/vbox/src/VBox/Devices/PC/ipxe/src/util/ |
H A D | mucurses_test.c | 10 char secret[16]; local 15 get_iscsi_chap_secret(secret); 17 mvwprintw( stdscr, 3, 5, "password is \"%s\"", secret ); 26 char *title = "Set new iSCSI CHAP secret", 27 *msg = "Configure the iSCSI access secret", 29 WINDOW *secret; local 31 secret = newwin( stdscr->height / 2, 36 wborder( secret, '|', '|', '-', '-', '+', '+', '+', '+' ); 37 mvwprintw( secret, 1, 2, "%s", title ); 38 mvwhline( secret, [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/io/ |
H A D | prio.c | 65 _pr_stdin->secret->md.sync_file_io = PR_TRUE; 66 _pr_stdout->secret->md.sync_file_io = PR_TRUE; 67 _pr_stderr->secret->md.sync_file_io = PR_TRUE; 136 fd->secret->state = _PR_FILEDESC_OPEN; 137 fd->secret->md.osfd = osfd; 179 if (fd->secret->inheritable != inheritable) { 183 fd->secret->inheritable = inheritable;
|
H A D | prfile.c | 76 fd, fd ? fd->secret->md.osfd : 0, buf, amount)); 106 if ( PR_TRUE == fd->secret->appendMode ) { 111 } /* if (fd->secret->appendMode...) */ 116 fd, fd ? fd->secret->md.osfd : 0, buf, amount)); 123 if (fd->secret->nonblocking) { 252 if (!fd || !fd->secret 253 || (fd->secret->state != _PR_FILEDESC_OPEN 254 && fd->secret->state != _PR_FILEDESC_CLOSED)) { 259 if (fd->secret->state == _PR_FILEDESC_OPEN) { 260 if (_PR_MD_CLOSE_FILE(fd->secret [all...] |
H A D | prsocket.c | 143 if (fd->secret->nonblocking) { 235 fd->secret->md.osfd = osfd; 236 fd->secret->inheritable = _PR_TRI_FALSE; 237 fd->secret->state = _PR_FILEDESC_OPEN; 251 fd->secret->state = _PR_FILEDESC_CLOSED; 303 osfd = fd->secret->md.osfd; 434 fd2->secret->nonblocking = fd->secret->nonblocking; 435 fd2->secret->inheritable = fd->secret [all...] |
H A D | prfdcach.c | 126 PR_ASSERT(_PR_FILEDESC_FREED == fd->secret->state); 137 memset(fd->secret, 0, sizeof(PRFilePrivate)); 144 fd->secret = PR_NEW(PRFilePrivate); 145 if (NULL == fd->secret) PR_DELETE(fd); 161 fd->secret->state = _PR_FILEDESC_FREED; 171 PR_Free(fd->secret); 298 PR_DELETE(fd->secret); 305 PR_DELETE(fd->secret);
|
H A D | prpolevt.c | 208 PRPollableDesc *pollDesc = (PRPollableDesc *)fd->secret; 232 PRPollableDesc *pollDesc = (PRPollableDesc *)fd->secret; 266 event->secret = (PRFilePrivate*)pollDesc; 272 PR_DELETE(event->secret); 288 PRPollableDesc *pollDesc = (PRPollableDesc *)event->secret; 305 PRPollableDesc *pollDesc = (PRPollableDesc *)event->secret; 432 event->secret = PR_NEW(PRFilePrivate); 433 if (event->secret == NULL) { 457 event->secret->writeEnd = fd[1]; 470 PR_DELETE(event->secret); [all...] |
H A D | prmapopt.c | 91 data->value.non_blocking = fd->secret->nonblocking; 234 PR_ASSERT((fd->secret->md.io_model_committed == PR_FALSE) 235 || (fd->secret->nonblocking == data->value.non_blocking)); 236 if (fd->secret->md.io_model_committed 237 && (fd->secret->nonblocking != data->value.non_blocking)) 249 fd->secret->nonblocking = data->value.non_blocking;
|
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/beos/ |
H A D | bnet.c | 215 PRInt32 osfd = fd->secret->md.osfd; 220 if (fd->secret->md.sock_state & BE_SOCK_SHUTDOWN_READ) { 240 if (fd->secret->nonblocking) { 267 PRInt32 osfd = fd->secret->md.osfd; 278 if (fd->secret->nonblocking) { 311 PRInt32 osfd = fd->secret->md.osfd; 316 if (fd->secret->md.sock_state & BE_SOCK_SHUTDOWN_WRITE) 327 if (fd->secret->nonblocking) { 364 if ((!fd->secret->nonblocking) && (rv > 0) && (rv < amount) 387 PRInt32 osfd = fd->secret [all...] |
H A D | bproc.c | 103 && attr->stdinFd->secret->md.osfd != 0) { 104 in_osfd = attr->stdinFd->secret->md.osfd; 114 && attr->stdoutFd->secret->md.osfd != 1) { 115 out_osfd = attr->stdoutFd->secret->md.osfd; 125 && attr->stderrFd->secret->md.osfd != 2) { 126 err_osfd = attr->stderrFd->secret->md.osfd;
|
H A D | bfile.c | 117 setsockopt(fd->secret->md.osfd, SOL_SOCKET, SO_NONBLOCK, &blocking, sizeof(blocking)); 126 rv = fcntl(fd->secret->md.osfd, F_SETFD, inheritable ? 0 : FD_CLOEXEC); 138 fd->secret->inheritable = _PR_TRI_UNKNOWN; 140 int flags = fcntl(fd->secret->md.osfd, F_GETFD, 0); 145 fd->secret->inheritable = (flags & FD_CLOEXEC) ? 155 PR_ASSERT(_PR_TRI_UNKNOWN == fd->secret->inheritable); 156 flags = fcntl(fd->secret->md.osfd, F_GETFD, 0); 158 fd->secret->inheritable = (flags & FD_CLOEXEC) ? 227 PRInt32 osfd = fd->secret->md.osfd; 241 PRInt32 osfd = fd->secret [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/mac/ |
H A D | macsockotpt.c | 320 PRFilePrivate *secret = (PRFilePrivate *) contextPtr; local 321 _MDFileDesc * md = &(secret->md); 322 EndpointRef endpoint = (EndpointRef)secret->md.osfd; 339 readThread = secret->md.misc.thread; 340 secret->md.misc.thread = NULL; 341 secret->md.misc.cookie = cookie; 355 writeThread = secret->md.write.thread; 356 secret->md.write.thread = NULL; 357 secret->md.write.cookie = cookie; 362 secret [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/windows/ |
H A D | w95sock.c | 105 if (ioctlsocket(fd->secret->md.osfd, FIONREAD, &result) < 0) { 118 PRInt32 osfd = fd->secret->md.osfd; 124 if ((err == WSAEWOULDBLOCK) && (!fd->secret->nonblocking)) 144 PRInt32 osfd = fd->secret->md.osfd; 151 if ((!fd->secret->nonblocking) && (err == WSAEWOULDBLOCK)) 175 rv = bind(fd->secret->md.osfd, (const struct sockaddr *)&(addr->inet), addrlen); 190 rv = listen(fd->secret->md.osfd, backlog); 204 PRInt32 osfd = fd->secret->md.osfd; 217 && (!fd->secret->nonblocking)) 238 PRInt32 osfd = fd->secret [all...] |
H A D | ntio.c | 142 ((fd)->secret->nonblocking || (fd)->secret->inheritable == _PR_TRI_TRUE) 1180 PRInt32 osfd = fd->secret->md.osfd; 1185 if (fd->secret->nonblocking) { 1186 if (!fd->secret->md.io_model_committed) { 1189 fd->secret->md.io_model_committed = PR_TRUE; 1204 PR_ASSERT(!fd->secret->md.io_model_committed); 1227 rv = bind(fd->secret->md.osfd, (const struct sockaddr *)&(addr->inet), addrlen); 1237 rv = setsockopt(fd->secret->md.osfd, 1276 PRInt32 osfd = fd->secret [all...] |
H A D | w16sock.c | 133 if (ioctlsocket(fd->secret->md.osfd, FIONREAD, &result) < 0) { 161 rv = listen(fd->secret->md.osfd, backlog); 173 PRInt32 osfd = fd->secret->md.osfd; 184 if (fd->secret->nonblocking) { 225 PRInt32 osfd = fd->secret->md.osfd; 239 if (fd->secret->nonblocking) { 279 rv = bind(fd->secret->md.osfd, (const struct sockaddr *)&(addr->inet), addrlen); 294 PRInt32 osfd = fd->secret->md.osfd; 301 if (fd->secret->nonblocking) { 338 PRInt32 osfd = fd->secret [all...] |
H A D | w16io.c | 144 ( fd->secret->md.osfd == PR_StandardInput ) && 151 rv = read( fd->secret->md.osfd, buf, len ); 180 switch ( fd->secret->md.osfd ) 197 rv = write( fd->secret->md.osfd, buf, len ); 207 rv = write( fd->secret->md.osfd, buf, len ); 231 rv = lseek( fd->secret->md.osfd, offset, whence ); 275 rv = (PRInt32) fsync( fd->secret->md.osfd ); 509 rv = fstat( fd->secret->md.osfd, &statBuf );
|
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/os2/ |
H A D | os2sock.c | 126 if (_OS2_IOCTL(fd->secret->md.osfd, FIONREAD, (char *) &result, sizeof(result)) < 0) { 288 PRInt32 osfd = fd->secret->md.osfd; 297 if (fd->secret->nonblocking) { 325 PRInt32 osfd = fd->secret->md.osfd; 359 if (!fd->secret->nonblocking && (err == EINPROGRESS)) 400 rv = bind(fd->secret->md.osfd, (struct sockaddr *) addr, (int )addrlen); 413 rv = listen(fd->secret->md.osfd, backlog); 426 PRInt32 osfd = fd->secret->md.osfd; 434 if (fd->secret->nonblocking) { 456 PRInt32 osfd = fd->secret [all...] |
H A D | os2io.c | 225 rv = DosRead((HFILE)fd->secret->md.osfd, 250 rv = DosWrite((HFILE)fd->secret->md.osfd, 276 rv = DosSetFilePtr((HFILE)fd->secret->md.osfd, offset, whence, &newLocation); 293 rv = DosSetFilePtr((HFILE)fd->secret->md.osfd, low, whence, &newLocation); 294 rv = DosSetFilePtr((HFILE)fd->secret->md.osfd, hi, FILE_CURRENT, &newLocation); 326 rc = DosSetFilePtr((HFILE)fd->secret->md.osfd, lo, where, (PULONG)&newLocation); 348 PRInt32 rc = DosResetBuffer((HFILE)fd->secret->md.osfd); 609 _setmode(fd->secret->md.osfd, O_BINARY); 610 if(fstat((int)fd->secret->md.osfd, &hinfo) != NO_ERROR) { 781 rc = DosQueryFHState((HFILE)fd->secret [all...] |
H A D | os2poll.c | 147 (_PR_FILEDESC_OPEN == bottom->secret->state)) 151 PRInt32 osfd = bottom->secret->md.osfd; 304 osfd = bottom->secret->md.osfd; 359 if (getsockopt(bottom->secret->md.osfd, SOL_SOCKET,
|
/vbox/src/VBox/Devices/Network/lwip/src/netif/ppp/ |
H A D | chpms.c | 125 char *secret, 142 char *secret, 152 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'\n", secret_len, secret)); 157 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response); 160 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response); 343 char *secret, 353 /* Initialize the Unicode version of the secret (== password). */ 357 unicodePassword[i * 2] = (u_char)secret[i]; 378 char *secret, 138 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len ) argument 340 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response ) argument 375 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response ) argument [all...] |
H A D | chap.c | 422 char secret[MAXSECRETLEN]; local 465 /* get secret for authenticating ourselves with the specified host */ 467 secret, &secret_len, 0)) { 468 secret_len = 0; /* assume null secret if can't find one */ 469 CHAPDEBUG((LOG_WARNING, "No CHAP secret found for authenticating us to %s\n", rhostname)); 485 MD5Update(&mdContext, (u_char*)secret, secret_len); 494 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 503 BZERO(secret, sizeof(secret)); 518 char secret[MAXSECRETLE local [all...] |
/vbox/src/VBox/Devices/Network/lwip-new/src/netif/ppp/ |
H A D | chpms.c | 133 char *secret, 307 char *secret, 318 /* Initialize the Unicode version of the secret (== password). */ 322 unicodePassword[i * 2] = (u_char)secret[i]; 346 char *secret, 357 UcasePassword[i] = (u_char)toupper(secret[i]); 366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) argument 374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret)); 379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_le 305 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument 344 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument [all...] |
H A D | chap.c | 428 char secret[MAXSECRETLEN]; local 472 /* get secret for authenticating ourselves with the specified host */ 474 secret, &secret_len, 0)) { 475 secret_len = 0; /* assume null secret if can't find one */ 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n", 494 MD5Update(&mdContext, (u_char*)secret, secret_len); 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 512 BZERO(secret, sizeof(secret)); 528 char secret[MAXSECRETLE local [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/pthreads/ |
H A D | ptio.c | 1266 if ((NULL == fd) || (NULL == fd->secret) 1267 || ((_PR_FILEDESC_OPEN != fd->secret->state) 1268 && (_PR_FILEDESC_CLOSED != fd->secret->state))) 1275 if (_PR_FILEDESC_OPEN == fd->secret->state) 1277 if (-1 == close(fd->secret->md.osfd)) 1300 fd->secret->state = _PR_FILEDESC_CLOSED; 1312 bytes = read(fd->secret->md.osfd, buf, amount); 1316 && (!fd->secret->nonblocking)) 1319 op.arg1.osfd = fd->secret->md.osfd; 1340 bytes = write(fd->secret [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/include/md/ |
H A D | _macos.h | 502 #define _MD_SEND(fd,buf,amount,flags,timeout) macsock_send(fd->secret->md.osfd,buf,amount,flags) 503 #define _MD_SENDTO(fd,buf,amount,flags,addr,addrlen,timeout) macsock_sendto(fd->secret->md.osfd,buf,amount,flags,(struct sockaddr *)addr,addrlen) 504 #define _MD_RECV(fd,buf,amount,flags,timeout) macsock_recv(fd->secret->md.osfd,buf,amount,flags) 505 #define _MD_RECVFROM(fd,buf,amount,flags,addr,addrlen,timeout) macsock_recvfrom(fd->secret->md.osfd,buf,amount,flags,(struct sockaddr *)addr,addrlen) 509 #define _MD_ACCEPT(fd,addr,addrlen,timeout) macsock_accept(fd->secret->md.osfd,(struct sockaddr *)addr,addrlen) 510 #define _MD_CONNECT(fd,name,namelen,timeout) macsock_connect(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 511 #define _MD_BIND(fd,name,namelen) macsock_bind(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 512 #define _MD_GETSOCKNAME(fd,name,namelen) macsock_getsockname(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 513 #define _MD_GETPEERNAME(fd,name,namelen) macsock_getpeername(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 514 #define _MD_GETSOCKOPT(fd,level,optname,optval,optlen) macsock_getsockopt(fd->secret [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/unix/ |
H A D | uxproces.c | 236 fd_stdin = attr->stdinFd->secret->md.osfd; 238 fd_stdout = attr->stdoutFd->secret->md.osfd; 240 fd_stderr = attr->stderrFd->secret->md.osfd; 292 if (attr->stdinFd && attr->stdinFd->secret->md.osfd != 0) { 293 fd_map[0] = dup(attr->stdinFd->secret->md.osfd); 298 if (attr->stdoutFd && attr->stdoutFd->secret->md.osfd != 1) { 299 fd_map[1] = dup(attr->stdoutFd->secret->md.osfd); 304 if (attr->stderrFd && attr->stderrFd->secret->md.osfd != 2) { 305 fd_map[2] = dup(attr->stderrFd->secret->md.osfd); 350 && attr->stdinFd->secret [all...] |