/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | cipher.c | 1616 /* Set counter for CTR mode. (CTR,CTRLEN) must denote a buffer of 1633 gcry_cipher_ctl( gcry_cipher_hd_t h, int cmd, void *buffer, size_t buflen) 1640 rc = cipher_setkey( h, buffer, buflen ); 1644 cipher_setiv( h, buffer, buflen ); 1678 if( h || !buffer || buflen != sizeof(int) ) 1680 disable_cipher_algo( *(int*)buffer ); 1684 if (buffer && buflen == h->cipher->blocksize) 1685 memcpy (h->ctr, buffer, h->cipher->blocksize); 1686 else if (buffer == NULL || buflen == 0) 1705 If the provided buffer i 1631 gcry_cipher_ctl( gcry_cipher_hd_t h, int cmd, void *buffer, size_t buflen) argument 1739 gcry_cipher_info(gcry_cipher_hd_t h, int cmd, void *buffer, size_t *nbytes) argument 1781 gcry_cipher_algo_info(int algo, int what, void *buffer, size_t *nbytes) argument [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/efi/ |
H A D | api.h | 825 void **buffer); 828 (*free_pool) (void *buffer); 891 grub_efi_handle_t *buffer); 980 grub_efi_handle_t **buffer); 1002 (*set_mem) (void *buffer, grub_efi_uintn_t size, grub_efi_uint8_t value); 1319 void *buffer); 1324 void *buffer); 1402 void *buffer, 1409 void *buffer, 1429 void *buffer); [all...] |
/osnet-11/usr/src/lib/libndr/common/ |
H A D | ndr_heap.c | 221 (void) smb_mbstowcs((smb_wchar_t *)vc->vcs->buffer, s, 247 bcopy(data, vcbuf->vcb->buffer, datalen);
|
/osnet-11/usr/src/lib/krb5/ss/ |
H A D | listen.c | 135 char buffer[BUFSIZ]; local 136 char *volatile end = buffer;
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | bios.c | 64 unsigned long buffer; 84 dap.buffer = segment << 16; 88 * the requested buffer, but didn't return an error code. 266 the greater buffer size for the "get drive parameters" int 62 unsigned long buffer; member in struct:disk_address_packet
|
H A D | fsys_minix.c | 159 /* check filesystem types and read superblock into memory buffer */ 193 minix_rdfsb (int fsblock, int buffer) argument 196 BLOCK_SIZE, (char *) buffer); 290 /* preconditions: minix_mount already executed, therefore supblk in buffer 293 postconditions: on a nonzero return, buffer known as INODE contains the 308 char linkbuf[PATH_MAX]; /* buffer for following sym-links */
|
H A D | fsys_ext2fs.c | 299 /* check filesystem types and read superblock into memory buffer */ 321 ext2_rdfsb (int fsblock, int buffer) argument 324 printf ("fsblock %d buffer %d\n", fsblock, buffer); 327 EXT2_BLOCK_SIZE (SUPERBLOCK), (char *) buffer); 538 /* preconditions: ext2fs_mount already executed, therefore supblk in buffer 541 * postconditions: on a nonzero return, buffer known as INODE contains the 543 * side effects: messes up GROUP_DESC buffer area 558 char linkbuf[PATH_MAX]; /* buffer for following symbolic links */
|
/osnet-11/usr/src/lib/libsum/common/ |
H A D | sum-sha1.c | 50 uint8_t buffer[64]; member in struct:Sha1_s 171 sha1_transform(uint32_t state[5], const unsigned char buffer[64]) { argument 177 (void)memcpy(block, buffer, 64); 239 (void)memcpy(&sha->buffer[j], data, (i = 64 - j)); 240 sha1_transform(sha->state, sha->buffer); 248 (void)memcpy(&sha->buffer[j], &data[i], len - i); 316 memset(sha->buffer, 0, sizeof(sha->buffer));
|
/osnet-11/usr/src/lib/mpapi/libmpscsi_vhci/common/ |
H A D | MP_GetMPLuOidListFromTPG.c | 150 struct stat buffer; local 265 status = stat(fullName, &buffer);
|
/osnet-11/usr/src/lib/nsswitch/dns/common/ |
H A D | gethostent.c | 155 argp->returnval = argp->buf.buffer; 233 argp->returnval = argp->buf.buffer; 387 * If successful, buffer will be filled with valid data
|
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | getprofattr.c | 282 args->buf.buffer, args->buf.buflen) != NSS_STR_PARSE_SUCCESS) { 286 args->buf.result : args->buf.buffer;
|
/osnet-11/usr/src/lib/libkmf/ber_der/common/ |
H A D | decode.c | 178 unsigned char buffer[sizeof (ber_int_t)]; local 186 if (len > sizeof (buffer)) 190 if (kmfber_read(ber, (char *)buffer, len) != len) 195 value = 0x80 & buffer[0] ? (-1) : 0; 201 value = (value << 8) | buffer[i]; 356 * Shift the buffer to the beginning of the allocated space 552 case 's': /* octet string - in a buffer */ 610 /* We'v overflowed our buffer */ 705 case 's': /* octet string - in a buffer */
|
/osnet-11/usr/src/grub/grub2/grub-core/script/ |
H A D | execute.c | 219 char buffer[ERRNO_DIGITS_MAX + 1]; local 220 grub_snprintf (buffer, sizeof (buffer), "%u", scope->argv.argc); 221 if (grub_script_argv_append (&result, buffer, grub_strlen (buffer)))
|
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getnetgrent.c | 106 char *buffer = args->buffer; local 119 args->retp[i] = buffer; 120 (void) memcpy(buffer, str, len); 121 buffer += len;
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 227 char buffer[512]; local 229 if (snprintf(buffer, sizeof (buffer), 231 KRB5_ENV_CCNAME, (int)pw_uid) >= sizeof (buffer)) { 237 kmd->env = strdup(buffer);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ |
H A D | pp_sys.c | 341 sv_setpv(TARG, ""); /* note that this preserves previous buffer */ 1541 char *buffer; local 1593 buffer = SvPVutf8_force(bufsv, blen); 1598 buffer = SvPV_force(bufsv, blen); 1620 buffer = SvGROW(bufsv, (STRLEN)(length+1)); 1622 count = PerlSock_recvfrom(PerlIO_fileno(IoIFP(io)), buffer, length, offset, 1662 offset = utf8_hop((U8 *)buffer,offset) - (U8 *) buffer; 1666 buffer = SvGROW(bufsv, (STRLEN)(length+offset+1)); 1668 Zero(buffer 1781 char *buffer; local [all...] |
/osnet-11/usr/src/lib/libc/amd64/gen/ |
H A D | memcpy.s | 1021 movdqa 0x10(%rdx),%xmm3 # load the upper source buffer 1022 movdqa 0x20(%rdx),%xmm0 # load the upper source buffer 1026 psrldq $0x1,%xmm1 # shift right prev buffer (saved from last iteration) 1028 pslldq $0xf,%xmm3 # shift the current buffer left (shift in zeros) 1032 psrldq $0x1,%xmm2 # shift right prev buffer (saved from last iteration) 1034 pslldq $0xf,%xmm0 # shift the current buffer left (shift in zeros) 1395 movdqa 0x10(%rdx),%xmm3 # load the upper source buffer 1397 movdqa 0x20(%rdx),%xmm0 # load the upper source buffer 1398 movdqa 0x30(%rdx),%xmm5 # load the upper source buffer 1425 movdqa 0x10(%rdx),%xmm3 # load the upper source buffer [all...] |
/osnet-11/usr/src/lib/libcmd/common/ |
H A D | od.c | 93 "[+b\an\a?Allocate a fixed input buffer of size \an\a.]" 94 "[+m\an\a?Set the mapped input buffer size to \an\a.]" 95 "[+n?Turn off the \bSF_SHARE\b input buffer flag.]" 228 } buffer; member in struct:State_s 957 if (state->buffer.noshare) 959 if (state->buffer.size) 960 sfsetbuf(ip, state->buffer.base, state->buffer.size); 1370 state.buffer.size = strton(s, &e, NiL, 1); 1371 if (n == 'b' && !(state.buffer [all...] |
/osnet-11/usr/src/lib/libdhcputil/common/ |
H A D | dhcp_inittab.c | 170 char buffer[ITAB_MAX_LINE_LEN]; local 196 while (fgets(buffer, sizeof (buffer), inittab_fp) != NULL) { 201 * make sure the string didn't overflow our buffer 203 if (strchr(buffer, '\n') == NULL) { 212 for (i = 0; buffer[i] != '\0'; i++) 213 if (isspace(buffer[i]) == 0) 216 if (buffer[i] == ITAB_COMMENT_CHAR || buffer[i] == '\0') 222 if (parse_entry(buffer, field [all...] |
/osnet-11/usr/src/lib/libfuse/common/ |
H A D | options.c | 168 fuse_opt_shift_arg(struct fuse_args *args, char *buffer, int bufsiz) argument 173 (void) strlcpy(buffer, args->argv[0], bufsiz); 176 return (buffer);
|
/osnet-11/usr/src/lib/fm/libseslog/common/ |
H A D | libseslog.c | 180 * Save the logs by walking through the entries in the response buffer. 182 * resp buffer looks like: 244 * Bytes 2 and 3 of response buffer contain the page length of 270 * Start walking each log entry in response buffer looking for 579 /* Too short of a response buffer */ 791 struct stat buffer; local 808 if (stat(real_path, &buffer) != 0) { 812 if (stat(real_path, &buffer) != 0) {
|
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 250 char *buffer; member in struct:context 255 unsigned int size; /* Absolute size of buffer */ 256 unsigned int needsize; /* How much of the size of the buffer is left */ 513 "Unable to allocate final buffer"); 515 utils->seterror(utils->conn, 0, "Unable to allocate final buffer"); 1760 /* make sure the output buffer is big enough for this blob */ 1775 /* We can just use the output buffer because it's big enough */ 1857 if(!text->buffer) 1858 text->buffer=text->utils->malloc(text->size+5); 1860 text->buffer [all...] |
/osnet-11/usr/src/lib/libresolv2/common/isc/ |
H A D | logging.c | 360 (void)vsprintf(lc->buffer, format, args); 361 if (strlen(lc->buffer) > (size_t)LOG_BUFFER_SIZE) { 382 lc->buffer); 417 lc->buffer);
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/ber/ |
H A D | decode.c | 166 unsigned char buffer[sizeof(ber_int_t)]; local 178 if ( ber_read( ber, (char *) buffer, len ) != len ) 183 value = 0x80 & buffer[0] ? (LBER_FUNC_VALUE) : 0; 189 value = (value << 8) | buffer[i]; 482 case 's': /* octet string - in a buffer */ 530 /* We'v overflowed our buffer */ 628 case 's': /* octet string - in a buffer */
|
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_sec_mechs.c | 1084 char *buffer, size_t buflen) 1088 if (keylen == 0 || !buffer || buflen == 0) 1094 if (!mechfile_name2lib(mechname, buffer, buflen)) 1097 return (buffer); 1083 __nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, char *buffer, size_t buflen) argument
|