Searched refs:scratch (Results 1 - 25 of 132) sorted by relevance

123456

/illumos-gate/usr/src/test/util-tests/tests/awk/gnu/
H A Dprmreuse.awk10 function legit( scratch)
12 split("1 2 3", scratch)
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dencrypt_tk.c48 krb5_data *scratch; local
53 if ((retval = encode_krb5_enc_tkt_part(dec_tkt_part, &scratch))) {
57 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \
58 krb5_free_data(context, scratch); }
62 KRB5_KEYUSAGE_KDC_REP_TICKET, scratch,
H A Ddecrypt_tk.c47 krb5_data scratch; local
53 scratch.length = ticket->enc_part.ciphertext.length;
54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
60 &ticket->enc_part, &scratch))) {
61 free(scratch.data);
65 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \
66 free(scratch.data);}
69 retval = decode_krb5_enc_tkt_part(&scratch, &dec_tkt_part);
H A Dkdc_rep_dc.c43 krb5_data scratch; local
53 /* set up scratch decrypt/decode area */
55 scratch.length = dec_rep->enc_part.ciphertext.length;
56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) {
63 &scratch))) {
64 free(scratch.data);
68 #define clean_scratch() {memset(scratch.data, 0, scratch.length); \
69 free(scratch.data);}
72 retval = decode_krb5_enc_kdc_rep_part(&scratch,
[all...]
H A Drd_rep.c49 krb5_data scratch; local
61 scratch.length = reply->enc_part.ciphertext.length;
62 if (!(scratch.data = malloc(scratch.length))) {
69 &reply->enc_part, &scratch)))
73 retval = decode_krb5_ap_rep_enc_part(&scratch, repl);
110 memset(scratch.data, 0, scratch.length);
113 free(scratch.data);
H A Dencode_kdc.c52 krb5_data *scratch; local
89 retval = encode_krb5_enc_kdc_rep_part(&tmp_encpart, &scratch);
95 #define cleanup_scratch() { (void) memset(scratch->data, 0, scratch->length); \
96 krb5_free_data(context, scratch); }
98 retval = krb5_encrypt_helper(context, client_key, usage, scratch,
H A Dmk_rep.c48 krb5_data * scratch; local
73 if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch)))
78 scratch, &reply.enc_part)))
92 memset(scratch->data, 0, scratch->length);
93 krb5_free_data(context, scratch);
H A Dcopy_creds.c41 krb5_data *scratch; local
60 retval = krb5_copy_data(context, &incred->ticket, &scratch);
63 tempcred->ticket = *scratch;
64 krb5_xfree(scratch);
65 retval = krb5_copy_data(context, &incred->second_ticket, &scratch);
69 tempcred->second_ticket = *scratch;
70 krb5_xfree(scratch);
H A Dpreauth.c145 krb5_data scratch; local
158 scratch.length = (*pa)->length;
159 scratch.data = (char *) (*pa)->contents;
160 retval = decode_krb5_etype_info(&scratch, &etype_info);
281 krb5_data * scratch; local
289 if ((retval = encode_krb5_pa_enc_ts(&pa_enc, &scratch)) != 0)
296 scratch, &enc_data)))
299 krb5_free_data(context, scratch);
300 scratch = 0;
302 if ((retval = encode_krb5_enc_data(&enc_data, &scratch)) !
465 krb5_data * scratch; local
[all...]
H A Dsend_tgs.c62 krb5_data * scratch; local
87 if ((retval = encode_krb5_authenticator(&authent, &scratch))) {
100 /* Cleanup scratch and scratch data */
106 scratch, &request.authenticator)))
125 memset(scratch->data, 0, scratch->length);
126 free(scratch->data);
128 free(scratch);
165 krb5_data *scratch, scratch local
[all...]
H A Drd_cred.c24 krb5_data scratch; local
26 scratch.length = pcred->enc_part.ciphertext.length;
27 if (!(scratch.data = (char *)malloc(scratch.length)))
33 &pcred->enc_part, &scratch)))
37 (void) memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length);
41 if ((retval = decode_krb5_enc_cred_part(&scratch, &ppart)))
53 (void) memset(scratch.data, 0, scratch
[all...]
H A Dcopy_tick.c99 krb5_data *scratch; local
109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch);
115 tempto->enc_part.ciphertext = *scratch;
116 krb5_xfree(scratch);
H A Drd_priv.c64 krb5_data scratch; local
85 scratch.length = privmsg->enc_part.ciphertext.length;
86 if (!(scratch.data = malloc(scratch.length))) {
94 &privmsg->enc_part, &scratch)))
98 if ((retval = decode_krb5_enc_priv_part(&scratch, &privmsg_enc_part)))
144 (void) memset(scratch.data, 0, scratch.length);
145 krb5_xfree(scratch.data);
H A Dmk_req_ext.c140 krb5_data *scratch = 0; local
237 &scratch)))
250 scratch, &request.authenticator)))
271 if (scratch) {
272 memset(scratch->data, 0, scratch->length);
273 krb5_xfree(scratch->data);
274 krb5_xfree(scratch);
H A Dmk_cred.c34 krb5_data * scratch; local
37 if ((retval = encode_krb5_enc_cred_part(pcredpart, &scratch)))
45 pencdata->ciphertext.data = scratch->data;
46 pencdata->ciphertext.length = scratch->length;
47 krb5_xfree(scratch);
54 scratch, pencdata);
63 memset(scratch->data, 0, scratch->length);
64 krb5_free_data(context, scratch);
/illumos-gate/usr/src/tools/tokenize/
H A Dasmsubr.s43 .register %g7, #scratch
49 .register %g7, #scratch
/illumos-gate/usr/src/cmd/listen/
H A Dlslog.c90 char scratch[BUFSIZ]; local
93 strcpy(scratch, err_list[code].err_msg);
94 clean_up(code, exitflag, scratch);
109 char scratch[256]; local
115 (void) snprintf(scratch, sizeof (scratch), "%s: %s",
118 (void) strlcat(scratch, ": ", sizeof (scratch));
119 (void) strlcat(scratch, strerror(save_errno), sizeof (scratch));
132 char scratch[256]; local
[all...]
H A Dlisten.c196 char scratch[BUFSIZ]; local
199 char *scratch_p = scratch;
260 sprintf(scratch, "no netconfig entry for <%s>", Netspec);
261 logmessage(scratch);
286 sprintf(scratch, "%s/%s/%s", ALTDIR, Mytag, DBGNAME);
287 Debugfp = fopen(scratch, "w");
317 sprintf(scratch, "couldn't open %s, default to GMT",
319 logmessage(scratch);
329 sprintf(scratch, "Listener port monitor tag: %s", Mytag_p);
330 logmessage(scratch);
479 char scratch[BUFSIZ]; local
700 char scratch[BUFSIZ]; local
1081 char scratch[BUFSIZ]; local
1141 char scratch[BUFSIZ]; local
1177 char scratch[BUFSIZ]; local
1573 char scratch[BUFSIZ]; local
1687 char scratch[BUFSIZ]; local
1773 char scratch[BUFSIZ]; local
1886 char scratch[BUFSIZ]; local
1950 char scratch[BUFSIZ]; local
[all...]
H A Dnlps_serv.c347 char scratch[BUFSIZ]; local
361 sprintf(scratch, "NLPS: nullfix(): unable to PEEK, errno is %d", errno);
363 logmessage(scratch);
394 sprintf(scratch, "NLPS: nullfix(): unable to PEEK second time, errno is %d", errno);
396 logmessage(scratch);
468 char scratch[256]; local
479 sprintf(scratch, badversion, low, high);
480 logmessage(scratch);
495 sprintf(scratch, disabledmsg, svc_code_p);
496 logmessage(scratch);
595 char scratch[256]; local
[all...]
H A Dlsdbf.c199 char scratch[128]; local
245 sprintf(scratch, dbfdupcmsg, svc_code_p);
246 logmessage(scratch);
316 sprintf(scratch, dbfsvccmsg, svc_code_p);
317 logmessage(scratch);
321 sprintf(scratch, "Invalid private address ignored: \\x%x", private_p);
322 logmessage(scratch);
525 char scratch[BUFSIZ]; local
622 sprintf(scratch, "service code <%s> specifies non-integer rpc info", *svc_code_p);
623 logmessage(scratch);
787 char scratch[BUFSIZ]; local
[all...]
/illumos-gate/usr/src/cmd/mdb/common/modules/crypto/
H A Dspi.c95 char scratch[33]; local
105 bcopy(ext_prov.ei_label, scratch, CRYPTO_EXT_SIZE_LABEL);
106 scratch[CRYPTO_EXT_SIZE_LABEL] = '\0';
107 mdb_printf("ei_label\t\t%s\n", scratch);
109 bcopy(ext_prov.ei_manufacturerID, scratch, CRYPTO_EXT_SIZE_MANUF);
110 scratch[CRYPTO_EXT_SIZE_MANUF] = '\0';
111 mdb_printf("ei_manufacturerID\t%s\n", scratch);
113 bcopy(ext_prov.ei_model, scratch, CRYPTO_EXT_SIZE_MODEL);
114 scratch[CRYPTO_EXT_SIZE_MODEL] = '\0';
115 mdb_printf("ei_model\t\t%s\n", scratch);
[all...]
/illumos-gate/usr/src/cmd/saf/
H A Dutil.c107 char scratch[SIZE]; /* a scratch buffer */ local
125 (void) sprintf(scratch, "tag too long, truncated to <%s>", p);
126 log(scratch);
149 (void) sprintf(scratch, "type too long, truncated to <%s>", p);
150 log(scratch);
180 (void) sprintf(scratch, "Unrecognized flag <%c>", *(p - 1));
182 log(scratch);
185 error(scratch);
/illumos-gate/usr/src/lib/libexacct/demo/
H A Dexdump.c484 ea_object_t scratch; local
487 if ((res = ea_get_object(ef, &scratch)) == -1) {
493 disp_obj(&scratch, indent + 1);
495 if (scratch.eo_type == EO_GROUP)
496 disp_group(ef, scratch.eo_group.eg_nobjs, indent + 1);
498 (void) ea_free_item(&scratch, EUP_ALLOC);
513 ea_object_t scratch; local
540 bzero(&scratch, sizeof (ea_object_t));
541 while (ea_get_object(&ef, &scratch) != -1) {
542 disp_obj(&scratch,
[all...]
/illumos-gate/usr/src/common/crypto/ecc/
H A Decp_jm.c66 mp_int *raz4, mp_int scratch[], const ECGroup *group)
71 t0 = &scratch[0];
72 t1 = &scratch[1];
73 M = &scratch[2];
74 S = &scratch[3];
137 mp_int *raz4, mp_int scratch[], const ECGroup *group)
142 A = &scratch[0];
143 B = &scratch[1];
144 C = &scratch[2];
145 D = &scratch[
64 ec_GFp_pt_dbl_jm(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument
134 ec_GFp_pt_add_jm_aff(const mp_int *px, const mp_int *py, const mp_int *pz, const mp_int *paz4, const mp_int *qx, const mp_int *qy, mp_int *rx, mp_int *ry, mp_int *rz, mp_int *raz4, mp_int scratch[], const ECGroup *group) argument
230 mp_int scratch[MAX_SCRATCH]; local
[all...]
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c1248 krb5_data scratch; local
1258 scratch.data = (char *) pa->contents;
1259 scratch.length = pa->length;
1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0)
1403 krb5_data * scratch; local
1465 &scratch);
1467 &scratch);
1470 pa_data->contents = (unsigned char *)scratch->data;
1471 pa_data->length = scratch->length;
1472 free(scratch);
1522 krb5_data *scratch = NULL; local
1630 krb5_data * scratch; local
1719 krb5_data scratch; local
1864 krb5_data * scratch; local
2254 krb5_data scratch; local
[all...]

Completed in 1075 milliseconds

123456