Searched refs:uflag (Results 1 - 25 of 34) sorted by relevance

12

/macosx-10.9.5/shell_cmds-175/mktemp/
H A Dmktemp.c58 int dflag, qflag, tflag, uflag; local
60 ret = dflag = qflag = tflag = uflag = 0;
80 uflag++;
127 if (uflag)
138 if (uflag)
/macosx-10.9.5/text_cmds-87/uniq/
H A Duniq.c64 int cflag, dflag, uflag; variable
111 uflag = 1;
123 if (dflag || uflag)
125 } else if (!dflag && !uflag)
126 dflag = uflag = 1;
149 if (!cflag && uflag && dflag)
169 if (cflag || !dflag || !uflag)
173 if (!cflag && uflag && dflag)
182 if (cflag || !dflag || !uflag)
215 if ((dflag && repeats) || (uflag
[all...]
/macosx-10.9.5/ksh-20/ksh/src/lib/libast/sfio/
H A D_sfopen.c148 reg int sflags, oflags, uflag; local
154 sflags = oflags = uflag = 0;
166 uflag = 0;
180 uflag = 1;
196 uflag = 0;
214 *uflagp = uflag;
/macosx-10.9.5/file_cmds-230/mtree/
H A Dextern.h56 extern int dflag, eflag, iflag, nflag, qflag, rflag, sflag, uflag, wflag;
H A Dmtree.c56 int cflag, dflag, eflag, iflag, nflag, qflag, rflag, sflag, uflag, Uflag, wflag; variable
141 uflag = 1;
144 uflag = 1;
H A Dcompare.c131 if (uflag)
145 if (uflag)
161 if (uflag)
197 if (uflag) {
242 if (uflag)
H A Dverify.c185 if (!(p->flags & F_VISIT) && uflag) {
/macosx-10.9.5/diskdev_cmds-572.1.1/quotaon.tproj/
H A Dquotaon.c96 int uflag; /* operate on user quotas */ variable
141 uflag++;
154 if (!gflag && !uflag) {
156 uflag++;
178 if (uflag && hasquota(&fst[i], USRQUOTA, &qfnp))
187 if (uflag && hasquota(&fst[i], USRQUOTA, &qfnp))
201 if (uflag && hasquota(fs, USRQUOTA, &qfnp))
210 if (uflag && hasquota(fs, USRQUOTA, &qfnp))
/macosx-10.9.5/remote_cmds-41.90.1/makedbm.tproj/
H A Dmakedbm.c353 int aflag, uflag, bflag, lflag, sflag, Uflag; local
364 aflag = uflag = bflag = lflag = sflag = Uflag = 0;
370 uflag++;
402 uflag++;
409 if ((uflag != 0) && (aflag != 0)) {
413 if (uflag != 0) {
437 if (uflag != 0) {
/macosx-10.9.5/netcat-20/
H A Dnetcat.c88 int uflag; /* UDP - Default to TCP */ variable
304 uflag = 1;
344 if (uflag)
399 hints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM;
400 hints.ai_protocol = uflag ? IPPROTO_UDP : IPPROTO_TCP;
406 if (uflag)
451 if (uflag) {
522 if (uflag) {
535 uflag ? "udp" : "tcp");
539 host, portlist[i], uflag
[all...]
/macosx-10.9.5/shell_cmds-175/id/
H A Did.c87 int Gflag, Mflag, Pflag, ch, gflag, id, nflag, pflag, rflag, uflag; local
91 Gflag = Mflag = Pflag = gflag = nflag = pflag = rflag = uflag = 0;
102 uflag = nflag = 1;
137 uflag = 1;
149 switch(Aflag + Gflag + Mflag + Pflag + gflag + pflag + uflag) {
181 if (uflag) {
/macosx-10.9.5/system_cmds-597.90.1/sa.tproj/
H A Dmain.c75 int Kflag, lflag, mflag, qflag, rflag, sflag, tflag, uflag, vflag; variable
176 uflag = 1;
202 if (!uflag) {
225 if (!uflag && sflag) {
286 if (!uflag && !qflag) {
294 if (!uflag) {
392 if (!uflag) {
H A Dextern.h111 extern int Kflag, lflag, mflag, qflag, rflag, sflag, tflag, uflag, vflag;
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/sa.tproj/
H A Dmain.c75 int Kflag, lflag, mflag, qflag, rflag, sflag, tflag, uflag, vflag; variable
176 uflag = 1;
202 if (!uflag) {
225 if (!uflag && sflag) {
286 if (!uflag && !qflag) {
294 if (!uflag) {
392 if (!uflag) {
H A Dextern.h111 extern int Kflag, lflag, mflag, qflag, rflag, sflag, tflag, uflag, vflag;
/macosx-10.9.5/diskdev_cmds-572.1.1/repquota.tproj/
H A Drepquota.c134 int gflag = 0, uflag = 0, errs = 0; local
151 uflag++;
164 if (!gflag && !uflag) {
167 uflag++;
184 if (uflag && hasquota(&fst[i], USRQUOTA, &qfnp))
193 if (uflag && hasquota(&fst[i], USRQUOTA, &qfnp))
204 if (uflag) {
218 if (uflag && hasquota(fs, USRQUOTA, &qfnp))
227 if (uflag && hasquota(fs, USRQUOTA, &qfnp))
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/
H A Ddes.c134 /* crypto/des/des.c */ /* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@mincom.oz.au). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@mincom.oz.au). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@mincom.oz.au)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson (tjh@mincom.oz.au)" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #include <stdio.h> #include <stdlib.h> #include <string.h> #ifdef HAVE_UNISTD_H #include <unistd.h> #endif #ifdef HAVE_IO_H #include <io.h> #endif #include <time.h> #include "des_ver.h" #ifdef VMS #include <types.h> #include <stat.h> #endif #ifdef HAVE_SYS_TYPES_H #include <sys/types.h> #endif #ifdef HAVE_SYS_STAT_H #include <sys/stat.h> #endif #include "des.h" #ifndef HAVE_RANDOM #define random rand #define srandom(s) srand(s) #endif #ifndef NOPROTO void usage(void); void doencryption(void); int uufwrite(unsigned char *data, int size, unsigned int num, FILE *fp); void uufwriteEnd(FILE *fp); int uufread(unsigned char *out,int size,unsigned int num,FILE *fp); int uuencode(unsigned char *in,int num,unsigned char *out); int uudecode(unsigned char *in,int num,unsigned char *out); #else void usage(); void doencryption(); int uufwrite(); void uufwriteEnd(); int uufread(); int uuencode(); int uudecode(); #endif #ifdef VMS #define EXIT(a) exit(a&0x10000000) #else #define EXIT(a) exit(a) #endif #define BUFSIZE (8*1024) #define VERIFY 1 #define KEYSIZ 8 #define KEYSIZB 1024 /* should hit tty line limit first :-) */ char key[KEYSIZB+1]; int do_encrypt,longk=0; FILE *DES_IN,*DES_OUT,*CKSUM_OUT; char uuname[200]; unsigned char uubuf[50]; int uubufnum=0; #define INUUBUFN (45*100) #define OUTUUBUF (65*100) unsigned char b[OUTUUBUF]; unsigned char bb[300]; des_cblock cksum={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}; char cksumname[200]=""; int vflag,cflag,eflag,dflag,kflag,bflag,fflag,sflag,uflag,flag3,hflag,error; int main(argc, argv) int argc; char **argv; { int i; struct stat ins,outs; char *p; char *in=NULL,*out=NULL; vflag=cflag=eflag=dflag=kflag=hflag=bflag=fflag=sflag=uflag=flag3=0; error=0; memset(key,0,sizeof(key)); for (i=1; i<argc; i++) { p=argv[i]; if ((p[0] == '-') && (p[1] != '\0')) { p++; while (*p) { switch (*(p++)) { case '3': flag3=1; longk=1; break; case 'c': cflag=1; strncpy(cksumname,p,200); p+=strlen(cksumname); break; case 'C': cflag=1; longk=1; strncpy(cksumname,p,200); p+=strlen(cksumname); break; case 'e': eflag=1; break; case 'v': vflag=1; break; case 'E': eflag=1; longk=1; break; case 'd': dflag=1; break; case 'D': dflag=1; longk=1; break; case 'b': bflag=1; break; case 'f': fflag=1; break; case 's': sflag=1; break; case 'u': uflag=1; strncpy(uuname,p,200); p+=strlen(uuname); break; case 'h': hflag=1; break; case 'k': kflag=1; if ((i+1) == argc) { fputs("must have a key with the -k option\n",stderr); error=1; } else { int j; i++; strncpy(key,argv[i],KEYSIZB); for (j=strlen(argv[i])-1; j>=0; j--) argv[i][j]='\0'; } break; default: fprintf(stderr,"'%c' unknown flag\n",p[-1]); error=1; break; } } } else { if (in == NULL) in=argv[i]; else if (out == NULL) out=argv[i]; else error=1; } } if (error) usage(); /* We either * do checksum or * do encrypt or * do decrypt or * do decrypt then ckecksum or * do checksum then encrypt */ if (((eflag+dflag) == 1) || cflag) { if (eflag) do_encrypt=DES_ENCRYPT; if (dflag) do_encrypt=DES_DECRYPT; } else { if (vflag) { #ifndef _Windows fprintf(stderr,"des(1) built with %s\n",libdes_version); #endif EXIT(1); } else usage(); } #ifndef _Windows if (vflag) fprintf(stderr,"des(1) built with %s\n",libdes_version); #endif if ( (in != NULL) && (out != NULL) && #ifndef MSDOS (stat(in,&ins) != -1) && (stat(out,&outs) != -1) && (ins.st_dev == outs.st_dev) && (ins.st_ino == outs.st_ino)) #else /* MSDOS */ (strcmp(in,out) == 0)) #endif { fputs("input and output file are the same\n",stderr); EXIT(3); } if (!kflag) if (des_read_pw_string(key,KEYSIZB+1,"Enter key:",eflag?VERIFY:0)) { fputs("password error\n",stderr); EXIT(2); } if (in == NULL) DES_IN=stdin; else if ((DES_IN=fopen(in,"r")) == NULL) { perror("opening input file"); EXIT(4); } CKSUM_OUT=stdout; if (out == NULL) { DES_OUT=stdout; CKSUM_OUT=stderr; } else if ((DES_OUT=fopen(out,"w")) == NULL) { perror("opening output file"); EXIT(5); } #ifdef MSDOS /* This should set the file to binary mode. */ { #include <fcntl.h> if (!(uflag && dflag)) setmode(fileno(DES_IN),O_BINARY); if (!(uflag && eflag)) setmode(fileno(DES_OUT),O_BINARY); } #endif doencryption(); fclose(DES_IN); fclose(DES_OUT); EXIT(0); } void usage() { char **u; static const char *Usage[]={ "des <options> [input-file [output-file]]", "options:", "-v : des(1) version number", "-e : encrypt using sunOS compatible user key to DES key conversion.", "-E : encrypt ", "-d : decrypt using sunOS compatible user key to DES key conversion.", "-D : decrypt ", "-c[ckname] : generate a cbc_cksum using sunOS compatible user key to", " DES key conversion and output to ckname (stdout default,", " stderr if data being output on stdout). The checksum is", " generated before encryption and after decryption if used", " in conjunction with -[eEdD].", "-C[ckname] : generate a cbc_cksum as for -c but compatible with -[ED].", "-k key : use key 'key'", "-h : the key that is entered will be a hexidecimal number", " that is used directly as the des key", "-u[uuname] : input file is uudecoded if -[dD] or output uuencoded data if -[eE]", " (uuname is the filename to put in the uuencode header).", "-b : encrypt using DES in ecb encryption mode, the defaut is cbc mode.", "-3 : encrypt using tripple DES encryption. This uses 2 keys", " generated from the input key. If the input key is less", " than 8 characters long, this is equivelent to normal", " encryption. Default is tripple cbc, -b makes it tripple ecb.", NULL }; for (u=(char **)Usage; *u; u++) { fputs(*u,stderr); fputc('\n',stderr); } EXIT(1); } void doencryption() { #ifdef _LIBC extern int srandom(); extern int random(); extern unsigned long time(); #endif register int i; des_key_schedule ks,ks2; unsigned char iv[8],iv2[8]; char *p; int num=0,j,k,l,rem,ll,len,last,ex=0; des_cblock kk,k2; FILE *O; int Exit=0; #ifndef MSDOS static unsigned char buf[BUFSIZE+8],obuf[BUFSIZE+8]; #else static unsigned char *buf=NULL,*obuf=NULL; if (buf == NULL) { if ( (( buf=(unsigned char *)Malloc(BUFSIZE+8)) == NULL) || ((obuf=(unsigned char *)Malloc(BUFSIZE+8)) == NULL)) { fputs("Not enough memory\n",stderr); Exit=10; goto problems; } } #endif if (hflag) { j=(flag3?16:8); p=key; for (i=0; i<j; i++) { k=0; if ((*p <= '9') && (*p >= '0')) k=(*p-'0')<<4; else if ((*p <= 'f') && (*p >= 'a')) k=(*p-'a'+10)<<4; else if ((*p <= 'F') && (*p >= 'A')) k=(*p-'A'+10)<<4; else { fputs("Bad hex key\n",stderr); Exit=9; goto problems; } p++; if ((*p <= '9') && (*p >= '0')) k|=(*p-'0'); else if ((*p <= 'f') && (*p >= 'a')) k|=(*p-'a'+10); else if ((*p <= 'F') && (*p >= 'A')) k|=(*p-'A'+10); else { fputs("Bad hex key\n",stderr); Exit=9; goto problems; } p++; if (i < 8) kk[i]=k; else k2[i-8]=k; } des_set_key((C_Block *)k2,ks2); memset(k2,0,sizeof(k2)); } else if (longk || flag3) { if (flag3) { des_string_to_2keys(key,(C_Block *)kk,(C_Block *)k2); des_set_key((C_Block *)k2,ks2); memset(k2,0,sizeof(k2)); } else des_string_to_key(key,(C_Block *)kk); } else for (i=0; i<KEYSIZ; i++) { l=0; k=key[i]; for (j=0; j<8; j++) { if (k&1) l++; k>>=1; } if (l & 1) kk[i]=key[i]&0x7f; else kk[i]=key[i]|0x80; } des_set_key((C_Block *)kk,ks); memset(key,0,sizeof(key)); memset(kk,0,sizeof(kk)); /* woops - A bug that does not showup under unix :-( */ memset(iv,0,sizeof(iv)); memset(iv2,0,sizeof(iv2)); l=1; rem=0; /* first read */ if (eflag || (!dflag && cflag)) { for (;;) { num=l=fread(&(buf[rem]),1,BUFSIZE,DES_IN); l+=rem; num+=rem; if (l < 0) { perror("read error"); Exit=6; goto problems; } rem=l%8; len=l-rem; if (feof(DES_IN)) { srandom((unsigned int)time(NULL)); for (i=7-rem; i>0; i--) buf[l++]=random()&0xff; buf[l++]=rem; ex=1; len+=rem; } else l-=rem; if (cflag) { des_cbc_cksum((C_Block *)buf,(C_Block *)cksum, (long)len,ks,(C_Block *)cksum); if (!eflag) { if (feof(DES_IN)) break; else continue; } } if (bflag && !flag3) for (i=0; i<l; i+=8) des_ecb_encrypt( (des_cblock *)&(buf[i]), (des_cblock *)&(obuf[i]), ks,do_encrypt); else if (flag3 && bflag) for (i=0; i<l; i+=8) des_ecb2_encrypt( (des_cblock *)&(buf[i]), (des_cblock *)&(obuf[i]), ks,ks2,do_encrypt); else if (flag3 && !bflag) { char tmpbuf[8]; if (rem) memcpy(tmpbuf,&(buf[l]), (unsigned int)rem); des_3cbc_encrypt( (des_cblock *)buf,(des_cblock *)obuf, (long)l,ks,ks2,(des_cblock *)iv, (des_cblock *)iv2,do_encrypt); if (rem) memcpy(&(buf[l]),tmpbuf, (unsigned int)rem); } else { des_cbc_encrypt( (des_cblock *)buf,(des_cblock *)obuf, (long)l,ks,(des_cblock *)iv,do_encrypt); if (l >= 8) memcpy(iv,&(obuf[l-8]),8); } if (rem) memcpy(buf,&(buf[l]),(unsigned int)rem); i=0; while (i < l) { if (uflag) j=uufwrite(obuf,1,(unsigned int)l-i, DES_OUT); else j=fwrite(obuf,1,(unsigned int)l-i, DES_OUT); if (j == -1) { perror("Write error"); Exit=7; goto problems; } i+=j; } if (feof(DES_IN)) { if (uflag) uufwriteEnd(DES_OUT); break; } } } else /* decrypt */ { ex=1; for (;;) { if (ex) { if (uflag) l=uufread(buf,1,BUFSIZE,DES_IN); else l=fread(buf,1,BUFSIZE,DES_IN); ex=0; rem=l%8; l-=rem; } if (l < 0) { perror("read error"); Exit=6; goto problems; } if (bflag && !flag3) for (i=0; i<l; i+=8) des_ecb_encrypt( (des_cblock *)&(buf[i]), (des_cblock *)&(obuf[i]), ks,do_encrypt); else if (flag3 && bflag) for (i=0; i<l; i+=8) des_ecb2_encrypt( (des_cblock *)&(buf[i]), (des_cblock *)&(obuf[i]), ks,ks2,do_encrypt); else if (flag3 && !bflag) { des_3cbc_encrypt( (des_cblock *)buf,(des_cblock *)obuf, (long)l,ks,ks2,(des_cblock *)iv, (des_cblock *)iv2,do_encrypt); } else { des_cbc_encrypt( (des_cblock *)buf,(des_cblock *)obuf, (long)l,ks,(des_cblock *)iv,do_encrypt); if (l >= 8) memcpy(iv,&(buf[l-8]),8); } if (uflag) ll=uufread(&(buf[rem]),1,BUFSIZE,DES_IN); else ll=fread(&(buf[rem]),1,BUFSIZE,DES_IN); (…)
1 /* crypto/des/des.c */ variable
/macosx-10.9.5/diskdev_cmds-572.1.1/quota.tproj/
H A Dquota.c122 int i, gflag = 0, uflag = 0; local
138 uflag++;
152 if (!uflag && !gflag)
153 uflag++;
155 if (uflag)
168 if (uflag && gflag)
170 if (uflag) {
/macosx-10.9.5/file_cmds-230/pax/
H A Dar_subs.c325 if ((uflag || Dflag) && ((lstat(arcn->name, &sb) == 0))) {
326 if (uflag && Dflag) {
566 if (uflag) {
856 if (uflag && (ftime_start() < 0))
898 if (uflag) {
967 if ((uflag && (ftime_start() < 0)) || (wr_start() < 0))
1081 if (uflag || Dflag) {
1099 if (uflag && Dflag) {
H A Dpax.c86 int uflag; /* ignore older modification time files */ variable
88 int Dflag; /* same as uflag except inode change time */
93 int Zflag; /* same as uflag except after name mode */
H A Dextern.h229 extern int uflag;
/macosx-10.9.5/system_cmds-597.90.1/reboot.tproj/
H A Dreboot.c87 int ch, howto, kflag, lflag, nflag, qflag, uflag; local
132 uflag = 1;
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/reboot.tproj/
H A Dreboot.c87 int ch, howto, kflag, lflag, nflag, qflag, uflag; local
132 uflag = 1;
/macosx-10.9.5/diskdev_cmds-572.1.1/quotacheck.tproj/
H A Dquotacheck.c103 int uflag; /* check user quotas */ variable
173 uflag++;
189 if (!gflag && !uflag) {
191 uflag++;
240 if (uflag) {
297 if (uflag && hasquota(fst, USRQUOTA, &qfnp)) {
324 if (uflag && hasquota(fs, USRQUOTA, &qfnp)) {
/macosx-10.9.5/system_cmds-597.90.1/sar.tproj/
H A Dsar.c93 int uflag = 0; /* cpu utilization - this is the only default */ variable
309 uflag= 1;
354 /* setup default uflag option */
357 dflag = gflag = pflag = uflag = 1;
371 uflag=1;
876 if (uflag) /* print cpu headers */
1036 if (uflag && sar_cpu)
1576 if (uflag) /* print cpu averages */

Completed in 533 milliseconds

12