sc2
krb5_free_sam_challenge_2(krb5_context ctx, krb5_sam_challenge_2 *sc2)
if (!sc2)
krb5_free_sam_challenge_2_contents(ctx, sc2);
free(sc2);
krb5_sam_challenge_2 *sc2)
if (!sc2)
if (sc2->sam_challenge_2_body.data)
krb5_free_data_contents(ctx, &sc2->sam_challenge_2_body);
if (sc2->sam_cksum) {
cksump = sc2->sam_cksum;
free(sc2->sam_cksum);
sc2->sam_cksum = 0;
krb5_sam_challenge_2_body *sc2)
if (!sc2)
krb5_free_sam_challenge_2_body_contents(ctx, sc2);
free(sc2);
krb5_sam_challenge_2_body *sc2)
if (!sc2)
if (sc2->sam_type_name.data)
krb5_free_data_contents(ctx, &sc2->sam_type_name);
if (sc2->sam_track_id.data)
krb5_free_data_contents(ctx, &sc2->sam_track_id);
if (sc2->sam_challenge_label.data)
krb5_free_data_contents(ctx, &sc2->sam_challenge_label);
if (sc2->sam_challenge.data)
krb5_free_data_contents(ctx, &sc2->sam_challenge);
if (sc2->sam_response_prompt.data)
krb5_free_data_contents(ctx, &sc2->sam_response_prompt);
if (sc2->sam_pk_for_sad.data)
krb5_free_data_contents(ctx, &sc2->sam_pk_for_sad);
if ((retval = decode_krb5_sam_challenge_2(&tmp_data, &sc2)))
retval = decode_krb5_sam_challenge_2_body(&sc2->sam_challenge_2_body, &sc2b);
krb5_free_sam_challenge_2(context, sc2);
if (!sc2->sam_cksum || ! *sc2->sam_cksum) {
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
cksum = sc2->sam_cksum;
&sc2->sam_challenge_2_body,
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_free_sam_challenge_2(context, sc2);
krb5_sam_challenge_2 *sc2 = NULL;
krb5_sam_challenge_2 *sc2);
krb5_keyblock *client_key, krb5_sam_challenge_2 *sc2)
retval = sam_make_challenge(context, &sc2b, client_key, sc2);
krb5_sam_challenge_2 sc2;
memset(&sc2, 0, sizeof(sc2));
retval = get_securid_edata_2(context, client, client_key, &sc2);
retval = get_grail_edata(context, client, client_key, &sc2);
retval = encode_krb5_sam_challenge_2(&sc2, &encoded_challenge);
ESS_SIGNING_CERT_V2 *sc2 = NULL;
if ((sc2 = OSSL_ESS_signing_cert_v2_new_init(md, signer,
add_sc = ossl_cms_add1_signing_cert_v2(si, sc2);
ESS_SIGNING_CERT_V2_free(sc2);
ESS_SIGNING_CERT_V2 *sc2 = NULL;
sc2 = OSSL_ESS_signing_cert_v2_new_init(ctx->ess_cert_id_digest,
if (sc2 == NULL)
if (!ossl_ess_add1_signing_cert_v2(si, sc2)) {
ESS_SIGNING_CERT_V2_free(sc2);
sc2 = 2.36825757341694050500333261769082182e3L, /* 0x400a2808, 0x3e0a9b42, 0x82977842, 0x9c5de29e */
S=one+s*(sc1+s*(sc2+s*(sc3+s*(sc4+s*(sc5+s*(sc6+s*(sc7+
S=one+s*(sc1+s*(sc2+s*(sc3+s*(sc4+s*sc5))));
struct syncache *sc2;
sc2 = TAILQ_LAST(&sch->sch_bucket, sch_head);
syncache_drop(sc2, sch);