Searched refs:scratch (Results 1 - 25 of 68) sorted by relevance

123

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dencrypt_tk.c48 krb5_data *scratch; local
53 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) {
57 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \
58 krb5_free_data(context, scratch); }
62 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch,
H A Ddecrypt_tk.c46 krb5_data scratch; local
55 scratch.length = ticket->enc_part.ciphertext.length;
56 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
62 &ticket->enc_part, &scratch))) {
63 free(scratch.data);
67 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \
68 free(scratch.data);}
71 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part);
H A Dkdc_rep_dc.c44 krb5_data scratch; local
54 /* set up scratch decrypt/decode area */
56 scratch.length = dec_rep->enc_part.ciphertext.length;
57 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) {
64 &scratch))) {
65 free(scratch.data);
69 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \
70 free(scratch.data);}
73 retval = decode_krb5_enc_kdc_rep_part(&scratch,
[all...]
H A Drd_rep.c85 krb5_data scratch; local
98 scratch.length = reply->enc_part.ciphertext.length;
99 scratch.data = malloc(scratch.length);
100 if (scratch.data == NULL) {
107 &reply->enc_part, &scratch);
115 retval = decode_krb5_ap_rep_enc_part(&scratch, &enc);
152 if (scratch.data)
153 memset(scratch.data, 0, scratch
166 krb5_data scratch; local
[all...]
H A Dencode_kdc.c55 krb5_data *scratch; local
92 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch);
98 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \
99 krb5_free_data(context, scratch); }
101 retval = krb5_encrypt_helper(context, client_key, usage, scratch,
H A Dcopy_creds.c65 krb5_data *scratch; local
81 retval = krb5_copy_data(context, &incred->ticket, &scratch);
84 tempcred->ticket = *scratch;
85 free(scratch);
86 retval = krb5_copy_data(context, &incred->second_ticket, &scratch);
90 tempcred->second_ticket = *scratch;
91 free(scratch);
H A Dpreauth.c133 krb5_data scratch; local
146 scratch.length = (*pa)->length;
147 scratch.data = (char *) (*pa)->contents;
148 retval = decode_krb5_etype_info(&scratch, &etype_info);
269 krb5_data * scratch; local
277 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0)
284 scratch, &enc_data)))
287 krb5_free_data(context, scratch);
288 scratch = 0;
290 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) !
446 krb5_data * scratch = 0; local
[all...]
H A Dmk_rep.c83 krb5_data * scratch; local
123 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch)))
128 scratch, &reply.enc_part)))
144 memset(scratch->data, 0, scratch->length);
145 krb5_free_data(context, scratch);
H A Dsend_tgs.c64 krb5_data * scratch = NULL; local
107 if ((retval = encode_krb5_authenticator(&authent, &scratch)))
115 /* Cleanup scratch and scratch data */
121 scratch, &request.authenticator)))
140 if (scratch != NULL && scratch->data != NULL) {
141 zap(scratch->data, scratch->length);
142 free(scratch
185 krb5_data *scratch, scratch2; local
[all...]
H A Drd_cred.c29 krb5_data scratch; local
31 scratch.length = pcred->enc_part.ciphertext.length;
32 if (!(scratch.data = (char *)malloc(scratch.length)))
38 &pcred->enc_part, &scratch)))
41 memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length);
45 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart)))
56 memset(scratch.data, 0, scratch
[all...]
H A Drd_priv.c70 krb5_data scratch; local
92 scratch.length = privmsg->enc_part.ciphertext.length;
93 if (!(scratch.data = malloc(scratch.length))) {
101 &privmsg->enc_part, &scratch))) {
108 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part)))
156 memset(scratch.data, 0, scratch.length);
157 free(scratch.data);
H A Dfast.c288 krb5_data scratch; local
298 scratch.data = (char *) fx_reply->contents;
299 scratch.length = fx_reply->length;
300 retval = decode_krb5_pa_fx_fast_reply(&scratch, &encrypted_response);
302 scratch.data = NULL;
304 scratch.data = malloc(encrypted_response->ciphertext.length);
305 if (scratch.data == NULL)
307 scratch.length = encrypted_response->ciphertext.length;
312 encrypted_response, &scratch);
320 retval = decode_krb5_fast_response(&scratch,
367 krb5_data scratch, *encoded_td = NULL; local
572 krb5_data scratch; local
[all...]
H A Dmk_cred.c37 krb5_data * scratch; local
40 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch)))
48 pencdata->ciphertext.data = scratch->data;
49 pencdata->ciphertext.length = scratch->length;
50 free(scratch);
57 scratch, pencdata);
66 memset(scratch->data, 0, scratch->length);
67 krb5_free_data(context, scratch);
H A Dcopy_tick.c101 krb5_data *scratch; local
111 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch);
117 tempto->enc_part.ciphertext = *scratch;
118 free(scratch);
H A Dmk_req_ext.c101 krb5_data *scratch = 0; local
225 &scratch)))
231 scratch, &request.authenticator)))
267 if (scratch) {
268 memset(scratch->data, 0, scratch->length);
269 free(scratch->data);
270 free(scratch);
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dcamellia-glue.c139 byte scratch[16]; local
180 camellia_encrypt(&ctx,scratch,plaintext);
181 if(memcmp(scratch,ciphertext_128,sizeof(ciphertext_128))!=0)
183 camellia_decrypt(&ctx,scratch,scratch);
184 if(memcmp(scratch,plaintext,sizeof(plaintext))!=0)
188 camellia_encrypt(&ctx,scratch,plaintext);
189 if(memcmp(scratch,ciphertext_192,sizeof(ciphertext_192))!=0)
191 camellia_decrypt(&ctx,scratch,scratch);
[all...]
H A Drfc2268.c260 unsigned char scratch[16]; local
294 do_encrypt (&ctx, scratch, plaintext_1);
296 if (memcmp (scratch, ciphertext_1, sizeof(ciphertext_1)))
300 do_decrypt (&ctx, scratch, scratch);
301 if (memcmp (scratch, plaintext_1, sizeof(plaintext_1)))
306 do_encrypt (&ctx, scratch, plaintext_2);
307 if (memcmp (scratch, ciphertext_2, sizeof(ciphertext_2)))
311 do_decrypt (&ctx, scratch, scratch);
[all...]
H A Darcfour.c128 byte scratch[16]; local
140 encrypt_stream( &ctx, scratch, plaintext_1, sizeof(plaintext_1));
141 if ( memcmp (scratch, ciphertext_1, sizeof (ciphertext_1)))
144 encrypt_stream(&ctx, scratch, scratch, sizeof(plaintext_1)); /* decrypt */
145 if ( memcmp (scratch, plaintext_1, sizeof (plaintext_1)))
/osnet-11/usr/src/grub/grub2/grub-core/lib/
H A Dreed_solomon.c64 static char *scratch __attribute__ ((section(".text"))) = (void *) 0x100300; variable
67 static char *scratch; variable
223 chosen = (void *) scratch;
224 scratch += n * sizeof (int);
244 scratch -= n * sizeof (int);
265 sigma = (void *) scratch;
266 scratch += rs2 * sizeof (gf_single_t);
267 errpot = (void *) scratch;
268 scratch += rs2 * sizeof (gf_single_t);
269 errpos = (void *) scratch;
[all...]
/osnet-11/usr/src/lib/libexacct/demo/
H A Dexdump.c484 ea_object_t scratch; local
487 if ((res = ea_get_object(ef, &scratch)) == -1) {
493 disp_obj(&scratch, indent + 1);
495 if (scratch.eo_type == EO_GROUP)
496 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1);
498 (void) ea_free_item(&scratch, EUP_ALLOC);
513 ea_object_t scratch; local
540 bzero(&scratch, sizeof (ea_object_t));
541 while (ea_get_object(&ef, &scratch) != -1) {
542 disp_obj(&scratch,
[all...]
/osnet-11/usr/src/common/crypto/ecc/
H A Decp_jm.c66 mp_int *raz4, mp_int scratch[], const ECGroup *group)
71 t0 = &scratch[0];
72 t1 = &scratch[1];
73 M = &scratch[2];
74 S = &scratch[3];
137 mp_int *raz4, mp_int scratch[], const ECGroup *group)
142 A = &scratch[0];
143 B = &scratch[1];
144 C = &scratch[2];
145 D = &scratch[
64 ec_GFp_pt_dbl_jm(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument
134 ec_GFp_pt_add_jm_aff(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, const mp_int *qx, const mp_int *qy, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument
230 mp_int scratch[MAX_SCRATCH]; local
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/
H A Dencrypted_challenge_main.c81 krb5_data scratch; local
82 scratch.length = padata->length;
83 scratch.data = (char *) padata->contents;
88 retval =kaccess.decode_enc_data(&scratch, &enc);
89 scratch.data = NULL;
91 scratch.data = malloc(enc->ciphertext.length);
92 scratch.length = enc->ciphertext.length;
93 if (scratch.data == NULL)
99 enc, &scratch);
105 if (scratch
206 krb5_data scratch, plain; local
[all...]
/osnet-11/usr/src/lib/passwdutil/
H A Dnis_attr.c74 char *scratch; member in struct:__anon2797
178 if (buf->scratch)
179 free(buf->scratch);
272 if (nisbuf->scratch)
273 free(nisbuf->scratch);
330 strlen(name), &(nisbuf->scratch),
334 if (nisbuf->scratch)
335 free(nisbuf->scratch);
342 nis_to_pwd(nisbuf->scratch, nisbuf->pwd);
373 if (nisbuf->scratch)
[all...]
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dsupport.c332 static u_char scratch[1000]; local
334 n = b64_ntop(data, scratch, size, sizeof(scratch));
335 printf("%s: %x %d %s\n", msg, mode, n, scratch);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/
H A Dautouse.t44 eval { croak "It is but a scratch!" };
45 ok( $@, qr/^It is but a scratch!/);

Completed in 116 milliseconds

123