/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encrypt_tk.c | 48 krb5_data *scratch; local 53 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) { 57 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ 58 krb5_free_data(context, scratch); } 62 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch,
|
H A D | decrypt_tk.c | 46 krb5_data scratch; local 55 scratch.length = ticket->enc_part.ciphertext.length; 56 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) 62 &ticket->enc_part, &scratch))) { 63 free(scratch.data); 67 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ 68 free(scratch.data);} 71 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part);
|
H A D | kdc_rep_dc.c | 44 krb5_data scratch; local 54 /* set up scratch decrypt/decode area */ 56 scratch.length = dec_rep->enc_part.ciphertext.length; 57 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { 64 &scratch))) { 65 free(scratch.data); 69 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ 70 free(scratch.data);} 73 retval = decode_krb5_enc_kdc_rep_part(&scratch, [all...] |
H A D | rd_rep.c | 85 krb5_data scratch; local 98 scratch.length = reply->enc_part.ciphertext.length; 99 scratch.data = malloc(scratch.length); 100 if (scratch.data == NULL) { 107 &reply->enc_part, &scratch); 115 retval = decode_krb5_ap_rep_enc_part(&scratch, &enc); 152 if (scratch.data) 153 memset(scratch.data, 0, scratch 166 krb5_data scratch; local [all...] |
H A D | encode_kdc.c | 55 krb5_data *scratch; local 92 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch); 98 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ 99 krb5_free_data(context, scratch); } 101 retval = krb5_encrypt_helper(context, client_key, usage, scratch,
|
H A D | copy_creds.c | 65 krb5_data *scratch; local 81 retval = krb5_copy_data(context, &incred->ticket, &scratch); 84 tempcred->ticket = *scratch; 85 free(scratch); 86 retval = krb5_copy_data(context, &incred->second_ticket, &scratch); 90 tempcred->second_ticket = *scratch; 91 free(scratch);
|
H A D | preauth.c | 133 krb5_data scratch; local 146 scratch.length = (*pa)->length; 147 scratch.data = (char *) (*pa)->contents; 148 retval = decode_krb5_etype_info(&scratch, &etype_info); 269 krb5_data * scratch; local 277 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0) 284 scratch, &enc_data))) 287 krb5_free_data(context, scratch); 288 scratch = 0; 290 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) ! 446 krb5_data * scratch = 0; local [all...] |
H A D | mk_rep.c | 83 krb5_data * scratch; local 123 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch))) 128 scratch, &reply.enc_part))) 144 memset(scratch->data, 0, scratch->length); 145 krb5_free_data(context, scratch);
|
H A D | send_tgs.c | 64 krb5_data * scratch = NULL; local 107 if ((retval = encode_krb5_authenticator(&authent, &scratch))) 115 /* Cleanup scratch and scratch data */ 121 scratch, &request.authenticator))) 140 if (scratch != NULL && scratch->data != NULL) { 141 zap(scratch->data, scratch->length); 142 free(scratch 185 krb5_data *scratch, scratch2; local [all...] |
H A D | rd_cred.c | 29 krb5_data scratch; local 31 scratch.length = pcred->enc_part.ciphertext.length; 32 if (!(scratch.data = (char *)malloc(scratch.length))) 38 &pcred->enc_part, &scratch))) 41 memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length); 45 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart))) 56 memset(scratch.data, 0, scratch [all...] |
H A D | rd_priv.c | 70 krb5_data scratch; local 92 scratch.length = privmsg->enc_part.ciphertext.length; 93 if (!(scratch.data = malloc(scratch.length))) { 101 &privmsg->enc_part, &scratch))) { 108 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part))) 156 memset(scratch.data, 0, scratch.length); 157 free(scratch.data);
|
H A D | fast.c | 288 krb5_data scratch; local 298 scratch.data = (char *) fx_reply->contents; 299 scratch.length = fx_reply->length; 300 retval = decode_krb5_pa_fx_fast_reply(&scratch, &encrypted_response); 302 scratch.data = NULL; 304 scratch.data = malloc(encrypted_response->ciphertext.length); 305 if (scratch.data == NULL) 307 scratch.length = encrypted_response->ciphertext.length; 312 encrypted_response, &scratch); 320 retval = decode_krb5_fast_response(&scratch, 367 krb5_data scratch, *encoded_td = NULL; local 572 krb5_data scratch; local [all...] |
H A D | mk_cred.c | 37 krb5_data * scratch; local 40 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch))) 48 pencdata->ciphertext.data = scratch->data; 49 pencdata->ciphertext.length = scratch->length; 50 free(scratch); 57 scratch, pencdata); 66 memset(scratch->data, 0, scratch->length); 67 krb5_free_data(context, scratch);
|
H A D | copy_tick.c | 101 krb5_data *scratch; local 111 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); 117 tempto->enc_part.ciphertext = *scratch; 118 free(scratch);
|
H A D | mk_req_ext.c | 101 krb5_data *scratch = 0; local 225 &scratch))) 231 scratch, &request.authenticator))) 267 if (scratch) { 268 memset(scratch->data, 0, scratch->length); 269 free(scratch->data); 270 free(scratch);
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | camellia-glue.c | 139 byte scratch[16]; local 180 camellia_encrypt(&ctx,scratch,plaintext); 181 if(memcmp(scratch,ciphertext_128,sizeof(ciphertext_128))!=0) 183 camellia_decrypt(&ctx,scratch,scratch); 184 if(memcmp(scratch,plaintext,sizeof(plaintext))!=0) 188 camellia_encrypt(&ctx,scratch,plaintext); 189 if(memcmp(scratch,ciphertext_192,sizeof(ciphertext_192))!=0) 191 camellia_decrypt(&ctx,scratch,scratch); [all...] |
H A D | rfc2268.c | 260 unsigned char scratch[16]; local 294 do_encrypt (&ctx, scratch, plaintext_1); 296 if (memcmp (scratch, ciphertext_1, sizeof(ciphertext_1))) 300 do_decrypt (&ctx, scratch, scratch); 301 if (memcmp (scratch, plaintext_1, sizeof(plaintext_1))) 306 do_encrypt (&ctx, scratch, plaintext_2); 307 if (memcmp (scratch, ciphertext_2, sizeof(ciphertext_2))) 311 do_decrypt (&ctx, scratch, scratch); [all...] |
H A D | arcfour.c | 128 byte scratch[16]; local 140 encrypt_stream( &ctx, scratch, plaintext_1, sizeof(plaintext_1)); 141 if ( memcmp (scratch, ciphertext_1, sizeof (ciphertext_1))) 144 encrypt_stream(&ctx, scratch, scratch, sizeof(plaintext_1)); /* decrypt */ 145 if ( memcmp (scratch, plaintext_1, sizeof (plaintext_1)))
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/ |
H A D | reed_solomon.c | 64 static char *scratch __attribute__ ((section(".text"))) = (void *) 0x100300; variable 67 static char *scratch; variable 223 chosen = (void *) scratch; 224 scratch += n * sizeof (int); 244 scratch -= n * sizeof (int); 265 sigma = (void *) scratch; 266 scratch += rs2 * sizeof (gf_single_t); 267 errpot = (void *) scratch; 268 scratch += rs2 * sizeof (gf_single_t); 269 errpos = (void *) scratch; [all...] |
/osnet-11/usr/src/lib/libexacct/demo/ |
H A D | exdump.c | 484 ea_object_t scratch; local 487 if ((res = ea_get_object(ef, &scratch)) == -1) { 493 disp_obj(&scratch, indent + 1); 495 if (scratch.eo_type == EO_GROUP) 496 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1); 498 (void) ea_free_item(&scratch, EUP_ALLOC); 513 ea_object_t scratch; local 540 bzero(&scratch, sizeof (ea_object_t)); 541 while (ea_get_object(&ef, &scratch) != -1) { 542 disp_obj(&scratch, [all...] |
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | ecp_jm.c | 66 mp_int *raz4, mp_int scratch[], const ECGroup *group) 71 t0 = &scratch[0]; 72 t1 = &scratch[1]; 73 M = &scratch[2]; 74 S = &scratch[3]; 137 mp_int *raz4, mp_int scratch[], const ECGroup *group) 142 A = &scratch[0]; 143 B = &scratch[1]; 144 C = &scratch[2]; 145 D = &scratch[ 64 ec_GFp_pt_dbl_jm(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument 134 ec_GFp_pt_add_jm_aff(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, const mp_int *qx, const mp_int *qy, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument 230 mp_int scratch[MAX_SCRATCH]; local [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 81 krb5_data scratch; local 82 scratch.length = padata->length; 83 scratch.data = (char *) padata->contents; 88 retval =kaccess.decode_enc_data(&scratch, &enc); 89 scratch.data = NULL; 91 scratch.data = malloc(enc->ciphertext.length); 92 scratch.length = enc->ciphertext.length; 93 if (scratch.data == NULL) 99 enc, &scratch); 105 if (scratch 206 krb5_data scratch, plain; local [all...] |
/osnet-11/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 74 char *scratch; member in struct:__anon2797 178 if (buf->scratch) 179 free(buf->scratch); 272 if (nisbuf->scratch) 273 free(nisbuf->scratch); 330 strlen(name), &(nisbuf->scratch), 334 if (nisbuf->scratch) 335 free(nisbuf->scratch); 342 nis_to_pwd(nisbuf->scratch, nisbuf->pwd); 373 if (nisbuf->scratch) [all...] |
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | support.c | 332 static u_char scratch[1000]; local 334 n = b64_ntop(data, scratch, size, sizeof(scratch)); 335 printf("%s: %x %d %s\n", msg, mode, n, scratch);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ |
H A D | autouse.t | 44 eval { croak "It is but a scratch!" }; 45 ok( $@, qr/^It is but a scratch!/);
|