/osnet-11/usr/src/lib/libkstat/common/ |
H A D | kstat.c | 45 * with the kstat_ctl_t data structure. When the kstat_ctl_t is free, the 322 /* Free the kc_private data if present. */ 368 kstat_read(kstat_ctl_t *kc, kstat_t *ksp, void *data) argument 385 * which you hope will hold all the data. 388 * the current size of the kstat's data. You then 399 if (data != NULL) { 400 (void) memcpy(data, ksp->ks_data, ksp->ks_data_size); 408 kstat_named_t *knp = data; 418 * the string to the beginning of 'data' to fix 419 * the pointer so that strings in 'data' do 432 kstat_write(kstat_ctl_t *kc, kstat_t *ksp, void *data) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | sha512.c | 105 transform (SHA512_CONTEXT *hd, const unsigned char *data) argument 165 memcpy (w, data, 128); 173 p2[7] = *data++; 174 p2[6] = *data++; 175 p2[5] = *data++; 176 p2[4] = *data++; 177 p2[3] = *data++; 178 p2[2] = *data++; 179 p2[1] = *data++; 180 p2[0] = *data [all...] |
H A D | pubkey.c | 34 gcry_mpi_t *data, gcry_mpi_t *skey, 39 gcry_mpi_t *data, gcry_mpi_t *pkey, 132 dummy_encrypt (int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, argument 137 (void)data; 145 dummy_decrypt (int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, argument 150 (void)data; 158 dummy_sign (int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, argument 163 (void)data; 170 dummy_verify (int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, argument 176 (void)data; 229 gcry_pk_lookup_func_name(void *spec, void *data) argument 608 pubkey_encrypt(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 658 pubkey_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 705 pubkey_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 748 pubkey_verify(int algorithm, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument 1591 gcry_mpi_t *pkey = NULL, data = NULL, *ciph = NULL; local 1736 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL; local 2429 const char *data; local [all...] |
H A D | dsa.c | 203 gcry_mpi_t data = gcry_mpi_new (qbits); 214 gcry_mpi_randomize (data, qbits, GCRY_WEAK_RANDOM); 217 sign (sig_a, sig_b, data, sk); 220 if ( !verify (sig_a, sig_b, data, &pk) ) 223 /* Modify the data and check that the signing fails. */ 224 gcry_mpi_add_ui (data, data, 1); 225 if ( verify (sig_a, sig_b, data, &pk) ) 233 gcry_mpi_release (data); 964 dsa_sign (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_ 202 gcry_mpi_t data = gcry_mpi_new (qbits); local 963 dsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 1041 gcry_sexp_t data = NULL; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | sha512.c | 107 transform (SHA512_CONTEXT *hd, const unsigned char *data) argument 167 memcpy (w, data, 128); 175 p2[7] = *data++; 176 p2[6] = *data++; 177 p2[5] = *data++; 178 p2[4] = *data++; 179 p2[3] = *data++; 180 p2[2] = *data++; 181 p2[1] = *data++; 182 p2[0] = *data [all...] |
/osnet-11/usr/src/cmd/sendmail/db/btree/ |
H A D | bt_delete.c | 77 DBT data; local 95 * Walk a cursor through the key/data pairs, deleting as we go. Set 98 * keys or data, so request a partial of length 0. 100 memset(&data, 0, sizeof(data)); 101 F_SET(&data, DB_DBT_USERMEM | DB_DBT_PARTIAL); 111 /* Walk through the set of key/data pairs, deleting as we go. */ 112 if ((ret = dbc->c_get(dbc, key, &data, f_init)) != 0) 117 if ((ret = dbc->c_get(dbc, key, &data, f_next)) != 0) { 162 bo = (BOVERFLOW *)bi->data; [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | krb5_decode.c | 83 var->realm.data = NULL; \ 84 var->data = NULL 291 clear_field(rep,enc_part.ciphertext.data); 339 clear_field(rep,transited.tr_contents.data); 398 clear_field(rep,enc_part.ciphertext.data); 423 clear_field(rep,enc_part.ciphertext.data); 445 clear_field(rep,authenticator.ciphertext.data); 475 clear_field(rep,enc_part.ciphertext.data); 531 clear_field(rep,authorization_data.ciphertext.data); 562 clear_field(rep,authorization_data.ciphertext.data); 1240 krb5_data data, *code = &data; local [all...] |
H A D | asn1buf.c | 19 * that you can't simply memcpy out the buffer data, since it will be 100 if (code == NULL || code->data == NULL) return ASN1_MISSING_FIELD; 101 buf->next = buf->base = code->data; 102 buf->bound = code->data + code->length - 1; 288 d->data = malloc(d->length + 1); 289 if (d->data == NULL) { 294 d->data[i] = buf->base[d->length - i - 1]; 295 d->data[d->length] = '\0';
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IPC/SysV/ |
H A D | SysV.xs | 136 struct semid_ds *data = (struct semid_ds *)SvPV(ds,len); 140 if (len != sizeof(*data)) { 143 len, sizeof(*data)); 145 sv_setiv(*av_fetch(list,0,TRUE), data[0].sem_perm.uid); 146 sv_setiv(*av_fetch(list,1,TRUE), data[0].sem_perm.gid); 147 sv_setiv(*av_fetch(list,2,TRUE), data[0].sem_perm.cuid); 148 sv_setiv(*av_fetch(list,3,TRUE), data[0].sem_perm.cgid); 149 sv_setiv(*av_fetch(list,4,TRUE), data[0].sem_perm.mode); 150 sv_setiv(*av_fetch(list,5,TRUE), data[0].sem_ctime); 151 sv_setiv(*av_fetch(list,6,TRUE), data[ [all...] |
/osnet-11/usr/src/lib/libast/common/sfio/ |
H A D | sfvscanf.c | 24 /* The main engine for reading formatted data 66 uchar *d, *endd, *data; /* local buffering system */ member in struct:_scan_s 74 (sc)->d = d, (sc)->endd = endd, (sc)->data = data, \ 78 d = (sc)->d, endd = (sc)->endd, data = (sc)->data, \ 103 { sc->n_input += sc->d - sc->data; 105 SFREAD(sc->f, sc->data, sc->d - sc->data); 109 sc->data 340 uchar *d, *endd, *data; local [all...] |
/osnet-11/usr/src/lib/libc/i386/sys/ |
H A D | ptrace.c | 139 ptrace(int request, pid_t pid, int addr, int data) argument 157 map(request), pid, addr, data); 238 if (pread(cp->asfd, (char *)&data, sizeof (data), (off_t)addr) 239 == sizeof (data)) { 241 return (data); 257 data = *((int *)((caddr_t)(&cp->user) + xaddr)); 259 return (data); 267 if (pwrite(cp->asfd, (char *)&data, sizeof (data), (off_ [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/ |
H A D | LzmaEnc.c | 254 const Byte *data; member in struct:_CSeqInStreamBuf 258 static SRes MyRead(void *pp, void *data, size_t *size) argument 264 memcpy(data, p->data, curSize); 266 p->data += curSize; 981 const Byte *data; local 1016 data = p->matchFinder.GetPointerToCurrentPos(p->matchFinderObj) - 1; 1031 data2 = data - (reps[i] + 1); 1032 if (data[0] != data2[0] || data[ 1192 const Byte *data; local 1563 const Byte *data; local 1880 const Byte *data; local 2185 Byte *data; member in struct:_CSeqOutStreamBuf 2190 MyWrite(void *pp, const void *data, size_t size) argument [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Digest/MD5/ |
H A D | MD5.pm | 58 $digest = md5($data); 59 $digest = md5_hex($data); 60 $digest = md5_base64($data); 67 $ctx->add($data); 92 =item md5($data,...) 101 =item md5_hex($data,...) 107 =item md5_base64($data,...) 125 data to it and finally ask for the digest in a suitable format. A 149 digest, e.g. when calculating digests iteratively on a continuous data 158 =item $md5->add($data, [all...] |
/osnet-11/usr/src/lib/libast/common/vmalloc/ |
H A D | vmhdr.h | 233 #define KPVALLOC(vm,sz,func) (SETLOCAL((vm)->data), func((vm),(sz)) ) 234 #define KPVALIGN(vm,sz,al,func) (SETLOCAL((vm)->data), func((vm),(sz),(al)) ) 235 #define KPVFREE(vm,d,func) (SETLOCAL((vm)->data), func((vm),(d)) ) 236 #define KPVRESIZE(vm,d,sz,mv,func) (SETLOCAL((vm)->data), func((vm),(d),(sz),(mv)) ) 237 #define KPVADDR(vm,addr,func) (SETLOCAL((vm)->data), func((vm),(addr)) ) 238 #define KPVCOMPACT(vm,func) (SETLOCAL((vm)->data), func((vm)) ) 269 { char data[MULTIPLE(ALIGNA,ALIGNB)]; member in struct:_align_s 283 { size_t size; /* size of data area in bytes */ 290 { Vmuchar_t data[HEADSIZE]; /* to standardize size */ member in union:_head_u 303 { Vmuchar_t data[BODYSIZ member in union:_body_u [all...] |
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 376 void *data, 384 pam_handle_t *pamh = (pam_handle_t *)data; 451 assert(prompts[i].reply->data != NULL); 454 if (strlcpy(prompts[i].reply->data, 471 retp = strchr(prompts[i].reply->data, '\n'); 476 strlen(prompts[i].reply->data); 488 /* 0 out sensitive data before free() */ 571 krb5_princ_realm(kmd->kcontext, me)->data, 572 tgtname.length, tgtname.data, 574 krb5_princ_realm(kmd->kcontext, me)->data, 374 pam_krb5_prompter( krb5_context ctx, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument 993 krb5_cleanup(pam_handle_t *pamh, void *data, int pam_status) argument [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_hash.c | 215 * handle and the key is used to generate a hashed index. The data 226 ht_add_item(HT_HANDLE *handle, const char *key, const void *data) argument 254 item->hi_data = (void *)data; 283 ht_replace_item(HT_HANDLE *handle, const char *key, const void *data) argument 287 return (ht_add_item(handle, key, data)); 295 * first key found will be deleted. Note that the data pointer is never 297 * return value will be null. Otherwise, the data pointer supplied by the 309 void *data = 0; local 337 data = cur->hi_data; 355 return (data); [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 96 authdata_match(krb5_authdata *const *mdata, krb5_authdata *const *data) argument 100 if (mdata == data) 104 return *data == NULL; 106 if (data == NULL) 109 while ((mdatap = *mdata) && (datap = *data)) { 116 data++; 118 return (*mdata == NULL) && (*data == NULL);
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_kdb.c | 223 "History entry contains no key data"); 296 /* there's no admin data. this can happen, if the admin 299 data (which is all zeros with the hist_kvno filled 301 data will get stored correctly. */ 412 /* we are always updating TL data */ 435 void *data; member in struct:_iter_data 439 kdb_iter_func(krb5_pointer data, krb5_db_entry *kdb) argument 441 iter_data *id = (iter_data *) data; 443 (*(id->func))(id->data, kdb->princ); 450 void (*iter_fct)(void *, krb5_principal), void *data) 449 kdb_iter_entry(kadm5_server_handle_t handle, char *match_entry, void (*iter_fct)(void *, krb5_principal), void *data) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/db/include/ |
H A D | db_page.h | 19 * your system. In addition, no data type can require larger alignment than 20 * its own size, e.g., a 4-byte data element may not require 8-byte alignment. 22 * Note that key/data lengths are often stored in db_indx_t's -- this is 23 * not accidental, nor does it limit the key/data size. If the key/data 35 * headers and cover enough of the btree and hash meta-data pages to obliterate 129 * key for inp[1]'s data. All other types of pages only contain single items. 183 * is to store the number of records in the meta-data page, which will create 236 * The amount of overflow data stored on each page is stored in the 254 #define H_KEYDATA 1 /* Key/data ite 290 u_int8_t data[1]; /* Variable length key/data item. */ member in struct:_hkeydata 406 u_int8_t data[1]; /* Variable length key/data item. */ member in struct:_bkeydata 469 u_int8_t data[1]; /* Variable length key item. */ member in struct:_binternal [all...] |
/osnet-11/usr/src/cmd/sendmail/db/log/ |
H A D | log_rec.c | 88 if ((ret = __log_register_read(dbtp->data, &argp)) != 0) 105 argp->name.data, strerror(ENOENT)); 152 argp->name.data, strerror(ENOENT)); 193 dbe->name != NULL && argp->name.data != NULL && 194 strncmp(argp->name.data, dbe->name, argp->name.size) == 0) { 212 argp->uid.data, argp->name.data, argp->ftype, argp->id));
|
/osnet-11/usr/src/lib/libdtrace/common/ |
H A D | dt_aggregate.c | 265 dt_aggregate_usym(dtrace_hdl_t *dtp, uint64_t *data) argument 267 uint64_t pid = data[0]; 268 uint64_t *pc = &data[1]; 288 dt_aggregate_umod(dtrace_hdl_t *dtp, uint64_t *data) argument 290 uint64_t pid = data[0]; 291 uint64_t *pc = &data[1]; 311 dt_aggregate_sym(dtrace_hdl_t *dtp, uint64_t *data) argument 314 uint64_t *pc = data; 321 dt_aggregate_mod(dtrace_hdl_t *dtp, uint64_t *data) argument 323 uint64_t *pc = data; 351 caddr_t data = ent->dtahe_data.dtada_data; local 436 caddr_t addr, data; local 1156 dtrace_aggdata_t *data; local 1447 const dtrace_aggdata_t **data; local 1610 caddr_t data; local 1909 dtrace_aggdata_t *data; local [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | FTP.pm | 435 my($loc,$len,$buf,$resp,$data); 452 $data = $ftp->retr($remote) or 466 $data->abort; 474 $data->abort; 490 last unless $len = $data->read($buf,$blksize); 506 $data->abort; 524 unless ($data->close()) # implied $ftp->response 716 my $size = -f $local && -s _; # no ALLO if sending data from a pipe 931 my $data = undef; 944 $data [all...] |
/osnet-11/usr/src/lib/libparted/common/libparted/fs/ext2/ |
H A D | ext2_mkfs.c | 292 uint32_t* data = ped_malloc ((fs->blocksize / 4) * sizeof(uint32_t)); local 311 memset(bh->data, 0, fs->blocksize); 312 offset = _set_dirent(bh->data, 0, fs->blocksize, 0, 314 offset = _set_dirent(bh->data, offset, fs->blocksize, 1, 321 memset(data, 0, fs->blocksize); 322 data[0] = 0; 323 data[1] = PED_CPU_TO_LE32(fs->blocksize); 327 memcpy(bh->data, data, fs->blocksize); 371 memset(bh->data, [all...] |
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | nis_common.c | 57 * ends up doing more malloc()ing and data copying than would otherwise 458 struct cb_data data; local 461 data.args = args; 462 data.filter = filter; 463 data.func = func; 464 data.result = NSS_NOTFOUND; 467 cback.data = (char *)&data; 485 return (data.result); 551 struct XbyY_data data; local [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ntlm.c | 305 const uchar_t *data, size_t data_len) 319 * MD5(K XOR opad, MD5(K XOR ipad, data)) 324 * and data is the data being protected. 344 MD5Update(&context, data, data_len); /* then data of datagram */ 429 uchar_t *data = NULL; local 431 /* data = concat(C8, client_data) */ 433 data = malloc(dlen); 434 if (data 303 smbfs_HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument [all...] |