/osnet-11/usr/src/lib/libc/i386_hwcap1/gen/ |
H A D | memcpy.s | 38 movl 8+ 4(%esp),%edi / destination buffer address 39 movl 8+ 8(%esp),%esi / source buffer address 159 / Make certain that destination buffer becomes aligned
|
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | getprinter.c | 138 args->buf.buffer, args->buf.buflen); 142 args->buf.result : args->buf.buffer;
|
/osnet-11/usr/src/lib/libparted/common/lib/ |
H A D | quotearg.h | 282 /* Place into buffer BUFFER (of size BUFFERSIZE) a quoted version of 293 size_t quotearg_buffer (char *buffer, size_t buffersize, 298 buffer. It is the caller's responsibility to free the result. The
|
/osnet-11/usr/src/lib/libipadm/common/ |
H A D | ipadm_ndpd.c | 365 * Attempt to read `buflen' worth of bytes from `fd' into the buffer pointed 369 ipadm_ndpd_read(int fd, void *buffer, size_t buflen) argument 394 prbytes = read(fd, (caddr_t)buffer + nbytes, buflen - nbytes); 407 * Write `buflen' bytes from `buffer' to open file `fd'. Returns 0 411 ipadm_ndpd_write(int fd, const void *buffer, size_t buflen) argument 415 const char *buf = buffer;
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Filter/Util/Call/ |
H A D | Call.xs | 101 else /* no EOL, so append the complete buffer */ 126 /* make $_ use our buffer */ 202 SV * buffer = DEFSV ; 204 RETVAL = FILTER_READ(IDX + 1, buffer, size) ;
|
/osnet-11/usr/src/lib/libumem/common/ |
H A D | umem_base.h | 111 extern void _umem_cache_free(umem_cache_t *cache, void *buffer);
|
/osnet-11/usr/src/lib/nsswitch/ad/common/ |
H A D | ad_common.h | 82 char *buffer; member in struct:ad_backend
|
/osnet-11/usr/src/lib/pam_modules/authtok_check/ |
H A D | packlib.c | 245 char buffer[NUMWORDS * MAXWORDLEN]; local 269 if (!fread(buffer, 1, sizeof (buffer), pwp->dfp)) { 275 bptr = buffer;
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | twofish.c | 877 byte scratch[16]; /* Encryption/decryption result buffer. */ 955 /* Test buffer. */ 956 byte buffer[4][16] = { 995 twofish_setkey (&ctx, buffer[0], sizeof (buffer[0])); 997 twofish_encrypt (&ctx, buffer[2], buffer[2]); 998 twofish_setkey (&ctx, buffer[1], sizeof (buffer[1])); 1000 twofish_encrypt (&ctx, buffer[ 946 byte buffer[4][16] = { local [all...] |
H A D | blowfish.c | 470 byte buffer[8]; local 477 encrypt_block( (void *) &c, buffer, plain ); 478 if( memcmp( buffer, "\x32\x4E\xD0\xFE\xF4\x13\xA2\x03", 8 ) ) 480 decrypt_block( (void *) &c, buffer, buffer ); 481 if( memcmp( buffer, plain, 8 ) ) 485 encrypt_block( (void *) &c, buffer, plain3 ); 486 if( memcmp( buffer, cipher3, 8 ) ) 488 decrypt_block( (void *) &c, buffer, buffer ); [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | twofish.c | 895 /* Test buffer. */ 896 byte buffer[4][16] = { 935 twofish_setkey (&ctx, buffer[0], sizeof (buffer[0])); 937 twofish_encrypt (&ctx, buffer[2], buffer[2]); 938 twofish_setkey (&ctx, buffer[1], sizeof (buffer[1])); 940 twofish_encrypt (&ctx, buffer[3], buffer[ 886 byte buffer[4][16] = { local [all...] |
/osnet-11/usr/src/lib/libsocket/inet/ |
H A D | netmasks.c | 61 * to be MT safe, use a passed in buffer like otherget*_r APIs. 218 * in buffer for use by check_addr for 'files' backend, to match the network 219 * address. The network address is placed in the buffer as a network order 220 * internet address, if buffer is non null. The network order form of the mask 224 str2addr(const char *instr, int lenstr, void *ent, char *buffer, int buflen) argument 240 if (buffer) { /* for 'files' backend verification */ 251 (void) memcpy(buffer, (char *)&addr,
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ieee1275/ |
H A D | ofdisk.c | 202 char buffer[sizeof ("ieee1275/") + grub_strlen (ent->shortest)]; local 204 ptr = grub_stpcpy (buffer, "ieee1275/"); 206 if (hook (buffer))
|
/osnet-11/usr/src/grub/grub2/grub-core/kern/ |
H A D | file.c | 237 char *buffer = buf; local 245 amt_read = (file->fs->read) (file, buffer, readsz); 254 buffer += amt_read;
|
/osnet-11/usr/src/grub/grub2/grub-core/script/ |
H A D | lexer.c | 135 YY_BUFFER_STATE buffer; local 198 buffer = yy_scan_string (line, lexerstate->yyscanner); 201 if (! buffer)
|
/osnet-11/usr/src/lib/libc/i386/gen/ |
H A D | memcpy.s | 63 movl 8+ 4(%esp),%edi / destination buffer address 64 movl 8+ 8(%esp),%esi / source buffer address 77 movl %esi,%ecx / get source buffer 4 byte aligned
|
/osnet-11/usr/src/lib/nsswitch/compat/common/ |
H A D | getpwent.c | 111 /* Check if we have enough space in the buffer */ 249 (void) strncpy(argp->buf.buffer, buf, len); 250 argp->returnval = argp->buf.buffer; 257 argp->buf.buffer,
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | svcctl_svc.c | 459 param->buffer = NDR_MALLOC(mxa, SVCCTL_SECURITY_BUFSIZE); 460 if (param->buffer == NULL) { 465 bzero(param->buffer, sizeof (SVCCTL_SECURITY_BUFSIZE)); 474 param->buffer = NDR_MALLOC(mxa, sizeof (uint32_t)); 1205 param->buffer = NDR_STRDUP(mxa, ""); 1211 param->buffer = NDR_MALLOC(mxa, input_bufsize); 1212 if (param->buffer == NULL) { 1214 param->buffer = NDR_STRDUP(mxa, ""); 1218 bzero(param->buffer, input_bufsize); 1220 svc_rsp.svc_buf = param->buffer; [all...] |
/osnet-11/usr/src/lib/libldap5/include/ldap/ |
H A D | solaris-int.h | 65 * Socket buffer structure associated to the LDAP connection 145 LDAP_API(ber_uint_t) LDAP_CALL ber_get_next_buffer( void *buffer, 148 LDAP_API(ber_uint_t) LDAP_CALL ber_get_next_buffer_ext( void *buffer, 354 const char *name, LDAPHostEnt *result, char *buffer, 358 char *buffer, int buflen, int *statusp, void *extradata); 360 LDAP *ld, struct sockaddr *netaddr, char *buffer, int buflen);
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 117 void *ent, char *buffer, int buflen) { 121 * We copy the input string into the output buffer 123 (void) memcpy(buffer, instr, lenstr); 124 buffer[lenstr] = '\0'; 442 NSS_XbyY_INIT(&arg, buf->result, buf->buffer, buf->buflen, str2key); 465 keyval = buf->buffer; 116 str2key(const char *instr, int lenstr, void *ent, char *buffer, int buflen) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/net/drivers/i386/pc/ |
H A D | pxe.c | 103 grub_uint32_t buffer; member in struct:grub_pxe_undi_isr 278 grub_memcpy (ptr, LINEAR (isr->buffer), isr->buffer_len); 292 grub_memcpy (ptr, LINEAR (isr->buffer), isr->buffer_len); 438 ci.buffer = 0; 444 bp = LINEAR (ci.buffer);
|
/osnet-11/usr/src/cmd/ldap/ns_ldap/ |
H A D | ldaplist.c | 272 char *buffer[100]; local 490 buffer[0] = strdup(attribute); 492 buffer[index++] = attribute = p + 1; 495 buffer[index] = NULL; 496 ldapattribute = buffer;
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_setcred.c | 501 char buffer[512]; local 503 if (snprintf(buffer, sizeof (buffer), 505 (int)uuid) >= sizeof (buffer)) { 514 kmd->env = strdup(buffer);
|
/osnet-11/usr/src/lib/libgss/ |
H A D | g_initialize.c | 713 char buffer[BUFSIZ], *oidStr, *oid, *sharedLib, *kernMod, *endp; local 727 (void) memset(buffer, 0, sizeof (buffer)); 728 while (fgets(buffer, BUFSIZ, confFile) != NULL) { 731 if (*buffer == '#') 738 oidStr = buffer; 739 for (oid = buffer; *oid && !isspace(*oid); oid++);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/PerlIO/via/ |
H A D | via.pm | 125 =item $obj->READ($buffer,$len,$fh) 127 Returns the number of octets placed in $buffer (must be less than or 130 =item $obj->WRITE($buffer,$fh) 132 Returns the number of octets from buffer that have been successfully written. 136 Should return a string to be placed in the buffer. Optional. If not 156 =item $obj->UNREAD($buffer,$fh) 158 Returns the number of octets from buffer that have been successfully 202 # When writing we buffer the data
|