/titanic_41/usr/src/lib/libadm/common/ |
H A D | cktime.c | 137 cktime_val(char *fmt, char *input) in cktime_val() argument 152 input = p_time(input, LH, UH); in cktime_val() 153 if (!input) in cktime_val() 158 input = p_time(input, LM, UM); in cktime_val() 159 if (!input) in cktime_val() 164 input = p_time(input, LS, US); in cktime_val() 165 if (!input) in cktime_val() 170 input = p_time(input, LH, UH); in cktime_val() 171 if (!input) { in cktime_val() 176 input = p_delim(input, DELIM1); in cktime_val() [all …]
|
H A D | ckdate.c | 302 ckdate_val(char *fmt, char *input) in ckdate_val() argument 318 input = p_date(input, LD, UD, STDIG); in ckdate_val() 319 if (!input) in ckdate_val() 324 input = p_eday(input, LD2, UD); in ckdate_val() 325 if (!input) in ckdate_val() 330 input = p_date(input, LM, UM, STDIG); in ckdate_val() 331 if (!input) in ckdate_val() 336 input = p_date(input, LY, UY, STDIG); in ckdate_val() 337 if (!input) in ckdate_val() 342 input = p_date(input, LCY, UCY, CCYY); in ckdate_val() [all …]
|
H A D | ckstr.c | 86 ckstr_val(char *regexp[], int length, char *input) in ckstr_val() argument 92 if (length && (strlen(input) > (size_t)length)) { in ckstr_val() 101 valid = __step(input, expbuf); in ckstr_val() 105 } else if (strpbrk(input, " \t")) { in ckstr_val() 113 ckstr_err(char *regexp[], int length, char *error, char *input) in ckstr_err() argument 118 if (input) { in ckstr_err() 119 if (ckstr_val(regexp, length, input)) { in ckstr_err() 147 char input[MAX_INPUT], in ckstr() local 157 if (getinput(input)) in ckstr() 160 n = (int)strlen(input); in ckstr() [all …]
|
H A D | ckkeywd.c | 69 char input[MAX_INPUT]; in ckkeywd() local 87 if (getinput(input)) in ckkeywd() 90 n = (int)strlen(input); in ckkeywd() 99 if (strcmp(input, "?") == 0) { in ckkeywd() 103 if (ckquit && (strcmp(input, "q") == 0)) { in ckkeywd() 104 (void) strcpy(strval, input); in ckkeywd() 110 valid = !match(input, keyword); in ckkeywd() 116 (void) strcpy(strval, input); in ckkeywd()
|
H A D | ckyorn.c | 85 char input[MAX_INPUT]; in ckyorn() local 91 if (getinput(input)) in ckyorn() 94 n = (int)strlen(input); in ckyorn() 103 if (strcmp(input, "?") == 0) { in ckyorn() 107 if (ckquit && (strcmp(input, "q") == 0)) in ckyorn() 110 if (ckyorn_val(input)) { in ckyorn() 114 (void) strcpy(yorn, input); in ckyorn()
|
/titanic_41/usr/src/cmd/ssh/libopenbsd-compat/common/ |
H A D | base64.c | 139 u_char input[3]; in b64_ntop() local 144 input[0] = *src++; in b64_ntop() 145 input[1] = *src++; in b64_ntop() 146 input[2] = *src++; in b64_ntop() 149 output[0] = input[0] >> 2; in b64_ntop() 150 output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4); in b64_ntop() 151 output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6); in b64_ntop() 152 output[3] = input[2] & 0x3f; in b64_ntop() 169 input[0] = input[1] = input[2] = '\0'; in b64_ntop() 171 input[i] = *src++; in b64_ntop() [all …]
|
/titanic_41/usr/src/lib/libresolv2/common/isc/ |
H A D | base64.c | 148 u_char input[3]; in b64_ntop() local 153 input[0] = *src++; in b64_ntop() 154 input[1] = *src++; in b64_ntop() 155 input[2] = *src++; in b64_ntop() 158 output[0] = input[0] >> 2; in b64_ntop() 159 output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4); in b64_ntop() 160 output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6); in b64_ntop() 161 output[3] = input[2] & 0x3f; in b64_ntop() 178 input[0] = input[1] = input[2] = '\0'; in b64_ntop() 180 input[i] = *src++; in b64_ntop() [all …]
|
/titanic_41/usr/src/cmd/sasinfo/ |
H A D | sasinfo-list.c | 99 rp_tree_t *rpnode, inputArg_t *input, int gident, 104 inputArg_t *input, int lident, int gident); 106 sas_print_rpnode(inputArg_t *input, 112 SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input); 114 static int processHBA(inputArg_t *input, 117 static int isPortWWNInArgv(inputArg_t *input, PHBA_WWN pWWN); 118 static int isStringInArgv(inputArg_t *input, const char *adapterName); 124 static int handleHBA(SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input, 128 SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input); 137 SMHBA_ADAPTERATTRIBUTES *attrs, inputArg_t *input); [all …]
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | aes_provider.c | 36 const krb5_data *input, krb5_data *output) in krb5int_aes_encrypt() argument 51 ASSERT(input != NULL); in krb5int_aes_encrypt() 52 if (input->length < BLOCK_SIZE) in krb5int_aes_encrypt() 55 ASSERT(input->length == output->length); in krb5int_aes_encrypt() 77 nblocks = (input->length + BLOCK_SIZE - 1) / BLOCK_SIZE; in krb5int_aes_encrypt() 80 partialamount = input->length % BLOCK_SIZE; in krb5int_aes_encrypt() 101 ret = k5_ef_crypto((const char *)input->data, in krb5int_aes_encrypt() 103 input->length, (krb5_keyblock *)key, in krb5int_aes_encrypt() 164 pt.cd_uio->uio_iov[0].iov_base = (char *)input->data; in krb5int_aes_encrypt() 166 pt.cd_uio->uio_iov[0].iov_len = input->length - partialamount; in krb5int_aes_encrypt() [all …]
|
H A D | arcfour_provider.c | 75 const krb5_data *input, krb5_data *output) in k5_arcfour_decrypt() argument 92 if (input->length != output->length) in k5_arcfour_decrypt() 151 (CK_BYTE_PTR)input->data, in k5_arcfour_decrypt() 152 (CK_ULONG)input->length, in k5_arcfour_decrypt() 157 (CK_BYTE_PTR)input->data, in k5_arcfour_decrypt() 158 (CK_ULONG)input->length, in k5_arcfour_decrypt() 172 bzero(output->data, input->length); in k5_arcfour_decrypt() 180 ret = k5_ef_crypto((const char *)input->data, (char *)output->data, in k5_arcfour_decrypt() 181 input->length, (krb5_keyblock *)key, NULL, 0); in k5_arcfour_decrypt() 192 const krb5_data *input, krb5_data *output) in k5_arcfour_encrypt() argument [all …]
|
H A D | des.c | 39 krb5_const krb5_data *ivec, krb5_const krb5_data *input, in k5_des_docrypt() argument 49 if ((input->length%8) != 0) in k5_des_docrypt() 53 if (input->length != output->length) in k5_des_docrypt() 56 ret = mit_des_cbc_encrypt(context, (krb5_pointer) input->data, in k5_des_docrypt() 57 (krb5_pointer) output->data, input->length, in k5_des_docrypt() 68 krb5_const krb5_data *ivec, krb5_const krb5_data *input, in k5_des_encrypt() argument 71 return(k5_des_docrypt(context, key, ivec, input, output, 1)); in k5_des_encrypt() 76 krb5_const krb5_data *ivec, krb5_const krb5_data *input, in k5_des_decrypt() argument 79 return(k5_des_docrypt(context, key, ivec, input, output, 0)); in k5_des_decrypt()
|
H A D | des3.c | 39 krb5_const krb5_data *input, krb5_data *output, int encrypt) in k5_des3_docrypt() argument 50 if ((input->length%8) != 0) in k5_des3_docrypt() 54 if (input->length != output->length) in k5_des3_docrypt() 57 ret = mit_des3_cbc_encrypt(context, (krb5_pointer) input->data, in k5_des3_docrypt() 58 (krb5_pointer) output->data, input->length, in k5_des3_docrypt() 70 krb5_const krb5_data *input, krb5_data *output) in k5_des3_encrypt() argument 72 return(k5_des3_docrypt(context, key, ivec, input, output, 1)); in k5_des3_encrypt() 78 krb5_const krb5_data *input, krb5_data *output) in k5_des3_decrypt() argument 80 return(k5_des3_docrypt(context, key, ivec, input, output, 0)); in k5_des3_decrypt()
|
/titanic_41/usr/src/cmd/dtrace/test/tst/common/funcs/ |
H A D | tst.tolower.d | 32 input[i] = "ahi"; 35 input[i] = "MaHi!"; 38 input[i] = " Nase-5"; 41 input[i] = "!@#$%"; 48 /input[i] != NULL && (this->out = tolower(input[i])) != expected[i]/ 51 input[i], expected[i], this->out); 56 /input[i] != NULL/ 59 input[i], expected[i]); 63 /input[i++] == NULL/
|
H A D | tst.toupper.d | 32 input[i] = "ahi"; 35 input[i] = "MaHi!"; 38 input[i] = " dace-9"; 41 input[i] = "!@#$%"; 48 /input[i] != NULL && (this->out = toupper(input[i])) != expected[i]/ 51 input[i], expected[i], this->out); 56 /input[i] != NULL/ 59 input[i], expected[i]); 63 /input[i++] == NULL/
|
/titanic_41/usr/src/uts/common/crypto/core/ |
H A D | kcf_prov_lib.c | 242 crypto_get_input_data(crypto_data_t *input, uchar_t **dptr, uchar_t *buf) in crypto_get_input_data() argument 246 switch (input->cd_format) { in crypto_get_input_data() 248 if (input->cd_raw.iov_len < input->cd_length) in crypto_get_input_data() 250 *dptr = (uchar_t *)(input->cd_raw.iov_base + in crypto_get_input_data() 251 input->cd_offset); in crypto_get_input_data() 255 if ((rv = crypto_uio_data(input, buf, input->cd_length, in crypto_get_input_data() 262 if ((rv = crypto_mblk_data(input, buf, input->cd_length, in crypto_get_input_data() 397 crypto_update_iov(void *ctx, crypto_data_t *input, crypto_data_t *output, in crypto_update_iov() argument 404 if (input->cd_miscdata != NULL) { in crypto_update_iov() 405 copy_block((uint8_t *)input->cd_miscdata, in crypto_update_iov() [all …]
|
/titanic_41/usr/src/cmd/format/ |
H A D | prompts.c | 53 return (input(FIO_INT64, "Enter maximum number of LBAs", in get_mlba() 67 return (input(FIO_INT, "Enter number of data cylinders", in get_ncyl() 84 return (input(FIO_INT, "Enter number of alternate cylinders", ':', 102 return (input(FIO_INT, "Enter number of physical cylinders", ':', 116 return (input(FIO_INT, "Enter number of heads", ':', in get_nhead() 134 if (input(FIO_OPINT, "Enter physical number of heads", 154 return (input(FIO_INT, in get_nsect() 172 if (input(FIO_OPINT, "Enter number of physical sectors/track", 197 return (input(FIO_INT, "Enter number of bytes/track", 216 return (input(FIO_INT, "Enter rpm of drive", ':', in get_rpm() [all …]
|
/titanic_41/usr/src/uts/common/crypto/io/ |
H A D | arcfour.c | 233 rc4_crypt(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output, in rc4_crypt() argument 238 ret = rc4_crypt_update(ctx, input, output, req); in rc4_crypt() 248 rc4_crypt_update(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output, in rc4_crypt_update() argument 266 switch (input->cd_format) { in rc4_crypt_update() 269 start = input->cd_raw.iov_base + input->cd_offset; in rc4_crypt_update() 271 end = input->cd_raw.iov_base + input->cd_raw.iov_len; in rc4_crypt_update() 273 if (start + input->cd_length > end) in rc4_crypt_update() 277 input->cd_length); in rc4_crypt_update() 283 mblk_t *mp = input->cd_mp, *mp1, *mp2; in rc4_crypt_update() 287 mp1 = advance_position(mp, input->cd_offset, &start); in rc4_crypt_update() [all …]
|
/titanic_41/usr/src/lib/fm/topo/libtopo/common/ |
H A D | mkerror.sh | 31 input="`cat`" 32 [ -z "$input" ] && exit 1 53 echo "$input" | sed -n "s/$pattern/$replace/p" || exit 1 90 echo "$input" | sed -n "s/$pattern/$replace/p" || exit 1 107 echo "$input" | sed -n "s/$pattern/$replace/p" || exit 1 124 echo "$input" | sed -n "s/$pattern/$replace/p" || exit 1 141 echo "$input" | sed -n "s/$pattern/$replace/p" || exit 1 158 echo "$input" | sed -n "s/$pattern/$replace/p" || exit 1
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 15 krb5_const krb5_data *input, in k5_ef_hash() argument 31 (CK_BYTE_PTR)input[i].data, in k5_ef_hash() 32 (CK_ULONG)input[i].length)) != CKR_OK) { in k5_ef_hash() 64 krb5_const krb5_data *input, in k5_ef_mac() argument 77 inlen = K5ROUNDUP(input->length, 8); in k5_ef_mac() 80 if (inlen != input->length) { in k5_ef_mac() 86 inbuf = input->data; in k5_ef_mac() 93 if (inlen != input->length) { in k5_ef_mac() 95 (void) memcpy(inbuf, input->data, input->length); in k5_ef_mac() 108 if (inlen != input->length && inbuf != NULL) in k5_ef_mac()
|
/titanic_41/usr/src/cmd/od/ |
H A D | od.c | 51 static FILE *input = NULL; variable 326 if (input != NULL) { in next_input() 327 if ((input = freopen(files[curfile], "r", input)) != in next_input() 330 return (input); in next_input() 333 if ((input = fopen(files[curfile], "r")) != NULL) { in next_input() 335 return (input); in next_input() 355 while ((input != NULL) && (b->navail < (2 * blocksize))) { in refill() 360 (void) fclose(input); in refill() 361 input = NULL; in refill() 372 while (want && input) { in refill() [all …]
|
/titanic_41/usr/src/lib/libshell/common/tests/ |
H A D | sun_solaris_builtin_tail.sh | 144 input=$'hello\nworld' 152 input=$'1\n2\n3\n4' 161 input=$'1\n2\n3\n4' 170 input=$'1\n2\n3\n4' 179 input=$'1\n2\n3\n4' 189 input=$'1\n2\n3\n4' 198 input=$'1\n2\n3\n4' 207 input=$'1\n2\n3\n4' 216 input=$'1\n2\n3\n4' 225 input=$'1\n2\n3\n4' [all …]
|
/titanic_41/usr/src/cmd/svr4pkg/pkgscripts/ |
H A D | cmdexec.c | 46 static int docmd(char *cmd, char *file, char *input); 55 *input, /* sed input file */ in main() local 90 input = tempnam(NULL, "sedinp"); in main() 91 if ((fpout = fopen(input, "w")) == NULL) { in main() 92 progerr(gettext("unable to open %s"), input); in main() 117 if (docmd(cmd, destfile, input)) { in main() 122 (void) unlink(input); in main() 127 docmd(char *cmd, char *file, char *input) in docmd() argument 136 (void) sprintf(command, "%s -f %s <%s >%s", cmd, input, file, tempout); in docmd()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_decrypt.c | 44 const krb5_data *input, in krb5_old_decrypt() argument 58 if (input->length < blocksize + hashsize || input->length % blocksize != 0) in krb5_old_decrypt() 60 plainsize = input->length - blocksize - hashsize; in krb5_old_decrypt() 64 if (arg_output->length < input->length) { in krb5_old_decrypt() 65 output.length = input->length; in krb5_old_decrypt() 73 output.length = input->length; in krb5_old_decrypt() 89 (void) memcpy(cn, input->data + input->length - blocksize, blocksize); in krb5_old_decrypt() 100 if ((ret = ((*(enc->decrypt))(context, key, ivec, input, &output)))) in krb5_old_decrypt()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_encrypt.c | 62 const krb5_data *ivec, const krb5_data *input, in krb5_dk_encrypt() argument 88 plainlen = krb5_roundup(blocksize+input->length, blocksize); in krb5_dk_encrypt() 90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); in krb5_dk_encrypt() 106 (void) memcpy(plaintext+blocksize, input->data, input->length); in krb5_dk_encrypt() 108 (void) memset(plaintext+blocksize+input->length, 0, in krb5_dk_encrypt() 109 plainlen - (blocksize+input->length)); in krb5_dk_encrypt() 188 const krb5_data *input, krb5_data *output) in trunc_hmac() argument 203 ret = krb5_hmac(context, ki, input, &tmphash); in trunc_hmac() 205 ret = krb5_hmac(context, hash, ki, num, input, &tmphash); in trunc_hmac() 226 const krb5_data *input, in krb5int_aes_dk_encrypt() argument [all …]
|
H A D | dk_decrypt.c | 45 const krb5_data *input, 55 const krb5_data *ivec, const krb5_data *input, in krb5_dk_decrypt() argument 59 ivec, input, output, 0); in krb5_dk_decrypt() 68 const krb5_data *ivec, const krb5_data *input, in krb5int_aes_dk_decrypt() argument 72 ivec, input, output, 96 / 8); in krb5int_aes_dk_decrypt() 81 const krb5_data *ivec, const krb5_data *input, in krb5_dk_decrypt_maybe_trunc_hmac() argument 115 if (input->length < blocksize + hmacsize) in krb5_dk_decrypt_maybe_trunc_hmac() 117 if (output->length < input->length - blocksize - hmacsize) in krb5_dk_decrypt_maybe_trunc_hmac() 120 enclen = input->length - hmacsize; in krb5_dk_decrypt_maybe_trunc_hmac() 130 d1.data = input->data; in krb5_dk_decrypt_maybe_trunc_hmac() [all …]
|