAIN_TYPES ; do 297 verbose "$tid: host ${kt} connect wrong cert" 300 ${SSHKEYGEN} -q -N '' -t ${kt} -f $OBJ/cert_host_key_${kt} || \ 301 fail "ssh-keygen of cert_host_key_${kt} failed" 302 case $kt in [all …]
|
H A D | keytype.sh | 24 for kt in $ktypes; do 25 rm -f $OBJ/key.$kt 26 xbits=`echo ${kt} | awk -F- '{print $2}'` 27 xtype=`echo ${kt} | awk -F- '{print $1}'` 28 case "$kt" in 29 *sk) type="$kt"; bits="n/a"; bits_arg="";; 33 ${SSHKEYGEN} $bits_arg -q -N '' -t $type -f $OBJ/key.$kt || \
|
H A D | dropbear-ciphers.sh | 26 for kt in $keytype; do 27 verbose "$tid: cipher $c mac $m kt $kt" 29 env HOME=$OBJ dbclient -y -i $OBJ/.dropbear/$kt 2>$OBJ/dbclient.log \
|
/freebsd/sys/tests/framework/ |
H A D | kern_testfrwk.c | 177 struct kern_test kt; in kerntest_execute() local 186 error = SYSCTL_IN(req, &kt, sizeof(struct kern_test)); in kerntest_execute() 190 if (kt.num_threads <= 0) { in kerntest_execute() 197 if (strcmp(li->name, kt.name) == 0) { in kerntest_execute() 203 printf("Can't find the test %s\n", kt.name); in kerntest_execute() 215 if (kfrwk.kfrwk_waiting < kt.num_threads) { in kerntest_execute() 220 kt.tot_threads_running = kt.num_threads; in kerntest_execute() 223 memcpy(&kte->kt_data, &kt, sizeof(kt)); in kerntest_execute()
|
/freebsd/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 145 create_krb5_tickets (krb5_context context, krb5_keytab kt) in create_krb5_tickets() argument 158 ret = krb5_kt_get_entry (context, kt, server_principal, in create_krb5_tickets() 227 setup_env (krb5_context context, krb5_keytab *kt) in setup_env() argument 232 ret = krb5_kt_resolve (context, keytab_file, kt); in setup_env() 234 ret = krb5_kt_default (context, kt); in setup_env() 310 krb5_keytab kt; in main() local 332 setup_env(context, &kt); in main() 335 create_krb5_tickets(context, kt); in main() 337 krb5_kt_close(context, kt); in main()
|
/freebsd/crypto/heimdal/admin/ |
H A D | list.c | 158 char kt[1024]; in kt_list() local 164 if((ret = krb5_kt_default_name(context, kt, sizeof(kt))) != 0) { in kt_list() 168 keytab_string = kt; in kt_list()
|
/freebsd/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | kdc.c | 66 krb5_keytab kt = NULL; in get_ccache() local 92 ret = krb5_kt_default(context, &kt); in get_ccache() 113 kt, in get_ccache() 131 krb5_kt_close(context, kt); in get_ccache() 144 if (kt) in get_ccache() 145 krb5_kt_close(context, kt); in get_ccache()
|
/freebsd/contrib/bearssl/src/ec/ |
H A D | ec_c25519_i15.c | 254 uint32_t kt; in api_mul() local 256 kt = (k[31 - (i >> 3)] >> (i & 7)) & 1; in api_mul() 257 swap ^= kt; in api_mul() 260 swap = kt; in api_mul()
|
H A D | ec_c25519_i31.c | 248 uint32_t kt; in api_mul() local 250 kt = (k[31 - (i >> 3)] >> (i & 7)) & 1; in api_mul() 251 swap ^= kt; in api_mul() 254 swap = kt; in api_mul()
|
H A D | ec_c25519_m62.c | 431 uint32_t kt; in api_mul() local 433 kt = (k[31 - (i >> 3)] >> (i & 7)) & 1; in api_mul() 434 swap ^= kt; in api_mul() 437 swap = kt; in api_mul()
|
/freebsd/contrib/telnet/libtelnet/ |
H A D | kerberos5.c | 145 krb5_keytab kt; in kerberos5_init() local 148 ret = krb5_kt_default(context, &kt); in kerberos5_init() 152 ret = krb5_kt_start_seq_get (context, kt, &cursor); in kerberos5_init() 154 krb5_kt_close (context, kt); in kerberos5_init() 157 krb5_kt_end_seq_get (context, kt, &cursor); in kerberos5_init() 158 krb5_kt_close (context, kt); in kerberos5_init()
|
/freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 172 krb5_keytab kt; in kerberos5_init() local 175 ret = krb5_kt_default(context, &kt); in kerberos5_init() 179 ret = krb5_kt_start_seq_get (context, kt, &cursor); in kerberos5_init() 181 krb5_kt_close (context, kt); in kerberos5_init() 184 krb5_kt_end_seq_get (context, kt, &cursor); in kerberos5_init() 185 krb5_kt_close (context, kt); in kerberos5_init()
|
/freebsd/contrib/bearssl/src/x509/ |
H A D | x509_minimal.c | 1122 int kt; in br_x509_minimal_run() local 1132 kt = CTX->pkey.key_type; in br_x509_minimal_run() 1133 if ((ta->pkey.key_type & 0x0F) != kt) { in br_x509_minimal_run() 1136 switch (kt) { in br_x509_minimal_run() 1681 int kt; in verify_signature() local 1683 kt = ctx->cert_signer_key_type; in verify_signature() 1684 if ((pk->key_type & 0x0F) != kt) { in verify_signature() 1687 switch (kt) { in verify_signature()
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | init_c.c | 180 krb5_keytab kt; in get_new_cache() local 182 ret = krb5_kt_default(context, &kt); in get_new_cache() 184 ret = krb5_kt_resolve(context, keytab, &kt); in get_new_cache() 192 kt, in get_new_cache() 196 krb5_kt_close(context, kt); in get_new_cache()
|
/freebsd/contrib/ncurses/ncurses/base/ |
H A D | lib_set_term.c | 111 _nc_free_keytry(TRIES * kt) in _nc_free_keytry() argument 113 if (kt != 0) { in _nc_free_keytry() 114 _nc_free_keytry(kt->child); in _nc_free_keytry() 115 _nc_free_keytry(kt->sibling); in _nc_free_keytry() 116 free(kt); in _nc_free_keytry()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 252 prepare_key(struct shared_state *st, int kt, int bits) in prepare_key() argument 261 switch (kt) { in prepare_key() 280 error_fr(r, "priv %d", kt); in prepare_key() 288 error_fr(r, "pub %d", kt); in prepare_key()
|