Home
last modified time | relevance | path

Searched refs:scratch (Results 1 – 25 of 156) sorted by relevance

1234567

/titanic_44/usr/src/common/net/wanboot/crypt/
H A Ddes3.c109 uint64_t scratch; in des3_keycheck() local
163 scratch = key_so_far; in des3_keycheck()
173 scratch >>= 1; in des3_keycheck()
174 if (scratch & 0x1) /* bit 1 */ in des3_keycheck()
176 scratch >>= 1; in des3_keycheck()
177 if (scratch & 0x1) /* bit 2 */ in des3_keycheck()
179 scratch >>= 1; in des3_keycheck()
180 if (scratch & 0x1) /* bit 3 */ in des3_keycheck()
182 scratch >>= 1; in des3_keycheck()
183 if (scratch & 0x1) /* bit 4 */ in des3_keycheck()
[all …]
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Ddecrypt_tk.c47 krb5_data scratch; in krb5_decrypt_tkt_part() local
53 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part()
54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part()
60 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part()
61 free(scratch.data); in krb5_decrypt_tkt_part()
65 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ in krb5_decrypt_tkt_part()
66 free(scratch.data);} in krb5_decrypt_tkt_part()
69 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part); in krb5_decrypt_tkt_part()
H A Dkdc_rep_dc.c43 krb5_data scratch; in krb5_kdc_rep_decrypt_proc() local
55 scratch.length = dec_rep->enc_part.ciphertext.length; in krb5_kdc_rep_decrypt_proc()
56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { in krb5_kdc_rep_decrypt_proc()
63 &scratch))) { in krb5_kdc_rep_decrypt_proc()
64 free(scratch.data); in krb5_kdc_rep_decrypt_proc()
68 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ in krb5_kdc_rep_decrypt_proc()
69 free(scratch.data);} in krb5_kdc_rep_decrypt_proc()
72 retval = decode_krb5_enc_kdc_rep_part(&scratch, &local_encpart); in krb5_kdc_rep_decrypt_proc()
H A Dsend_tgs.c61 krb5_data * scratch; in krb5_send_tgs_basic() local
86 if ((retval = encode_krb5_authenticator(&authent, &scratch))) { in krb5_send_tgs_basic()
105 scratch, &request.authenticator))) in krb5_send_tgs_basic()
124 memset(scratch->data, 0, scratch->length); in krb5_send_tgs_basic()
125 free(scratch->data); in krb5_send_tgs_basic()
127 free(scratch); in krb5_send_tgs_basic()
164 krb5_data *scratch, scratch2; in krb5_send_tgs2() local
200 &scratch))) in krb5_send_tgs2()
205 scratch, in krb5_send_tgs2()
208 krb5_free_data(context, scratch); in krb5_send_tgs2()
[all …]
H A Drd_rep.c49 krb5_data scratch; in krb5_rd_rep() local
61 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep()
62 if (!(scratch.data = malloc(scratch.length))) { in krb5_rd_rep()
69 &reply->enc_part, &scratch))) in krb5_rd_rep()
73 retval = decode_krb5_ap_rep_enc_part(&scratch, repl); in krb5_rd_rep()
110 memset(scratch.data, 0, scratch.length); in krb5_rd_rep()
113 free(scratch.data); in krb5_rd_rep()
H A Dpreauth.c145 krb5_data scratch; in krb5_obtain_padata() local
158 scratch.length = (*pa)->length; in krb5_obtain_padata()
159 scratch.data = (char *) (*pa)->contents; in krb5_obtain_padata()
160 retval = decode_krb5_etype_info(&scratch, &etype_info); in krb5_obtain_padata()
281 krb5_data * scratch; in obtain_enc_ts_padata() local
289 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0) in obtain_enc_ts_padata()
296 scratch, &enc_data))) in obtain_enc_ts_padata()
299 krb5_free_data(context, scratch); in obtain_enc_ts_padata()
300 scratch = 0; in obtain_enc_ts_padata()
302 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) != 0) in obtain_enc_ts_padata()
[all …]
H A Dencrypt_tk.c48 krb5_data *scratch; in krb5_encrypt_tkt_part() local
53 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) { in krb5_encrypt_tkt_part()
57 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ in krb5_encrypt_tkt_part()
58 krb5_free_data(context, scratch); } in krb5_encrypt_tkt_part()
62 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch, in krb5_encrypt_tkt_part()
H A Dcopy_creds.c41 krb5_data *scratch; in krb5_copy_creds() local
60 retval = krb5_copy_data(context, &incred->ticket, &scratch); in krb5_copy_creds()
63 tempcred->ticket = *scratch; in krb5_copy_creds()
64 krb5_xfree(scratch); in krb5_copy_creds()
65 retval = krb5_copy_data(context, &incred->second_ticket, &scratch); in krb5_copy_creds()
69 tempcred->second_ticket = *scratch; in krb5_copy_creds()
70 krb5_xfree(scratch); in krb5_copy_creds()
H A Dencode_kdc.c52 krb5_data *scratch; in krb5_encode_kdc_rep() local
89 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch); in krb5_encode_kdc_rep()
95 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ in krb5_encode_kdc_rep()
96 krb5_free_data(context, scratch); } in krb5_encode_kdc_rep()
98 retval = krb5_encrypt_helper(context, client_key, usage, scratch, in krb5_encode_kdc_rep()
H A Drd_cred.c24 krb5_data scratch; in decrypt_credencdata() local
26 scratch.length = pcred->enc_part.ciphertext.length; in decrypt_credencdata()
27 if (!(scratch.data = (char *)malloc(scratch.length))) in decrypt_credencdata()
33 &pcred->enc_part, &scratch))) in decrypt_credencdata()
37 (void) memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length); in decrypt_credencdata()
41 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart))) in decrypt_credencdata()
53 (void) memset(scratch.data, 0, scratch.length); in decrypt_credencdata()
54 krb5_xfree(scratch.data); in decrypt_credencdata()
H A Dmk_rep.c48 krb5_data * scratch; in krb5_mk_rep() local
73 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch))) in krb5_mk_rep()
78 scratch, &reply.enc_part))) in krb5_mk_rep()
92 memset(scratch->data, 0, scratch->length); in krb5_mk_rep()
93 krb5_free_data(context, scratch); in krb5_mk_rep()
H A Drd_priv.c64 krb5_data scratch; in krb5_rd_priv_basic() local
85 scratch.length = privmsg->enc_part.ciphertext.length; in krb5_rd_priv_basic()
86 if (!(scratch.data = malloc(scratch.length))) { in krb5_rd_priv_basic()
94 &privmsg->enc_part, &scratch))) in krb5_rd_priv_basic()
98 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part))) in krb5_rd_priv_basic()
144 (void) memset(scratch.data, 0, scratch.length); in krb5_rd_priv_basic()
145 krb5_xfree(scratch.data); in krb5_rd_priv_basic()
H A Dmk_req_ext.c140 krb5_data *scratch = 0; in krb5_mk_req_extended() local
237 &scratch))) in krb5_mk_req_extended()
250 scratch, &request.authenticator))) in krb5_mk_req_extended()
271 if (scratch) { in krb5_mk_req_extended()
272 memset(scratch->data, 0, scratch->length); in krb5_mk_req_extended()
273 krb5_xfree(scratch->data); in krb5_mk_req_extended()
274 krb5_xfree(scratch); in krb5_mk_req_extended()
H A Dmk_cred.c34 krb5_data * scratch; in encrypt_credencpart() local
37 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch))) in encrypt_credencpart()
45 pencdata->ciphertext.data = scratch->data; in encrypt_credencpart()
46 pencdata->ciphertext.length = scratch->length; in encrypt_credencpart()
47 krb5_xfree(scratch); in encrypt_credencpart()
54 scratch, pencdata); in encrypt_credencpart()
63 memset(scratch->data, 0, scratch->length); in encrypt_credencpart()
64 krb5_free_data(context, scratch); in encrypt_credencpart()
/titanic_44/usr/src/cmd/listen/
H A Dlslog.c90 char scratch[BUFSIZ]; in error() local
93 strcpy(scratch, err_list[code].err_msg); in error()
94 clean_up(code, exitflag, scratch); in error()
109 char scratch[256]; in tli_error() local
115 (void) snprintf(scratch, sizeof (scratch), "%s: %s", in tli_error()
118 (void) strlcat(scratch, ": ", sizeof (scratch)); in tli_error()
119 (void) strlcat(scratch, strerror(save_errno), sizeof (scratch)); in tli_error()
121 clean_up(code, exitflag, scratch); in tli_error()
132 char scratch[256]; in sys_error() local
134 (void) snprintf(scratch, sizeof (scratch), "%s: %s", in sys_error()
[all …]
H A Dlisten.c196 char scratch[BUFSIZ]; in main() local
199 char *scratch_p = scratch; in main()
260 sprintf(scratch, "no netconfig entry for <%s>", Netspec); in main()
261 logmessage(scratch); in main()
286 sprintf(scratch, "%s/%s/%s", ALTDIR, Mytag, DBGNAME); in main()
287 Debugfp = fopen(scratch, "w"); in main()
317 sprintf(scratch, "couldn't open %s, default to GMT", in main()
319 logmessage(scratch); in main()
329 sprintf(scratch, "Listener port monitor tag: %s", Mytag_p); in main()
330 logmessage(scratch); in main()
[all …]
H A Dnlps_serv.c347 char scratch[BUFSIZ]; in nullfix() local
361 sprintf(scratch, "NLPS: nullfix(): unable to PEEK, errno is %d", errno); in nullfix()
363 logmessage(scratch); in nullfix()
394 sprintf(scratch, "NLPS: nullfix(): unable to PEEK second time, errno is %d", errno); in nullfix()
396 logmessage(scratch); in nullfix()
468 char scratch[256]; local
479 sprintf(scratch, badversion, low, high);
480 logmessage(scratch);
495 sprintf(scratch, disabledmsg, svc_code_p);
496 logmessage(scratch);
[all …]
H A Dlsdbf.c201 char scratch[128]; local
247 sprintf(scratch, dbfdupcmsg, svc_code_p);
248 logmessage(scratch);
318 sprintf(scratch, dbfsvccmsg, svc_code_p);
319 logmessage(scratch);
323 sprintf(scratch, "Invalid private address ignored: \\x%x", private_p);
324 logmessage(scratch);
527 char scratch[BUFSIZ]; local
624 sprintf(scratch, "service code <%s> specifies non-integer rpc info", *svc_code_p);
625 logmessage(scratch);
[all …]
/titanic_44/usr/src/cmd/mdb/common/modules/crypto/
H A Dspi.c91 char scratch[33]; in crypto_provider_ext_info() local
101 bcopy(ext_prov.ei_label, scratch, CRYPTO_EXT_SIZE_LABEL); in crypto_provider_ext_info()
102 scratch[CRYPTO_EXT_SIZE_LABEL] = '\0'; in crypto_provider_ext_info()
103 mdb_printf("ei_label\t\t%s\n", scratch); in crypto_provider_ext_info()
105 bcopy(ext_prov.ei_manufacturerID, scratch, CRYPTO_EXT_SIZE_MANUF); in crypto_provider_ext_info()
106 scratch[CRYPTO_EXT_SIZE_MANUF] = '\0'; in crypto_provider_ext_info()
107 mdb_printf("ei_manufacturerID\t%s\n", scratch); in crypto_provider_ext_info()
109 bcopy(ext_prov.ei_model, scratch, CRYPTO_EXT_SIZE_MODEL); in crypto_provider_ext_info()
110 scratch[CRYPTO_EXT_SIZE_MODEL] = '\0'; in crypto_provider_ext_info()
111 mdb_printf("ei_model\t\t%s\n", scratch); in crypto_provider_ext_info()
[all …]
/titanic_44/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c1248 krb5_data scratch; in verify_enc_timestamp() local
1258 scratch.data = (char *) pa->contents; in verify_enc_timestamp()
1259 scratch.length = pa->length; in verify_enc_timestamp()
1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0) in verify_enc_timestamp()
1403 krb5_data * scratch; in etype_info_helper() local
1465 &scratch); in etype_info_helper()
1467 &scratch); in etype_info_helper()
1470 pa_data->contents = (unsigned char *)scratch->data; in etype_info_helper()
1471 pa_data->length = scratch->length; in etype_info_helper()
1472 free(scratch); in etype_info_helper()
[all …]
/titanic_44/usr/src/common/crypto/ecc/
H A Decp_jm.c66 mp_int *raz4, mp_int scratch[], const ECGroup *group) in ec_GFp_pt_dbl_jm() argument
71 t0 = &scratch[0]; in ec_GFp_pt_dbl_jm()
72 t1 = &scratch[1]; in ec_GFp_pt_dbl_jm()
73 M = &scratch[2]; in ec_GFp_pt_dbl_jm()
74 S = &scratch[3]; in ec_GFp_pt_dbl_jm()
137 mp_int *raz4, mp_int scratch[], const ECGroup *group) in ec_GFp_pt_add_jm_aff() argument
142 A = &scratch[0]; in ec_GFp_pt_add_jm_aff()
143 B = &scratch[1]; in ec_GFp_pt_add_jm_aff()
144 C = &scratch[2]; in ec_GFp_pt_add_jm_aff()
145 D = &scratch[3]; in ec_GFp_pt_add_jm_aff()
[all …]
/titanic_44/usr/src/cmd/saf/
H A Dutil.c107 char scratch[SIZE]; /* a scratch buffer */ local
125 (void) sprintf(scratch, "tag too long, truncated to <%s>", p);
126 log(scratch);
149 (void) sprintf(scratch, "type too long, truncated to <%s>", p);
150 log(scratch);
180 (void) sprintf(scratch, "Unrecognized flag <%c>", *(p - 1));
182 log(scratch);
185 error(scratch);
/titanic_44/usr/src/lib/libexacct/demo/
H A Dexdump.c484 ea_object_t scratch; in disp_group() local
487 if ((res = ea_get_object(ef, &scratch)) == -1) { in disp_group()
493 disp_obj(&scratch, indent + 1); in disp_group()
495 if (scratch.eo_type == EO_GROUP) in disp_group()
496 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1); in disp_group()
498 (void) ea_free_item(&scratch, EUP_ALLOC); in disp_group()
513 ea_object_t scratch; in main() local
540 bzero(&scratch, sizeof (ea_object_t)); in main()
541 while (ea_get_object(&ef, &scratch) != -1) { in main()
542 disp_obj(&scratch, 0); in main()
[all …]
/titanic_44/usr/src/cmd/cpc/common/
H A Dcputrack.c330 cpc_buf_t **data1, **data2, **scratch; in pinit_lwp() local
364 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in pinit_lwp()
397 cpc_buf_t **data1, **data2, **scratch; in pfini_lwp() local
404 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in pfini_lwp()
405 if (cpc_set_sample(cpc, set, *scratch) == 0) { in pfini_lwp()
411 *data1 = *scratch; in pfini_lwp()
420 cpc_buf_add(cpc, *data1, *data1, *scratch); in pfini_lwp()
451 cpc_buf_t **data1, **data2, **scratch; in plwp_create() local
457 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in plwp_create()
473 cpc_buf_t **data1, **data2, **scratch; in plwp_exit() local
[all …]
/titanic_44/usr/src/lib/passwdutil/
H A Dnis_attr.c73 char *scratch; member
174 if (buf->scratch) in nis_user_to_authenticate()
175 free(buf->scratch); in nis_user_to_authenticate()
267 if (nisbuf->scratch) in nis_getattr()
268 free(nisbuf->scratch); in nis_getattr()
325 strlen(name), &(nisbuf->scratch), in nis_getpwnam()
329 if (nisbuf->scratch) in nis_getpwnam()
330 (void) free(nisbuf->scratch); in nis_getpwnam()
337 nis_to_pwd(nisbuf->scratch, nisbuf->pwd); in nis_getpwnam()
512 if (nisbuf->scratch) in nis_putpwnam()
[all …]

1234567