Lines Matching refs:data

234  * start processing any data from the server, at which point every module
434 * to obtain the data and free it.
436 * This may require massaging data into a contrived format, but it will
438 * or data to the plugin modules.
449 char *data;
463 data = malloc(sizeof(krb5_enctype));
464 if (data == NULL) {
468 ret->data = data;
470 eptr = (krb5_enctype *)data;
480 if (ret->data)
481 free(ret->data);
495 ret->data = (char *) key;
510 if (ret->data)
511 krb5_free_keyblock(kcontext, (krb5_keyblock *) ret->data);
550 * they don't generate preauth data), and run it. */
623 /* Save the new preauth data item. */
646 d.data = (char *) p.contents;
712 if (salt != NULL && salt->data != NULL) {
716 fprintf (stderr, " '%.*s'", salt->length, salt->data);
745 fprintf (stderr, "enc data { type=%d kvno=%d data=%02x %02x ... }\n",
747 0xff & enc_data.ciphertext.data[0],
748 0xff & enc_data.ciphertext.data[1]);
754 free(enc_data.ciphertext.data);
760 free(enc_data.ciphertext.data);
773 pa->contents = (krb5_octet *) tmp->data;
826 ((((kdata.length)<=(maxsize))?(kdata.data):(str))):(str)
860 tmpsam.data = (char *) in_padata->contents;
906 response_data.data = response;
942 /* password, then SAM data) so that user's won't be confused. */
951 if ((salt->length == -1 || salt->length == SALT_TYPE_AFS_LENGTH) && (salt->data == NULL)) {
969 free(defsalt.data);
989 if ((salt->length == SALT_TYPE_AFS_LENGTH) && (salt->data == NULL)) {
1013 free(defsalt.data);
1064 pa->contents = (krb5_octet *) scratch->data;
1179 (kdc_cert.data ? &kdc_cert : NULL),
1188 free(out_data.data);
1194 (*out_padata)->contents = (krb5_octet *)out_data.data;
1209 /* free data mallocd by krb5_pkinit_get_server_certs() */
1213 free(trusted_CAs[udex].data);
1217 if(kdc_cert.data) {
1218 free(kdc_cert.data);
1241 0 != memcmp(lkdcprefix, client->realm.data, sizeof(lkdcprefix)-1))
1243 realm_hash = &client->realm.data[sizeof(lkdcprefix)-1];
1307 asRep.data = (char *)in_padata->contents;
1368 if (signer_cert.data) {
1369 free(signer_cert.data);
1415 tmp_data.data = (char *)in_padata->contents;
1482 response_data.data = response;
1502 if ((salt->length == -1) && (salt->data == NULL)) {
1530 if (defsalt.length) free(defsalt.data);
1544 if (defsalt.length) free(defsalt.data);
1555 if (defsalt.length) free(defsalt.data);
1562 free(defsalt.data);
1577 free(defsalt.data);
1630 enc_sam_response_enc_2.sam_sad.data = NULL;
1663 sr2.sam_enc_nonce_or_sad.ciphertext.data =
1666 if (!sr2.sam_enc_nonce_or_sad.ciphertext.data) {
1705 sam_padata->contents = (krb5_octet *) scratch->data;
1751 memcpy(s4u_padata->contents, userid->subject_cert.data, userid->subject_cert.length);
1817 * If one of the modules can adjust its AS_REQ data using the contents of the
1922 if (salt && salt->data && salt->length > 0) {
1925 fprintf (stderr, " '%.*s'", salt->length, salt->data);
1926 fprintf (stderr, "; preauth data types:");
1964 scratch.data = (char *) in_padata[i]->contents;
2013 scratch.data = (char *) etype_info[l]->salt;
2017 salt->data = NULL;