/osnet-11/usr/src/lib/libadm/common/ |
H A D | getinput.c | 43 char input[MAX_INPUT]; local 46 if (!fgets(input, MAX_INPUT, stdin)) 50 pt = input;
|
H A D | ckint.c | 94 input[MAX_INPUT], local 106 if (getinput(input)) 109 if (strlen(input) == 0) { 116 } else if (strcmp(input, "?") == 0) { 119 } else if (ckquit && (strcmp(input, "q") == 0)) 122 value = strtol(input, &ptr, (int)base);
|
H A D | ckkeywd.c | 69 char input[MAX_INPUT]; local 87 if (getinput(input)) 90 n = (int)strlen(input); 99 if (strcmp(input, "?") == 0) { 103 if (ckquit && (strcmp(input, "q") == 0)) { 104 (void) strcpy(strval, input); 110 valid = !match(input, keyword); 116 (void) strcpy(strval, input);
|
H A D | ckgid.c | 152 input[MAX_INPUT]; local 160 if (getinput(input)) { 166 if (!strlen(input)) { 177 } else if (strcmp(input, "?") == 0) { 182 } else if (ckquit && (strcmp(input, "q") == 0)) { 186 } else if (ckgid_val(input)) { 192 (void) strcpy(gid, input);
|
H A D | ckrange.c | 75 ckrange_val(long lower, long upper, int base, char *input) argument 80 value = strtol(input, &ptr, base); 93 char input[MAX_INPUT]; local 121 if (getinput(input)) 124 n = (int)strlen(input); 133 if (strcmp(input, "?") == 0) { 137 if (ckquit && (strcmp(input, "q") == 0)) 140 value = strtol(input, &ptr, base);
|
H A D | ckuid.c | 152 input[MAX_INPUT]; local 160 if (getinput(input)) { 166 if (!strlen(input)) { 177 } else if (strcmp(input, "?") == 0) { 182 } else if (ckquit && (strcmp(input, "q") == 0)) { 186 } else if (ckuid_val(input)) { 192 (void) strcpy(uid, input);
|
H A D | ckyorn.c | 85 char input[MAX_INPUT]; local 91 if (getinput(input)) 94 n = (int)strlen(input); 103 if (strcmp(input, "?") == 0) { 107 if (ckquit && (strcmp(input, "q") == 0)) 110 if (ckyorn_val(input)) { 114 (void) strcpy(yorn, input);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_md5.c | 42 unsigned int icount, krb5_const krb5_data *input, 52 return(k5_ef_hash(context, &mechanism, icount, input, output)); 41 k5_md5_hash(krb5_context context, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
|
H A D | hash_sha1.c | 39 unsigned int icount, krb5_const krb5_data *input, 48 return(k5_ef_hash(context, &mechanism, icount, input, output)); 38 k5_sha1_hash(krb5_context context, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
|
H A D | hash_ef_generic.c | 12 krb5_const krb5_data *input, 26 (CK_BYTE_PTR)input[i].data, 27 (CK_ULONG)input[i].length)) != CKR_OK) { 54 krb5_const krb5_data *input, 67 inlen = K5ROUNDUP(input->length, 8); 70 if (inlen != input->length) { 76 inbuf = input->data; 82 if (inlen != input->length) { 84 (void) memcpy(inbuf, input->data, input 9 k5_ef_hash(krb5_context context, CK_MECHANISM *mechanism, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument 51 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument [all...] |
/osnet-11/usr/src/cmd/hal/hald-runner/ |
H A D | runner.h | 37 gchar *input; member in struct:__anon48
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | prf.c | 55 krb5_data *input, krb5_data *output) 60 assert(input && output); 72 ret = ktp->prf(ktp, key, input, output); 78 krb5_data *input, krb5_data *output) 86 ret = krb5_k_prf(context, key, input, output); 54 krb5_k_prf(krb5_context context, krb5_key key, krb5_data *input, krb5_data *output) argument 77 krb5_c_prf(krb5_context context, const krb5_keyblock *keyblock, krb5_data *input, krb5_data *output) argument
|
/osnet-11/usr/src/lib/krb5/ss/ |
H A D | pager.c | 44 void ss_set_use_pager(int input) argument 46 USE_PAGER = input;
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | tr.c | 44 char *input = 0; local 52 input = (char *)grub_env_get (var); 57 input = args[0]; 66 input = args[2]; 71 if (argc <= 0 && !input) 80 /* Translate input into output buffer. */ 82 output = grub_malloc (grub_strlen (input) + 1); 86 for (i = 0; input[i]; i++) { 88 output[i] = grub_toupper (input[i]); 91 output[i] = grub_tolower (input[ [all...] |
/osnet-11/usr/src/lib/crypt_modules/sha256/ |
H A D | test.c | 34 const char *input; member in struct:__anon949 65 const char *input; member in struct:__anon950 120 tests2[cnt].input, tests2[cnt].salt, NULL);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softARCFourCrypt.c | 85 * input: pointer to the input data to be transformed 86 * inputlen: length of the input. 91 * Encrypts/Decrypts the 'input' and gets the result in the 'output' 101 soft_arcfour_crypt(crypto_active_op_t *active_op, CK_BYTE_PTR input, argument 124 arcfour_crypt(keystream, input, output, inputlen);
|
/osnet-11/usr/src/lib/libresolv2/common/isc/ |
H A D | base64.c | 91 The encoding process represents 24-bit groups of input bits as output 93 24-bit input group is formed by concatenating 3 8-bit input groups. 124 always completed at the end of a quantity. When fewer than 24 input 125 bits are available in an input group, zero bits are added (on the 129 Since all base64 input is an integral number of octets, only the 133 (1) the final quantum of encoding input is an integral 137 (2) the final quantum of encoding input is exactly 8 bits; 140 (3) the final quantum of encoding input is exactly 16 bits; 148 u_char input[ local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | MICwrap.c | 210 gss_buffer_t input, /* Input message to wrap */ 257 if ((*minor = __QOPSeal(wrap->mic.qop, input, conf_req, 299 gss_buffer_t input, /* Wrapped Diffie-Hellman token */ 332 /* Deserialize the input in to tok using keys */ 333 if ((*minor = __get_token(input, NULL, &tok, &keys)) != DH_SUCCESS) { 205 __dh_gss_seal( OM_uint32 *minor, gss_ctx_id_t context, int conf_req, int qop_req, gss_buffer_t input, int *conf_state, gss_buffer_t output ) argument 296 __dh_gss_unseal( OM_uint32 *minor, gss_ctx_id_t context, gss_buffer_t input, gss_buffer_t output, int *conf_state, int *qop_used ) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 46 const krb5_data *input, krb5_data *output) 104 (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) { 43 k5_hmac_md5_hash(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *iv, const krb5_data *input, krb5_data *output) argument
|
H A D | k5_md5des.c | 49 const krb5_data *input, krb5_data *output) 99 /* hash the confounder, then the input data */ 116 (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) { 150 krb5_const krb5_data *input, 217 /* hash the confounder, then the input data */ 235 (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) { 47 k5_md5des_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 146 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | import_name.c | 144 krb5_principal input; local 158 input = *((krb5_principal *) input_name_buffer->value); 160 if ((code = krb5_copy_principal(context, input, &princ))) {
|
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | parser.h | 51 /* The input that will determine the next state from FROM_STATE. */ 52 char input; member in struct:grub_parser_state_transition 54 /* If set to 1, the input is valid and should be used. */
|
/osnet-11/usr/src/grub/grub2/util/ |
H A D | grub-script-check.c | 77 char *input; local 178 input = 0; 179 get_config_line(&input, 0); 180 if (! input) 184 script = grub_script_parse (input, get_config_line); 191 grub_free (input);
|
/osnet-11/usr/src/lib/libsqlite/src/ |
H A D | parse.y | 70 input ::= cmdlist. label
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_crypt.c | 41 smb_auth_md4(unsigned char *result, const unsigned char *input, int length) argument 46 MD4Update(&md4_context, input, length); 53 smb_auth_md5(unsigned char *result, const unsigned char *input, int length) argument 74 rv = C_DigestUpdate(hSession, (CK_BYTE_PTR)input, length);
|