/titanic_44/usr/src/common/net/wanboot/crypt/ |
H A D | des3.c | 109 uint64_t scratch; in des3_keycheck() local 163 scratch = key_so_far; in des3_keycheck() 173 scratch >>= 1; in des3_keycheck() 174 if (scratch & 0x1) /* bit 1 */ in des3_keycheck() 176 scratch >>= 1; in des3_keycheck() 177 if (scratch & 0x1) /* bit 2 */ in des3_keycheck() 179 scratch >>= 1; in des3_keycheck() 180 if (scratch & 0x1) /* bit 3 */ in des3_keycheck() 182 scratch >>= 1; in des3_keycheck() 183 if (scratch & 0x1) /* bit 4 */ in des3_keycheck() [all …]
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | decrypt_tk.c | 47 krb5_data scratch; in krb5_decrypt_tkt_part() local 53 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part() 54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part() 60 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part() 61 free(scratch.data); in krb5_decrypt_tkt_part() 65 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ in krb5_decrypt_tkt_part() 66 free(scratch.data);} in krb5_decrypt_tkt_part() 69 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part); in krb5_decrypt_tkt_part()
|
H A D | kdc_rep_dc.c | 43 krb5_data scratch; in krb5_kdc_rep_decrypt_proc() local 55 scratch.length = dec_rep->enc_part.ciphertext.length; in krb5_kdc_rep_decrypt_proc() 56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { in krb5_kdc_rep_decrypt_proc() 63 &scratch))) { in krb5_kdc_rep_decrypt_proc() 64 free(scratch.data); in krb5_kdc_rep_decrypt_proc() 68 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \ in krb5_kdc_rep_decrypt_proc() 69 free(scratch.data);} in krb5_kdc_rep_decrypt_proc() 72 retval = decode_krb5_enc_kdc_rep_part(&scratch, &local_encpart); in krb5_kdc_rep_decrypt_proc()
|
H A D | send_tgs.c | 61 krb5_data * scratch; in krb5_send_tgs_basic() local 86 if ((retval = encode_krb5_authenticator(&authent, &scratch))) { in krb5_send_tgs_basic() 105 scratch, &request.authenticator))) in krb5_send_tgs_basic() 124 memset(scratch->data, 0, scratch->length); in krb5_send_tgs_basic() 125 free(scratch->data); in krb5_send_tgs_basic() 127 free(scratch); in krb5_send_tgs_basic() 164 krb5_data *scratch, scratch2; in krb5_send_tgs2() local 200 &scratch))) in krb5_send_tgs2() 205 scratch, in krb5_send_tgs2() 208 krb5_free_data(context, scratch); in krb5_send_tgs2() [all …]
|
H A D | rd_rep.c | 49 krb5_data scratch; in krb5_rd_rep() local 61 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep() 62 if (!(scratch.data = malloc(scratch.length))) { in krb5_rd_rep() 69 &reply->enc_part, &scratch))) in krb5_rd_rep() 73 retval = decode_krb5_ap_rep_enc_part(&scratch, repl); in krb5_rd_rep() 110 memset(scratch.data, 0, scratch.length); in krb5_rd_rep() 113 free(scratch.data); in krb5_rd_rep()
|
H A D | preauth.c | 145 krb5_data scratch; in krb5_obtain_padata() local 158 scratch.length = (*pa)->length; in krb5_obtain_padata() 159 scratch.data = (char *) (*pa)->contents; in krb5_obtain_padata() 160 retval = decode_krb5_etype_info(&scratch, &etype_info); in krb5_obtain_padata() 281 krb5_data * scratch; in obtain_enc_ts_padata() local 289 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0) in obtain_enc_ts_padata() 296 scratch, &enc_data))) in obtain_enc_ts_padata() 299 krb5_free_data(context, scratch); in obtain_enc_ts_padata() 300 scratch = 0; in obtain_enc_ts_padata() 302 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) != 0) in obtain_enc_ts_padata() [all …]
|
H A D | encrypt_tk.c | 48 krb5_data *scratch; in krb5_encrypt_tkt_part() local 53 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) { in krb5_encrypt_tkt_part() 57 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ in krb5_encrypt_tkt_part() 58 krb5_free_data(context, scratch); } in krb5_encrypt_tkt_part() 62 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch, in krb5_encrypt_tkt_part()
|
H A D | copy_creds.c | 41 krb5_data *scratch; in krb5_copy_creds() local 60 retval = krb5_copy_data(context, &incred->ticket, &scratch); in krb5_copy_creds() 63 tempcred->ticket = *scratch; in krb5_copy_creds() 64 krb5_xfree(scratch); in krb5_copy_creds() 65 retval = krb5_copy_data(context, &incred->second_ticket, &scratch); in krb5_copy_creds() 69 tempcred->second_ticket = *scratch; in krb5_copy_creds() 70 krb5_xfree(scratch); in krb5_copy_creds()
|
H A D | encode_kdc.c | 52 krb5_data *scratch; in krb5_encode_kdc_rep() local 89 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch); in krb5_encode_kdc_rep() 95 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \ in krb5_encode_kdc_rep() 96 krb5_free_data(context, scratch); } in krb5_encode_kdc_rep() 98 retval = krb5_encrypt_helper(context, client_key, usage, scratch, in krb5_encode_kdc_rep()
|
H A D | rd_cred.c | 24 krb5_data scratch; in decrypt_credencdata() local 26 scratch.length = pcred->enc_part.ciphertext.length; in decrypt_credencdata() 27 if (!(scratch.data = (char *)malloc(scratch.length))) in decrypt_credencdata() 33 &pcred->enc_part, &scratch))) in decrypt_credencdata() 37 (void) memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length); in decrypt_credencdata() 41 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart))) in decrypt_credencdata() 53 (void) memset(scratch.data, 0, scratch.length); in decrypt_credencdata() 54 krb5_xfree(scratch.data); in decrypt_credencdata()
|
H A D | mk_rep.c | 48 krb5_data * scratch; in krb5_mk_rep() local 73 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch))) in krb5_mk_rep() 78 scratch, &reply.enc_part))) in krb5_mk_rep() 92 memset(scratch->data, 0, scratch->length); in krb5_mk_rep() 93 krb5_free_data(context, scratch); in krb5_mk_rep()
|
H A D | rd_priv.c | 64 krb5_data scratch; in krb5_rd_priv_basic() local 85 scratch.length = privmsg->enc_part.ciphertext.length; in krb5_rd_priv_basic() 86 if (!(scratch.data = malloc(scratch.length))) { in krb5_rd_priv_basic() 94 &privmsg->enc_part, &scratch))) in krb5_rd_priv_basic() 98 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part))) in krb5_rd_priv_basic() 144 (void) memset(scratch.data, 0, scratch.length); in krb5_rd_priv_basic() 145 krb5_xfree(scratch.data); in krb5_rd_priv_basic()
|
H A D | mk_req_ext.c | 140 krb5_data *scratch = 0; in krb5_mk_req_extended() local 237 &scratch))) in krb5_mk_req_extended() 250 scratch, &request.authenticator))) in krb5_mk_req_extended() 271 if (scratch) { in krb5_mk_req_extended() 272 memset(scratch->data, 0, scratch->length); in krb5_mk_req_extended() 273 krb5_xfree(scratch->data); in krb5_mk_req_extended() 274 krb5_xfree(scratch); in krb5_mk_req_extended()
|
H A D | mk_cred.c | 34 krb5_data * scratch; in encrypt_credencpart() local 37 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch))) in encrypt_credencpart() 45 pencdata->ciphertext.data = scratch->data; in encrypt_credencpart() 46 pencdata->ciphertext.length = scratch->length; in encrypt_credencpart() 47 krb5_xfree(scratch); in encrypt_credencpart() 54 scratch, pencdata); in encrypt_credencpart() 63 memset(scratch->data, 0, scratch->length); in encrypt_credencpart() 64 krb5_free_data(context, scratch); in encrypt_credencpart()
|
/titanic_44/usr/src/cmd/listen/ |
H A D | lslog.c | 90 char scratch[BUFSIZ]; in error() local 93 strcpy(scratch, err_list[code].err_msg); in error() 94 clean_up(code, exitflag, scratch); in error() 109 char scratch[256]; in tli_error() local 115 (void) snprintf(scratch, sizeof (scratch), "%s: %s", in tli_error() 118 (void) strlcat(scratch, ": ", sizeof (scratch)); in tli_error() 119 (void) strlcat(scratch, strerror(save_errno), sizeof (scratch)); in tli_error() 121 clean_up(code, exitflag, scratch); in tli_error() 132 char scratch[256]; in sys_error() local 134 (void) snprintf(scratch, sizeof (scratch), "%s: %s", in sys_error() [all …]
|
H A D | listen.c | 196 char scratch[BUFSIZ]; in main() local 199 char *scratch_p = scratch; in main() 260 sprintf(scratch, "no netconfig entry for <%s>", Netspec); in main() 261 logmessage(scratch); in main() 286 sprintf(scratch, "%s/%s/%s", ALTDIR, Mytag, DBGNAME); in main() 287 Debugfp = fopen(scratch, "w"); in main() 317 sprintf(scratch, "couldn't open %s, default to GMT", in main() 319 logmessage(scratch); in main() 329 sprintf(scratch, "Listener port monitor tag: %s", Mytag_p); in main() 330 logmessage(scratch); in main() [all …]
|
H A D | nlps_serv.c | 347 char scratch[BUFSIZ]; in nullfix() local 361 sprintf(scratch, "NLPS: nullfix(): unable to PEEK, errno is %d", errno); in nullfix() 363 logmessage(scratch); in nullfix() 394 sprintf(scratch, "NLPS: nullfix(): unable to PEEK second time, errno is %d", errno); in nullfix() 396 logmessage(scratch); in nullfix() 468 char scratch[256]; local 479 sprintf(scratch, badversion, low, high); 480 logmessage(scratch); 495 sprintf(scratch, disabledmsg, svc_code_p); 496 logmessage(scratch); [all …]
|
H A D | lsdbf.c | 201 char scratch[128]; local 247 sprintf(scratch, dbfdupcmsg, svc_code_p); 248 logmessage(scratch); 318 sprintf(scratch, dbfsvccmsg, svc_code_p); 319 logmessage(scratch); 323 sprintf(scratch, "Invalid private address ignored: \\x%x", private_p); 324 logmessage(scratch); 527 char scratch[BUFSIZ]; local 624 sprintf(scratch, "service code <%s> specifies non-integer rpc info", *svc_code_p); 625 logmessage(scratch); [all …]
|
/titanic_44/usr/src/cmd/mdb/common/modules/crypto/ |
H A D | spi.c | 91 char scratch[33]; in crypto_provider_ext_info() local 101 bcopy(ext_prov.ei_label, scratch, CRYPTO_EXT_SIZE_LABEL); in crypto_provider_ext_info() 102 scratch[CRYPTO_EXT_SIZE_LABEL] = '\0'; in crypto_provider_ext_info() 103 mdb_printf("ei_label\t\t%s\n", scratch); in crypto_provider_ext_info() 105 bcopy(ext_prov.ei_manufacturerID, scratch, CRYPTO_EXT_SIZE_MANUF); in crypto_provider_ext_info() 106 scratch[CRYPTO_EXT_SIZE_MANUF] = '\0'; in crypto_provider_ext_info() 107 mdb_printf("ei_manufacturerID\t%s\n", scratch); in crypto_provider_ext_info() 109 bcopy(ext_prov.ei_model, scratch, CRYPTO_EXT_SIZE_MODEL); in crypto_provider_ext_info() 110 scratch[CRYPTO_EXT_SIZE_MODEL] = '\0'; in crypto_provider_ext_info() 111 mdb_printf("ei_model\t\t%s\n", scratch); in crypto_provider_ext_info() [all …]
|
/titanic_44/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 1248 krb5_data scratch; in verify_enc_timestamp() local 1258 scratch.data = (char *) pa->contents; in verify_enc_timestamp() 1259 scratch.length = pa->length; in verify_enc_timestamp() 1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0) in verify_enc_timestamp() 1403 krb5_data * scratch; in etype_info_helper() local 1465 &scratch); in etype_info_helper() 1467 &scratch); in etype_info_helper() 1470 pa_data->contents = (unsigned char *)scratch->data; in etype_info_helper() 1471 pa_data->length = scratch->length; in etype_info_helper() 1472 free(scratch); in etype_info_helper() [all …]
|
/titanic_44/usr/src/common/crypto/ecc/ |
H A D | ecp_jm.c | 66 mp_int *raz4, mp_int scratch[], const ECGroup *group) in ec_GFp_pt_dbl_jm() argument 71 t0 = &scratch[0]; in ec_GFp_pt_dbl_jm() 72 t1 = &scratch[1]; in ec_GFp_pt_dbl_jm() 73 M = &scratch[2]; in ec_GFp_pt_dbl_jm() 74 S = &scratch[3]; in ec_GFp_pt_dbl_jm() 137 mp_int *raz4, mp_int scratch[], const ECGroup *group) in ec_GFp_pt_add_jm_aff() argument 142 A = &scratch[0]; in ec_GFp_pt_add_jm_aff() 143 B = &scratch[1]; in ec_GFp_pt_add_jm_aff() 144 C = &scratch[2]; in ec_GFp_pt_add_jm_aff() 145 D = &scratch[3]; in ec_GFp_pt_add_jm_aff() [all …]
|
/titanic_44/usr/src/cmd/saf/ |
H A D | util.c | 107 char scratch[SIZE]; /* a scratch buffer */ local 125 (void) sprintf(scratch, "tag too long, truncated to <%s>", p); 126 log(scratch); 149 (void) sprintf(scratch, "type too long, truncated to <%s>", p); 150 log(scratch); 180 (void) sprintf(scratch, "Unrecognized flag <%c>", *(p - 1)); 182 log(scratch); 185 error(scratch);
|
/titanic_44/usr/src/lib/libexacct/demo/ |
H A D | exdump.c | 484 ea_object_t scratch; in disp_group() local 487 if ((res = ea_get_object(ef, &scratch)) == -1) { in disp_group() 493 disp_obj(&scratch, indent + 1); in disp_group() 495 if (scratch.eo_type == EO_GROUP) in disp_group() 496 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1); in disp_group() 498 (void) ea_free_item(&scratch, EUP_ALLOC); in disp_group() 513 ea_object_t scratch; in main() local 540 bzero(&scratch, sizeof (ea_object_t)); in main() 541 while (ea_get_object(&ef, &scratch) != -1) { in main() 542 disp_obj(&scratch, 0); in main() [all …]
|
/titanic_44/usr/src/cmd/cpc/common/ |
H A D | cputrack.c | 330 cpc_buf_t **data1, **data2, **scratch; in pinit_lwp() local 364 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in pinit_lwp() 397 cpc_buf_t **data1, **data2, **scratch; in pfini_lwp() local 404 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in pfini_lwp() 405 if (cpc_set_sample(cpc, set, *scratch) == 0) { in pfini_lwp() 411 *data1 = *scratch; in pfini_lwp() 420 cpc_buf_add(cpc, *data1, *data1, *scratch); in pfini_lwp() 451 cpc_buf_t **data1, **data2, **scratch; in plwp_create() local 457 nreq = cpc_setgrp_getbufs(sgrp, &data1, &data2, &scratch); in plwp_create() 473 cpc_buf_t **data1, **data2, **scratch; in plwp_exit() local [all …]
|
/titanic_44/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 73 char *scratch; member 174 if (buf->scratch) in nis_user_to_authenticate() 175 free(buf->scratch); in nis_user_to_authenticate() 267 if (nisbuf->scratch) in nis_getattr() 268 free(nisbuf->scratch); in nis_getattr() 325 strlen(name), &(nisbuf->scratch), in nis_getpwnam() 329 if (nisbuf->scratch) in nis_getpwnam() 330 (void) free(nisbuf->scratch); in nis_getpwnam() 337 nis_to_pwd(nisbuf->scratch, nisbuf->pwd); in nis_getpwnam() 512 if (nisbuf->scratch) in nis_putpwnam() [all …]
|