Lines Matching refs:data

112                         krb5_pa_data * data)
301 krb5_pa_data * data,
327 if (data == NULL || data->length == 0 || data->contents == NULL)
348 print_buffer_bin(data->contents, data->length, "/tmp/kdc_as_req");
354 reqctx->pa_type = data->pa_type;
356 PADATA_TO_KRB5DATA(data, &k5data);
358 switch ((int)data->pa_type) {
361 pa_type = (int)data->pa_type;
368 print_buffer_bin(reqp->signedAuthPack.data,
375 reqp->signedAuthPack.data, reqp->signedAuthPack.length,
376 &authp_data.data, &authp_data.length, &krb5_authz.data,
389 print_buffer_bin(reqp9->signedAuthPack.data,
397 reqp9->signedAuthPack.data, reqp9->signedAuthPack.length,
398 &authp_data.data, &authp_data.length, &krb5_authz.data,
402 pkiDebug("unrecognized pa_type = %d\n", data->pa_type);
442 print_buffer_bin(authp_data.data, authp_data.length, "/tmp/kdc_auth_pack");
446 switch ((int)data->pa_type) {
473 * We need to compute the checksum on the data that
502 print_buffer(req_pkt->data, req_pkt->length);
518 if (reqp->kdcPkId.data != NULL) {
522 reqp->kdcPkId.data, reqp->kdcPkId.length, &valid_kdcPkId);
559 * This code used to generate ad-initial-verified-cas authorization data.
563 /* return authorization data to be included in the ticket */
564 switch ((int)data->pa_type) {
574 if (retval && data->pa_type == KRB5_PADATA_PK_AS_REQ) {
575 pkiDebug("pkinit_verify_padata failed: creating e-data\n");
581 switch ((int)data->pa_type) {
594 free(authp_data.data);
595 free(krb5_authz.data);
618 enc.ciphertext.data = NULL;
639 memset(scratch->data, 0, scratch->length);
652 pa->contents = (krb5_octet *) scratch->data;
654 scratch->data = NULL;
781 reqctx->rcv_auth_pack->clientPublicValue->subjectPublicKey.data;
788 reqctx->rcv_auth_pack9->clientPublicValue->subjectPublicKey.data;
820 dhkey_info.subjectPublicKey.data = dh_pubkey;
831 print_buffer_bin((unsigned char *)encoded_dhkey_info->data,
840 (unsigned char *)encoded_dhkey_info->data,
842 &rep->u.dh_Info.dhSignedData.data,
845 pkiDebug("failed to create pkcs7 signed data\n");
853 (unsigned char *)encoded_dhkey_info->data,
855 &rep9->u.dhSignedData.data,
858 pkiDebug("failed to create pkcs7 signed data\n");
920 print_buffer(req_pkt->data, req_pkt->length);
944 (unsigned char *)encoded_key_pack->data,
946 &rep->u.encKeyPack.data, &rep->u.encKeyPack.length);
974 (unsigned char *)encoded_key_pack->data,
976 &rep9->u.encKeyPack.data, &rep9->u.encKeyPack.length);
980 pkiDebug("failed to create pkcs7 enveloped data: %s\n",
985 print_buffer_bin((unsigned char *)encoded_key_pack->data,
990 print_buffer_bin(rep->u.encKeyPack.data,
996 print_buffer_bin(rep9->u.encKeyPack.data,
1019 print_buffer_bin((unsigned char *)out_data->data, out_data->length,
1026 free(out_data->data);
1042 (*send_pa)->contents = (krb5_octet *) out_data->data;
1047 free(scratch.data);
1209 (strncmp(p->realmname, princ->realm.data, p->realmname_len) == 0)) {
1216 __FUNCTION__, princ->realm.length, princ->realm.data);