Searched defs:input (Results 1 - 25 of 87) sorted by relevance

1234

/osnet-11/usr/src/lib/libadm/common/
H A Dgetinput.c43 char input[MAX_INPUT]; local
46 if (!fgets(input, MAX_INPUT, stdin))
50 pt = input;
H A Dckint.c94 input[MAX_INPUT], local
106 if (getinput(input))
109 if (strlen(input) == 0) {
116 } else if (strcmp(input, "?") == 0) {
119 } else if (ckquit && (strcmp(input, "q") == 0))
122 value = strtol(input, &ptr, (int)base);
H A Dckkeywd.c69 char input[MAX_INPUT]; local
87 if (getinput(input))
90 n = (int)strlen(input);
99 if (strcmp(input, "?") == 0) {
103 if (ckquit && (strcmp(input, "q") == 0)) {
104 (void) strcpy(strval, input);
110 valid = !match(input, keyword);
116 (void) strcpy(strval, input);
H A Dckgid.c152 input[MAX_INPUT]; local
160 if (getinput(input)) {
166 if (!strlen(input)) {
177 } else if (strcmp(input, "?") == 0) {
182 } else if (ckquit && (strcmp(input, "q") == 0)) {
186 } else if (ckgid_val(input)) {
192 (void) strcpy(gid, input);
H A Dckrange.c75 ckrange_val(long lower, long upper, int base, char *input) argument
80 value = strtol(input, &ptr, base);
93 char input[MAX_INPUT]; local
121 if (getinput(input))
124 n = (int)strlen(input);
133 if (strcmp(input, "?") == 0) {
137 if (ckquit && (strcmp(input, "q") == 0))
140 value = strtol(input, &ptr, base);
H A Dckuid.c152 input[MAX_INPUT]; local
160 if (getinput(input)) {
166 if (!strlen(input)) {
177 } else if (strcmp(input, "?") == 0) {
182 } else if (ckquit && (strcmp(input, "q") == 0)) {
186 } else if (ckuid_val(input)) {
192 (void) strcpy(uid, input);
H A Dckyorn.c85 char input[MAX_INPUT]; local
91 if (getinput(input))
94 n = (int)strlen(input);
103 if (strcmp(input, "?") == 0) {
107 if (ckquit && (strcmp(input, "q") == 0))
110 if (ckyorn_val(input)) {
114 (void) strcpy(yorn, input);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/
H A Dhash_md5.c42 unsigned int icount, krb5_const krb5_data *input,
52 return(k5_ef_hash(context, &mechanism, icount, input, output));
41 k5_md5_hash(krb5_context context, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
H A Dhash_sha1.c39 unsigned int icount, krb5_const krb5_data *input,
48 return(k5_ef_hash(context, &mechanism, icount, input, output));
38 k5_sha1_hash(krb5_context context, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
H A Dhash_ef_generic.c12 krb5_const krb5_data *input,
26 (CK_BYTE_PTR)input[i].data,
27 (CK_ULONG)input[i].length)) != CKR_OK) {
54 krb5_const krb5_data *input,
67 inlen = K5ROUNDUP(input->length, 8);
70 if (inlen != input->length) {
76 inbuf = input->data;
82 if (inlen != input->length) {
84 (void) memcpy(inbuf, input->data, input
9 k5_ef_hash(krb5_context context, CK_MECHANISM *mechanism, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
51 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
[all...]
/osnet-11/usr/src/cmd/hal/hald-runner/
H A Drunner.h37 gchar *input; member in struct:__anon48
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dprf.c55 krb5_data *input, krb5_data *output)
60 assert(input && output);
72 ret = ktp->prf(ktp, key, input, output);
78 krb5_data *input, krb5_data *output)
86 ret = krb5_k_prf(context, key, input, output);
54 krb5_k_prf(krb5_context context, krb5_key key, krb5_data *input, krb5_data *output) argument
77 krb5_c_prf(krb5_context context, const krb5_keyblock *keyblock, krb5_data *input, krb5_data *output) argument
/osnet-11/usr/src/lib/krb5/ss/
H A Dpager.c44 void ss_set_use_pager(int input) argument
46 USE_PAGER = input;
/osnet-11/usr/src/grub/grub2/grub-core/commands/
H A Dtr.c44 char *input = 0; local
52 input = (char *)grub_env_get (var);
57 input = args[0];
66 input = args[2];
71 if (argc <= 0 && !input)
80 /* Translate input into output buffer. */
82 output = grub_malloc (grub_strlen (input) + 1);
86 for (i = 0; input[i]; i++) {
88 output[i] = grub_toupper (input[i]);
91 output[i] = grub_tolower (input[
[all...]
/osnet-11/usr/src/lib/crypt_modules/sha256/
H A Dtest.c34 const char *input; member in struct:__anon949
65 const char *input; member in struct:__anon950
120 tests2[cnt].input, tests2[cnt].salt, NULL);
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftARCFourCrypt.c85 * input: pointer to the input data to be transformed
86 * inputlen: length of the input.
91 * Encrypts/Decrypts the 'input' and gets the result in the 'output'
101 soft_arcfour_crypt(crypto_active_op_t *active_op, CK_BYTE_PTR input, argument
124 arcfour_crypt(keystream, input, output, inputlen);
/osnet-11/usr/src/lib/libresolv2/common/isc/
H A Dbase64.c91 The encoding process represents 24-bit groups of input bits as output
93 24-bit input group is formed by concatenating 3 8-bit input groups.
124 always completed at the end of a quantity. When fewer than 24 input
125 bits are available in an input group, zero bits are added (on the
129 Since all base64 input is an integral number of octets, only the
133 (1) the final quantum of encoding input is an integral
137 (2) the final quantum of encoding input is exactly 8 bits;
140 (3) the final quantum of encoding input is exactly 16 bits;
148 u_char input[ local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A DMICwrap.c210 gss_buffer_t input, /* Input message to wrap */
257 if ((*minor = __QOPSeal(wrap->mic.qop, input, conf_req,
299 gss_buffer_t input, /* Wrapped Diffie-Hellman token */
332 /* Deserialize the input in to tok using keys */
333 if ((*minor = __get_token(input, NULL, &tok, &keys)) != DH_SUCCESS) {
205 __dh_gss_seal( OM_uint32 *minor, gss_ctx_id_t context, int conf_req, int qop_req, gss_buffer_t input, int *conf_state, gss_buffer_t output ) argument
296 __dh_gss_unseal( OM_uint32 *minor, gss_ctx_id_t context, gss_buffer_t input, gss_buffer_t output, int *conf_state, int *qop_used ) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dhmac_md5.c46 const krb5_data *input, krb5_data *output)
104 (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) {
43 k5_hmac_md5_hash(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *iv, const krb5_data *input, krb5_data *output) argument
H A Dk5_md5des.c49 const krb5_data *input, krb5_data *output)
99 /* hash the confounder, then the input data */
116 (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) {
150 krb5_const krb5_data *input,
217 /* hash the confounder, then the input data */
235 (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) {
47 k5_md5des_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
146 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dimport_name.c144 krb5_principal input; local
158 input = *((krb5_principal *) input_name_buffer->value);
160 if ((code = krb5_copy_principal(context, input, &princ))) {
/osnet-11/usr/src/grub/grub2/include/grub/
H A Dparser.h51 /* The input that will determine the next state from FROM_STATE. */
52 char input; member in struct:grub_parser_state_transition
54 /* If set to 1, the input is valid and should be used. */
/osnet-11/usr/src/grub/grub2/util/
H A Dgrub-script-check.c77 char *input; local
178 input = 0;
179 get_config_line(&input, 0);
180 if (! input)
184 script = grub_script_parse (input, get_config_line);
191 grub_free (input);
/osnet-11/usr/src/lib/libsqlite/src/
H A Dparse.y70 input ::= cmdlist. label
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_crypt.c41 smb_auth_md4(unsigned char *result, const unsigned char *input, int length) argument
46 MD4Update(&md4_context, input, length);
53 smb_auth_md5(unsigned char *result, const unsigned char *input, int length) argument
74 rv = C_DigestUpdate(hSession, (CK_BYTE_PTR)input, length);

Completed in 44 milliseconds

1234