/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_decrypt.c | 44 const krb5_data *input, 57 /* Verify input and output lengths. */ 58 if (input->length < blocksize + hashsize || input->length % blocksize != 0) 60 plainsize = input->length - blocksize - hashsize; 64 if (arg_output->length < input->length) { 65 output.length = input->length; 73 output.length = input->length; 89 (void) memcpy(cn, input->data + input 38 krb5_old_decrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *arg_output) argument [all...] |
/illumos-gate/usr/src/cmd/format/ |
H A D | prompts.c | 53 return (input(FIO_INT64, "Enter maximum number of LBAs", 67 return (input(FIO_INT, "Enter number of data cylinders", 84 return (input(FIO_INT, "Enter number of alternate cylinders", ':', 102 return (input(FIO_INT, "Enter number of physical cylinders", ':', 116 return (input(FIO_INT, "Enter number of heads", ':', 134 if (input(FIO_OPINT, "Enter physical number of heads", 154 return (input(FIO_INT, 172 if (input(FIO_OPINT, "Enter number of physical sectors/track", 197 return (input(FIO_INT, "Enter number of bytes/track", 216 return (input(FIO_IN [all...] |
H A D | menu_analyze.c | 172 * input characters so we can page the output. 265 scan_entire = !input(FIO_MSTR, "Analyze entire disk", '?', 268 * If we are not scanning the whole disk, input the bounds of the scan. 281 scan_lower = (diskaddr_t)input(FIO_BN, 287 scan_upper = (diskaddr_t)input(FIO_BN, 293 scan_loop = !input(FIO_MSTR, "Loop continuously", '?', 296 * If we are not looping continuously, input the number of passes. 301 scan_passes = input(FIO_INT, "Enter number of passes", ':', 306 scan_correct = !input(FIO_MSTR, "Repair defective blocks", '?', 310 scan_stop = !input(FIO_MST [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | dk.h | 32 size_t input, size_t *length); 41 const krb5_data *input, krb5_data *output); 48 krb5_const krb5_data *ivec, krb5_const krb5_data *input, 61 krb5_const krb5_data *input, krb5_data *output); 77 size_t input, size_t *length); 85 const krb5_data *input, krb5_data *output); 92 const krb5_data *ivec, const krb5_data *input,
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | des.c | 39 krb5_const krb5_data *ivec, krb5_const krb5_data *input, 49 if ((input->length%8) != 0) 53 if (input->length != output->length) 56 ret = mit_des_cbc_encrypt(context, (krb5_pointer) input->data, 57 (krb5_pointer) output->data, input->length, 68 krb5_const krb5_data *ivec, krb5_const krb5_data *input, 71 return(k5_des_docrypt(context, key, ivec, input, output, 1)); 76 krb5_const krb5_data *ivec, krb5_const krb5_data *input, 79 return(k5_des_docrypt(context, key, ivec, input, output, 0)); 38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument 67 k5_des_encrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument 75 k5_des_decrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
|
H A D | des3.c | 39 krb5_const krb5_data *input, krb5_data *output, int encrypt) 50 if ((input->length%8) != 0) 54 if (input->length != output->length) 57 ret = mit_des3_cbc_encrypt(context, (krb5_pointer) input->data, 58 (krb5_pointer) output->data, input->length, 70 krb5_const krb5_data *input, krb5_data *output) 72 return(k5_des3_docrypt(context, key, ivec, input, output, 1)); 78 krb5_const krb5_data *input, krb5_data *output) 80 return(k5_des3_docrypt(context, key, ivec, input, output, 0)); 37 k5_des3_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument 68 k5_des3_encrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument 76 k5_des3_decrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
|
H A D | aes_provider.c | 36 const krb5_data *input, krb5_data *output) 51 ASSERT(input != NULL); 52 if (input->length < BLOCK_SIZE) 55 ASSERT(input->length == output->length); 76 /* number of input blocks including partial block */ 77 nblocks = (input->length + BLOCK_SIZE - 1) / BLOCK_SIZE; 80 partialamount = input->length % BLOCK_SIZE; 101 ret = k5_ef_crypto((const char *)input->data, 103 input->length, (krb5_keyblock *)key, 164 pt.cd_uio->uio_iov[0].iov_base = (char *)input 34 krb5int_aes_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 269 krb5int_aes_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 486 krb5int_aes_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 721 krb5int_aes_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument [all...] |
H A D | arcfour_provider.c | 75 const krb5_data *input, krb5_data *output) 92 if (input->length != output->length) 151 (CK_BYTE_PTR)input->data, 152 (CK_ULONG)input->length, 157 (CK_BYTE_PTR)input->data, 158 (CK_ULONG)input->length, 172 bzero(output->data, input->length); 180 ret = k5_ef_crypto((const char *)input->data, (char *)output->data, 181 input->length, (krb5_keyblock *)key, NULL, 0); 192 const krb5_data *input, krb5_dat 73 k5_arcfour_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument 190 k5_arcfour_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_prov_lib.c | 242 crypto_get_input_data(crypto_data_t *input, uchar_t **dptr, uchar_t *buf) argument 246 switch (input->cd_format) { 248 if (input->cd_raw.iov_len < input->cd_length) 250 *dptr = (uchar_t *)(input->cd_raw.iov_base + 251 input->cd_offset); 255 if ((rv = crypto_uio_data(input, buf, input->cd_length, 262 if ((rv = crypto_mblk_data(input, buf, input 397 crypto_update_iov(void *ctx, crypto_data_t *input, crypto_data_t *output, int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), void (*copy_block)(uint8_t *, uint64_t *)) argument 419 crypto_update_uio(void *ctx, crypto_data_t *input, crypto_data_t *output, int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), void (*copy_block)(uint8_t *, uint64_t *)) argument 484 crypto_update_mp(void *ctx, crypto_data_t *input, crypto_data_t *output, int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), void (*copy_block)(uint8_t *, uint64_t *)) argument [all...] |
/illumos-gate/usr/src/cmd/sasinfo/ |
H A D | sasinfo-list.c | 99 rp_tree_t *rpnode, inputArg_t *input, int gident, 104 inputArg_t *input, int lident, int gident); 106 sas_print_rpnode(inputArg_t *input, 112 SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input); 114 static int processHBA(inputArg_t *input, 117 static int isPortWWNInArgv(inputArg_t *input, PHBA_WWN pWWN); 118 static int isStringInArgv(inputArg_t *input, const char *adapterName); 124 static int handleHBA(SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input, 128 SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input); 137 SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input); 195 inputArg_t input; local 254 inputArg_t input; local 326 inputArg_t input; local 394 inputArg_t input; local 506 processHBA(inputArg_t *input, processPortFunc processPort) argument 1051 isPortWWNInArgv(inputArg_t *input, PHBA_WWN pWWN) argument 1089 isStringInArgv(inputArg_t *input, const char *stringName) argument 1119 handleHBA(SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input, int numberOfPorts, const char *adapterName) argument 1153 handleHBAPort(HBA_HANDLE handle, char *adapterName, HBA_UINT32 portIndex, SMHBA_PORTATTRIBUTES *port, SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input) argument 1178 handleExpander(HBA_HANDLE handle, char *adapterName, HBA_UINT32 portIndex, SMHBA_PORTATTRIBUTES *port, SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input) argument 1388 handleTargetPort(HBA_HANDLE handle, char *adapterName, HBA_UINT32 portIndex, SMHBA_PORTATTRIBUTES *port, SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input) argument 1508 inputArg_t input; local 1600 handleLogicalUnit(HBA_HANDLE handle, char *adapterName, HBA_UINT32 portIndex, SMHBA_PORTATTRIBUTES *port, SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input) argument 2497 sas_rp_tree_print(HBA_HANDLE handle, char *adapterName, HBA_UINT32 portIndex, SMHBA_PORTATTRIBUTES *port, rp_tree_t *rpnode, inputArg_t *input, int gident, int *printPort) argument 2641 sas_rp_tree_print_desc(HBA_HANDLE handle, HBA_UINT32 portIndex, SMHBA_PORTATTRIBUTES *port, rp_tree_t *desc, inputArg_t *input, int lident, int gident) argument 2669 sas_print_rpnode(inputArg_t *input, rp_tree_t *rpnode, int lident, int gident) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | descbc.c | 47 krb5_const krb5_data *input, krb5_data *output) 54 if ((input->length%8) != 0) 65 ivec ? (krb5_data *)ivec : &zero_ivec, input, output); 43 k5_descbc_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/hash_provider/ |
H A D | hash_ksha1.c | 47 unsigned int icount, krb5_const krb5_data *input, 61 if (k5_ef_hash(context, icount, input, output)) 46 k5_sha1_hash(krb5_context context, unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument
|
H A D | hash_kef_generic.c | 17 const krb5_data *input, 57 v1.iov_base = (void *)input[i].data; 58 v1.iov_len = input[i].length; 59 d1.cd_length = input[i].length; 91 const krb5_data *input, 101 ASSERT(input != NULL); 127 v1.iov_base = (void *)input->data; 128 v1.iov_len = input->length; 132 d1.cd_length = input->length; 16 k5_ef_hash(krb5_context context, int icount, const krb5_data *input, krb5_data *output) argument 88 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_encrypt.c | 55 const krb5_data *ivec, const krb5_data *input, 58 return((*(enc->encrypt))(context, key, ivec, input, output)); 51 krb5_raw_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/lib/libadm/common/ |
H A D | ckrange.c | 75 ckrange_val(long lower, long upper, int base, char *input) argument 80 value = strtol(input, &ptr, base); 93 char input[MAX_INPUT]; local 121 if (getinput(input)) 124 n = (int)strlen(input); 133 if (strcmp(input, "?") == 0) { 137 if (ckquit && (strcmp(input, "q") == 0)) 140 value = strtol(input, &ptr, base);
|
H A D | ckgid.c | 152 input[MAX_INPUT]; local 160 if (getinput(input)) { 166 if (!strlen(input)) { 177 } else if (strcmp(input, "?") == 0) { 182 } else if (ckquit && (strcmp(input, "q") == 0)) { 186 } else if (ckgid_val(input)) { 192 (void) strcpy(gid, input);
|
H A D | ckuid.c | 152 input[MAX_INPUT]; local 160 if (getinput(input)) { 166 if (!strlen(input)) { 177 } else if (strcmp(input, "?") == 0) { 182 } else if (ckquit && (strcmp(input, "q") == 0)) { 186 } else if (ckuid_val(input)) { 192 (void) strcpy(uid, input);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_decrypt.c | 45 const krb5_data *input, 55 const krb5_data *ivec, const krb5_data *input, 59 ivec, input, output, 0); 68 const krb5_data *ivec, const krb5_data *input, 72 ivec, input, output, 96 / 8); 81 const krb5_data *ivec, const krb5_data *input, 114 /* Verify input and output lengths. */ 115 if (input->length < blocksize + hmacsize) 117 if (output->length < input->length - blocksize - hmacsize) 120 enclen = input 50 krb5_dk_decrypt( krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 63 krb5int_aes_dk_decrypt( krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 76 krb5_dk_decrypt_maybe_trunc_hmac( krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output, size_t hmacsize) argument [all...] |
H A D | dk_encrypt.c | 62 const krb5_data *ivec, const krb5_data *input, 88 plainlen = krb5_roundup(blocksize+input->length, blocksize); 90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); 106 (void) memcpy(plaintext+blocksize, input->data, input->length); 108 (void) memset(plaintext+blocksize+input->length, 0, 109 plainlen - (blocksize+input->length)); 188 const krb5_data *input, krb5_data *output) 203 ret = krb5_hmac(context, ki, input, &tmphash); 205 ret = krb5_hmac(context, hash, ki, num, input, 58 krb5_dk_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 185 trunc_hmac(krb5_context context, const struct krb5_hash_provider *hash, const krb5_keyblock *ki, int num, const krb5_data *input, krb5_data *output) argument 220 krb5int_aes_dk_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument [all...] |
/illumos-gate/usr/src/lib/libshell/common/tests/ |
H A D | sun_solaris_builtin_tail.sh | 101 # quote input string but use single-backslash that "err_exit" prints 111 # quote input string but use double-backslash that "err_exit" prints 144 input=$'hello\nworld' 152 input=$'1\n2\n3\n4' 161 input=$'1\n2\n3\n4' 170 input=$'1\n2\n3\n4' 179 input=$'1\n2\n3\n4' 189 input=$'1\n2\n3\n4' 198 input=$'1\n2\n3\n4' 207 input [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | decrypt.c | 39 const krb5_enc_data *input, krb5_data *output) 52 if ((input->enctype != ENCTYPE_UNKNOWN) && 53 (krb5_enctypes_list[i].etype != input->enctype)) 74 key, usage, ivec, &input->ciphertext, output)); 37 krb5_c_decrypt(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_enc_data *input, krb5_data *output) argument
|
H A D | hmac.c | 45 krb5_const krb5_data *input, krb5_data *output) 57 if (input == NULL || input->data == NULL) { 58 KRB5_LOG0(KRB5_INFO, "krb5_hmac() NULL input"); 64 dd.cd_length = input->length; 65 dd.cd_raw.iov_base = (char *)input->data; 66 dd.cd_raw.iov_len = input->length; 110 krb5_const krb5_data *input, 130 if (input == NULL) { 131 KRB5_LOG0(KRB5_ERR, "krb5_hmac() error input 44 krb5_hmac(krb5_context context, const krb5_keyblock *key, krb5_const krb5_data *input, krb5_data *output) argument 106 krb5_hmac(krb5_context context, krb5_const struct krb5_hash_provider *hash, krb5_const krb5_keyblock *key, krb5_const unsigned int icount, krb5_const krb5_data *input, krb5_data *output) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | arcfour.c | 233 rc4_crypt(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output, argument 238 ret = rc4_crypt_update(ctx, input, output, req); 248 rc4_crypt_update(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output, argument 266 switch (input->cd_format) { 269 start = input->cd_raw.iov_base + input->cd_offset; 271 end = input->cd_raw.iov_base + input->cd_raw.iov_len; 273 if (start + input->cd_length > end) 277 input 496 rc4_crypt_atomic(crypto_provider_handle_t handle, crypto_session_id_t session, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/cmd/head/ |
H A D | head.c | 55 static FILE *input; variable 141 if (input != NULL) 142 (void) fclose(input); 143 if ((input = fopen(argv[optind], "r")) == NULL) { 150 input = stdin; 179 while (cnt > 0 && fgets(lbuf, sizeof (lbuf), input) != 0) {
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_rename/ |
H A D | zfs_rename_006_pos.ksh | 74 for input in $VOL_R_PATH /dev/zvol/rdsk/$clone; do 75 log_must eval "dd if=$input of=$VOLDATA bs=$BS count=$CNT >/dev/null 2>&1" 77 log_fail "$input gets corrupted after rename operation."
|