/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | write_msg.c | 41 krb5int_write_messages(krb5_context context, krb5_pointer fdp, krb5_data *outbuf, int nbufs) argument 54 len[0] = htonl(outbuf[0].length); 56 SG_SET(&sg[1], outbuf[0].length ? outbuf[0].data : NULL, 57 outbuf[0].length); 59 len[1] = htonl(outbuf[1].length); 61 SG_SET(&sg[3], outbuf[1].length ? outbuf[1].data : NULL, 62 outbuf[1].length); 67 outbuf 74 krb5_write_message(krb5_context context, krb5_pointer fdp, krb5_data *outbuf) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 58 char *outbuf = NULL; local 78 outbuf = calloc(outlen, sizeof (char)); 79 if (outbuf == NULL) 81 if (outbuf != NULL && inbuf != NULL) { 88 (mit_des_cblock *)outbuf, 93 (void) memcpy(output->data, &outbuf[outlen-8], 8); 99 if (outbuf != NULL) 100 free(outbuf);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_rep.c | 68 Formats a KRB_AP_REP message into outbuf. 70 The outbuf buffer storage is allocated, and should be freed by the 78 krb5_data *outbuf, int dce_style) 134 *outbuf = *toutbuf; 151 krb5_mk_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *outbuf) argument 153 return k5_mk_rep(context, auth_context, outbuf, 0); 157 krb5_mk_rep_dce(krb5_context context, krb5_auth_context auth_context, krb5_data *outbuf) argument 159 return k5_mk_rep(context, auth_context, outbuf, 1); 77 k5_mk_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *outbuf, int dce_style) argument
|
H A D | mk_req.c | 35 Formats a KRB_AP_REQ message into outbuf. 47 The outbuf buffer storage is allocated, and should be freed by the 56 krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) 81 in_data, credsp, outbuf); 54 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, char *service, char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
|
H A D | mk_priv.c | 45 krb5_pointer i_vector, krb5_data *outbuf) 103 *outbuf = *scratch2; 124 const krb5_data *userdata, krb5_data *outbuf, 207 auth_context->i_vector, outbuf))) { 220 free(outbuf); 42 mk_priv_basic(krb5_context context, const krb5_data *userdata, krb5_key key, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_pointer i_vector, krb5_data *outbuf) argument 123 krb5_mk_priv(krb5_context context, krb5_auth_context auth_context, const krb5_data *userdata, krb5_data *outbuf, krb5_replay_data *outdata) argument
|
H A D | mk_safe.c | 42 Formats a KRB_SAFE message into outbuf. 51 The outbuf buffer storage is allocated, and should be freed by the 60 krb5_cksumtype sumtype, krb5_data *outbuf) 111 *outbuf = *scratch2; 125 const krb5_data *userdata, krb5_data *outbuf, 264 sumtype, outbuf))) { 277 free(outbuf); 287 free(outbuf); 57 krb5_mk_safe_basic(krb5_context context, const krb5_data *userdata, krb5_key key, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_cksumtype sumtype, krb5_data *outbuf) argument 124 krb5_mk_safe(krb5_context context, krb5_auth_context auth_context, const krb5_data *userdata, krb5_data *outbuf, krb5_replay_data *outdata) argument
|
H A D | rd_priv.c | 44 data in *outbuf. 51 outbuf points to allocated storage which the caller should 66 krb5_replay_data *replaydata, krb5_data *outbuf) 147 *outbuf = privmsg_enc_part->user_data; 168 const krb5_data *inbuf, krb5_data *outbuf, 233 &replaydata, outbuf))) { 282 free(outbuf->data); 283 outbuf->length = 0; 284 outbuf->data = NULL; 63 krb5_rd_priv_basic(krb5_context context, const krb5_data *inbuf, const krb5_key key, const krb5_address *local_addr, const krb5_address *remote_addr, krb5_pointer i_vector, krb5_replay_data *replaydata, krb5_data *outbuf) argument 167 krb5_rd_priv(krb5_context context, krb5_auth_context auth_context, const krb5_data *inbuf, krb5_data *outbuf, krb5_replay_data *outdata) argument
|
H A D | rd_safe.c | 43 data in *outbuf. 50 outbuf points to allocated storage which the caller should free when finished. 59 krb5_replay_data *replaydata, krb5_data *outbuf) 162 *outbuf = message->user_data; 173 const krb5_data *inbuf, krb5_data *outbuf, 235 &replaydata, outbuf))) { 285 free(outbuf->data); 55 krb5_rd_safe_basic(krb5_context context, const krb5_data *inbuf, krb5_key key, const krb5_address *recv_addr, const krb5_address *sender_addr, krb5_replay_data *replaydata, krb5_data *outbuf) argument 172 krb5_rd_safe(krb5_context context, krb5_auth_context auth_context, const krb5_data *inbuf, krb5_data *outbuf, krb5_replay_data *outdata) argument
|
H A D | recvauth.c | 60 krb5_data outbuf; local 185 if ((retval = krb5_mk_error(context, &error, &outbuf))) { 194 outbuf.length = 0; 195 outbuf.data = 0; 198 retval = krb5_write_message(context, fd, &outbuf); 199 if (outbuf.data) { 200 free(outbuf.data); 210 if ((retval = krb5_mk_rep(context, *auth_context, &outbuf))) { 213 retval = krb5_write_message(context, fd, &outbuf); 214 free(outbuf [all...] |
H A D | sendauth.c | 60 krb5_data inbuf, outbuf[2]; local 73 outbuf[0].length = strlen(sendauth_version) + 1; 74 outbuf[0].data = (char *) sendauth_version; 75 outbuf[1].length = strlen(appl_version) + 1; 76 outbuf[1].data = appl_version; 77 if ((retval = krb5int_write_messages(context, fd, outbuf, 2))) 167 outbuf[0].data = NULL; /* Coverity is confused otherwise */ 170 &outbuf[0]))) 177 retval = krb5_write_message(context, fd, &outbuf[0]); 180 k5_trace_message_send(*((int *)fd), outbuf[ [all...] |
H A D | fwd_tgt.c | 45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument 209 *outbuf = *scratch;
|
H A D | mk_req_ext.c | 42 Formats a KRB_AP_REQ message into outbuf, with more complete options than 45 outbuf, ap_req_options, checksum, and ccache are used in the 64 The outbuf buffer storage is allocated, and should be freed by the 92 krb5_creds *in_creds, krb5_data *outbuf) 241 *outbuf = *toutbuf; 90 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument
|
H A D | send_tgs.c | 57 krb5_creds *in_cred, krb5_data *outbuf, krb5_keyblock *subkey) 125 *outbuf = *toutbuf; 56 tgs_construct_tgsreq(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf, krb5_keyblock *subkey) argument
|
/osnet-11/usr/src/lib/libpp/common/ |
H A D | ppdata.c | 63 static char outbuf[2*(PPBUFSIZ+MAXTOKEN)];/* output buffer */ variable 101 &outbuf[0], /* outb */ 102 &outbuf[0], /* outbuf */ 103 &outbuf[0], /* outp */ 104 &outbuf[PPBUFSIZ], /* oute */
|
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | DAAdvertiser.java | 59 static private byte[] outbuf = null; field in class:DAAdvertiser 143 outbuf = baos.toByteArray(); 246 return outbuf;
|
/osnet-11/usr/src/lib/libresolv2/common/inet/ |
H A D | inet_net_ntop.c | 177 char outbuf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:255.255.255.255/128")]; local 187 cp = outbuf; 259 if (cp != outbuf) 268 if (strlen(outbuf) + 1 > size) 270 strcpy(dst, outbuf);
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | arcfour.c | 43 byte *outbuf, const byte *inbuf, unsigned int length ) 57 *outbuf++ = *inbuf++ ^ sbox[(sbox[i] + sbox[j]) & 255]; 66 byte *outbuf, const byte *inbuf, unsigned int length) 69 do_encrypt_stream (ctx, outbuf, inbuf, length ); 42 do_encrypt_stream( ARCFOUR_context *ctx, byte *outbuf, const byte *inbuf, unsigned int length ) argument 65 encrypt_stream(void *context, byte *outbuf, const byte *inbuf, unsigned int length) argument
|
H A D | camellia-glue.c | 108 camellia_encrypt(void *c, byte *outbuf, const byte *inbuf) argument 112 Camellia_EncryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf); 122 camellia_decrypt(void *c, byte *outbuf, const byte *inbuf) argument 126 Camellia_DecryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf);
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | arcfour.c | 42 byte *outbuf, const byte *inbuf, unsigned int length ) 56 *outbuf++ = *inbuf++ ^ sbox[(sbox[i] + sbox[j]) & 255]; 65 byte *outbuf, const byte *inbuf, unsigned int length) 68 do_encrypt_stream (ctx, outbuf, inbuf, length ); 41 do_encrypt_stream( ARCFOUR_context *ctx, byte *outbuf, const byte *inbuf, unsigned int length ) argument 64 encrypt_stream(void *context, byte *outbuf, const byte *inbuf, unsigned int length) argument
|
H A D | camellia-glue.c | 109 camellia_encrypt(void *c, byte *outbuf, const byte *inbuf) argument 113 Camellia_EncryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf); 123 camellia_decrypt(void *c, byte *outbuf, const byte *inbuf) argument 127 Camellia_DecryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf);
|
H A D | rfc2268.c | 87 do_encrypt (void *context, unsigned char *outbuf, const unsigned char *inbuf) argument 128 outbuf[0] = word0 & 255; 129 outbuf[1] = word0 >> 8; 130 outbuf[2] = word1 & 255; 131 outbuf[3] = word1 >> 8; 132 outbuf[4] = word2 & 255; 133 outbuf[5] = word2 >> 8; 134 outbuf[6] = word3 & 255; 135 outbuf[7] = word3 >> 8; 139 do_decrypt (void *context, unsigned char *outbuf, cons argument [all...] |
/osnet-11/usr/src/lib/libprtdiag_psr/sparc/ontario/common/ |
H A D | huron.c | 387 huron_get_first_compatible_value(picl_nodehdl_t nodeh, char **outbuf) argument 410 *outbuf = pval; 440 *outbuf = pval;
|
H A D | pelton.c | 62 char **outbuf); 397 pelton_get_first_compatible_value(picl_nodehdl_t nodeh, char **outbuf) argument 420 *outbuf = pval; 450 *outbuf = pval;
|
/osnet-11/usr/src/lib/fm/libfmd_agent/common/ |
H A D | fmd_agent.c | 93 char *inbuf = NULL, *outbuf = NULL; local 116 outbuf = umem_alloc(outsz, UMEM_DEFAULT); 117 if (outbuf == NULL) { 127 fid.fid_outbuf = outbuf; 132 umem_free(outbuf, outsz); 134 outbuf = NULL; 150 if (outbuf != NULL) 151 umem_free(outbuf, outsz);
|
/osnet-11/usr/src/grub/grub2/grub-core/io/ |
H A D | xzio.c | 42 grub_uint8_t outbuf[XZBUFSIZ]; member in struct:grub_xzio 225 xzio->buf.out = xzio->outbuf;
|