/illumos-gate/usr/src/cmd/listen/ |
H A D | lslog.c | 88 char scratch[BUFSIZ]; in error() local 91 strcpy(scratch, err_list[code].err_msg); in error() 92 clean_up(code, exitflag, scratch); in error() 107 char scratch[256]; in tli_error() local 113 (void) snprintf(scratch, sizeof (scratch), "%s: %s", in tli_error() 116 (void) strlcat(scratch, ": ", sizeof (scratch)); in tli_error() 117 (void) strlcat(scratch, strerror(save_errno), sizeof (scratch)); in tli_error() 119 clean_up(code, exitflag, scratch); in tli_error() 130 char scratch[256]; in sys_error() local 132 (void) snprintf(scratch, sizeof (scratch), "%s: %s", in sys_error() [all …]
|
H A D | listen.c | 196 char scratch[BUFSIZ]; in main() local 199 char *scratch_p = scratch; in main() 260 sprintf(scratch, "no netconfig entry for <%s>", Netspec); in main() 261 logmessage(scratch); in main() 286 sprintf(scratch, "%s/%s/%s", ALTDIR, Mytag, DBGNAME); in main() 287 Debugfp = fopen(scratch, "w"); in main() 317 sprintf(scratch, "couldn't open %s, default to GMT", in main() 319 logmessage(scratch); in main() 329 sprintf(scratch, "Listener port monitor tag: %s", Mytag_p); in main() 330 logmessage(scratch); in main() [all …]
|
H A D | nlps_serv.c | 345 char scratch[BUFSIZ]; in nullfix() local 359 sprintf(scratch, "NLPS: nullfix(): unable to PEEK, errno is %d", errno); in nullfix() 361 logmessage(scratch); in nullfix() 392 sprintf(scratch, "NLPS: nullfix(): unable to PEEK second time, errno is %d", errno); in nullfix() 394 logmessage(scratch); in nullfix() 466 char scratch[256]; local 477 sprintf(scratch, badversion, low, high); 478 logmessage(scratch); 493 sprintf(scratch, disabledmsg, svc_code_p); 494 logmessage(scratch); [all …]
|
H A D | lsdbf.c | 199 char scratch[128]; local 245 sprintf(scratch, dbfdupcmsg, svc_code_p); 246 logmessage(scratch); 316 sprintf(scratch, dbfsvccmsg, svc_code_p); 317 logmessage(scratch); 321 sprintf(scratch, "Invalid private address ignored: \\x%x", private_p); 322 logmessage(scratch); 525 char scratch[BUFSIZ]; local 622 sprintf(scratch, "service code <%s> specifies non-integer rpc info", *svc_code_p); 623 logmessage(scratch); [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | decrypt_tk.c | 46 krb5_data scratch; in krb5_decrypt_tkt_part() local 52 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part() 53 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part() 59 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part() 60 free(scratch.data); in krb5_decrypt_tkt_part() 64 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ in krb5_decrypt_tkt_part() 65 free(scratch.data);} in krb5_decrypt_tkt_part() 68 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part); in krb5_decrypt_tkt_part()
|
H A D | kdc_rep_dc.c | 43 krb5_data scratch; in krb5_kdc_rep_decrypt_proc() local 55 scratch.length = dec_rep->enc_part.ciphertext.length; in krb5_kdc_rep_decrypt_proc() 56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { in krb5_kdc_rep_decrypt_proc() 63 &scratch))) { in krb5_kdc_rep_decrypt_proc() 64 free(scratch.data); in krb5_kdc_rep_decrypt_proc() 68 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ in krb5_kdc_rep_decrypt_proc() 69 free(scratch.data);} in krb5_kdc_rep_decrypt_proc() 72 retval = decode_krb5_enc_kdc_rep_part(&scratch, &local_encpart); in krb5_kdc_rep_decrypt_proc()
|
H A D | send_tgs.c | 62 krb5_data * scratch; in krb5_send_tgs_basic() local 87 if ((retval = encode_krb5_authenticator(&authent, &scratch))) { in krb5_send_tgs_basic() 106 scratch, &request.authenticator))) in krb5_send_tgs_basic() 125 memset(scratch->data, 0, scratch->length); in krb5_send_tgs_basic() 126 free(scratch->data); in krb5_send_tgs_basic() 128 free(scratch); in krb5_send_tgs_basic() 165 krb5_data *scratch, scratch2; in krb5_send_tgs2() local 207 &scratch))) in krb5_send_tgs2() 212 scratch, in krb5_send_tgs2() 215 krb5_free_data(context, scratch); in krb5_send_tgs2() [all …]
|
H A D | preauth.c | 145 krb5_data scratch; in krb5_obtain_padata() local 158 scratch.length = (*pa)->length; in krb5_obtain_padata() 159 scratch.data = (char *) (*pa)->contents; in krb5_obtain_padata() 160 retval = decode_krb5_etype_info(&scratch, &etype_info); in krb5_obtain_padata() 281 krb5_data * scratch; in obtain_enc_ts_padata() local 289 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0) in obtain_enc_ts_padata() 296 scratch, &enc_data))) in obtain_enc_ts_padata() 299 krb5_free_data(context, scratch); in obtain_enc_ts_padata() 300 scratch = 0; in obtain_enc_ts_padata() 302 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) != 0) in obtain_enc_ts_padata() [all …]
|
H A D | rd_rep.c | 49 krb5_data scratch; in krb5_rd_rep() local 61 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep() 62 if (!(scratch.data = malloc(scratch.length))) { in krb5_rd_rep() 69 &reply->enc_part, &scratch))) in krb5_rd_rep() 73 retval = decode_krb5_ap_rep_enc_part(&scratch, repl); in krb5_rd_rep() 110 memset(scratch.data, 0, scratch.length); in krb5_rd_rep() 113 free(scratch.data); in krb5_rd_rep()
|
H A D | encrypt_tk.c | 47 krb5_data *scratch; in krb5_encrypt_tkt_part() local 52 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) { in krb5_encrypt_tkt_part() 56 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ in krb5_encrypt_tkt_part() 57 krb5_free_data(context, scratch); } in krb5_encrypt_tkt_part() 61 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch, in krb5_encrypt_tkt_part()
|
H A D | copy_creds.c | 41 krb5_data *scratch; in krb5_copy_creds() local 60 retval = krb5_copy_data(context, &incred->ticket, &scratch); in krb5_copy_creds() 63 tempcred->ticket = *scratch; in krb5_copy_creds() 64 krb5_xfree(scratch); in krb5_copy_creds() 65 retval = krb5_copy_data(context, &incred->second_ticket, &scratch); in krb5_copy_creds() 69 tempcred->second_ticket = *scratch; in krb5_copy_creds() 70 krb5_xfree(scratch); in krb5_copy_creds()
|
H A D | rd_cred.c | 24 krb5_data scratch; in decrypt_credencdata() local 26 scratch.length = pcred->enc_part.ciphertext.length; in decrypt_credencdata() 27 if (!(scratch.data = (char *)malloc(scratch.length))) in decrypt_credencdata() 33 &pcred->enc_part, &scratch))) in decrypt_credencdata() 37 (void) memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length); in decrypt_credencdata() 41 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart))) in decrypt_credencdata() 53 (void) memset(scratch.data, 0, scratch.length); in decrypt_credencdata() 54 krb5_xfree(scratch.data); in decrypt_credencdata()
|
H A D | encode_kdc.c | 52 krb5_data *scratch; in krb5_encode_kdc_rep() local 89 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch); in krb5_encode_kdc_rep() 95 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ in krb5_encode_kdc_rep() 96 krb5_free_data(context, scratch); } in krb5_encode_kdc_rep() 98 retval = krb5_encrypt_helper(context, client_key, usage, scratch, in krb5_encode_kdc_rep()
|
H A D | mk_rep.c | 48 krb5_data * scratch; in krb5_mk_rep() local 73 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch))) in krb5_mk_rep() 78 scratch, &reply.enc_part))) in krb5_mk_rep() 92 memset(scratch->data, 0, scratch->length); in krb5_mk_rep() 93 krb5_free_data(context, scratch); in krb5_mk_rep()
|
H A D | rd_priv.c | 64 krb5_data scratch; in krb5_rd_priv_basic() local 85 scratch.length = privmsg->enc_part.ciphertext.length; in krb5_rd_priv_basic() 86 if (!(scratch.data = malloc(scratch.length))) { in krb5_rd_priv_basic() 94 &privmsg->enc_part, &scratch))) in krb5_rd_priv_basic() 98 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part))) in krb5_rd_priv_basic() 144 (void) memset(scratch.data, 0, scratch.length); in krb5_rd_priv_basic() 145 krb5_xfree(scratch.data); in krb5_rd_priv_basic()
|
H A D | mk_req_ext.c | 140 krb5_data *scratch = 0; in krb5_mk_req_extended() local 237 &scratch))) in krb5_mk_req_extended() 250 scratch, &request.authenticator))) in krb5_mk_req_extended() 271 if (scratch) { in krb5_mk_req_extended() 272 memset(scratch->data, 0, scratch->length); in krb5_mk_req_extended() 273 krb5_xfree(scratch->data); in krb5_mk_req_extended() 274 krb5_xfree(scratch); in krb5_mk_req_extended()
|
H A D | mk_cred.c | 34 krb5_data * scratch; in encrypt_credencpart() local 37 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch))) in encrypt_credencpart() 45 pencdata->ciphertext.data = scratch->data; in encrypt_credencpart() 46 pencdata->ciphertext.length = scratch->length; in encrypt_credencpart() 47 krb5_xfree(scratch); in encrypt_credencpart() 54 scratch, pencdata); in encrypt_credencpart() 63 memset(scratch->data, 0, scratch->length); in encrypt_credencpart() 64 krb5_free_data(context, scratch); in encrypt_credencpart()
|
H A D | preauth2.c | 785 krb5_data * scratch; in pa_sam() local 971 &scratch))) in pa_sam() 980 scratch->length, &enclen))) { in pa_sam() 981 krb5_free_data(context, scratch); in pa_sam() 993 krb5_free_data(context, scratch); in pa_sam() 998 scratch, enc_data))) { in pa_sam() 1004 krb5_free_data(context, scratch); in pa_sam() 1015 if ((ret = encode_krb5_sam_response(&sam_response, &scratch))) { in pa_sam() 1022 pa->length = scratch->length; in pa_sam() 1023 pa->contents = (krb5_octet *) scratch->data; in pa_sam() [all …]
|
/illumos-gate/usr/src/cmd/mdb/common/modules/crypto/ |
H A D | spi.c | 95 char scratch[33]; in crypto_provider_ext_info() local 105 bcopy(ext_prov.ei_label, scratch, CRYPTO_EXT_SIZE_LABEL); in crypto_provider_ext_info() 106 scratch[CRYPTO_EXT_SIZE_LABEL] = '\0'; in crypto_provider_ext_info() 107 mdb_printf("ei_label\t\t%s\n", scratch); in crypto_provider_ext_info() 109 bcopy(ext_prov.ei_manufacturerID, scratch, CRYPTO_EXT_SIZE_MANUF); in crypto_provider_ext_info() 110 scratch[CRYPTO_EXT_SIZE_MANUF] = '\0'; in crypto_provider_ext_info() 111 mdb_printf("ei_manufacturerID\t%s\n", scratch); in crypto_provider_ext_info() 113 bcopy(ext_prov.ei_model, scratch, CRYPTO_EXT_SIZE_MODEL); in crypto_provider_ext_info() 114 scratch[CRYPTO_EXT_SIZE_MODEL] = '\0'; in crypto_provider_ext_info() 115 mdb_printf("ei_model\t\t%s\n", scratch); in crypto_provider_ext_info() [all …]
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 1248 krb5_data scratch; in verify_enc_timestamp() local 1258 scratch.data = (char *) pa->contents; in verify_enc_timestamp() 1259 scratch.length = pa->length; in verify_enc_timestamp() 1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0) in verify_enc_timestamp() 1403 krb5_data * scratch; in etype_info_helper() local 1465 &scratch); in etype_info_helper() 1467 &scratch); in etype_info_helper() 1470 pa_data->contents = (unsigned char *)scratch->data; in etype_info_helper() 1471 pa_data->length = scratch->length; in etype_info_helper() 1472 free(scratch); in etype_info_helper() [all …]
|
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | ecp_jm.c | 64 mp_int *raz4, mp_int scratch[], const ECGroup *group) in ec_GFp_pt_dbl_jm() argument 69 t0 = &scratch[0]; in ec_GFp_pt_dbl_jm() 70 t1 = &scratch[1]; in ec_GFp_pt_dbl_jm() 71 M = &scratch[2]; in ec_GFp_pt_dbl_jm() 72 S = &scratch[3]; in ec_GFp_pt_dbl_jm() 135 mp_int *raz4, mp_int scratch[], const ECGroup *group) in ec_GFp_pt_add_jm_aff() argument 140 A = &scratch[0]; in ec_GFp_pt_add_jm_aff() 141 B = &scratch[1]; in ec_GFp_pt_add_jm_aff() 142 C = &scratch[2]; in ec_GFp_pt_add_jm_aff() 143 D = &scratch[3]; in ec_GFp_pt_add_jm_aff() [all …]
|
/illumos-gate/usr/src/lib/libexacct/demo/ |
H A D | exdump.c | 482 ea_object_t scratch; in disp_group() local 485 if ((res = ea_get_object(ef, &scratch)) == -1) { in disp_group() 491 disp_obj(&scratch, indent + 1); in disp_group() 493 if (scratch.eo_type == EO_GROUP) in disp_group() 494 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1); in disp_group() 496 (void) ea_free_item(&scratch, EUP_ALLOC); in disp_group() 511 ea_object_t scratch; in main() local 538 bzero(&scratch, sizeof (ea_object_t)); in main() 539 while (ea_get_object(&ef, &scratch) != -1) { in main() 540 disp_obj(&scratch, 0); in main() [all …]
|
/illumos-gate/usr/src/cmd/cpc/common/ |
H A D | cputrack.c | 326 cpc_buf_t **data1, **data2, **scratch; in pinit_lwp() local 360 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in pinit_lwp() 389 cpc_buf_t **data1, **data2, **scratch; in pfini_lwp() local 396 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in pfini_lwp() 397 if (cpc_set_sample(cpc, set, *scratch) == 0) { in pfini_lwp() 403 *data1 = *scratch; in pfini_lwp() 412 cpc_buf_add(cpc, *data1, *data1, *scratch); in pfini_lwp() 443 cpc_buf_t **data1, **data2, **scratch; in plwp_create() local 449 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in plwp_create() 465 cpc_buf_t **data1, **data2, **scratch; in plwp_exit() local [all …]
|
H A D | setgrp.c | 52 cpc_buf_t *scratch; member 184 (sgrp->sets[sgrp->nelem].scratch = cpc_buf_create(sgrp->cpc, set)) in cpc_setgrp_newset() 199 cpc_buf_t ***scratch) in cpc_setgrp_getbufs() argument 206 *scratch = &(sgrp->sets[sgrp->current].scratch); in cpc_setgrp_getbufs() 243 newa[i].scratch = cpc_buf_create(old->cpc, newa[i].set); in cpc_setgrp_clone() 245 newa[i].scratch == NULL) { in cpc_setgrp_clone() 252 cpc_buf_copy(old->cpc, newa[i].scratch, old->sets[i].scratch); in cpc_setgrp_clone() 271 (void) cpc_buf_destroy(sgrp->cpc, sgrp->sets[sgrp->current].scratch); in cpc_setgrp_delset()
|
/illumos-gate/usr/src/cmd/saf/ |
H A D | util.c | 104 char scratch[SIZE]; /* a scratch buffer */ local 122 (void) sprintf(scratch, "tag too long, truncated to <%s>", p); 123 log(scratch); 146 (void) sprintf(scratch, "type too long, truncated to <%s>", p); 147 log(scratch); 177 (void) sprintf(scratch, "Unrecognized flag <%c>", *(p - 1)); 179 log(scratch); 182 error(scratch);
|