Lines Matching refs:token

76     gss_buffer_desc token;
192 /* get the token parameters */
269 token.length = tmsglen;
289 token.length = tmsglen - conflen - plain[tmsglen-1];
292 if (token.length) {
293 if ((token.value = (void *) xmalloc(token.length)) == NULL) {
300 (void) memcpy(token.value, plain+conflen, token.length);
302 token.value = NULL;
306 token = *message_buffer;
307 plain = token.value;
308 plainlen = token.length;
311 token.length = 0;
312 token.value = NULL;
313 plain = token.value;
314 plainlen = token.length;
357 /* 8 = bytes of token body to be checksummed according to spec */
360 xmalloc(8 + (ctx->big_endian ? token.length : plainlen)))) {
364 xfree_wrap(token.value, token.length);
365 /* Solaris Kerberos: just to be safe since token.value is an
368 token.value = NULL;
369 token.length = 0;
379 (void) memcpy(data_ptr+8, token.value, token.length);
383 plaind.length = 8 + (ctx->big_endian ? token.length : plainlen);
388 xfree_wrap(data_ptr, 8 + (ctx->big_endian ? token.length : plainlen));
392 xfree_wrap(token.value, token.length);
393 /* Solaris Kerberos: just to be safe since token.value is an
396 token.value = NULL;
397 token.length = 0;
411 xfree_wrap(token.value, token.length);
412 /* Solaris Kerberos: just to be safe since token.value is an
415 token.value = NULL;
416 token.length = 0;
440 xfree_wrap(token.value, token.length);
441 /* Solaris Kerberos: just to be safe since token.value is an
444 token.value = NULL;
445 token.length = 0;
453 (ctx->big_endian ? token.length : plainlen)))) {
458 xfree_wrap(token.value, token.length);
459 /* Solaris Kerberos: just to be safe since token.value is an
462 token.value = NULL;
463 token.length = 0;
472 token.value, token.length);
477 (ctx->big_endian ? token.length : plainlen);
484 (ctx->big_endian ? token.length : plainlen));
490 xfree_wrap(token.value, token.length);
491 /* Solaris Kerberos: just to be safe since token.value is an
494 token.value = NULL;
495 token.length = 0;
502 /* Falls through to defective-token?? */
514 /* 8 = bytes of token body to be checksummed according to spec */
517 xmalloc(8 + (ctx->big_endian ? token.length : plainlen)))) {
521 xfree_wrap(token.value, token.length);
522 /* Solaris Kerberos: just to be safe since token.value is an
525 token.value = NULL;
526 token.length = 0;
536 (void) memcpy(data_ptr+8, token.value, token.length);
543 plaind.length = 8 + (ctx->big_endian ? token.length : plainlen);
550 xfree_wrap(data_ptr, 8 + (ctx->big_endian ? token.length : plainlen));
554 xfree_wrap(token.value, token.length);
555 /* Solaris Kerberos: just to be safe since token.value is an
558 token.value = NULL;
559 token.length = 0;
579 xfree_wrap(token.value, token.length);
580 /* Solaris Kerberos: just to be safe since token.value is an
583 token.value = NULL;
584 token.length = 0;
619 xfree_wrap(token.value, token.length);
620 /* Solaris Kerberos: just to be safe since token.value is an
623 token.value = NULL;
624 token.length = 0;
639 *message_buffer = token;
686 /* parse the token, leave the data in message_buffer, setting conf_state */