/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encrypt_tk.c | 48 krb5_data *scratch; local 53 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) { 57 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ 58 krb5_free_data(context, scratch); } 62 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch,
|
H A D | decrypt_tk.c | 47 krb5_data scratch; local 53 scratch.length = ticket->enc_part.ciphertext.length; 54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) 60 &ticket->enc_part, &scratch))) { 61 free(scratch.data); 65 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ 66 free(scratch.data);} 69 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part);
|
H A D | kdc_rep_dc.c | 43 krb5_data scratch; local 53 /* set up scratch decrypt/decode area */ 55 scratch.length = dec_rep->enc_part.ciphertext.length; 56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { 63 &scratch))) { 64 free(scratch.data); 68 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ 69 free(scratch.data);} 72 retval = decode_krb5_enc_kdc_rep_part(&scratch, [all...] |
H A D | rd_rep.c | 49 krb5_data scratch; local 61 scratch.length = reply->enc_part.ciphertext.length; 62 if (!(scratch.data = malloc(scratch.length))) { 69 &reply->enc_part, &scratch))) 73 retval = decode_krb5_ap_rep_enc_part(&scratch, repl); 110 memset(scratch.data, 0, scratch.length); 113 free(scratch.data);
|
H A D | encode_kdc.c | 52 krb5_data *scratch; local 89 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch); 95 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ 96 krb5_free_data(context, scratch); } 98 retval = krb5_encrypt_helper(context, client_key, usage, scratch,
|
H A D | mk_rep.c | 48 krb5_data * scratch; local 73 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch))) 78 scratch, &reply.enc_part))) 92 memset(scratch->data, 0, scratch->length); 93 krb5_free_data(context, scratch);
|
H A D | copy_creds.c | 41 krb5_data *scratch; local 60 retval = krb5_copy_data(context, &incred->ticket, &scratch); 63 tempcred->ticket = *scratch; 64 krb5_xfree(scratch); 65 retval = krb5_copy_data(context, &incred->second_ticket, &scratch); 69 tempcred->second_ticket = *scratch; 70 krb5_xfree(scratch);
|
H A D | preauth.c | 145 krb5_data scratch; local 158 scratch.length = (*pa)->length; 159 scratch.data = (char *) (*pa)->contents; 160 retval = decode_krb5_etype_info(&scratch, &etype_info); 281 krb5_data * scratch; local 289 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0) 296 scratch, &enc_data))) 299 krb5_free_data(context, scratch); 300 scratch = 0; 302 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) ! 465 krb5_data * scratch; local [all...] |
H A D | send_tgs.c | 62 krb5_data * scratch; local 87 if ((retval = encode_krb5_authenticator(&authent, &scratch))) { 100 /* Cleanup scratch and scratch data */ 106 scratch, &request.authenticator))) 125 memset(scratch->data, 0, scratch->length); 126 free(scratch->data); 128 free(scratch); 165 krb5_data *scratch, scratch local [all...] |
H A D | rd_cred.c | 24 krb5_data scratch; local 26 scratch.length = pcred->enc_part.ciphertext.length; 27 if (!(scratch.data = (char *)malloc(scratch.length))) 33 &pcred->enc_part, &scratch))) 37 (void) memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length); 41 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart))) 53 (void) memset(scratch.data, 0, scratch [all...] |
H A D | copy_tick.c | 99 krb5_data *scratch; local 109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); 115 tempto->enc_part.ciphertext = *scratch; 116 krb5_xfree(scratch);
|
H A D | rd_priv.c | 64 krb5_data scratch; local 85 scratch.length = privmsg->enc_part.ciphertext.length; 86 if (!(scratch.data = malloc(scratch.length))) { 94 &privmsg->enc_part, &scratch))) 98 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part))) 144 (void) memset(scratch.data, 0, scratch.length); 145 krb5_xfree(scratch.data);
|
H A D | mk_req_ext.c | 140 krb5_data *scratch = 0; local 237 &scratch))) 250 scratch, &request.authenticator))) 271 if (scratch) { 272 memset(scratch->data, 0, scratch->length); 273 krb5_xfree(scratch->data); 274 krb5_xfree(scratch);
|
H A D | mk_cred.c | 34 krb5_data * scratch; local 37 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch))) 45 pencdata->ciphertext.data = scratch->data; 46 pencdata->ciphertext.length = scratch->length; 47 krb5_xfree(scratch); 54 scratch, pencdata); 63 memset(scratch->data, 0, scratch->length); 64 krb5_free_data(context, scratch);
|
/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | des3.c | 109 uint64_t scratch; local 163 scratch = key_so_far; 173 scratch >>= 1; 174 if (scratch & 0x1) /* bit 1 */ 176 scratch >>= 1; 177 if (scratch & 0x1) /* bit 2 */ 179 scratch >>= 1; 180 if (scratch & 0x1) /* bit 3 */ 182 scratch >>= 1; 183 if (scratch [all...] |
/illumos-gate/usr/src/tools/tokenize/ |
H A D | asmsubr.s | 43 .register %g7, #scratch 49 .register %g7, #scratch
|
/illumos-gate/usr/src/cmd/listen/ |
H A D | lslog.c | 90 char scratch[BUFSIZ]; local 93 strcpy(scratch, err_list[code].err_msg); 94 clean_up(code, exitflag, scratch); 109 char scratch[256]; local 115 (void) snprintf(scratch, sizeof (scratch), "%s: %s", 118 (void) strlcat(scratch, ": ", sizeof (scratch)); 119 (void) strlcat(scratch, strerror(save_errno), sizeof (scratch)); 132 char scratch[256]; local [all...] |
H A D | listen.c | 196 char scratch[BUFSIZ]; local 199 char *scratch_p = scratch; 260 sprintf(scratch, "no netconfig entry for <%s>", Netspec); 261 logmessage(scratch); 286 sprintf(scratch, "%s/%s/%s", ALTDIR, Mytag, DBGNAME); 287 Debugfp = fopen(scratch, "w"); 317 sprintf(scratch, "couldn't open %s, default to GMT", 319 logmessage(scratch); 329 sprintf(scratch, "Listener port monitor tag: %s", Mytag_p); 330 logmessage(scratch); 479 char scratch[BUFSIZ]; local 700 char scratch[BUFSIZ]; local 1076 char scratch[BUFSIZ]; local 1135 char scratch[BUFSIZ]; local 1171 char scratch[BUFSIZ]; local 1567 char scratch[BUFSIZ]; local 1681 char scratch[BUFSIZ]; local 1767 char scratch[BUFSIZ]; local 1880 char scratch[BUFSIZ]; local 1944 char scratch[BUFSIZ]; local [all...] |
H A D | nlps_serv.c | 347 char scratch[BUFSIZ]; local 361 sprintf(scratch, "NLPS: nullfix(): unable to PEEK, errno is %d", errno); 363 logmessage(scratch); 394 sprintf(scratch, "NLPS: nullfix(): unable to PEEK second time, errno is %d", errno); 396 logmessage(scratch); 468 char scratch[256]; local 479 sprintf(scratch, badversion, low, high); 480 logmessage(scratch); 495 sprintf(scratch, disabledmsg, svc_code_p); 496 logmessage(scratch); 595 char scratch[256]; local [all...] |
H A D | lsdbf.c | 201 char scratch[128]; local 247 sprintf(scratch, dbfdupcmsg, svc_code_p); 248 logmessage(scratch); 318 sprintf(scratch, dbfsvccmsg, svc_code_p); 319 logmessage(scratch); 323 sprintf(scratch, "Invalid private address ignored: \\x%x", private_p); 324 logmessage(scratch); 527 char scratch[BUFSIZ]; local 624 sprintf(scratch, "service code <%s> specifies non-integer rpc info", *svc_code_p); 625 logmessage(scratch); 789 char scratch[BUFSIZ]; local [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/crypto/ |
H A D | spi.c | 91 char scratch[33]; local 101 bcopy(ext_prov.ei_label, scratch, CRYPTO_EXT_SIZE_LABEL); 102 scratch[CRYPTO_EXT_SIZE_LABEL] = '\0'; 103 mdb_printf("ei_label\t\t%s\n", scratch); 105 bcopy(ext_prov.ei_manufacturerID, scratch, CRYPTO_EXT_SIZE_MANUF); 106 scratch[CRYPTO_EXT_SIZE_MANUF] = '\0'; 107 mdb_printf("ei_manufacturerID\t%s\n", scratch); 109 bcopy(ext_prov.ei_model, scratch, CRYPTO_EXT_SIZE_MODEL); 110 scratch[CRYPTO_EXT_SIZE_MODEL] = '\0'; 111 mdb_printf("ei_model\t\t%s\n", scratch); [all...] |
/illumos-gate/usr/src/cmd/saf/ |
H A D | util.c | 107 char scratch[SIZE]; /* a scratch buffer */ local 125 (void) sprintf(scratch, "tag too long, truncated to <%s>", p); 126 log(scratch); 149 (void) sprintf(scratch, "type too long, truncated to <%s>", p); 150 log(scratch); 180 (void) sprintf(scratch, "Unrecognized flag <%c>", *(p - 1)); 182 log(scratch); 185 error(scratch);
|
/illumos-gate/usr/src/lib/libexacct/demo/ |
H A D | exdump.c | 484 ea_object_t scratch; local 487 if ((res = ea_get_object(ef, &scratch)) == -1) { 493 disp_obj(&scratch, indent + 1); 495 if (scratch.eo_type == EO_GROUP) 496 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1); 498 (void) ea_free_item(&scratch, EUP_ALLOC); 513 ea_object_t scratch; local 540 bzero(&scratch, sizeof (ea_object_t)); 541 while (ea_get_object(&ef, &scratch) != -1) { 542 disp_obj(&scratch, [all...] |
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | ecp_jm.c | 66 mp_int *raz4, mp_int scratch[], const ECGroup *group) 71 t0 = &scratch[0]; 72 t1 = &scratch[1]; 73 M = &scratch[2]; 74 S = &scratch[3]; 137 mp_int *raz4, mp_int scratch[], const ECGroup *group) 142 A = &scratch[0]; 143 B = &scratch[1]; 144 C = &scratch[2]; 145 D = &scratch[ 64 ec_GFp_pt_dbl_jm(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument 134 ec_GFp_pt_add_jm_aff(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, const mp_int *qx, const mp_int *qy, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument 230 mp_int scratch[MAX_SCRATCH]; local [all...] |
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 1248 krb5_data scratch; local 1258 scratch.data = (char *) pa->contents; 1259 scratch.length = pa->length; 1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0) 1403 krb5_data * scratch; local 1465 &scratch); 1467 &scratch); 1470 pa_data->contents = (unsigned char *)scratch->data; 1471 pa_data->length = scratch->length; 1472 free(scratch); 1522 krb5_data *scratch = NULL; local 1630 krb5_data * scratch; local 1719 krb5_data scratch; local 1864 krb5_data * scratch; local 2254 krb5_data scratch; local [all...] |