Lines Matching refs:in

10  * Michigan is not used in any advertising or publicity
14 * University of Michigan is included in any copy of any
114 free_krb5_pa_pk_as_req(krb5_pa_pk_as_req **in)
116 if (*in == NULL) return;
117 free((*in)->signedAuthPack.data);
118 if ((*in)->trustedCertifiers != NULL)
119 free_krb5_external_principal_identifier(&(*in)->trustedCertifiers);
120 free((*in)->kdcPkId.data);
121 free(*in);
125 free_krb5_pa_pk_as_req_draft9(krb5_pa_pk_as_req_draft9 **in)
127 if (*in == NULL) return;
128 free((*in)->signedAuthPack.data);
129 free((*in)->kdcCert.data);
130 free((*in)->encryptionCert.data);
131 if ((*in)->trustedCertifiers != NULL)
132 free_krb5_trusted_ca(&(*in)->trustedCertifiers);
133 free(*in);
137 free_krb5_reply_key_pack(krb5_reply_key_pack **in)
139 if (*in == NULL) return;
140 free((*in)->replyKey.contents);
141 free((*in)->asChecksum.contents);
142 free(*in);
146 free_krb5_reply_key_pack_draft9(krb5_reply_key_pack_draft9 **in)
148 if (*in == NULL) return;
149 free((*in)->replyKey.contents);
150 free(*in);
154 free_krb5_auth_pack(krb5_auth_pack **in)
156 if ((*in) == NULL) return;
157 if ((*in)->clientPublicValue != NULL) {
158 free((*in)->clientPublicValue->algorithm.algorithm.data);
159 free((*in)->clientPublicValue->algorithm.parameters.data);
160 free((*in)->clientPublicValue->subjectPublicKey.data);
161 free((*in)->clientPublicValue);
163 free((*in)->pkAuthenticator.paChecksum.contents);
164 if ((*in)->supportedCMSTypes != NULL)
165 free_krb5_algorithm_identifiers(&((*in)->supportedCMSTypes));
166 free(*in);
171 krb5_auth_pack_draft9 **in)
173 if ((*in) == NULL) return;
174 krb5_free_principal(context, (*in)->pkAuthenticator.kdcName);
175 free(*in);
179 free_krb5_pa_pk_as_rep(krb5_pa_pk_as_rep **in)
181 if (*in == NULL) return;
182 switch ((*in)->choice) {
184 free((*in)->u.dh_Info.dhSignedData.data);
187 free((*in)->u.encKeyPack.data);
192 free(*in);
196 free_krb5_pa_pk_as_rep_draft9(krb5_pa_pk_as_rep_draft9 **in)
198 if (*in == NULL) return;
199 free((*in)->u.encKeyPack.data);
200 free(*in);
204 free_krb5_external_principal_identifier(krb5_external_principal_identifier ***in)
207 if (*in == NULL) return;
208 while ((*in)[i] != NULL) {
209 free((*in)[i]->subjectName.data);
210 free((*in)[i]->issuerAndSerialNumber.data);
211 free((*in)[i]->subjectKeyIdentifier.data);
212 free((*in)[i]);
215 free(*in);
219 free_krb5_trusted_ca(krb5_trusted_ca ***in)
222 if (*in == NULL) return;
223 while ((*in)[i] != NULL) {
224 switch((*in)[i]->choice) {
228 free((*in)[i]->u.caName.data);
231 free((*in)[i]->u.issuerAndSerial.data);
236 free((*in)[i]);
239 free(*in);
243 free_krb5_typed_data(krb5_typed_data ***in)
246 if (*in == NULL) return;
247 while ((*in)[i] != NULL) {
248 free((*in)[i]->data);
249 free((*in)[i]);
252 free(*in);
256 free_krb5_algorithm_identifier(krb5_algorithm_identifier *in)
258 if (in == NULL)
260 free(in->algorithm.data);
261 free(in->parameters.data);
262 free(in);
266 free_krb5_algorithm_identifiers(krb5_algorithm_identifier ***in)
269 if (in == NULL || *in == NULL)
271 for (i = 0; (*in)[i] != NULL; i++) {
272 free_krb5_algorithm_identifier((*in)[i]);
274 free(*in);
278 free_krb5_subject_pk_info(krb5_subject_pk_info **in)
280 if ((*in) == NULL) return;
281 free((*in)->algorithm.parameters.data);
282 free((*in)->subjectPublicKey.data);
283 free(*in);
287 free_krb5_kdc_dh_key_info(krb5_kdc_dh_key_info **in)
289 if (*in == NULL) return;
290 free((*in)->subjectPublicKey.data);
291 free(*in);
295 init_krb5_pa_pk_as_req(krb5_pa_pk_as_req **in)
297 (*in) = malloc(sizeof(krb5_pa_pk_as_req));
298 if ((*in) == NULL) return;
299 (*in)->signedAuthPack.data = NULL;
300 (*in)->signedAuthPack.length = 0;
301 (*in)->trustedCertifiers = NULL;
302 (*in)->kdcPkId.data = NULL;
303 (*in)->kdcPkId.length = 0;
307 init_krb5_pa_pk_as_req_draft9(krb5_pa_pk_as_req_draft9 **in)
309 (*in) = malloc(sizeof(krb5_pa_pk_as_req_draft9));
310 if ((*in) == NULL) return;
311 (*in)->signedAuthPack.data = NULL;
312 (*in)->signedAuthPack.length = 0;
313 (*in)->trustedCertifiers = NULL;
314 (*in)->kdcCert.data = NULL;
315 (*in)->kdcCert.length = 0;
316 (*in)->encryptionCert.data = NULL;
317 (*in)->encryptionCert.length = 0;
321 init_krb5_reply_key_pack(krb5_reply_key_pack **in)
323 (*in) = malloc(sizeof(krb5_reply_key_pack));
324 if ((*in) == NULL) return;
325 (*in)->replyKey.contents = NULL;
326 (*in)->replyKey.length = 0;
327 (*in)->asChecksum.contents = NULL;
328 (*in)->asChecksum.length = 0;
332 init_krb5_reply_key_pack_draft9(krb5_reply_key_pack_draft9 **in)
334 (*in) = malloc(sizeof(krb5_reply_key_pack_draft9));
335 if ((*in) == NULL) return;
336 (*in)->replyKey.contents = NULL;
337 (*in)->replyKey.length = 0;
341 init_krb5_auth_pack(krb5_auth_pack **in)
343 (*in) = malloc(sizeof(krb5_auth_pack));
344 if ((*in) == NULL) return;
345 (*in)->clientPublicValue = NULL;
346 (*in)->supportedCMSTypes = NULL;
347 (*in)->clientDHNonce.length = 0;
348 (*in)->clientDHNonce.data = NULL;
349 (*in)->pkAuthenticator.paChecksum.contents = NULL;
353 init_krb5_auth_pack_draft9(krb5_auth_pack_draft9 **in)
355 (*in) = malloc(sizeof(krb5_auth_pack_draft9));
356 if ((*in) == NULL) return;
357 (*in)->clientPublicValue = NULL;
361 init_krb5_pa_pk_as_rep(krb5_pa_pk_as_rep **in)
363 (*in) = malloc(sizeof(krb5_pa_pk_as_rep));
364 if ((*in) == NULL) return;
365 (*in)->u.dh_Info.serverDHNonce.length = 0;
366 (*in)->u.dh_Info.serverDHNonce.data = NULL;
367 (*in)->u.dh_Info.dhSignedData.length = 0;
368 (*in)->u.dh_Info.dhSignedData.data = NULL;
369 (*in)->u.encKeyPack.length = 0;
370 (*in)->u.encKeyPack.data = NULL;
374 init_krb5_pa_pk_as_rep_draft9(krb5_pa_pk_as_rep_draft9 **in)
376 (*in) = malloc(sizeof(krb5_pa_pk_as_rep_draft9));
377 if ((*in) == NULL) return;
378 (*in)->u.dhSignedData.length = 0;
379 (*in)->u.dhSignedData.data = NULL;
380 (*in)->u.encKeyPack.length = 0;
381 (*in)->u.encKeyPack.data = NULL;
385 init_krb5_typed_data(krb5_typed_data **in)
387 (*in) = malloc(sizeof(krb5_typed_data));
388 if ((*in) == NULL) return;
389 (*in)->type = 0;
390 (*in)->length = 0;
391 (*in)->data = NULL;
395 init_krb5_subject_pk_info(krb5_subject_pk_info **in)
397 (*in) = malloc(sizeof(krb5_subject_pk_info));
398 if ((*in) == NULL) return;
399 (*in)->algorithm.parameters.data = NULL;
400 (*in)->algorithm.parameters.length = 0;
401 (*in)->subjectPublicKey.data = NULL;
402 (*in)->subjectPublicKey.length = 0;