Lines Matching refs:ptr

54 rotate_left (void *ptr, size_t bufsiz, size_t rc)  in rotate_left()  argument
72 (void) memcpy(tbuf, ptr, rc); in rotate_left()
73 (void) memmove(ptr, (char *)ptr + rc, bufsiz - rc); in rotate_left()
74 (void) memcpy((char *)ptr + bufsiz - rc, tbuf, rc); in rotate_left()
351 unsigned char *ptr, int bodysize, in gss_krb5int_unseal_token_v3() argument
384 ptr -= 2; in gss_krb5int_unseal_token_v3()
392 if ((ptr[2] & FLAG_SENDER_IS_ACCEPTOR) != acceptor_flag) { in gss_krb5int_unseal_token_v3()
412 if (ctx->have_acceptor_subkey && (ptr[2] & FLAG_ACCEPTOR_SUBKEY)) { in gss_krb5int_unseal_token_v3()
428 if (load_16_be(ptr) != 0x0504) in gss_krb5int_unseal_token_v3()
430 if (ptr[3] != 0xff) in gss_krb5int_unseal_token_v3()
432 ec = load_16_be(ptr+4); in gss_krb5int_unseal_token_v3()
433 rrc = load_16_be(ptr+6); in gss_krb5int_unseal_token_v3()
434 seqnum = load_64_be(ptr+8); in gss_krb5int_unseal_token_v3()
435 if (!rotate_left(ptr+16, bodysize-16, rrc)) { in gss_krb5int_unseal_token_v3()
440 if (ptr[2] & FLAG_WRAP_CONFIDENTIAL) { in gss_krb5int_unseal_token_v3()
454 cipher.ciphertext.data = (char *)ptr + 16; in gss_krb5int_unseal_token_v3()
469 || althdr[2] != ptr[2] in gss_krb5int_unseal_token_v3()
470 || althdr[3] != ptr[3] in gss_krb5int_unseal_token_v3()
471 || memcmp(althdr+8, ptr+8, 8)) { in gss_krb5int_unseal_token_v3()
496 store_16_be(0, ptr+4); in gss_krb5int_unseal_token_v3()
497 store_16_be(0, ptr+6); in gss_krb5int_unseal_token_v3()
499 plain.data = (char *)ptr; in gss_krb5int_unseal_token_v3()
500 if (!rotate_left(ptr, bodysize-ec, 16)) in gss_krb5int_unseal_token_v3()
507 sum.contents = ptr+bodysize-ec; in gss_krb5int_unseal_token_v3()
531 if (!rotate_left(ptr, bodysize-ec, bodysize - ec - 16)) in gss_krb5int_unseal_token_v3()
533 store_16_be(ec, ptr+4); in gss_krb5int_unseal_token_v3()
534 store_16_be(rrc, ptr+6); in gss_krb5int_unseal_token_v3()
541 if (load_16_be(ptr) != 0x0404) in gss_krb5int_unseal_token_v3()
544 if (ptr[3] != 0xff) in gss_krb5int_unseal_token_v3()
546 if (load_32_be(ptr+4) != (ulong_t)0xffffffffU) in gss_krb5int_unseal_token_v3()
548 seqnum = load_64_be(ptr+8); in gss_krb5int_unseal_token_v3()
556 (void) memcpy(plain.data + message_buffer->length, ptr, 16); in gss_krb5int_unseal_token_v3()
558 sum.contents = ptr + 16; in gss_krb5int_unseal_token_v3()
578 if (load_16_be(ptr) != 0x0405) in gss_krb5int_unseal_token_v3()