Lines Matching refs:scratch

1248     krb5_data			scratch;  in verify_enc_timestamp()  local
1258 scratch.data = (char *) pa->contents; in verify_enc_timestamp()
1259 scratch.length = pa->length; in verify_enc_timestamp()
1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0) in verify_enc_timestamp()
1403 krb5_data * scratch; in etype_info_helper() local
1465 &scratch); in etype_info_helper()
1467 &scratch); in etype_info_helper()
1470 pa_data->contents = (unsigned char *)scratch->data; in etype_info_helper()
1471 pa_data->length = scratch->length; in etype_info_helper()
1472 free(scratch); in etype_info_helper()
1522 krb5_data *scratch = NULL; in etype_info_as_rep_helper() local
1559 retval = encode_krb5_etype_info2((krb5_etype_info_entry * const*) entry, &scratch); in etype_info_as_rep_helper()
1561 retval = encode_krb5_etype_info((krb5_etype_info_entry * const*) entry, &scratch); in etype_info_as_rep_helper()
1565 tmp_padata->contents = (uchar_t *)scratch->data; in etype_info_as_rep_helper()
1566 tmp_padata->length = scratch->length; in etype_info_as_rep_helper()
1572 scratch->data = 0; in etype_info_as_rep_helper()
1581 if (scratch) in etype_info_as_rep_helper()
1582 krb5_free_data(context, scratch); in etype_info_as_rep_helper()
1630 krb5_data * scratch; in return_pw_salt() local
1668 scratch = krb5_princ_realm(kdc_context, request->client); in return_pw_salt()
1669 if ((padata->contents = malloc(scratch->length+1)) == NULL) { in return_pw_salt()
1673 memcpy(padata->contents, scratch->data, scratch->length); in return_pw_salt()
1674 padata->length = scratch->length+1; in return_pw_salt()
1675 padata->contents[scratch->length] = 0; in return_pw_salt()
1678 scratch = krb5_princ_realm(kdc_context, request->client); in return_pw_salt()
1679 if ((padata->contents = malloc(scratch->length)) == NULL) { in return_pw_salt()
1683 memcpy(padata->contents, scratch->data, scratch->length); in return_pw_salt()
1684 padata->length = scratch->length; in return_pw_salt()
1719 krb5_data scratch; in return_sam_data() local
1735 scratch.data = (char *) in_padata->contents; /* SUNWresync121 XXX */ in return_sam_data()
1736 scratch.length = in_padata->length; in return_sam_data()
1738 if ((retval = decode_krb5_sam_response(&scratch, &sr))) { in return_sam_data()
1750 scratch.length = tmpdata.ciphertext.length; in return_sam_data()
1751 if ((scratch.data = (char *) malloc(scratch.length)) == NULL) { in return_sam_data()
1757 &tmpdata, &scratch))) { in return_sam_data()
1760 free(scratch.data); in return_sam_data()
1765 if ((retval = decode_krb5_predicted_sam_response(&scratch, &psr))) { in return_sam_data()
1769 free(scratch.data); in return_sam_data()
1864 krb5_data * scratch; in get_sam_edata() local
2000 if ((retval = encode_krb5_predicted_sam_response(&psr, &scratch))) in get_sam_edata()
2009 scratch->length, &enclen))) in get_sam_edata()
2019 /* XXX */ 0, 0, scratch, &tmpdata))) in get_sam_edata()
2050 retval = encode_krb5_sam_challenge(&sc, &scratch); in get_sam_edata()
2054 pa_data->contents = (unsigned char *) scratch->data; in get_sam_edata()
2055 pa_data->length = scratch->length; in get_sam_edata()
2175 retval = encode_krb5_predicted_sam_response(&psr, &scratch); in get_sam_edata()
2184 scratch->length, &enclen))) in get_sam_edata()
2194 /* XXX */ 0, 0, scratch, &tmpdata))) in get_sam_edata()
2226 retval = encode_krb5_sam_challenge(&sc, &scratch); in get_sam_edata()
2230 pa_data->contents = (unsigned char *) scratch->data; in get_sam_edata()
2231 pa_data->length = scratch->length; in get_sam_edata()
2254 krb5_data scratch; in verify_sam_response() local
2261 scratch.data = (char *) pa->contents; in verify_sam_response()
2262 scratch.length = pa->length; in verify_sam_response()
2264 if ((retval = decode_krb5_sam_response(&scratch, &sr))) { in verify_sam_response()
2265 scratch.data = 0; in verify_sam_response()
2278 scratch.length = tmpdata.ciphertext.length; in verify_sam_response()
2279 if ((scratch.data = (char *) malloc(scratch.length)) == NULL) { in verify_sam_response()
2285 &tmpdata, &scratch))) { in verify_sam_response()
2293 if ((retval = decode_krb5_predicted_sam_response(&scratch, &psr))) { in verify_sam_response()
2343 free(scratch.data); in verify_sam_response()
2344 scratch.length = sr->sam_enc_nonce_or_ts.ciphertext.length; in verify_sam_response()
2345 if ((scratch.data = (char *) malloc(scratch.length)) == NULL) { in verify_sam_response()
2351 0, &sr->sam_enc_nonce_or_ts, &scratch))) { in verify_sam_response()
2357 if ((retval = decode_krb5_enc_sam_response_enc(&scratch, &esre))) { in verify_sam_response()
2378 if (scratch.data) free(scratch.data); in verify_sam_response()