/osnet-11/usr/src/tools/onbld/Checks/ |
H A D | Comments.py | 142 for entered in insts: 145 r'( \([^)]+\))?$', entered): 147 entered]) 165 # and the entered comment. If that fails we remove a possible 168 for entered in insts: 169 if entered == valid[case]: 173 dbcom = re.sub(r' \([^)]+\)$', '', entered) 177 entered])
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | password.c | 34 check_password (const char *user, const char *entered, argument 37 if (grub_crypto_memcmp (entered, password, GRUB_AUTH_MAX_PASSLEN) != 0)
|
H A D | legacycfg.c | 525 const char *entered __attribute__ ((unused)), 541 check_password_md5_real (const char *entered, argument 544 int enteredlen = grub_strlen (entered); 551 GRUB_MD_MD5->write (ctx, entered, enteredlen); 553 GRUB_MD_MD5->write (ctx, entered, enteredlen); 559 GRUB_MD_MD5->write (ctx, entered, enteredlen); 566 GRUB_MD_MD5->write (ctx, entered + ((i & 1) ? enteredlen : 0), 1); 576 GRUB_MD_MD5->write (ctx, entered, enteredlen); 584 GRUB_MD_MD5->write (ctx, entered, enteredlen); 589 GRUB_MD_MD5->write (ctx, entered, enteredle 598 check_password_md5(const char *user, const char *entered, void *password) argument 722 char entered[GRUB_AUTH_MAX_PASSLEN]; local [all...] |
H A D | password_pbkdf2.c | 43 check_password (const char *user, const char *entered, void *pin) argument 53 err = grub_crypto_pbkdf2 (GRUB_MD_SHA512, (grub_uint8_t *) entered, 54 grub_strlen (entered),
|
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | stats.c | 138 static bool entered = false; local 143 if (sfile == NULL || *sfile == '\0' || !GotStats || entered) 145 entered = true; 164 entered = false; 199 entered = false;
|
/osnet-11/usr/src/grub/grub2/grub-core/normal/ |
H A D | auth.c | 205 char entered[GRUB_AUTH_MAX_PASSLEN]; local 223 if (!grub_password_get (entered, GRUB_AUTH_MAX_PASSLEN)) 235 cur->callback (login, entered, cur->arg);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/attrs/ |
H A D | attrs.pm | 50 subroutine is entered.
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | stage2.c | 571 char entered[32]; local 579 /* Wipe out the previously entered password */ 580 grub_memset (entered, 0, sizeof (entered)); 581 get_cmdline (" Password: ", entered, 31, '*', 0); 589 if (! check_password (entered, password, password_type))
|
H A D | builtins.c | 143 check_password (char *entered, char* expected, password_t type) argument 148 return strcmp (entered, expected); 152 return check_md5_password (entered, expected); 4003 char entered[32]; 4005 /* Wipe out any previously entered password */ 4006 entered[0] = 0; 4007 get_cmdline ("Password: ", entered, 31, '*', 0); 4010 if (check_password (entered, arg, type) != 0) 4044 " command line). If the password PASSWD is entered, it loads the" 3963 char entered[32]; local
|
H A D | shared.h | 1080 int check_password(char *entered, char* expected, password_t type);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/File/ |
H A D | CheckTree.pm | 63 directory was last entered through the use of "cd" directives.
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/utils/ |
H A D | libnetcfg.PL | 603 describe your internal network. Each netmask should be entered in the
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ |
H A D | perl5db.pl | 286 is entered or exited. 365 =item * 1 - The C<t> command was entered to turn on tracing (every line executed is printed) 390 entered; reset whenever the watch expression changes. 415 entered. 1858 C<t> command was entered, or the user generated a signal. If the program 2076 A newline entered by itself means "re-execute the last command". We grab the 2451 demarcation' above which commands can be entered anytime, and below which 2457 when entered (see X<DB::sub>). We also save the C<n> command in C<$laststep>, 4992 it does nothing if entered with no operands. 5088 # No command arguments entered [all...] |
H A D | attributes.pm | 180 subroutine is entered.
|
H A D | CPAN.pm | 6057 The interactive mode is entered by running
|
H A D | CGI.pm | 2051 # this entered at cristy's request to fix problems with file upload fields 2101 # $maxlength -> Optional maximum characters that can be entered. 6253 If you want the entered file name for the file, you can just call param():
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Devel/Peek/ |
H A D | Peek.pm | 133 newly-entered subs/etc only). (The returned value is for the dispatcher before the modification.)
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Pod/ |
H A D | Parser.pm | 180 "cutting mode" has been (re)entered, but the caller will get a chance
|