return(KRB5_BAD_MSIZE);
computed.length = hashsize;
- if ((computed.contents = (krb5_octet *) malloc(computed.length)) == NULL)
- return(ENOMEM);
if (ret = krb5_c_make_checksum(context, cksum->checksum_type, key, usage,
data, &computed)) {
krb5_checksum checksum;
krb5_checksum *checksump = 0;
krb5_auth_context new_auth_context;
- size_t cksumlen;
krb5_ap_req request;
krb5_data *scratch = 0;
checksum.length = in_data->length;
checksum.contents = (krb5_octet *) in_data->data;
} else {
- if ((retval=krb5_c_checksum_length(context,
- (*auth_context)->req_cksumtype,
- &cksumlen)))
- goto cleanup;
-
- /* Generate checksum, XXX What should the seed be? */
- checksum.length = cksumlen;
- if ((checksum.contents = (krb5_octet *)malloc(checksum.length)) == NULL) {
- retval = ENOMEM;
- goto cleanup;
- }
if ((retval = krb5_c_make_checksum(context,
(*auth_context)->req_cksumtype,
(*auth_context)->keyblock,
krb5_octet zero_octet = 0;
krb5_checksum safe_checksum;
krb5_data *scratch1, *scratch2;
- size_t sumlen;
if (!valid_cksumtype(sumtype))
return KRB5_PROG_SUMTYPE_NOSUPP;
if ((retval = encode_krb5_safe(&safemsg, &scratch1)))
return retval;
- if ((retval = krb5_c_checksum_length(context, sumtype, &sumlen)))
- goto cleanup_scratch;
-
- safe_checksum.length = sumlen;
-
- if (!(safe_checksum.contents = (krb5_octet *) malloc(safe_checksum.length))) {
-
- retval = ENOMEM;
- goto cleanup_scratch;
- }
-
if ((retval = krb5_c_make_checksum(context, sumtype, keyblock,
KRB5_KEYUSAGE_KRB_SAFE_CKSUM,
scratch1, &safe_checksum)))
krb5_ap_req request;
krb5_data * scratch;
krb5_data * toutbuf;
- size_t sumlen;
-
- if ((retval = krb5_c_checksum_length(context, context->kdc_req_sumtype,
- &sumlen)))
- return(retval);
/* Generate checksum */
- checksum.length = krb5_checksum_size(context, context->kdc_req_sumtype);
- if ((checksum.contents = (krb5_octet *) malloc(checksum.length)) == NULL)
- return(ENOMEM);
-
if ((retval = krb5_c_make_checksum(context, context->kdc_req_sumtype,
&in_cred->keyblock,
KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM,