summaryrefslogtreecommitdiff
path: root/usr/src/uts/common
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/uts/common')
-rw-r--r--usr/src/uts/common/Makefile44
-rw-r--r--usr/src/uts/common/Makefile.files3
-rw-r--r--usr/src/uts/common/crypto/io/Makefile59
-rw-r--r--usr/src/uts/common/crypto/io/aes.c42
-rw-r--r--usr/src/uts/common/crypto/io/arcfour.c14
-rw-r--r--usr/src/uts/common/crypto/io/blowfish.c34
-rw-r--r--usr/src/uts/common/crypto/io/rsa.c40
-rw-r--r--usr/src/uts/common/des/Makefile21
-rw-r--r--usr/src/uts/common/des/des_crypt.c68
-rw-r--r--usr/src/uts/common/des/des_soft.c10
-rw-r--r--usr/src/uts/common/des/desdata.h4
-rw-r--r--usr/src/uts/common/gssapi/Makefile33
-rw-r--r--usr/src/uts/common/gssapi/gssd.x9
-rw-r--r--usr/src/uts/common/gssapi/gssd_clnt_stubs.c20
-rw-r--r--usr/src/uts/common/gssapi/include/Makefile69
-rw-r--r--usr/src/uts/common/gssapi/include/gssapiP_dummy.h5
-rw-r--r--usr/src/uts/common/gssapi/include/mechglueP.h53
-rw-r--r--usr/src/uts/common/gssapi/mechs/dummy/Makefile66
-rw-r--r--usr/src/uts/common/gssapi/mechs/dummy/dmech.c17
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/Makefile84
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/crypto/des/d3_cbc.c4
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cbc.c4
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cksum.c2
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/include/gssapiP_krb5.h2
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/krb5mech.c20
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/mech/seal.c6
-rw-r--r--usr/src/uts/common/gssapi/mechs/krb5/mech/unseal.c4
-rw-r--r--usr/src/uts/common/io/timod.c48
-rw-r--r--usr/src/uts/common/os/flock.c14
-rw-r--r--usr/src/uts/common/os/sig.c2
-rw-r--r--usr/src/uts/common/os/swapgeneric.c6
-rw-r--r--usr/src/uts/common/os/sysent.c19
-rw-r--r--usr/src/uts/common/rpc/Makefile17
-rw-r--r--usr/src/uts/common/rpc/sec_gss/rpcsec_gss_misc.c8
-rw-r--r--usr/src/uts/common/sys/Makefile13
-rw-r--r--usr/src/uts/common/sys/wanboot_impl.h10
-rw-r--r--usr/src/uts/common/syscall/fcntl.c16
37 files changed, 1 insertions, 889 deletions
diff --git a/usr/src/uts/common/Makefile b/usr/src/uts/common/Makefile
deleted file mode 100644
index 7cf2f14f64..0000000000
--- a/usr/src/uts/common/Makefile
+++ /dev/null
@@ -1,44 +0,0 @@
-#
-# CDDL HEADER START
-#
-# The contents of this file are subject to the terms of the
-# Common Development and Distribution License (the "License").
-# You may not use this file except in compliance with the License.
-#
-# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
-# or http://www.opensolaris.org/os/licensing.
-# See the License for the specific language governing permissions
-# and limitations under the License.
-#
-# When distributing Covered Code, include this CDDL HEADER in each
-# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
-# If applicable, add the following below this CDDL HEADER, with the
-# fields enclosed by brackets "[]" replaced with your own identifying
-# information: Portions Copyright [yyyy] [name of copyright owner]
-#
-# CDDL HEADER END
-#
-#
-# Copyright 2008 Sun Microsystems, Inc. All rights reserved.
-# Use is subject to license terms.
-#
-#
-# uts/common/Makefile
-#
-include $(SRC)/Makefile.master
-
-.KEEP_STATE:
-
-# EXPORT DELETE START
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree
-EXPORT_SRC:
- $(RM) Makefile+ Makefile.rules+
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile.rules > Makefile.rules+
- $(MV) Makefile.rules+ Makefile.rules
- $(CHMOD) 444 Makefile Makefile.rules
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/Makefile.files b/usr/src/uts/common/Makefile.files
index d6f359e3f9..3a0654407b 100644
--- a/usr/src/uts/common/Makefile.files
+++ b/usr/src/uts/common/Makefile.files
@@ -1646,10 +1646,7 @@ K5_KRB= kfree.o copy_key.o \
K5_OS= timeofday.o toffset.o \
init_os_ctx.o c_ustime.o
-SEAL=
-# EXPORT DELETE START
SEAL= seal.o unseal.o
-# EXPORT DELETE END
MECH= delete_sec_context.o \
import_sec_context.o \
diff --git a/usr/src/uts/common/crypto/io/Makefile b/usr/src/uts/common/crypto/io/Makefile
deleted file mode 100644
index 7288a6a061..0000000000
--- a/usr/src/uts/common/crypto/io/Makefile
+++ /dev/null
@@ -1,59 +0,0 @@
-#
-# CDDL HEADER START
-#
-# The contents of this file are subject to the terms of the
-# Common Development and Distribution License, Version 1.0 only
-# (the "License"). You may not use this file except in compliance
-# with the License.
-#
-# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
-# or http://www.opensolaris.org/os/licensing.
-# See the License for the specific language governing permissions
-# and limitations under the License.
-#
-# When distributing Covered Code, include this CDDL HEADER in each
-# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
-# If applicable, add the following below this CDDL HEADER, with the
-# fields enclosed by brackets "[]" replaced with your own identifying
-# information: Portions Copyright [yyyy] [name of copyright owner]
-#
-# CDDL HEADER END
-#
-#
-# ident "%Z%%M% %I% %E% SMI"
-#
-# Copyright 2003 Sun Microsystems, Inc. All rights reserved.
-# Use is subject to license terms.
-#
-# uts/common/crypto/io/Makefile
-#
-# include global definitions
-include ../../../../Makefile.master
-
-.KEEP_STATE:
-
-# EXPORT DELETE START
-EXPORT_SRC:
- $(RM) Makefile+ aes.c+ arcfour.c+ blowfish.c+ dprov.c+ rsa.c+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < aes.c > aes.c+
- $(MV) aes.c+ aes.c
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < arcfour.c > arcfour.c+
- $(MV) arcfour.c+ arcfour.c
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < blowfish.c > blowfish.c+
- $(MV) blowfish.c+ blowfish.c
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < dprov.c > dprov.c+
- $(MV) dprov.c+ dprov.c
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < rsa.c > rsa.c+
- $(MV) rsa.c+ rsa.c
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(RM) Makefile
- $(MV) Makefile+ Makefile
- $(CHMOD) 444 Makefile aes.c arcfour.c blowfish.c dprov.c rsa.c
-
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/crypto/io/aes.c b/usr/src/uts/common/crypto/io/aes.c
index 626058cefa..4ce7e51380 100644
--- a/usr/src/uts/common/crypto/io/aes.c
+++ b/usr/src/uts/common/crypto/io/aes.c
@@ -306,8 +306,6 @@ aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag)
return (rv);
}
-/* EXPORT DELETE START */
-
/*
* Initialize key schedules for AES
*/
@@ -336,8 +334,6 @@ init_keysched(crypto_key_t *key, void *newbie)
return (CRYPTO_SUCCESS);
}
-/* EXPORT DELETE END */
-
/*
* KCF software provider control entry points.
*/
@@ -372,9 +368,6 @@ aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
crypto_key_t *key, crypto_spi_ctx_template_t template,
crypto_req_handle_t req, boolean_t is_encrypt_init)
{
-
-/* EXPORT DELETE START */
-
aes_ctx_t *aes_ctx;
int rv;
int kmflag;
@@ -400,8 +393,6 @@ aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
ctx->cc_provider_private = aes_ctx;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -427,8 +418,6 @@ aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext,
{
int ret = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
aes_ctx_t *aes_ctx;
size_t saved_length, saved_offset, length_needed;
@@ -534,8 +523,6 @@ aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext,
ASSERT(aes_ctx->ac_remainder_len == 0);
(void) aes_free_context(ctx);
-/* EXPORT DELETE END */
-
return (ret);
}
@@ -546,8 +533,6 @@ aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
{
int ret = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
aes_ctx_t *aes_ctx;
off_t saved_offset;
size_t saved_length, length_needed;
@@ -652,8 +637,6 @@ aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
cleanup:
(void) aes_free_context(ctx);
-/* EXPORT DELETE END */
-
return (ret);
}
@@ -825,9 +808,6 @@ static int
aes_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
aes_ctx_t *aes_ctx;
int ret;
@@ -878,8 +858,6 @@ aes_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
(void) aes_free_context(ctx);
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -888,9 +866,6 @@ static int
aes_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
aes_ctx_t *aes_ctx;
int ret;
off_t saved_offset;
@@ -987,8 +962,6 @@ aes_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
(void) aes_free_context(ctx);
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -1294,9 +1267,6 @@ aes_create_ctx_template(crypto_provider_handle_t provider,
crypto_mechanism_t *mechanism, crypto_key_t *key,
crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
void *keysched;
size_t size;
int rv;
@@ -1327,8 +1297,6 @@ aes_create_ctx_template(crypto_provider_handle_t provider,
*tmpl = keysched;
*tmpl_size = size;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -1336,9 +1304,6 @@ aes_create_ctx_template(crypto_provider_handle_t provider,
static int
aes_free_context(crypto_ctx_t *ctx)
{
-
-/* EXPORT DELETE START */
-
aes_ctx_t *aes_ctx = ctx->cc_provider_private;
if (aes_ctx != NULL) {
@@ -1352,8 +1317,6 @@ aes_free_context(crypto_ctx_t *ctx)
ctx->cc_provider_private = NULL;
}
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -1364,9 +1327,6 @@ aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template,
boolean_t is_encrypt_init)
{
int rv = CRYPTO_SUCCESS;
-
-/* EXPORT DELETE START */
-
void *keysched;
size_t size;
@@ -1444,8 +1404,6 @@ aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template,
}
}
-/* EXPORT DELETE END */
-
return (rv);
}
diff --git a/usr/src/uts/common/crypto/io/arcfour.c b/usr/src/uts/common/crypto/io/arcfour.c
index fe6a64497d..81fe549684 100644
--- a/usr/src/uts/common/crypto/io/arcfour.c
+++ b/usr/src/uts/common/crypto/io/arcfour.c
@@ -201,9 +201,6 @@ rc4_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
crypto_key_t *key, crypto_spi_ctx_template_t template,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
ARCFour_key *keystream;
if ((mechanism)->cm_type != RC4_MECH_INFO_TYPE)
@@ -229,8 +226,6 @@ rc4_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
ctx->cc_provider_private = keystream;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -255,8 +250,6 @@ rc4_crypt_update(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output,
{
int ret = CRYPTO_SUCCESS;
-/* EXPORT DELETE START */
-
ARCFour_key *key;
off_t saveoffset;
@@ -484,8 +477,6 @@ rc4_crypt_update(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output,
output->cd_offset = saveoffset;
output->cd_length = input->cd_length;
-/* EXPORT DELETE END */
-
return (ret);
}
@@ -527,9 +518,6 @@ rc4_crypt_atomic(crypto_provider_handle_t handle, crypto_session_id_t session,
static int
rc4_free_context(crypto_ctx_t *ctx)
{
-
-/* EXPORT DELETE START */
-
ARCFour_key *keystream = ctx->cc_provider_private;
if (keystream != NULL) {
@@ -538,8 +526,6 @@ rc4_free_context(crypto_ctx_t *ctx)
ctx->cc_provider_private = NULL;
}
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
diff --git a/usr/src/uts/common/crypto/io/blowfish.c b/usr/src/uts/common/crypto/io/blowfish.c
index f475f1e961..6c53ae2f13 100644
--- a/usr/src/uts/common/crypto/io/blowfish.c
+++ b/usr/src/uts/common/crypto/io/blowfish.c
@@ -240,7 +240,6 @@ _info(struct modinfo *modinfop)
static int
init_keysched(crypto_key_t *key, void *keysched)
{
-/* EXPORT DELETE START */
/*
* Only keys by value are supported by this module.
*/
@@ -256,7 +255,6 @@ init_keysched(crypto_key_t *key, void *keysched)
}
blowfish_init_keysched(key->ck_data, key->ck_length, keysched);
-/* EXPORT DELETE END */
return (CRYPTO_SUCCESS);
}
@@ -278,9 +276,6 @@ blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
crypto_key_t *key, crypto_spi_ctx_template_t template,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
blowfish_ctx_t *blowfish_ctx;
int rv;
int kmflag;
@@ -320,8 +315,6 @@ blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
ctx->cc_provider_private = blowfish_ctx;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -345,8 +338,6 @@ blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext,
{
int ret;
-/* EXPORT DELETE START */
-
blowfish_ctx_t *blowfish_ctx;
/*
@@ -378,8 +369,6 @@ blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext,
ASSERT(blowfish_ctx->bc_remainder_len == 0);
(void) blowfish_free_context(ctx);
-/* EXPORT DELETE END */
-
/* LINTED */
return (ret);
}
@@ -391,8 +380,6 @@ blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
{
int ret;
-/* EXPORT DELETE START */
-
blowfish_ctx_t *blowfish_ctx;
/*
@@ -424,8 +411,6 @@ blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
ASSERT(blowfish_ctx->bc_remainder_len == 0);
(void) blowfish_free_context(ctx);
-/* EXPORT DELETE END */
-
/* LINTED */
return (ret);
}
@@ -561,9 +546,6 @@ static int
blowfish_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
blowfish_ctx_t *blowfish_ctx;
ASSERT(ctx->cc_provider_private != NULL);
@@ -580,8 +562,6 @@ blowfish_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
(void) blowfish_free_context(ctx);
data->cd_length = 0;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -590,9 +570,6 @@ static int
blowfish_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
blowfish_ctx_t *blowfish_ctx;
ASSERT(ctx->cc_provider_private != NULL);
@@ -609,8 +586,6 @@ blowfish_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data,
(void) blowfish_free_context(ctx);
data->cd_length = 0;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -797,9 +772,6 @@ blowfish_create_ctx_template(crypto_provider_handle_t provider,
crypto_mechanism_t *mechanism, crypto_key_t *key,
crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
void *keysched;
size_t size;
int rv;
@@ -825,8 +797,6 @@ blowfish_create_ctx_template(crypto_provider_handle_t provider,
*tmpl = keysched;
*tmpl_size = size;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -859,8 +829,6 @@ blowfish_common_init_ctx(blowfish_ctx_t *blowfish_ctx,
{
int rv = CRYPTO_SUCCESS;
-/* EXPORT DELETE START */
-
void *keysched;
size_t size;
@@ -898,7 +866,5 @@ blowfish_common_init_ctx(blowfish_ctx_t *blowfish_ctx,
}
}
-/* EXPORT DELETE END */
-
return (rv);
}
diff --git a/usr/src/uts/common/crypto/io/rsa.c b/usr/src/uts/common/crypto/io/rsa.c
index 6bb2f5b181..3542051a96 100644
--- a/usr/src/uts/common/crypto/io/rsa.c
+++ b/usr/src/uts/common/crypto/io/rsa.c
@@ -315,13 +315,9 @@ static int rsa_verify_common(rsa_mech_type_t, crypto_key_t *,
crypto_data_t *, crypto_data_t *);
static int compare_data(crypto_data_t *, uchar_t *);
-/* EXPORT DELETE START */
-
static int core_rsa_encrypt(crypto_key_t *, uchar_t *, int, uchar_t *, int);
static int core_rsa_decrypt(crypto_key_t *, uchar_t *, int, uchar_t *);
-/* EXPORT DELETE END */
-
static crypto_kcf_provider_handle_t rsa_prov_handle = NULL;
int
@@ -373,8 +369,6 @@ check_mech_and_key(crypto_mechanism_t *mechanism, crypto_key_t *key)
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
uchar_t *modulus;
ssize_t modulus_len; /* In bytes */
@@ -397,8 +391,6 @@ check_mech_and_key(crypto_mechanism_t *mechanism, crypto_key_t *key)
modulus_len > MAX_RSA_KEYLENGTH_IN_BYTES)
return (CRYPTO_KEY_SIZE_RANGE);
-/* EXPORT DELETE END */
-
return (rv);
}
@@ -598,8 +590,6 @@ rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key,
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
int plen;
uchar_t *ptptr;
uchar_t *modulus;
@@ -656,13 +646,9 @@ rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key,
ciphertext->cd_length = modulus_len;
}
-/* EXPORT DELETE END */
-
return (rv);
}
-/* EXPORT DELETE START */
-
static int
core_rsa_encrypt(crypto_key_t *key, uchar_t *in,
int in_len, uchar_t *out, int is_public)
@@ -704,8 +690,6 @@ core_rsa_encrypt(crypto_key_t *key, uchar_t *in,
return (rv);
}
-/* EXPORT DELETE END */
-
/* ARGSUSED */
static int
rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
@@ -752,8 +736,6 @@ rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key,
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
size_t plain_len;
uchar_t *ctptr;
uchar_t *modulus;
@@ -802,13 +784,9 @@ rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key,
plaintext->cd_length = plain_len;
}
-/* EXPORT DELETE END */
-
return (rv);
}
-/* EXPORT DELETE START */
-
static int
core_rsa_decrypt(crypto_key_t *key, uchar_t *in, int in_len, uchar_t *out)
{
@@ -863,8 +841,6 @@ core_rsa_decrypt(crypto_key_t *key, uchar_t *in, int in_len, uchar_t *out)
return (rv);
}
-/* EXPORT DELETE END */
-
/* ARGSUSED */
static int
rsa_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
@@ -961,8 +937,6 @@ rsa_digest_svrfy_common(digest_rsa_ctx_t *ctxp, crypto_data_t *data,
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
uchar_t digest[SHA512_DIGEST_LENGTH];
/* The der_data size is enough for MD5 also */
uchar_t der_data[SHA512_DIGEST_LENGTH + SHA2_DER_PREFIX_Len];
@@ -1068,8 +1042,6 @@ rsa_digest_svrfy_common(digest_rsa_ctx_t *ctxp, crypto_data_t *data,
rv = rsa_verify_common(mech_type, ctxp->key, &der_cd,
signature);
-/* EXPORT DELETE END */
-
return (rv);
}
@@ -1079,8 +1051,6 @@ rsa_sign_common(rsa_mech_type_t mech_type, crypto_key_t *key,
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
int dlen;
uchar_t *dataptr, *modulus;
ssize_t modulus_len;
@@ -1149,8 +1119,6 @@ rsa_sign_common(rsa_mech_type_t mech_type, crypto_key_t *key,
signature->cd_length = modulus_len;
}
-/* EXPORT DELETE END */
-
return (rv);
}
@@ -1297,8 +1265,6 @@ rsa_verify_common(rsa_mech_type_t mech_type, crypto_key_t *key,
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
uchar_t *sigptr, *modulus;
ssize_t modulus_len;
uchar_t plain_data[MAX_RSA_KEYLENGTH_IN_BYTES];
@@ -1346,8 +1312,6 @@ rsa_verify_common(rsa_mech_type_t mech_type, crypto_key_t *key,
rv = CRYPTO_SIGNATURE_INVALID;
}
-/* EXPORT DELETE END */
-
return (rv);
}
@@ -1503,8 +1467,6 @@ rsa_verify_recover_common(rsa_mech_type_t mech_type, crypto_key_t *key,
{
int rv = CRYPTO_FAILED;
-/* EXPORT DELETE START */
-
size_t data_len;
uchar_t *sigptr, *modulus;
ssize_t modulus_len;
@@ -1551,8 +1513,6 @@ rsa_verify_recover_common(rsa_mech_type_t mech_type, crypto_key_t *key,
return (rv);
data->cd_length = data_len;
-/* EXPORT DELETE END */
-
return (rv);
}
diff --git a/usr/src/uts/common/des/Makefile b/usr/src/uts/common/des/Makefile
index d8b634f1d3..9730d3bac4 100644
--- a/usr/src/uts/common/des/Makefile
+++ b/usr/src/uts/common/des/Makefile
@@ -19,8 +19,6 @@
#
# CDDL HEADER END
#
-# ident "%Z%%M% %I% %E% SMI"
-#
# Copyright (c) 1989,1999 by Sun Microsystems, Inc.
# All rights reserved.
#
@@ -50,23 +48,4 @@ install_h: $(ROOTDIRS) $(ROOTHDRS)
$(ROOTDIRS):
$(INS.dir)
-# EXPORT DELETE START
-EXPORT_SRC:
- $(RM) Makefile+ des_crypt.c+ des_soft.c+ desdata.h+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < des_crypt.c > des_crypt.c+
- $(MV) des_crypt.c+ des_crypt.c
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < des_soft.c > des_soft.c+
- $(MV) des_soft.c+ des_soft.c
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < desdata.h > desdata.h+
- $(MV) desdata.h+ desdata.h
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(RM) Makefile
- $(MV) Makefile+ Makefile
- $(CHMOD) 444 Makefile des_crypt.c des_soft.c desdata.h
-
-# EXPORT DELETE END
check: $(CHECKHDRS)
diff --git a/usr/src/uts/common/des/des_crypt.c b/usr/src/uts/common/des/des_crypt.c
index 9d489e4d74..f4f43a6e8e 100644
--- a/usr/src/uts/common/des/des_crypt.c
+++ b/usr/src/uts/common/des/des_crypt.c
@@ -51,7 +51,6 @@
#define _DES_IMPL
#include <des/des_impl.h>
-/* EXPORT DELETE START */
#include <sys/types.h>
#include <rpc/des_crypt.h>
#include <des/des.h>
@@ -73,8 +72,6 @@ static int common_crypt(char *key, char *buf, size_t len,
extern int _des_crypt(char *buf, size_t len, struct desparams *desp);
-/* EXPORT DELETE END */
-
extern struct mod_ops mod_cryptoops;
/*
@@ -97,15 +94,11 @@ static struct modlinkage modlinkage = {
NULL
};
-/* EXPORT DELETE START */
-
#define DES_MIN_KEY_LEN DES_MINBYTES
#define DES_MAX_KEY_LEN DES_MAXBYTES
#define DES3_MIN_KEY_LEN DES3_MAXBYTES /* no CKK_DES2 support */
#define DES3_MAX_KEY_LEN DES3_MAXBYTES
-/* EXPORT DELETE END */
-
#ifndef DES_MIN_KEY_LEN
#define DES_MIN_KEY_LEN 0
#endif
@@ -311,14 +304,12 @@ int
cbc_crypt(char *key, char *buf, size_t len, unsigned int mode, char *ivec)
{
int err = 0;
-/* EXPORT DELETE START */
struct desparams dp;
dp.des_mode = CBC;
COPY8(ivec, dp.des_ivec);
err = common_crypt(key, buf, len, mode, &dp);
COPY8(dp.des_ivec, ivec);
-/* EXPORT DELETE END */
return (err);
}
@@ -331,18 +322,15 @@ int
ecb_crypt(char *key, char *buf, size_t len, unsigned int mode)
{
int err = 0;
-/* EXPORT DELETE START */
struct desparams dp;
dp.des_mode = ECB;
err = common_crypt(key, buf, len, mode, &dp);
-/* EXPORT DELETE END */
return (err);
}
-/* EXPORT DELETE START */
/*
* Common code to cbc_crypt() & ecb_crypt()
*/
@@ -428,8 +416,6 @@ init_keysched(crypto_key_t *key, void *newbie, des_strength_t strength)
return (CRYPTO_SUCCESS);
}
-/* EXPORT DELETE END */
-
/*
* KCF software provider control entry points.
*/
@@ -449,8 +435,6 @@ des_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
crypto_req_handle_t req)
{
-/* EXPORT DELETE START */
-
des_strength_t strength;
des_ctx_t *des_ctx = NULL;
int rv;
@@ -504,8 +488,6 @@ des_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
ctx->cc_provider_private = des_ctx;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -549,7 +531,6 @@ des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext,
{
int ret;
-/* EXPORT DELETE START */
des_ctx_t *des_ctx;
/*
@@ -581,8 +562,6 @@ des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext,
ASSERT(des_ctx->dc_remainder_len == 0);
(void) des_free_context(ctx);
-/* EXPORT DELETE END */
-
/* LINTED */
return (ret);
}
@@ -594,7 +573,6 @@ des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
{
int ret;
-/* EXPORT DELETE START */
des_ctx_t *des_ctx;
/*
@@ -626,8 +604,6 @@ des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
ASSERT(des_ctx->dc_remainder_len == 0);
(void) des_free_context(ctx);
-/* EXPORT DELETE END */
-
/* LINTED */
return (ret);
}
@@ -641,8 +617,6 @@ des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext,
size_t saved_length, out_len;
int ret = CRYPTO_SUCCESS;
-/* EXPORT DELETE START */
-
ASSERT(ctx->cc_provider_private != NULL);
DES_ARG_INPLACE(plaintext, ciphertext);
@@ -693,8 +667,6 @@ des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext,
}
ciphertext->cd_offset = saved_offset;
-/* EXPORT DELETE END */
-
return (ret);
}
@@ -707,8 +679,6 @@ des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
size_t saved_length, out_len;
int ret = CRYPTO_SUCCESS;
-/* EXPORT DELETE START */
-
ASSERT(ctx->cc_provider_private != NULL);
DES_ARG_INPLACE(ciphertext, plaintext);
@@ -759,8 +729,6 @@ des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
}
plaintext->cd_offset = saved_offset;
-/* EXPORT DELETE END */
-
return (ret);
}
@@ -769,9 +737,6 @@ static int
des_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
des_ctx_t *des_ctx;
ASSERT(ctx->cc_provider_private != NULL);
@@ -788,8 +753,6 @@ des_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext,
(void) des_free_context(ctx);
ciphertext->cd_length = 0;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -798,9 +761,6 @@ static int
des_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext,
crypto_req_handle_t req)
{
-
-/* EXPORT DELETE START */
-
des_ctx_t *des_ctx;
ASSERT(ctx->cc_provider_private != NULL);
@@ -817,8 +777,6 @@ des_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext,
(void) des_free_context(ctx);
plaintext->cd_length = 0;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -831,8 +789,6 @@ des_encrypt_atomic(crypto_provider_handle_t provider,
{
int ret;
-/* EXPORT DELETE START */
-
des_ctx_t des_ctx; /* on the stack */
des_strength_t strength;
off_t saved_offset;
@@ -923,8 +879,6 @@ des_encrypt_atomic(crypto_provider_handle_t provider,
}
ciphertext->cd_offset = saved_offset;
-/* EXPORT DELETE END */
-
/* LINTED */
return (ret);
}
@@ -938,8 +892,6 @@ des_decrypt_atomic(crypto_provider_handle_t provider,
{
int ret;
-/* EXPORT DELETE START */
-
des_ctx_t des_ctx; /* on the stack */
des_strength_t strength;
off_t saved_offset;
@@ -1030,8 +982,6 @@ des_decrypt_atomic(crypto_provider_handle_t provider,
}
plaintext->cd_offset = saved_offset;
-/* EXPORT DELETE END */
-
/* LINTED */
return (ret);
}
@@ -1046,8 +996,6 @@ des_create_ctx_template(crypto_provider_handle_t provider,
crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req)
{
-/* EXPORT DELETE START */
-
des_strength_t strength;
void *keysched;
size_t size;
@@ -1088,8 +1036,6 @@ des_create_ctx_template(crypto_provider_handle_t provider,
*tmpl = keysched;
*tmpl_size = size;
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -1097,9 +1043,6 @@ des_create_ctx_template(crypto_provider_handle_t provider,
static int
des_free_context(crypto_ctx_t *ctx)
{
-
-/* EXPORT DELETE START */
-
des_ctx_t *des_ctx = ctx->cc_provider_private;
if (des_ctx != NULL) {
@@ -1113,8 +1056,6 @@ des_free_context(crypto_ctx_t *ctx)
ctx->cc_provider_private = NULL;
}
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -1127,9 +1068,6 @@ static int
des_key_check(crypto_provider_handle_t pd, crypto_mechanism_t *mech,
crypto_key_t *key)
{
-
-/* EXPORT DELETE START */
-
int expectedkeylen;
des_strength_t strength;
uint8_t keydata[DES3_MAX_KEY_LEN];
@@ -1163,8 +1101,6 @@ des_key_check(crypto_provider_handle_t pd, crypto_mechanism_t *mech,
if (des_keycheck(keydata, strength, key->ck_data) == B_FALSE)
return (CRYPTO_WEAK_KEY);
-/* EXPORT DELETE END */
-
return (CRYPTO_SUCCESS);
}
@@ -1176,8 +1112,6 @@ des_common_init_ctx(des_ctx_t *des_ctx, crypto_spi_ctx_template_t *template,
{
int rv = CRYPTO_SUCCESS;
-/* EXPORT DELETE START */
-
void *keysched;
size_t size;
@@ -1222,7 +1156,5 @@ des_common_init_ctx(des_ctx_t *des_ctx, crypto_spi_ctx_template_t *template,
}
}
-/* EXPORT DELETE END */
-
return (rv);
}
diff --git a/usr/src/uts/common/des/des_soft.c b/usr/src/uts/common/des/des_soft.c
index af5d984467..96272ead1c 100644
--- a/usr/src/uts/common/des/des_soft.c
+++ b/usr/src/uts/common/des/des_soft.c
@@ -31,8 +31,6 @@
* under license from the Regents of the University of California.
*/
-#ident "%Z%%M% %I% %E% SMI"
-
/*
* Warning! Things are arranged very carefully in this file to
* allow read-only data to be moved to the text segment. The
@@ -60,10 +58,8 @@ static void des_setkey(u_char userkey[8], struct deskeydata *kd,
unsigned int dir);
static void des_encrypt(u_char *data, struct deskeydata *kd);
-/* EXPORT DELETE START */
#define btst(k, b) (k[b >> 3] & (0x80 >> (b & 07)))
#define BIT28 (1<<28)
-/* EXPORT DELETE END */
/*
* Software encrypt or decrypt a block of data (multiple of 8 bytes)
@@ -73,7 +69,6 @@ static void des_encrypt(u_char *data, struct deskeydata *kd);
int
_des_crypt(char *buf, size_t len, struct desparams *desp)
{
-/* EXPORT DELETE START */
short i;
uint_t mode;
uint_t dir;
@@ -112,7 +107,6 @@ _des_crypt(char *buf, size_t len, struct desparams *desp)
buf += 8;
len -= 8;
}
-/* EXPORT DELETE END */
return (1);
}
@@ -125,7 +119,6 @@ _des_crypt(char *buf, size_t len, struct desparams *desp)
static void
des_setkey(u_char userkey[8], struct deskeydata *kd, unsigned int dir)
{
-/* EXPORT DELETE START */
int32_t C, D;
short i;
@@ -206,7 +199,6 @@ des_setkey(u_char userkey[8], struct deskeydata *kd, unsigned int dir)
bbit >>= 8;
}
}
-/* EXPORT DELETE END */
}
@@ -222,7 +214,6 @@ des_setkey(u_char userkey[8], struct deskeydata *kd, unsigned int dir)
static void
des_encrypt(u_char *data, struct deskeydata *kd)
{
-/* EXPORT DELETE START */
chunk_t work1, work2;
/*
@@ -400,5 +391,4 @@ des_encrypt(u_char *data, struct deskeydata *kd)
data[5] = work2.byte5;
data[6] = work2.byte6;
data[7] = work2.byte7;
-/* EXPORT DELETE END */
}
diff --git a/usr/src/uts/common/des/desdata.h b/usr/src/uts/common/des/desdata.h
index b03631f224..1f2c24b686 100644
--- a/usr/src/uts/common/des/desdata.h
+++ b/usr/src/uts/common/des/desdata.h
@@ -34,8 +34,6 @@
#ifndef _SYS_DESDATA_H
#define _SYS_DESDATA_H
-#pragma ident "%Z%%M% %I% %E% SMI"
-
#ifdef __cplusplus
extern "C" {
#endif
@@ -52,7 +50,6 @@ extern "C" {
#define static
#endif
-/* EXPORT DELETE START */
/*
* Permuted-choice 1 from the key bits
* to yield C and D.
@@ -1081,7 +1078,6 @@ const uint32_t P_tab[4][256] = {
0x0a100401U, 0x0a100c01U, 0x0a120401U, 0x0a120c01U,
0x0a100421U, 0x0a100c21U, 0x0a120421U, 0x0a120c21U,
};
-/* EXPORT DELETE END */
#ifdef __cplusplus
}
diff --git a/usr/src/uts/common/gssapi/Makefile b/usr/src/uts/common/gssapi/Makefile
index 0f02a03623..736ac8da68 100644
--- a/usr/src/uts/common/gssapi/Makefile
+++ b/usr/src/uts/common/gssapi/Makefile
@@ -88,36 +88,3 @@ check: $(CHECKHDRS)
clean:
$(RM) $(DERIVED_FILES)
-
-# EXPORT DELETE START
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree
-EXPORT_SRC:
- $(RM) Makefile+ gssd.x+ gssd_clnt_stubs.c+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < gssd.x > gssd.x+
- $(MV) gssd.x+ gssd.x
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < gssd_clnt_stubs.c > gssd_clnt_stubs.c+
- $(MV) gssd_clnt_stubs.c+ gssd_clnt_stubs.c
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
- $(CHMOD) 444 Makefile gssd.x gssd_clnt_stubs.c
-
-# CRYPT DELETE START
-# Special target to clean up the source tree for domestic distribution
-# Warning: This target changes the source tree
-
-CRYPT_SRC:
- $(RM) Makefile+ gssd_clnt_stubs.c+
- sed -e "/^# CRYPT DELETE START/,/^# CRYPT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
- sed -e "/CRYPT DELETE START/,/CRYPT DELETE END/d" \
- < gssd_clnt_stubs.c > gssd_clnt_stubs.c+
- $(MV) gssd_clnt_stubs.c+ gssd_clnt_stubs.c
- $(CHMOD) 444 Makefile gssd_clnt_stubs.c
-
-# CRYPT DELETE END
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/gssapi/gssd.x b/usr/src/uts/common/gssapi/gssd.x
index ef4a502dc4..439b739608 100644
--- a/usr/src/uts/common/gssapi/gssd.x
+++ b/usr/src/uts/common/gssapi/gssd.x
@@ -24,8 +24,6 @@
% * Use is subject to license terms.
% */
%
-%#pragma ident "%Z%%M% %I% %E% SMI"
-%
%/*
% * RPC protocol information for gssd, the usermode daemon that
% * assists the kernel with gssapi. It is gssd that executes all
@@ -265,7 +263,6 @@ struct gss_verify_res {
OM_UINT32 status; /* status of GSSAPI call */
};
-%/* EXPORT DELETE START */
struct gss_seal_arg {
OM_UINT32 gssd_context_verifier; /* verifier for context handles */
GSS_CTX_ID_T context_handle; /* handle to existing context */
@@ -295,8 +292,6 @@ struct gss_unseal_res {
OM_UINT32 status; /* status of GSSAPI call */
};
-%/* EXPORT DELETE END */
-
struct gss_display_status_arg {
uid_t uid; /* client uid */
int status_value; /* status to be converted */
@@ -482,8 +477,6 @@ program GSSPROG {
GSS_INQUIRE_CRED(gss_inquire_cred_arg) = 12;
-/* EXPORT DELETE START */
-
/*
* Called to seal a message.
*/
@@ -494,8 +487,6 @@ program GSSPROG {
*/
gss_unseal_res GSS_UNSEAL(gss_unseal_arg) = 14;
-/* EXPORT DELETE END */
-
/*
* gsscred interface functions to obtain principal uid and gids
*/
diff --git a/usr/src/uts/common/gssapi/gssd_clnt_stubs.c b/usr/src/uts/common/gssapi/gssd_clnt_stubs.c
index 6dc6b7737a..c934752798 100644
--- a/usr/src/uts/common/gssapi/gssd_clnt_stubs.c
+++ b/usr/src/uts/common/gssapi/gssd_clnt_stubs.c
@@ -70,14 +70,12 @@ static OM_uint32 kgss_sign_wrapped(void *, OM_uint32 *, gss_ctx_id_t, int,
static OM_uint32 kgss_verify_wrapped(void *, OM_uint32 *, gss_ctx_id_t,
gss_buffer_t, gss_buffer_t, int *qop_state, OM_uint32);
-/* EXPORT DELETE START */
static OM_uint32 kgss_seal_wrapped(void *, OM_uint32 *, gss_ctx_id_t,
int, int, gss_buffer_t, int *, gss_buffer_t, OM_uint32);
static OM_uint32 kgss_unseal_wrapped(void *, OM_uint32 *, gss_ctx_id_t,
gss_buffer_t, gss_buffer_t, int *conf_state, int *qop_state,
OM_uint32);
-/* EXPORT DELETE END */
static OM_uint32 kgss_delete_sec_context_wrapped(void *, OM_uint32 *,
gssd_ctx_id_t *, gss_buffer_t, OM_uint32);
@@ -821,24 +819,10 @@ static struct gss_config default_gc = {
NULL,
NULL,
0,
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
kgss_unseal_wrapped,
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
NULL, /* kgss_delete_sec_context_wrapped */
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
kgss_seal_wrapped,
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
NULL, /* kgss_import_sec_context */
-/* EXPORT DELETE START */
-/* CRYPT DELETE START */
-#if 0
-/* CRYPT DELETE END */
- kgss_seal_wrapped,
- kgss_unseal_wrapped,
-/* CRYPT DELETE START */
-#endif
-/* CRYPT DELETE END */
-/* EXPORT DELETE END */
kgss_sign_wrapped,
kgss_verify_wrapped
};
@@ -1789,8 +1773,6 @@ kgss_verify(OM_uint32 *minor_status,
message_buffer, token_buffer, qop_state));
}
-/* EXPORT DELETE START */
-
/*ARGSUSED*/
static OM_uint32
kgss_seal_wrapped(void *private,
@@ -2021,8 +2003,6 @@ kgss_unseal(OM_uint32 *minor_status,
output_message_buffer, conf_state, qop_state));
}
-/* EXPORT DELETE END */
-
OM_uint32
kgss_display_status(minor_status,
status_value,
diff --git a/usr/src/uts/common/gssapi/include/Makefile b/usr/src/uts/common/gssapi/include/Makefile
deleted file mode 100644
index 305577fa33..0000000000
--- a/usr/src/uts/common/gssapi/include/Makefile
+++ /dev/null
@@ -1,69 +0,0 @@
-#
-# CDDL HEADER START
-#
-# The contents of this file are subject to the terms of the
-# Common Development and Distribution License, Version 1.0 only
-# (the "License"). You may not use this file except in compliance
-# with the License.
-#
-# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
-# or http://www.opensolaris.org/os/licensing.
-# See the License for the specific language governing permissions
-# and limitations under the License.
-#
-# When distributing Covered Code, include this CDDL HEADER in each
-# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
-# If applicable, add the following below this CDDL HEADER, with the
-# fields enclosed by brackets "[]" replaced with your own identifying
-# information: Portions Copyright [yyyy] [name of copyright owner]
-#
-# CDDL HEADER END
-#
-#
-# Copyright (c) 1997-2001 by Sun Microsystems, Inc.
-# All rights reserved.
-#
-#pragma ident "%Z%%M% %I% %E% SMI"
-
-# include global definitions
-include ../../../../Makefile.master
-
-# EXPORT DELETE START
-
-all:
- @$(ECHO) " This Makefile is used to clean up the source tree\n" \
- "for export distribution.\n" \
- "[Usage]: make [EXPORT_SRC] [CRYPT_SRC]\n\n" \
- "WARNING: EXPORT_SRC, CRYPT_SRC targets change the\n" \
- "source tree and remove the Makefile."
-
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree and removes this Makefile
-
-EXPORT_SRC:
- $(RM) gssapiP_dummy.h+ mechglueP.h+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < gssapiP_dummy.h > gssapiP_dummy.h+
- $(MV) gssapiP_dummy.h+ gssapiP_dummy.h
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < mechglueP.h > mechglueP.h+
- $(MV) mechglueP.h+ mechglueP.h
- $(RM) Makefile
- $(CHMOD) 444 gssapiP_dummy.h mechglueP.h
-
-# CRYPT DELETE START
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree.
-
-CRYPT_SRC:
- $(RM) mechglueP.h+ Makefile+
- sed -e "/CRYPT DELETE START/,/CRYPT DELETE END/d" \
- < mechglueP.h > mechglueP.h+
- $(MV) mechglueP.h+ mechglueP.h
- sed -e "/^# CRYPT DELETE START/,/^# CRYPT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
- $(CHMOD) 444 mechglueP.h Makefile
-
-# CRYPT DELETE END
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/gssapi/include/gssapiP_dummy.h b/usr/src/uts/common/gssapi/include/gssapiP_dummy.h
index 403afe095a..1b4d1ca4a6 100644
--- a/usr/src/uts/common/gssapi/include/gssapiP_dummy.h
+++ b/usr/src/uts/common/gssapi/include/gssapiP_dummy.h
@@ -27,8 +27,6 @@
#ifndef _GSSAPIP_DUMMY_H
#define _GSSAPIP_DUMMY_H
-#pragma ident "%Z%%M% %I% %E% SMI"
-
#ifdef __cplusplus
extern "C" {
#endif
@@ -215,7 +213,7 @@ DUMMY_STATIC OM_uint32 dummy_gss_verify
#endif
/* */);
-/* EXPORT DELETE START */
+
DUMMY_STATIC OM_uint32 dummy_gss_seal
(
void *, /* dummy context */
@@ -244,7 +242,6 @@ DUMMY_STATIC OM_uint32 dummy_gss_unseal
/* */, OM_uint32
#endif
/* */);
-/* EXPORT DELETE END */
OM_uint32 dummy_gss_display_status
(
diff --git a/usr/src/uts/common/gssapi/include/mechglueP.h b/usr/src/uts/common/gssapi/include/mechglueP.h
index 479a940a08..f79b660c85 100644
--- a/usr/src/uts/common/gssapi/include/mechglueP.h
+++ b/usr/src/uts/common/gssapi/include/mechglueP.h
@@ -222,7 +222,6 @@ typedef struct gss_config {
OM_uint32 *, /* time_rec */
gss_cred_id_t * /* delegated_cred_handle */
/* */);
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
#endif /* ! _KERNEL */
/*
@@ -242,7 +241,6 @@ typedef struct gss_config {
#endif
/* */);
#ifndef _KERNEL
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
OM_uint32 (*gss_process_context_token)
(
void *, /* context */
@@ -340,7 +338,6 @@ typedef struct gss_config {
OM_uint32 *, /* initiator_time_rec */
OM_uint32 * /* acceptor_time_rec */
/* */);
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
#endif /* ! _KERNEL */
/*
* Note: there are two gss_seal's in here. Make any changes to both.
@@ -360,7 +357,6 @@ typedef struct gss_config {
#endif
/* */);
#ifndef _KERNEL
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
OM_uint32 (*gss_export_sec_context)
(
void *, /* context */
@@ -447,52 +443,6 @@ typedef struct gss_config {
gss_buffer_t /* exported_name */
/* */);
#endif /* ! _KERNEL */
-/* EXPORT DELETE START */
-/* CRYPT DELETE START */
-/*
- * This block comment is Sun Proprietary: Need-To-Know.
- * What we are doing is leaving the seal and unseal entry points
- * in an obvious place before sign and unsign for the Domestic customer
- * of the Solaris Source Product. The Domestic customer of the Solaris Source
- * Product will have to deal with the problem of creating exportable libgss
- * binaries.
- * In the binary product that Sun builds, these entry points are elsewhere,
- * and bracketed with special comments so that the CRYPT_SRC and EXPORT_SRC
- * targets delete them.
- */
-#if 0
-/* CRYPT DELETE END */
- OM_uint32 (*gss_seal)
- (
- void *, /* context */
- OM_uint32 *, /* minor_status */
- const gss_ctx_id_t, /* context_handle */
- int, /* conf_req_flag */
- int, /* qop_req */
- const gss_buffer_t, /* input_message_buffer */
- int *, /* conf_state */
- gss_buffer_t /* output_message_buffer */
-#ifdef _KERNEL
- /* */, OM_uint32
-#endif
- /* */);
- OM_uint32 (*gss_unseal)
- (
- void *, /* context */
- OM_uint32 *, /* minor_status */
- const gss_ctx_id_t, /* context_handle */
- const gss_buffer_t, /* input_message_buffer */
- gss_buffer_t, /* output_message_buffer */
- int *, /* conf_state */
- int * /* qop_state */
-#ifdef _KERNEL
- /* */, OM_uint32
-#endif
- /* */);
-/* CRYPT DELETE START */
-#endif /* 0 */
-/* CRYPT DELETE END */
-/* EXPORT DELETE END */
OM_uint32 (*gss_sign)
(
void *, /* context */
@@ -801,7 +751,6 @@ struct kgss_ctx {
(*(KCTX_TO_MECH(ctx)->gss_import_sec_context))(KCTX_TO_PRIVATE(ctx),\
minor_st, tkn, int_ctx_id)
-/* EXPORT DELETE START */
#define KGSS_SEAL(minor_st, ctx, conf_req, qop, msg, conf_state, tkn) \
(*(KCTX_TO_MECH(ctx)->gss_seal))(KCTX_TO_PRIVATE(ctx), minor_st, \
KCTX_TO_CTX(ctx), conf_req, qop, msg, conf_state, tkn,\
@@ -812,8 +761,6 @@ struct kgss_ctx {
KCTX_TO_CTX(ctx), msg, tkn, conf, qop, \
KCTX_TO_CTXV(ctx))
-/* EXPORT DELETE END */
-
#define KGSS_INIT_CONTEXT(ctx) krb5_init_context(ctx)
#define KGSS_RELEASE_OID(minor_st, oid) krb5_gss_release_oid(minor_st, oid)
extern OM_uint32 kgss_release_oid(OM_uint32 *, gss_OID *);
diff --git a/usr/src/uts/common/gssapi/mechs/dummy/Makefile b/usr/src/uts/common/gssapi/mechs/dummy/Makefile
deleted file mode 100644
index 4c3fa353fa..0000000000
--- a/usr/src/uts/common/gssapi/mechs/dummy/Makefile
+++ /dev/null
@@ -1,66 +0,0 @@
-#
-# CDDL HEADER START
-#
-# The contents of this file are subject to the terms of the
-# Common Development and Distribution License, Version 1.0 only
-# (the "License"). You may not use this file except in compliance
-# with the License.
-#
-# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
-# or http://www.opensolaris.org/os/licensing.
-# See the License for the specific language governing permissions
-# and limitations under the License.
-#
-# When distributing Covered Code, include this CDDL HEADER in each
-# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
-# If applicable, add the following below this CDDL HEADER, with the
-# fields enclosed by brackets "[]" replaced with your own identifying
-# information: Portions Copyright [yyyy] [name of copyright owner]
-#
-# CDDL HEADER END
-#
-#
-# Copyright (c) 1997-2001 by Sun Microsystems, Inc.
-# All rights reserved.
-#
-#pragma ident "%Z%%M% %I% %E% SMI"
-
-include ../../../../../Makefile.master
-
-# EXPORT DELETE START
-
-all:
- @$(ECHO) " This Makefile is used to clean up the source tree\n" \
- "for export distribution.\n" \
- "[Usage]: make [EXPORT_SRC] [CRYPT_SRC]\n\n" \
- "WARNING: EXPORT_SRC, CRYPT_SRC targets change the\n" \
- "source tree and remove the Makefile."
-
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree and removes this Makefile
-
-EXPORT_SRC:
- $(RM) dmech.c+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < dmech.c > dmech.c+
- $(MV) dmech.c+ dmech.c
- $(RM) Makefile
- $(CHMOD) 444 dmech.c
-
-# CRYPT DELETE START
-# CRYPT DELETE START
-# Special target to clean up the source tree for domestic distribution
-# Warning: This target changes the source tree
-
-CRYPT_SRC:
- $(RM) dmech.c+ Makefile+
- sed -e "/CRYPT DELETE START/,/CRYPT DELETE END/d" \
- < dmech.c > dmech.c+
- $(MV) dmech.c+ dmech.c
- sed -e "/^# CRYPT DELETE START/,/^# CRYPT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
- $(CHMOD) 444 dmech.c Makefile
-
-# CRYPT DELETE END
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/gssapi/mechs/dummy/dmech.c b/usr/src/uts/common/gssapi/mechs/dummy/dmech.c
index 04f0949d24..411a000c63 100644
--- a/usr/src/uts/common/gssapi/mechs/dummy/dmech.c
+++ b/usr/src/uts/common/gssapi/mechs/dummy/dmech.c
@@ -89,24 +89,10 @@ static struct gss_config dummy_mechanism =
NULL, /* context */
NULL, /* next */
TRUE, /* uses_kmod */
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
dummy_gss_unseal,
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
dummy_gss_delete_sec_context,
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
dummy_gss_seal,
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
dummy_gss_import_sec_context,
-/* EXPORT DELETE START */
-/* CRYPT DELETE START */
-#if 0
-/* CRYPT DELETE END */
- dummy_gss_seal,
- dummy_gss_unseal,
-/* CRYPT DELETE START */
-#endif
-/* CRYPT DELETE END */
-/* EXPORT DELETE END */
dummy_gss_sign,
dummy_gss_verify
};
@@ -275,7 +261,6 @@ static OM_uint32
return (GSS_S_COMPLETE);
}
-/* EXPORT DELETE START */
/*ARGSUSED*/
static OM_uint32
dummy_gss_seal(context, minor_status, context_handle, conf_req_flag,
@@ -363,8 +348,6 @@ dummy_gss_unseal(context, minor_status, context_handle,
return (GSS_S_COMPLETE);
}
-/* EXPORT DELETE END */
-
/*ARGSUSED*/
OM_uint32
dummy_gss_import_sec_context(ct, minor_status, interprocess_token,
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/Makefile b/usr/src/uts/common/gssapi/mechs/krb5/Makefile
deleted file mode 100644
index 8437419537..0000000000
--- a/usr/src/uts/common/gssapi/mechs/krb5/Makefile
+++ /dev/null
@@ -1,84 +0,0 @@
-#
-# Copyright 1997-2003 Sun Microsystems, Inc. All rights reserved.
-# Use is subject to license terms.
-#
-# ident "%Z%%M% %I% %E% SMI"
-#
-# /usr/src/uts/common/gssapi/mechs/krb5/Makefile
-
-include ../../../../../Makefile.master
-
-# EXPORT DELETE START
-
-all:
- @$(ECHO) " This Makefile is used to clean up the source tree\n" \
- "for export distribution.\n" \
- "[Usage]: make [EXPORT_SRC] [CRYPT_SRC]\n\n" \
- "WARNING: EXPORT_SRC, CRYPT_SRC targets change the\n" \
- "source tree and remove the Makefile."
-
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree
-EXPORT_SRC:
- $(RM) krb5mech.c+ include/gssapiP_krb5.h+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < include/gssapiP_krb5.h > include/gssapiP_krb5.h+
- $(MV) include/gssapiP_krb5.h+ include/gssapiP_krb5.h
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < krb5mech.c > krb5mech.c+
- $(MV) krb5mech.c+ krb5mech.c
-
- $(RM) crypto/des/f_cbc.c+ crypto/des/f_cksum.c+ \
- crypto/des/d3_cbc.c+ mech/seal.c+ mech/unseal.c+
-
- $(SED) -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < mech/seal.c > mech/seal.c+
- $(MV) mech/seal.c+ mech/seal.c
-
- $(SED) -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < mech/unseal.c > mech/unseal.c+
- $(MV) mech/unseal.c+ mech/unseal.c
-
- $(SED) -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < crypto/des/f_cbc.c > crypto/des/f_cbc.c+
- $(MV) crypto/des/f_cbc.c+ crypto/des/f_cbc.c
-
- $(SED) -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < crypto/des/d3_cbc.c > crypto/des/d3_cbc.c+
- $(MV) crypto/des/d3_cbc.c+ crypto/des/d3_cbc.c
-
- $(SED) -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < crypto/des/f_cksum.c > crypto/des/f_cksum.c+
- $(MV) crypto/des/f_cksum.c+ crypto/des/f_cksum.c
-
- $(RM) ../../../Makefile.files+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < ../../../Makefile.files > ../../../Makefile.files+
- $(MV) ../../../Makefile.files+ ../../../Makefile.files
-
- $(RM) Makefile+
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
-
- $(CHMOD) 444 krb5mech.c include/gssapiP_krb5.h crypto/des/f_cbc.c \
- crypto/des/f_cksum.c crypto/des/d3_cbc.c \
- mech/seal.c mech/unseal.c
-
-# CRYPT DELETE START
-# Special target to clean up the source tree for domestic distribution
-# Warning: This target changes the source tree
-CRYPT_SRC:
- $(RM) krb5mech.c+
- sed -e "/CRYPT DELETE START/,/CRYPT DELETE END/d" \
- < krb5mech.c > krb5mech.c+
- $(MV) krb5mech.c+ krb5mech.c
-
- $(RM) Makefile+
- sed -e "/^# CRYPT DELETE START/,/^# CRYPT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
-
- $(CHMOD) 444 krb5mech.c Makefile
-# CRYPT DELETE END
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/d3_cbc.c b/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/d3_cbc.c
index 4f8ee963f8..bedea49b0f 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/d3_cbc.c
+++ b/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/d3_cbc.c
@@ -37,7 +37,6 @@ mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cbl
const mit_des_cblock ivec, int encrypt)
{
int ret = KRB5_PROG_ETYPE_NOSUPP;
-/* EXPORT DELETE START */
KRB5_MECH_TO_PKCS algos;
CK_MECHANISM mechanism;
CK_RV rv;
@@ -99,7 +98,6 @@ final_cleanup:
if (ret)
(void) memset(out, 0, length);
-/* EXPORT DELETE END */
KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() end ret=%d\n", ret);
return(ret);
}
@@ -116,7 +114,6 @@ mit_des3_cbc_encrypt(krb5_context context,
const mit_des_cblock ivec, int encrypt)
{
int ret = KRB5_PROG_ETYPE_NOSUPP;
-/* EXPORT DELETE START */
krb5_data ivdata;
KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() start encrypt=%d", encrypt);
@@ -127,7 +124,6 @@ mit_des3_cbc_encrypt(krb5_context context,
ret = k5_ef_crypto((const char *)in, (char *)out,
length, key, &ivdata, encrypt);
-/* EXPORT DELETE END */
KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() end retval=%d", ret);
return(ret);
}
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cbc.c b/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cbc.c
index 10fe4f01d7..b5577c86bb 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cbc.c
+++ b/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cbc.c
@@ -40,7 +40,6 @@ mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt)
int encrypt;
{
krb5_error_code ret = KRB5_PROG_ETYPE_NOSUPP;
-/* EXPORT DELETE START */
KRB5_MECH_TO_PKCS algos;
CK_MECHANISM mechanism;
CK_RV rv;
@@ -102,7 +101,6 @@ final_cleanup:
if (ret)
(void) memset(out, 0, length);
-/* EXPORT DELETE END */
KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() end retval=%d", ret);
return(ret);
@@ -137,7 +135,6 @@ mit_des_cbc_encrypt(krb5_context context,
mit_des_cblock ivec, int encrypt)
{
int ret = KRB5_PROG_ETYPE_NOSUPP;
-/* EXPORT DELETE START */
krb5_data ivdata;
ret = 0;
@@ -149,7 +146,6 @@ mit_des_cbc_encrypt(krb5_context context,
ret = k5_ef_crypto((const char *)in,
(char *)out, length, key, &ivdata, encrypt);
-/* EXPORT DELETE END */
KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() end retval=%d", ret);
return(ret);
}
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cksum.c b/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cksum.c
index a5c46373ff..639924c309 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cksum.c
+++ b/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/f_cksum.c
@@ -30,7 +30,6 @@ mit_des_cbc_cksum(krb5_context context,
const krb5_octet *ivec)
{
krb5_error_code ret = 0;
-/* EXPORT DELETE START */
krb5_data input;
krb5_data output;
krb5_data ivecdata;
@@ -45,6 +44,5 @@ mit_des_cbc_cksum(krb5_context context,
ret = k5_ef_mac(context, key, &ivecdata,
(const krb5_data *)&input, &output);
-/* EXPORT DELETE END */
return (ret);
}
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/include/gssapiP_krb5.h b/usr/src/uts/common/gssapi/mechs/krb5/include/gssapiP_krb5.h
index 1a2f404170..521daacd40 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/include/gssapiP_krb5.h
+++ b/usr/src/uts/common/gssapi/mechs/krb5/include/gssapiP_krb5.h
@@ -428,7 +428,6 @@ OM_uint32 krb5_gss_verify
#endif
);
-/* EXPORT DELETE START */
OM_uint32 krb5_gss_seal
(OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
@@ -453,7 +452,6 @@ OM_uint32 krb5_gss_unseal
/* */, OM_uint32 /* context verifier */
#endif
);
-/* EXPORT DELETE END */
OM_uint32 krb5_gss_display_status
(OM_uint32*, /* minor_status */
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/krb5mech.c b/usr/src/uts/common/gssapi/mechs/krb5/krb5mech.c
index 00a8d7be18..d477d03a20 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/krb5mech.c
+++ b/usr/src/uts/common/gssapi/mechs/krb5/krb5mech.c
@@ -61,7 +61,6 @@ static OM_uint32 k5glue_verify
int *, /* qop_state */
OM_uint32);
-/* EXPORT DELETE START */
static OM_uint32 k5glue_seal
(void *, OM_uint32 *, /* minor_status */
gss_ctx_id_t, /* context_handle */
@@ -80,7 +79,6 @@ static OM_uint32 k5glue_unseal
int *, /* conf_state */
int *, /* qop_state */
OM_uint32);
-/* EXPORT DELETE END */
static OM_uint32 k5glue_import_sec_context
(void *, OM_uint32 *, /* minor_status */
@@ -94,24 +92,10 @@ static struct gss_config krb5_mechanism =
NULL, /* context */
NULL, /* next */
TRUE, /* uses_kmod */
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
k5glue_unseal,
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
k5glue_delete_sec_context,
-/* EXPORT DELETE START */ /* CRYPT DELETE START */
k5glue_seal,
-/* EXPORT DELETE END */ /* CRYPT DELETE END */
k5glue_import_sec_context,
-/* EXPORT DELETE START */
-/* CRYPT DELETE START */
-#if 0
-/* CRYPT DELETE END */
- k5glue_seal,
- k5glue_unseal,
-/* CRYPT DELETE START */
-#endif
-/* CRYPT DELETE END */
-/* EXPORT DELETE END */
k5glue_sign,
k5glue_verify,
};
@@ -223,7 +207,6 @@ k5glue_import_sec_context(ctx, minor_status, interprocess_token, context_handle)
context_handle));
}
-/* EXPORT DELETE START */
/* V1 only */
/* ARGSUSED */
static OM_uint32
@@ -244,7 +227,6 @@ k5glue_seal(ctx, minor_status, context_handle, conf_req_flag, qop_req,
conf_req_flag, qop_req, input_message_buffer,
conf_state, output_message_buffer, gssd_ctx_verifier));
}
-/* EXPORT DELETE END */
/* ARGSUSED */
static OM_uint32
@@ -263,7 +245,6 @@ k5glue_sign(ctx, minor_status, context_handle,
qop_req, message_buffer, message_token, gssd_ctx_verifier));
}
-/* EXPORT DELETE START */
/* ARGSUSED */
static OM_uint32
k5glue_unseal(ctx, minor_status, context_handle, input_message_buffer,
@@ -281,7 +262,6 @@ k5glue_unseal(ctx, minor_status, context_handle, input_message_buffer,
input_message_buffer, output_message_buffer,
conf_state, qop_state, gssd_ctx_verifier));
}
-/* EXPORT DELETE END */
/* V1 only */
/* ARGSUSED */
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/mech/seal.c b/usr/src/uts/common/gssapi/mechs/krb5/mech/seal.c
index 9ff22e20bf..7bd4f00225 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/mech/seal.c
+++ b/usr/src/uts/common/gssapi/mechs/krb5/mech/seal.c
@@ -1,12 +1,8 @@
-/* EXPORT DELETE START */
-
/*
* Copyright 2007 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
-#pragma ident "%Z%%M% %I% %E% SMI"
-
/*
* Copyright 1993 by OpenVision Technologies, Inc.
*
@@ -91,5 +87,3 @@ krb5_gss_wrap(minor_status, context_handle, conf_req_flag,
output_message_buffer, KG_TOK_WRAP_MSG));
#endif
}
-
-/* EXPORT DELETE END */
diff --git a/usr/src/uts/common/gssapi/mechs/krb5/mech/unseal.c b/usr/src/uts/common/gssapi/mechs/krb5/mech/unseal.c
index 7636d01dba..d46d7dade6 100644
--- a/usr/src/uts/common/gssapi/mechs/krb5/mech/unseal.c
+++ b/usr/src/uts/common/gssapi/mechs/krb5/mech/unseal.c
@@ -1,5 +1,3 @@
-/* EXPORT DELETE START */
-
/*
* Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
@@ -84,5 +82,3 @@ krb5_gss_unwrap(minor_status, context_handle,
return(rstat);
#endif
}
-
-/* EXPORT DELETE END */
diff --git a/usr/src/uts/common/io/timod.c b/usr/src/uts/common/io/timod.c
index 41bf9ce7dc..57817c2f79 100644
--- a/usr/src/uts/common/io/timod.c
+++ b/usr/src/uts/common/io/timod.c
@@ -18,7 +18,6 @@
*
* CDDL HEADER END
*/
-/* ONC_PLUS EXTRACT START */
/*
* Copyright 2010 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
@@ -31,7 +30,6 @@
* Transport Interface Library cooperating module - issue 2
*/
-/* ONC_PLUS EXTRACT END */
#include <sys/param.h>
#include <sys/types.h>
#include <sys/stream.h>
@@ -195,9 +193,7 @@ struct tim_tim {
#define LOCORDREL 0x0020 /* local end has orderly released */
#define REMORDREL 0x0040 /* remote end had orderly released */
#define NAMEPROC 0x0080 /* processing a NAME ioctl */
-/* ONC_PLUS EXTRACT START */
#define DO_MYNAME 0x0100 /* timod handles TI_GETMYNAME */
-/* ONC_PLUS EXTRACT END */
#define DO_PEERNAME 0x0200 /* timod handles TI_GETPEERNAME */
#define TI_CAP_RECVD 0x0400 /* TI_CAPABILITY received */
#define CAP_WANTS_INFO 0x0800 /* TI_CAPABILITY has TC1_INFO set */
@@ -313,20 +309,14 @@ int dotilog = 0;
#define TIMOD_ID 3
-/* ONC_PLUS EXTRACT START */
static int timodopen(queue_t *, dev_t *, int, int, cred_t *);
-/* ONC_PLUS EXTRACT END */
static int timodclose(queue_t *, int, cred_t *);
static void timodwput(queue_t *, mblk_t *);
static void timodrput(queue_t *, mblk_t *);
-/* ONC_PLUS EXTRACT START */
static void timodrsrv(queue_t *);
-/* ONC_PLUS EXTRACT END */
static void timodwsrv(queue_t *);
-/* ONC_PLUS EXTRACT START */
static int timodrproc(queue_t *, mblk_t *);
static int timodwproc(queue_t *, mblk_t *);
-/* ONC_PLUS EXTRACT END */
/* stream data structure definitions */
@@ -352,7 +342,6 @@ static struct qinit timodwinit = {
};
static struct streamtab timinfo = { &timodrinit, &timodwinit, NULL, NULL };
-/* ONC_PLUS EXTRACT START */
/*
* timodopen - open routine gets called when the module gets pushed
* onto the stream.
@@ -488,7 +477,6 @@ tim_buffer(void *arg)
enableok(q);
qenable(q);
}
-/* ONC_PLUS EXTRACT END */
/*
* timodclose - This routine gets called when the module gets popped
@@ -637,7 +625,6 @@ timodrput(queue_t *q, mblk_t *mp)
}
}
-/* ONC_PLUS EXTRACT START */
/*
* timodrsrv - Module read queue service procedure. This is called when
* messages are placed on an empty queue, when high priority
@@ -652,7 +639,6 @@ timodrput(queue_t *q, mblk_t *mp)
static void
timodrsrv(queue_t *q)
{
-/* ONC_PLUS EXTRACT END */
mblk_t *mp;
struct tim_tim *tp;
@@ -671,7 +657,6 @@ timodrsrv(queue_t *q)
return;
}
}
-/* ONC_PLUS EXTRACT START */
}
/*
@@ -701,11 +686,9 @@ timodrproc(queue_t *q, mblk_t *mp)
struct iocblk *iocbp;
mblk_t *nbp;
size_t blen;
-/* ONC_PLUS EXTRACT END */
tp = (struct tim_tim *)q->q_ptr;
-/* ONC_PLUS EXTRACT START */
switch (mp->b_datap->db_type) {
default:
putnext(q, mp);
@@ -786,14 +769,11 @@ timodrproc(queue_t *q, mblk_t *mp)
pptr = (union T_primitives *)mp->b_rptr;
switch (pptr->type) {
default:
-/* ONC_PLUS EXTRACT END */
if (auditing)
audit_sock(T_UNITDATA_IND, q, mp, TIMOD_ID);
-/* ONC_PLUS EXTRACT START */
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT END */
case T_ERROR_ACK:
/* Restore db_type - recover() might have changed it */
@@ -903,7 +883,6 @@ timodrproc(queue_t *q, mblk_t *mp)
tim_send_reply(q, mp, tp, pptr->ok_ack.CORRECT_prim);
break;
-/* ONC_PLUS EXTRACT START */
case T_BIND_ACK: {
struct T_bind_ack *ackp =
(struct T_bind_ack *)mp->b_rptr;
@@ -967,7 +946,6 @@ timodrproc(queue_t *q, mblk_t *mp)
break;
}
-/* ONC_PLUS EXTRACT END */
case T_OPTMGMT_ACK:
tilog("timodrproc: Got T_OPTMGMT_ACK\n", 0);
@@ -1200,7 +1178,6 @@ timodrproc(queue_t *q, mblk_t *mp)
tim_send_reply(q, mp, tp, T_ADDR_REQ);
break;
-/* ONC_PLUS EXTRACT START */
case T_CONN_IND: {
struct T_conn_ind *tcip =
(struct T_conn_ind *)mp->b_rptr;
@@ -1219,15 +1196,12 @@ timodrproc(queue_t *q, mblk_t *mp)
return (1);
}
}
-/* ONC_PLUS EXTRACT END */
if (auditing)
audit_sock(T_CONN_IND, q, mp, TIMOD_ID);
-/* ONC_PLUS EXTRACT START */
putnext(q, mp);
break;
}
-/* ONC_PLUS EXTRACT END */
case T_CONN_CON:
mutex_enter(&tp->tim_mutex);
if (tp->tim_peercred != NULL)
@@ -1340,7 +1314,6 @@ timodrproc(queue_t *q, mblk_t *mp)
}
break;
-/* ONC_PLUS EXTRACT START */
case M_FLUSH:
tilog("timodrproc: Got M_FLUSH\n", 0);
@@ -1353,7 +1326,6 @@ timodrproc(queue_t *q, mblk_t *mp)
}
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT END */
case M_IOCACK:
iocbp = (struct iocblk *)mp->b_rptr;
@@ -1429,7 +1401,6 @@ timodrproc(queue_t *q, mblk_t *mp)
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT START */
case M_IOCNAK:
tilog("timodrproc: Got M_IOCNAK\n", 0);
@@ -1462,13 +1433,11 @@ timodrproc(queue_t *q, mblk_t *mp)
}
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT END */
}
return (0);
}
-/* ONC_PLUS EXTRACT START */
/*
* timodwput - Module write put procedure. This is called from
* the module, driver, or stream head upstream/downstream.
@@ -1490,7 +1459,6 @@ timodwput(queue_t *q, mblk_t *mp)
* enqueue those M_IOCTLs which will result in an
* M_PCPROTO (ie, high priority) message being created.
*/
-/* ONC_PLUS EXTRACT END */
if (q->q_first != 0 && mp->b_datap->db_type < QPCTL) {
if (mp->b_datap->db_type == M_IOCTL) {
iocbp = (struct iocblk *)mp->b_rptr;
@@ -1509,7 +1477,6 @@ timodwput(queue_t *q, mblk_t *mp)
return;
}
}
-/* ONC_PLUS EXTRACT START */
/*
* Inline processing of data (to avoid additional procedure call).
* Rest is handled in timodwproc.
@@ -1538,7 +1505,6 @@ timodwput(queue_t *q, mblk_t *mp)
case M_PCPROTO:
pptr = (union T_primitives *)mp->b_rptr;
switch (pptr->type) {
-/* ONC_PLUS EXTRACT END */
case T_UNITDATA_REQ:
tp = (struct tim_tim *)q->q_ptr;
ASSERT(tp);
@@ -1571,7 +1537,6 @@ timodwput(queue_t *q, mblk_t *mp)
break;
}
break;
-/* ONC_PLUS EXTRACT START */
default:
(void) timodwproc(q, mp);
break;
@@ -1627,7 +1592,6 @@ timodwproc(queue_t *q, mblk_t *mp)
default:
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT END */
case M_DATA:
if (tp->tim_flags & CLTS) {
@@ -1644,7 +1608,6 @@ timodwproc(queue_t *q, mblk_t *mp)
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT START */
case M_IOCTL:
iocbp = (struct iocblk *)mp->b_rptr;
@@ -1669,7 +1632,6 @@ timodwproc(queue_t *q, mblk_t *mp)
tim_ioctl_retry(q);
return (1);
}
-/* ONC_PLUS EXTRACT END */
switch (iocbp->ioc_cmd) {
default:
@@ -1919,7 +1881,6 @@ timodwproc(queue_t *q, mblk_t *mp)
}
break;
-/* ONC_PLUS EXTRACT START */
case TI_GETMYNAME:
tilog("timodwproc: Got TI_GETMYNAME\n", 0);
@@ -1989,7 +1950,6 @@ getname:
}
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT END */
case T_UNITDATA_REQ:
if (tp->tim_flags & CLTS) {
@@ -2009,7 +1969,6 @@ getname:
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT START */
case T_CONN_REQ: {
struct T_conn_req *reqp = (struct T_conn_req *)
mp->b_rptr;
@@ -2055,10 +2014,8 @@ getname:
}
if (tp->tim_flags & COTS)
tp->tim_flags |= CONNWAIT;
-/* ONC_PLUS EXTRACT END */
if (auditing)
audit_sock(T_CONN_REQ, q, mp, TIMOD_ID);
-/* ONC_PLUS EXTRACT START */
putnext(q, mp);
break;
}
@@ -2119,7 +2076,6 @@ getname:
break;
}
-/* ONC_PLUS EXTRACT END */
case T_DISCON_REQ: {
struct T_discon_req *disp;
struct T_conn_ind *conp;
@@ -2175,7 +2131,6 @@ getname:
*/
putnext(q, mp);
break;
-/* ONC_PLUS EXTRACT START */
}
break;
case M_FLUSH:
@@ -2446,7 +2401,6 @@ ti_doname(
return (ret);
}
-/* ONC_PLUS EXTRACT END */
/*
* Fill in the address of a connectionless data packet if a connect
@@ -2580,7 +2534,6 @@ tim_findlink(t_uscalar_t id)
return (tp);
}
-/* ONC_PLUS EXTRACT START */
static void
tim_recover(queue_t *q, mblk_t *mp, t_scalar_t size)
{
@@ -2691,7 +2644,6 @@ ti_expind_on_rdqueues(queue_t *rq)
return (0); /* no expdata on read queues */
}
-/* ONC_PLUS EXTRACT END */
static void
tim_tcap_timer(void *q_ptr)
{
diff --git a/usr/src/uts/common/os/flock.c b/usr/src/uts/common/os/flock.c
index da81003d1c..4cb6ea8d82 100644
--- a/usr/src/uts/common/os/flock.c
+++ b/usr/src/uts/common/os/flock.c
@@ -18,7 +18,6 @@
*
* CDDL HEADER END
*/
-/* ONC_PLUS EXTRACT START */
/*
* Copyright 2007 Sun Microsystems, Inc. All rights reserved.
@@ -28,8 +27,6 @@
/* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
/* All Rights Reserved */
-#pragma ident "%Z%%M% %I% %E% SMI"
-
#include <sys/flock_impl.h>
#include <sys/vfs.h>
#include <sys/t_lock.h> /* for <sys/callb.h> */
@@ -609,7 +606,6 @@ flk_add_callback(flk_callback_t *newcb,
cblist->cb_prev->cb_next = newcb;
cblist->cb_prev = newcb;
}
-/* ONC_PLUS EXTRACT END */
/*
* Initialize the flk_edge_cache data structure and create the
@@ -984,7 +980,6 @@ block:
}
}
-/* ONC_PLUS EXTRACT START */
/*
* The actual execution of the request in the simple case is only to
* insert the 'request' in the list of active locks if it is not an
@@ -1043,7 +1038,6 @@ flk_execute_request(lock_descriptor_t *request)
return (0);
}
-/* ONC_PLUS EXTRACT END */
/*
* 'request' is blocked by some one therefore we put it into sleep queue.
@@ -2243,7 +2237,6 @@ done:
return (result);
}
-/* ONC_PLUS EXTRACT START */
/*
* Determine whether there are any locks for the given vnode with a remote
* sysid. Returns zero if not, non-zero if there are.
@@ -2614,7 +2607,6 @@ cleanlocks(vnode_t *vp, pid_t pid, int sysid)
CHECK_OWNER_LOCKS(gp, pid, sysid, vp);
mutex_exit(&gp->gp_mutex);
}
-/* ONC_PLUS EXTRACT END */
/*
@@ -2653,7 +2645,6 @@ chklock(
return (error);
}
-/* ONC_PLUS EXTRACT START */
/*
* convoff - converts the given data (start, whence) to the
* given whence.
@@ -2706,7 +2697,6 @@ convoff(vp, lckdat, whence, offset)
lckdat->l_whence = (short)whence;
return (0);
}
-/* ONC_PLUS EXTRACT END */
/* proc_graph function definitions */
@@ -3070,7 +3060,6 @@ add:
mutex_exit(&flock_lock);
}
-/* ONC_PLUS EXTRACT START */
/*
* Set the control status for lock manager requests.
*
@@ -3692,7 +3681,6 @@ unlock_lockmgr_granted(struct flock_globals *fg)
mutex_exit(&gp->gp_mutex);
}
}
-/* ONC_PLUS EXTRACT END */
/*
@@ -3715,7 +3703,6 @@ wait_for_lock(lock_descriptor_t *request)
}
}
-/* ONC_PLUS EXTRACT START */
/*
* Create an flock structure from the existing lock information
*
@@ -3870,7 +3857,6 @@ report_blocker(lock_descriptor_t *blocker, lock_descriptor_t *request)
}
}
}
-/* ONC_PLUS EXTRACT END */
/*
* PSARC case 1997/292
diff --git a/usr/src/uts/common/os/sig.c b/usr/src/uts/common/os/sig.c
index 4bad31d2cb..d3ce92fe24 100644
--- a/usr/src/uts/common/os/sig.c
+++ b/usr/src/uts/common/os/sig.c
@@ -2227,7 +2227,6 @@ sigcheck(proc_t *p, kthread_t *t)
#endif
}
-/* ONC_PLUS EXTRACT START */
void
sigintr(k_sigset_t *smask, int intable)
{
@@ -2304,7 +2303,6 @@ sigintr(k_sigset_t *smask, int intable)
lwp->lwp_nostop++;
}
-/* ONC_PLUS EXTRACT END */
void
sigunintr(k_sigset_t *smask)
diff --git a/usr/src/uts/common/os/swapgeneric.c b/usr/src/uts/common/os/swapgeneric.c
index 18ce39949a..bfb6ccc05e 100644
--- a/usr/src/uts/common/os/swapgeneric.c
+++ b/usr/src/uts/common/os/swapgeneric.c
@@ -18,11 +18,9 @@
*
* CDDL HEADER END
*/
-/* ONC_PLUS EXTRACT START */
/*
* Copyright (c) 1982, 2010, Oracle and/or its affiliates. All rights reserved.
*/
-/* ONC_PLUS EXTRACT END */
/*
* Configure root, swap and dump devices.
@@ -326,7 +324,6 @@ preload_module(struct sysparam *sysp, void *p)
return (0);
}
-/* ONC_PLUS EXTRACT START */
/*
* We want to load all the modules needed to mount the root filesystem,
* so that when we start the ball rolling in 'getrootdev', every module
@@ -340,7 +337,6 @@ loadrootmodules(void)
char *this;
char *name;
int err;
-/* ONC_PLUS EXTRACT END */
int i, proplen;
extern char *impl_module_list[];
extern char *platform_module_list[];
@@ -483,7 +479,6 @@ loop:
BMDPRINTF(("loadrootmodules: preload_module\n"));
(void) mod_sysctl_type(MOD_FORCELOAD, preload_module, NULL);
-/* ONC_PLUS EXTRACT START */
/*
* If we booted otw then load in the plumbing
* routine now while we still can. If we didn't
@@ -582,7 +577,6 @@ out:
return (err);
}
-/* ONC_PLUS EXTRACT END */
static int
get_bootpath_prop(char *bootpath)
diff --git a/usr/src/uts/common/os/sysent.c b/usr/src/uts/common/os/sysent.c
index bf62a79268..e3965f7d82 100644
--- a/usr/src/uts/common/os/sysent.c
+++ b/usr/src/uts/common/os/sysent.c
@@ -19,8 +19,6 @@
* CDDL HEADER END
*/
-/* ONC_PLUS EXTRACT START */
-
/*
* Copyright (c) 1988, 2010, Oracle and/or its affiliates. All rights reserved.
* Copyright 2012 Milan Jurik. All rights reserved.
@@ -30,8 +28,6 @@
/* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
/* All Rights Reserved */
-/* ONC_PLUS EXTRACT END */
-
#include <sys/param.h>
#include <sys/types.h>
#include <sys/systm.h>
@@ -53,7 +49,6 @@
struct hrtsysa;
struct mmaplf32a;
-/* ONC_PLUS EXTRACT START */
/*
* This table is the switch used to transfer to the appropriate
* routine for processing a system call. Each row contains the
@@ -61,7 +56,6 @@ struct mmaplf32a;
* in trap.c whether a setjmp() is not necessary, and a pointer
* to the routine.
*/
-/* ONC_PLUS EXTRACT END */
int access(char *, int);
int alarm(int);
@@ -422,7 +416,6 @@ typedef int64_t (*llfcn_t)(); /* for casting one-word returns */
*/
#define SYSENT_LOADABLE() \
{ 0, SE_LOADABLE, (int (*)())nosys, NULL, loadable_syscall }
-/* ONC_PLUS EXTRACT END */
/*
* Initialization macro for loadable 32-bit compatibility system calls.
@@ -433,13 +426,11 @@ typedef int64_t (*llfcn_t)(); /* for casting one-word returns */
struct sysent nosys_ent = SYSENT_NOSYS();
-/* ONC_PLUS EXTRACT START */
/*
* Native sysent table.
*/
struct sysent sysent[NSYSCALL] =
{
-/* ONC_PLUS EXTRACT END */
/* 0 */ IF_LP64(
SYSENT_NOSYS(),
SYSENT_C("indir", indir, 1)),
@@ -564,9 +555,7 @@ struct sysent sysent[NSYSCALL] =
/* 103 */ SYSENT_CI("statvfs", statvfs, 2),
/* 104 */ SYSENT_CI("fstatvfs", fstatvfs, 2),
/* 105 */ SYSENT_CI("getloadavg", getloadavg, 2),
-/* ONC_PLUS EXTRACT START */
/* 106 */ SYSENT_LOADABLE(), /* nfssys */
-/* ONC_PLUS EXTRACT END */
/* 107 */ SYSENT_CI("waitsys", waitsys, 4),
/* 108 */ SYSENT_CI("sigsendset", sigsendsys, 2),
/* 109 */ IF_x86(
@@ -765,9 +754,7 @@ struct sysent sysent[NSYSCALL] =
/* 253 */ SYSENT_CI("cladm", cladm, 3),
/* 254 */ SYSENT_CI("uucopy", uucopy, 3),
/* 255 */ SYSENT_CI("umount2", umount2, 2)
-/* ONC_PLUS EXTRACT START */
};
-/* ONC_PLUS EXTRACT END */
#ifdef _SYSCALL32_IMPL
@@ -821,14 +808,12 @@ extern ssize_t sendto32(int32_t, caddr32_t, size32_t, int32_t, caddr32_t,
extern int privsys32(int, priv_op_t, priv_ptype_t, caddr32_t, size32_t, int);
extern int ucredsys32(int, int, caddr32_t);
-/* ONC_PLUS EXTRACT START */
/*
* sysent table for ILP32 processes running on
* a LP64 kernel.
*/
struct sysent sysent32[NSYSCALL] =
{
-/* ONC_PLUS EXTRACT END */
/* 0 */ SYSENT_C("indir", indir, 1),
/* 1 */ SYSENT_CI("exit", (int (*)())rexit, 1),
/* 2 */ SYSENT_LOADABLE32(), /* (was forkall) */
@@ -937,9 +922,7 @@ struct sysent sysent32[NSYSCALL] =
/* 103 */ SYSENT_CI("statvfs", statvfs32, 2),
/* 104 */ SYSENT_CI("fstatvfs", fstatvfs32, 2),
/* 105 */ SYSENT_CI("getloadavg", getloadavg, 2),
-/* ONC_PLUS EXTRACT START */
/* 106 */ SYSENT_LOADABLE32(), /* nfssys */
-/* ONC_PLUS EXTRACT END */
/* 107 */ SYSENT_CI("waitsys", waitsys32, 4),
/* 108 */ SYSENT_CI("sigsendset", sigsendsys, 2),
/* 109 */ IF_x86(
@@ -1096,9 +1079,7 @@ struct sysent sysent32[NSYSCALL] =
/* 253 */ SYSENT_CI("cladm", cladm, 3),
/* 254 */ SYSENT_CI("uucopy", uucopy, 3),
/* 255 */ SYSENT_CI("umount2", umount2, 2)
-/* ONC_PLUS EXTRACT START */
};
-/* ONC_PLUS EXTRACT END */
#endif /* _SYSCALL32_IMPL */
/*
diff --git a/usr/src/uts/common/rpc/Makefile b/usr/src/uts/common/rpc/Makefile
index 7f2941ab73..2c5ed640b0 100644
--- a/usr/src/uts/common/rpc/Makefile
+++ b/usr/src/uts/common/rpc/Makefile
@@ -21,8 +21,6 @@
#
#
-# ident "%Z%%M% %I% %E% SMI"
-#
# Copyright 2005 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
#
@@ -103,21 +101,6 @@ key_prot.h: key_prot.x
pmap_prot.h: pmap_prot.x
$(RPCGEN) -h pmap_prot.x > $@
-# EXPORT DELETE START
-# Special target to clean up the source tree for export distribution
-# Warning: This target changes the source tree
-EXPORT_SRC:
- $(RM) Makefile+ sec_gss/rpcsec_gss_misc.c+
- $(SED) -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(MV) Makefile+ Makefile
- $(SED) -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < sec_gss/rpcsec_gss_misc.c > sec_gss/rpcsec_gss_misc.c+
- $(MV) sec_gss/rpcsec_gss_misc.c+ sec_gss/rpcsec_gss_misc.c
- $(CHMOD) 444 Makefile sec_gss/rpcsec_gss_misc.c
-
-# EXPORT DELETE END
-
rpc_sztypes.h: rpc_sztypes.x
$(RPCGEN) -C -h rpc_sztypes.x > $@
diff --git a/usr/src/uts/common/rpc/sec_gss/rpcsec_gss_misc.c b/usr/src/uts/common/rpc/sec_gss/rpcsec_gss_misc.c
index 4e23daca68..76e6ea1c3e 100644
--- a/usr/src/uts/common/rpc/sec_gss/rpcsec_gss_misc.c
+++ b/usr/src/uts/common/rpc/sec_gss/rpcsec_gss_misc.c
@@ -145,9 +145,7 @@ __rpc_gss_wrap_data(service, qop, context, seq_num, out_xdrs,
gss_buffer_desc in_buf, out_buf;
XDR temp_xdrs;
char *temp_data;
-/* EXPORT DELETE START */
bool_t conf_state;
-/* EXPORT DELETE END */
bool_t ret = FALSE;
int size;
@@ -185,7 +183,6 @@ __rpc_gss_wrap_data(service, qop, context, seq_num, out_xdrs,
switch (service) {
case rpc_gss_svc_privacy:
-/* EXPORT DELETE START */
if ((major = kgss_seal(&minor, context, TRUE, qop, &in_buf,
&conf_state, &out_buf)) != GSS_S_COMPLETE) {
RPCGSS_LOG1(1, "rpc_gss_wrap: kgss_seal failed."
@@ -194,11 +191,8 @@ __rpc_gss_wrap_data(service, qop, context, seq_num, out_xdrs,
}
in_buf.length = 0; /* in_buf not needed */
if (!conf_state)
-/* EXPORT DELETE END */
goto fail;
-/* EXPORT DELETE START */
break;
-/* EXPORT DELETE END */
case rpc_gss_svc_integrity:
if ((major = kgss_sign(&minor, context, qop, &in_buf,
&out_buf)) != GSS_S_COMPLETE) {
@@ -264,10 +258,8 @@ __rpc_gss_unwrap_data(service, context, seq_num, qop_check, in_xdrs,
if (service == rpc_gss_svc_privacy) {
major = GSS_S_FAILURE;
-/* EXPORT DELETE START */
major = kgss_unseal(&minor, context, &in_buf, &out_buf, &conf,
&qop);
-/* EXPORT DELETE END */
kmem_free(in_buf.value, in_buf.length);
if (major != GSS_S_COMPLETE) {
RPCGSS_LOG1(1, "rpc_gss_unwrap: kgss_unseal failed."
diff --git a/usr/src/uts/common/sys/Makefile b/usr/src/uts/common/sys/Makefile
index 271682bc67..0375409cb3 100644
--- a/usr/src/uts/common/sys/Makefile
+++ b/usr/src/uts/common/sys/Makefile
@@ -1382,16 +1382,3 @@ clobber: clean
check: $(CHECKHDRS)
FRC:
-
-# EXPORT DELETE START
-EXPORT_SRC:
- $(RM) wanboot_impl.h+ Makefile+
- sed -e "/EXPORT DELETE START/,/EXPORT DELETE END/d" \
- < wanboot_impl.h > wanboot_impl.h+
- $(MV) wanboot_impl.h+ wanboot_impl.h
- sed -e "/^# EXPORT DELETE START/,/^# EXPORT DELETE END/d" \
- < Makefile > Makefile+
- $(RM) Makefile
- $(MV) Makefile+ Makefile
- $(CHMOD) 444 Makefile wanboot_impl.h
-# EXPORT DELETE END
diff --git a/usr/src/uts/common/sys/wanboot_impl.h b/usr/src/uts/common/sys/wanboot_impl.h
index 6801c7ac36..b953593fa1 100644
--- a/usr/src/uts/common/sys/wanboot_impl.h
+++ b/usr/src/uts/common/sys/wanboot_impl.h
@@ -27,14 +27,10 @@
#ifndef _SYS_WANBOOT_IMPL_H
#define _SYS_WANBOOT_IMPL_H
-#pragma ident "%Z%%M% %I% %E% SMI"
-
#include <sys/types.h>
-/* EXPORT DELETE START */
#include <aes.h>
#include <des3.h>
#include <hmac_sha1.h>
-/* EXPORT DELETE END */
#ifdef __cplusplus
extern "C" {
@@ -55,29 +51,23 @@ extern "C" {
#define WANBOOT_MAXKEYLEN 1024 /* sized for RSA */
-/* EXPORT DELETE START */
#define WANBOOT_MAXBLOCKLEN AES_BLOCK_SIZE
#define WANBOOT_HMAC_KEY_SIZE 20 /* size of key we use for HMAC SHA-1 */
-/* EXPORT DELETE END */
struct wankeyio {
char wk_keyname[WANBOOT_MAXKEYNAMELEN];
uint_t wk_keysize;
union {
-/* EXPORT DELETE START */
char hmac_sha1_key[WANBOOT_HMAC_KEY_SIZE];
char des3key[DES3_KEY_SIZE];
char aeskey[AES_128_KEY_SIZE];
-/* EXPORT DELETE END */
char key[WANBOOT_MAXKEYLEN];
} wk_u;
};
-/* EXPORT DELETE START */
#define wk_hmac_sha1_key wk_u.hmac_sha1_key
#define wk_3des_key wk_u.3des_key
#define wk_aes_key wk_u.aeskey
-/* EXPORT DELETE END */
#define WANBOOT_SETKEY (('W' << 24) | ('A' << 16) | ('N' << 8) | 0)
diff --git a/usr/src/uts/common/syscall/fcntl.c b/usr/src/uts/common/syscall/fcntl.c
index cc0d7858d1..7421957235 100644
--- a/usr/src/uts/common/syscall/fcntl.c
+++ b/usr/src/uts/common/syscall/fcntl.c
@@ -19,7 +19,6 @@
* CDDL HEADER END
*/
-/* ONC_PLUS EXTRACT START */
/*
* Copyright (c) 1994, 2010, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2013, OmniTI Computer Consulting, Inc. All rights reserved.
@@ -34,8 +33,6 @@
*/
-/* ONC_PLUS EXTRACT END */
-
#include <sys/param.h>
#include <sys/isa_defs.h>
#include <sys/types.h>
@@ -43,9 +40,7 @@
#include <sys/systm.h>
#include <sys/errno.h>
#include <sys/fcntl.h>
-/* ONC_PLUS EXTRACT START */
#include <sys/flock.h>
-/* ONC_PLUS EXTRACT END */
#include <sys/vnode.h>
#include <sys/file.h>
#include <sys/mode.h>
@@ -58,7 +53,6 @@
#include <sys/cmn_err.h>
-/* ONC_PLUS EXTRACT START */
static int flock_check(vnode_t *, flock64_t *, offset_t, offset_t);
static int flock_get_start(vnode_t *, flock64_t *, offset_t, u_offset_t *);
static void fd_too_big(proc_t *);
@@ -150,8 +144,6 @@ fcntl(int fdes, int cmd, intptr_t arg)
iarg = (int)arg;
switch (cmd) {
-/* ONC_PLUS EXTRACT END */
-
case F_DUPFD:
case F_DUPFD_CLOEXEC:
p = curproc;
@@ -275,7 +267,6 @@ fcntl(int fdes, int cmd, intptr_t arg)
offset = fp->f_offset;
switch (cmd) {
-/* ONC_PLUS EXTRACT START */
/*
* The file system and vnode layers understand and implement
* locking with flock64 structures. So here once we pass through
@@ -450,7 +441,6 @@ fcntl(int fdes, int cmd, intptr_t arg)
#endif
}
break;
-/* ONC_PLUS EXTRACT END */
case F_CHKFL:
/*
@@ -597,7 +587,6 @@ fcntl(int fdes, int cmd, intptr_t arg)
break;
#if !defined(_LP64) || defined(_SYSCALL32_IMPL)
-/* ONC_PLUS EXTRACT START */
case F_GETLK64:
case F_SETLK64:
case F_SETLKW64:
@@ -680,10 +669,8 @@ fcntl(int fdes, int cmd, intptr_t arg)
error = EFAULT;
}
break;
-/* ONC_PLUS EXTRACT END */
#endif /* !defined(_LP64) || defined(_SYSCALL32_IMPL) */
-/* ONC_PLUS EXTRACT START */
case F_SHARE:
case F_SHARE_NBMAND:
case F_UNSHARE:
@@ -708,7 +695,6 @@ fcntl(int fdes, int cmd, intptr_t arg)
shr.s_own_len = sizeof (shr_own);
shr.s_owner = (caddr_t)&shr_own;
error = VOP_SHRLOCK(vp, cmd, &shr, flag, fp->f_cred, NULL);
-/* ONC_PLUS EXTRACT END */
break;
default:
@@ -727,7 +713,6 @@ out:
return (retval);
}
-/* ONC_PLUS EXTRACT START */
int
flock_check(vnode_t *vp, flock64_t *flp, offset_t offset, offset_t max)
{
@@ -839,4 +824,3 @@ fd_too_big(proc_t *p)
p->p_rctls, p, RCA_SAFE);
mutex_exit(&p->p_lock);
}
-/* ONC_PLUS EXTRACT END */