Searched refs:data (Results 576 - 600 of 1382) sorted by relevance

<<21222324252627282930>>

/osnet-11/usr/src/lib/libkstat/common/
H A Dkstat.c45 * with the kstat_ctl_t data structure. When the kstat_ctl_t is free, the
322 /* Free the kc_private data if present. */
368 kstat_read(kstat_ctl_t *kc, kstat_t *ksp, void *data) argument
385 * which you hope will hold all the data.
388 * the current size of the kstat's data. You then
399 if (data != NULL) {
400 (void) memcpy(data, ksp->ks_data, ksp->ks_data_size);
408 kstat_named_t *knp = data;
418 * the string to the beginning of 'data' to fix
419 * the pointer so that strings in 'data' do
432 kstat_write(kstat_ctl_t *kc, kstat_t *ksp, void *data) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dsha512.c105 transform (SHA512_CONTEXT *hd, const unsigned char *data) argument
165 memcpy (w, data, 128);
173 p2[7] = *data++;
174 p2[6] = *data++;
175 p2[5] = *data++;
176 p2[4] = *data++;
177 p2[3] = *data++;
178 p2[2] = *data++;
179 p2[1] = *data++;
180 p2[0] = *data
[all...]
H A Dpubkey.c34 gcry_mpi_t *data, gcry_mpi_t *skey,
39 gcry_mpi_t *data, gcry_mpi_t *pkey,
132 dummy_encrypt (int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, argument
137 (void)data;
145 dummy_decrypt (int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, argument
150 (void)data;
158 dummy_sign (int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, argument
163 (void)data;
170 dummy_verify (int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, argument
176 (void)data;
229 gcry_pk_lookup_func_name(void *spec, void *data) argument
608 pubkey_encrypt(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument
658 pubkey_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
705 pubkey_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
748 pubkey_verify(int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument
1591 gcry_mpi_t *pkey = NULL, data = NULL, *ciph = NULL; local
1736 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL; local
2429 const char *data; local
[all...]
H A Ddsa.c203 gcry_mpi_t data = gcry_mpi_new (qbits);
214 gcry_mpi_randomize (data, qbits, GCRY_WEAK_RANDOM);
217 sign (sig_a, sig_b, data, sk);
220 if ( !verify (sig_a, sig_b, data, &pk) )
223 /* Modify the data and check that the signing fails. */
224 gcry_mpi_add_ui (data, data, 1);
225 if ( verify (sig_a, sig_b, data, &pk) )
233 gcry_mpi_release (data);
964 dsa_sign (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_
202 gcry_mpi_t data = gcry_mpi_new (qbits); local
963 dsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument
1041 gcry_sexp_t data = NULL; local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Dsha512.c107 transform (SHA512_CONTEXT *hd, const unsigned char *data) argument
167 memcpy (w, data, 128);
175 p2[7] = *data++;
176 p2[6] = *data++;
177 p2[5] = *data++;
178 p2[4] = *data++;
179 p2[3] = *data++;
180 p2[2] = *data++;
181 p2[1] = *data++;
182 p2[0] = *data
[all...]
/osnet-11/usr/src/cmd/sendmail/db/btree/
H A Dbt_delete.c77 DBT data; local
95 * Walk a cursor through the key/data pairs, deleting as we go. Set
98 * keys or data, so request a partial of length 0.
100 memset(&data, 0, sizeof(data));
101 F_SET(&data, DB_DBT_USERMEM | DB_DBT_PARTIAL);
111 /* Walk through the set of key/data pairs, deleting as we go. */
112 if ((ret = dbc->c_get(dbc, key, &data, f_init)) != 0)
117 if ((ret = dbc->c_get(dbc, key, &data, f_next)) != 0) {
162 bo = (BOVERFLOW *)bi->data;
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dkrb5_decode.c83 var->realm.data = NULL; \
84 var->data = NULL
291 clear_field(rep,enc_part.ciphertext.data);
339 clear_field(rep,transited.tr_contents.data);
398 clear_field(rep,enc_part.ciphertext.data);
423 clear_field(rep,enc_part.ciphertext.data);
445 clear_field(rep,authenticator.ciphertext.data);
475 clear_field(rep,enc_part.ciphertext.data);
531 clear_field(rep,authorization_data.ciphertext.data);
562 clear_field(rep,authorization_data.ciphertext.data);
1240 krb5_data data, *code = &data; local
[all...]
H A Dasn1buf.c19 * that you can't simply memcpy out the buffer data, since it will be
100 if (code == NULL || code->data == NULL) return ASN1_MISSING_FIELD;
101 buf->next = buf->base = code->data;
102 buf->bound = code->data + code->length - 1;
288 d->data = malloc(d->length + 1);
289 if (d->data == NULL) {
294 d->data[i] = buf->base[d->length - i - 1];
295 d->data[d->length] = '\0';
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IPC/SysV/
H A DSysV.xs136 struct semid_ds *data = (struct semid_ds *)SvPV(ds,len);
140 if (len != sizeof(*data)) {
143 len, sizeof(*data));
145 sv_setiv(*av_fetch(list,0,TRUE), data[0].sem_perm.uid);
146 sv_setiv(*av_fetch(list,1,TRUE), data[0].sem_perm.gid);
147 sv_setiv(*av_fetch(list,2,TRUE), data[0].sem_perm.cuid);
148 sv_setiv(*av_fetch(list,3,TRUE), data[0].sem_perm.cgid);
149 sv_setiv(*av_fetch(list,4,TRUE), data[0].sem_perm.mode);
150 sv_setiv(*av_fetch(list,5,TRUE), data[0].sem_ctime);
151 sv_setiv(*av_fetch(list,6,TRUE), data[
[all...]
/osnet-11/usr/src/lib/libast/common/sfio/
H A Dsfvscanf.c24 /* The main engine for reading formatted data
66 uchar *d, *endd, *data; /* local buffering system */ member in struct:_scan_s
74 (sc)->d = d, (sc)->endd = endd, (sc)->data = data, \
78 d = (sc)->d, endd = (sc)->endd, data = (sc)->data, \
103 { sc->n_input += sc->d - sc->data;
105 SFREAD(sc->f, sc->data, sc->d - sc->data);
109 sc->data
340 uchar *d, *endd, *data; local
[all...]
/osnet-11/usr/src/lib/libc/i386/sys/
H A Dptrace.c139 ptrace(int request, pid_t pid, int addr, int data) argument
157 map(request), pid, addr, data);
238 if (pread(cp->asfd, (char *)&data, sizeof (data), (off_t)addr)
239 == sizeof (data)) {
241 return (data);
257 data = *((int *)((caddr_t)(&cp->user) + xaddr));
259 return (data);
267 if (pwrite(cp->asfd, (char *)&data, sizeof (data), (off_
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/
H A DLzmaEnc.c254 const Byte *data; member in struct:_CSeqInStreamBuf
258 static SRes MyRead(void *pp, void *data, size_t *size) argument
264 memcpy(data, p->data, curSize);
266 p->data += curSize;
981 const Byte *data; local
1016 data = p->matchFinder.GetPointerToCurrentPos(p->matchFinderObj) - 1;
1031 data2 = data - (reps[i] + 1);
1032 if (data[0] != data2[0] || data[
1192 const Byte *data; local
1563 const Byte *data; local
1880 const Byte *data; local
2185 Byte *data; member in struct:_CSeqOutStreamBuf
2190 MyWrite(void *pp, const void *data, size_t size) argument
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Digest/MD5/
H A DMD5.pm58 $digest = md5($data);
59 $digest = md5_hex($data);
60 $digest = md5_base64($data);
67 $ctx->add($data);
92 =item md5($data,...)
101 =item md5_hex($data,...)
107 =item md5_base64($data,...)
125 data to it and finally ask for the digest in a suitable format. A
149 digest, e.g. when calculating digests iteratively on a continuous data
158 =item $md5->add($data,
[all...]
/osnet-11/usr/src/lib/libast/common/vmalloc/
H A Dvmhdr.h233 #define KPVALLOC(vm,sz,func) (SETLOCAL((vm)->data), func((vm),(sz)) )
234 #define KPVALIGN(vm,sz,al,func) (SETLOCAL((vm)->data), func((vm),(sz),(al)) )
235 #define KPVFREE(vm,d,func) (SETLOCAL((vm)->data), func((vm),(d)) )
236 #define KPVRESIZE(vm,d,sz,mv,func) (SETLOCAL((vm)->data), func((vm),(d),(sz),(mv)) )
237 #define KPVADDR(vm,addr,func) (SETLOCAL((vm)->data), func((vm),(addr)) )
238 #define KPVCOMPACT(vm,func) (SETLOCAL((vm)->data), func((vm)) )
269 { char data[MULTIPLE(ALIGNA,ALIGNB)]; member in struct:_align_s
283 { size_t size; /* size of data area in bytes */
290 { Vmuchar_t data[HEADSIZE]; /* to standardize size */ member in union:_head_u
303 { Vmuchar_t data[BODYSIZ member in union:_body_u
[all...]
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c376 void *data,
384 pam_handle_t *pamh = (pam_handle_t *)data;
451 assert(prompts[i].reply->data != NULL);
454 if (strlcpy(prompts[i].reply->data,
471 retp = strchr(prompts[i].reply->data, '\n');
476 strlen(prompts[i].reply->data);
488 /* 0 out sensitive data before free() */
571 krb5_princ_realm(kmd->kcontext, me)->data,
572 tgtname.length, tgtname.data,
574 krb5_princ_realm(kmd->kcontext, me)->data,
374 pam_krb5_prompter( krb5_context ctx, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
993 krb5_cleanup(pam_handle_t *pamh, void *data, int pam_status) argument
[all...]
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_hash.c215 * handle and the key is used to generate a hashed index. The data
226 ht_add_item(HT_HANDLE *handle, const char *key, const void *data) argument
254 item->hi_data = (void *)data;
283 ht_replace_item(HT_HANDLE *handle, const char *key, const void *data) argument
287 return (ht_add_item(handle, key, data));
295 * first key found will be deleted. Note that the data pointer is never
297 * return value will be null. Otherwise, the data pointer supplied by the
309 void *data = 0; local
337 data = cur->hi_data;
355 return (data);
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcc_retr.c96 authdata_match(krb5_authdata *const *mdata, krb5_authdata *const *data) argument
100 if (mdata == data)
104 return *data == NULL;
106 if (data == NULL)
109 while ((mdatap = *mdata) && (datap = *data)) {
116 data++;
118 return (*mdata == NULL) && (*data == NULL);
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dserver_kdb.c223 "History entry contains no key data");
296 /* there's no admin data. this can happen, if the admin
299 data (which is all zeros with the hist_kvno filled
301 data will get stored correctly. */
412 /* we are always updating TL data */
435 void *data; member in struct:_iter_data
439 kdb_iter_func(krb5_pointer data, krb5_db_entry *kdb) argument
441 iter_data *id = (iter_data *) data;
443 (*(id->func))(id->data, kdb->princ);
450 void (*iter_fct)(void *, krb5_principal), void *data)
449 kdb_iter_entry(kadm5_server_handle_t handle, char *match_entry, void (*iter_fct)(void *, krb5_principal), void *data) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/db/include/
H A Ddb_page.h19 * your system. In addition, no data type can require larger alignment than
20 * its own size, e.g., a 4-byte data element may not require 8-byte alignment.
22 * Note that key/data lengths are often stored in db_indx_t's -- this is
23 * not accidental, nor does it limit the key/data size. If the key/data
35 * headers and cover enough of the btree and hash meta-data pages to obliterate
129 * key for inp[1]'s data. All other types of pages only contain single items.
183 * is to store the number of records in the meta-data page, which will create
236 * The amount of overflow data stored on each page is stored in the
254 #define H_KEYDATA 1 /* Key/data ite
290 u_int8_t data[1]; /* Variable length key/data item. */ member in struct:_hkeydata
406 u_int8_t data[1]; /* Variable length key/data item. */ member in struct:_bkeydata
469 u_int8_t data[1]; /* Variable length key item. */ member in struct:_binternal
[all...]
/osnet-11/usr/src/cmd/sendmail/db/log/
H A Dlog_rec.c88 if ((ret = __log_register_read(dbtp->data, &argp)) != 0)
105 argp->name.data, strerror(ENOENT));
152 argp->name.data, strerror(ENOENT));
193 dbe->name != NULL && argp->name.data != NULL &&
194 strncmp(argp->name.data, dbe->name, argp->name.size) == 0) {
212 argp->uid.data, argp->name.data, argp->ftype, argp->id));
/osnet-11/usr/src/lib/libdtrace/common/
H A Ddt_aggregate.c265 dt_aggregate_usym(dtrace_hdl_t *dtp, uint64_t *data) argument
267 uint64_t pid = data[0];
268 uint64_t *pc = &data[1];
288 dt_aggregate_umod(dtrace_hdl_t *dtp, uint64_t *data) argument
290 uint64_t pid = data[0];
291 uint64_t *pc = &data[1];
311 dt_aggregate_sym(dtrace_hdl_t *dtp, uint64_t *data) argument
314 uint64_t *pc = data;
321 dt_aggregate_mod(dtrace_hdl_t *dtp, uint64_t *data) argument
323 uint64_t *pc = data;
351 caddr_t data = ent->dtahe_data.dtada_data; local
436 caddr_t addr, data; local
1156 dtrace_aggdata_t *data; local
1447 const dtrace_aggdata_t **data; local
1610 caddr_t data; local
1909 dtrace_aggdata_t *data; local
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DFTP.pm435 my($loc,$len,$buf,$resp,$data);
452 $data = $ftp->retr($remote) or
466 $data->abort;
474 $data->abort;
490 last unless $len = $data->read($buf,$blksize);
506 $data->abort;
524 unless ($data->close()) # implied $ftp->response
716 my $size = -f $local && -s _; # no ALLO if sending data from a pipe
931 my $data = undef;
944 $data
[all...]
/osnet-11/usr/src/lib/libparted/common/libparted/fs/ext2/
H A Dext2_mkfs.c292 uint32_t* data = ped_malloc ((fs->blocksize / 4) * sizeof(uint32_t)); local
311 memset(bh->data, 0, fs->blocksize);
312 offset = _set_dirent(bh->data, 0, fs->blocksize, 0,
314 offset = _set_dirent(bh->data, offset, fs->blocksize, 1,
321 memset(data, 0, fs->blocksize);
322 data[0] = 0;
323 data[1] = PED_CPU_TO_LE32(fs->blocksize);
327 memcpy(bh->data, data, fs->blocksize);
371 memset(bh->data,
[all...]
/osnet-11/usr/src/lib/nsswitch/nis/common/
H A Dnis_common.c57 * ends up doing more malloc()ing and data copying than would otherwise
458 struct cb_data data; local
461 data.args = args;
462 data.filter = filter;
463 data.func = func;
464 data.result = NSS_NOTFOUND;
467 cback.data = (char *)&data;
485 return (data.result);
551 struct XbyY_data data; local
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ntlm.c305 const uchar_t *data, size_t data_len)
319 * MD5(K XOR opad, MD5(K XOR ipad, data))
324 * and data is the data being protected.
344 MD5Update(&context, data, data_len); /* then data of datagram */
429 uchar_t *data = NULL; local
431 /* data = concat(C8, client_data) */
433 data = malloc(dlen);
434 if (data
303 smbfs_HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument
[all...]

Completed in 67 milliseconds

<<21222324252627282930>>