/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | abort.c | 40 static int pass = 0; /* counts how many times abort has been called */ variable 70 if (++pass == 1)
|
/osnet-11/usr/src/lib/libpp/common/ |
H A D | pppragma.c | 31 pppragma(char* directive, char* pass, char* name, char* value, int newline) argument 41 if (pass) 48 ppprintf("%s:", pass); 60 if (sep || pass)
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | password.c | 49 char *pass; local 52 pass = grub_zalloc (GRUB_AUTH_MAX_PASSLEN); 53 if (!pass) 58 grub_memcpy (pass, password, copylen); 60 err = grub_auth_register_authentication (user, check_password, pass); 63 grub_free (pass);
|
H A D | password_pbkdf2.c | 46 struct pbkdf2_password *pass = pin; local 49 buf = grub_malloc (pass->buflen); 55 pass->salt, pass->saltlen, pass->c, 56 buf, pass->buflen); 63 if (grub_crypto_memcmp (buf, pass->expected, pass->buflen) != 0) 90 struct pbkdf2_password *pass; local 101 pass [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pbkdf2.c | 53 const krb5_data *pass, const krb5_data *salt) 109 params.pPassword = (CK_UTF8CHAR_PTR)pass->data; 111 passlen = (CK_ULONG)pass->length; 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_keychain.c | 111 * pass pk here anyway just so we can use the 151 * Note: pass is a cleartext password. 157 const char *pass, boolean_t updatefile) 164 if (pass == NULL) 167 if ((err = smbfs_ntlm_compute_lm_hash(lmhash, pass)) != 0) 169 if ((err = smbfs_ntlm_compute_nt_hash(nthash, pass)) != 0) 156 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, const char *pass, boolean_t updatefile) argument
|
H A D | smbfs_ntlm.c | 79 smbfs_ntlm_compute_lm_hash(uchar_t *hash, const char *pass) argument 87 ucpw = smbfs_utf8_str_toupper(pass); 115 smbfs_ntlm_compute_nt_hash(uchar_t *hash, const char *pass) argument 122 unipw = smbfs_convert_utf8_to_leunicode(pass); 342 MD5Init(&context); /* init context for 1st pass */ 345 MD5Final(digest, &context); /* finish up 1st pass */ 350 MD5Init(&context); /* init context for 2nd pass */ 353 MD5Final(digest, &context); /* finish up 2nd pass */
|
/osnet-11/usr/src/lib/libsocket/inet/ |
H A D | rexec.c | 56 const char *pass, const char *cmd, int *fd2p) 58 return (rexec_af(ahost, rport, name, pass, cmd, fd2p, AF_INET)); 62 const char *pass, const char *cmd, int *fd2p, int af) 95 _ruserpass(res->ai_canonname, (char **)&name, (char **)&pass); 157 (void) write(s, pass, strlen(pass) + 1); 55 rexec(char **ahost, unsigned short rport, const char *name, const char *pass, const char *cmd, int *fd2p) argument 61 rexec_af(char **ahost, unsigned short rport, const char *name, const char *pass, const char *cmd, int *fd2p, int af) argument
|
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | lcnalloc.c | 112 u8 pass, done_zones, search_zone, need_writeback, bit; local 143 * and pass depending on whether we are starting inside a zone (1) or 150 pass = 1; 166 * single pass is sufficient. 168 pass = 2; 175 * pass in this zone is sufficient. 177 pass = 2; 184 * Starting at beginning of volume which means a single pass 187 pass = 2; 214 "search_zone = %i, pass [all...] |
H A D | mft.c | 431 u8 pass, b; local 435 * Set the end of the pass making sure we do not overflow the mft 443 pass = 1; 452 pass = 2; 464 ntfs_log_debug("Starting bitmap search: pass %u, pass_start 0x%llx, " 465 "pass_end 0x%llx, data_pos 0x%llx.\n", pass, 473 for (; pass <= 2; size = PAGE_SIZE) { 516 * If the end of the pass has not been reached yet, 522 /* Do the next pass. */ 523 pass [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 57 setseed(unsigned char *pass) argument 67 rseed ^= (rseed << 8) | pass[i]; 107 char *pass /* password to seed with for private key */) 121 setseed((u_char *)pass); 139 seed = random() ^ pass[i % 8];
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_init.c | 116 char *pass, char **service_name, 123 return kadm5_init(context, client_name, pass, service_name, params, 192 kadm5_ret_t kadm5_init2(krb5_context context, char *client_name, char *pass, argument 415 kadm5_ret_t kadm5_init(krb5_context context, char *client_name, char *pass, argument 422 return (kadm5_init2(context, client_name, pass, service_name, params_in, 115 kadm5_init_with_password(krb5_context context, char *client_name, char *pass, char **service_name, kadm5_config_params *params, krb5_ui_4 struct_version, krb5_ui_4 api_version, char **db_args, void **server_handle) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | tiger.c | 623 pass( u64 *ra, u64 *rb, u64 *rc, u64 *x, int mul ) function 698 pass( &a, &b, &c, x, 5); 700 pass( &c, &a, &b, x, 7); 702 pass( &b, &c, &a, x, 9);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/t/ |
H A D | test.pl | 52 my ($pass, $where, $name, @mess) = @_; 59 $out = $pass ? "ok $test - $name" : "not ok $test - $name"; 61 $out = $pass ? "ok $test" : "not ok $test"; 67 unless ($pass) { 76 return $pass; 86 my ($pass, $name, @mess) = @_; 87 _ok($pass, _where(), $name, @mess); 138 my $pass; 141 $pass = !defined $got && !defined $expected; 144 $pass 257 sub pass { subroutine [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | POP3.pm | 67 sub debug_text { $_[2] =~ /^(pass|rpop)/i ? "$1 ....\n" : $_[2]; } 72 my($me,$user,$pass) = @_; 75 ($user, $pass) = $me->_lookup_credentials($user); 79 $me->pass($pass); 85 my($me,$user,$pass) = @_; 102 ($user, $pass) = $me->_lookup_credentials($user); 105 $md->add($banner,$pass); 119 sub pass subroutine 121 @_ == 2 or croak 'usage: $pop3->pass( PAS [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Test/ |
H A D | More.pm | 27 pass fail 97 pass($test_name); 567 =item B<pass> 571 pass($test_name); 576 wedge into an ok(). In this case, you can simply use pass() (to 584 sub pass (;$) { subroutine
|
/osnet-11/usr/src/lib/scsi/libsmp/common/ |
H A D | smp_plugin.c | 210 smp_plugin_loadone(smp_target_t *tp, const char *path, uint32_t pass) argument 242 pp->sp_priority |= (uint64_t)pass << 32;
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 65 getseed(seed, seedsize, pass) 68 unsigned char *pass; 77 rseed ^= (rseed << 8) | pass[i]; 82 seed[i] = (random() & 0xff) ^ pass[i % 8]; 112 __gen_dhkeys(public, secret, pass) 115 char *pass; 137 getseed((char *)seed, (int)sizeof (seed), (uchar_t *)pass); 172 char *pass) /* in */ 176 if (! pkey || ! skey || ! pass) 180 __gen_dhkeys(pkey, skey, pass); 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/support/ |
H A D | threads.c | 189 int i, pass, none_found; local 200 pass = 0; 202 while (pass < 4 && !none_found) {
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | tiger.c | 623 pass( u64 *ra, u64 *rb, u64 *rc, u64 *x, int mul ) function 698 pass( &a, &b, &c, x, 5); 700 pass( &c, &a, &b, x, 7); 702 pass( &b, &c, &a, x, 9);
|
/osnet-11/usr/src/lib/libast/common/misc/ |
H A D | optlib.h | 74 Optpass_t pass; member in struct:Optcache_s 85 Optpass_t pass[8]; /* optjoin() list */ member in struct:Optstate_s 94 int join; /* optjoin() pass # */
|
/osnet-11/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_mirror_resync.c | 45 mm_pass_num_t pass; /* pass number */ member in struct:mm_unit_list 135 * setup_units: build lists of units for each pass 167 lp->pass = mirrorp->pass_num; 168 if ((lp->pass < 0) || (lp->pass > MD_PASS_MAX)) 169 lp->pass = MD_PASS_MAX; 172 lp->next = mirrors[lp->pass]; 173 mirrors[lp->pass] = lp; 192 mm_pass_num_t pass, max_pas local 346 mm_pass_num_t pass, max_pass; local 529 mm_pass_num_t pass; local [all...] |
/osnet-11/usr/src/lib/scsi/libses/common/ |
H A D | ses_plugin.c | 176 * The caller should pass np if node type 254 ses_plugin_loadone(ses_target_t *tp, const char *path, uint32_t pass) argument 286 sp->sp_priority |= (uint64_t)pass << 32;
|
/osnet-11/usr/src/lib/fm/topo/libtopo/common/ |
H A D | sw.c | 377 int pass; local 427 /* On the first pass buf is NULL and size and buflen are 0 */ 428 pass = 1; 494 if (pass == 1) 509 pass = 2;
|
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 90 char *pass; member in struct:chpass_arg 100 char *pass; member in struct:chpass3_arg
|