Lines Matching refs:ctx

60 kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer,
64 krb5_gss_ctx_id_rec *ctx;
127 (sealalg == ctx->sealalg))) {
136 if ((ctx->sealalg == SEAL_ALG_NONE && signalg > 1) ||
137 (ctx->sealalg == SEAL_ALG_1 && signalg != SGN_ALG_3) ||
138 (ctx->sealalg == SEAL_ALG_DES3KD &&
140 (ctx->sealalg == SEAL_ALG_MICROSOFT_RC4 &&
177 ctx->seq);
179 ctx->seq);
181 ctx->seq))) {
186 ctx->enc))) {
194 if ((code = kg_get_seq_num(context, ctx->seq, ptr+14, ptr+6, &direction,
214 if (ctx->enc->enctype == ENCTYPE_ARCFOUR_HMAC) {
222 code = krb5_copy_keyblock (context, ctx->enc, &enc_key);
254 code = kg_decrypt(context, ctx->enc, KG_USAGE_SEAL, NULL,
268 if ((sealalg == 0xffff) && ctx->big_endian) {
271 conflen = kg_confounder_size(context, ctx->enc);
276 code = krb5_c_block_size(context, ctx->enc->enctype, &blocksize);
360 xmalloc(8 + (ctx->big_endian ? token.length : plainlen)))) {
378 if (ctx->big_endian)
383 plaind.length = 8 + (ctx->big_endian ? token.length : plainlen);
386 ctx->seq, sign_usage,
388 xfree_wrap(data_ptr, 8 + (ctx->big_endian ? token.length : plainlen));
405 if ((code = kg_encrypt(context, ctx->seq, KG_USAGE_SEAL,
406 (g_OID_equal(ctx->mech_used, gss_mech_krb5_old) ?
407 ctx->seq->contents : NULL),
434 if (!ctx->seed_init &&
435 (code = kg_make_seed(context, ctx->subkey, ctx->seed))) {
452 xmalloc(sizeof(ctx->seed) + 8 +
453 (ctx->big_endian ? token.length : plainlen)))) {
469 (void) memcpy(data_ptr+8, ctx->seed, sizeof(ctx->seed));
470 if (ctx->big_endian)
471 (void) memcpy(data_ptr+8+sizeof(ctx->seed),
474 (void) memcpy(data_ptr+8+sizeof(ctx->seed),
476 plaind.length = 8 + sizeof(ctx->seed) +
477 (ctx->big_endian ? token.length : plainlen);
481 ctx->seq, KG_USAGE_SIGN,
483 xfree_wrap(data_ptr, 8 + sizeof(ctx->seed) +
484 (ctx->big_endian ? token.length : plainlen));
517 xmalloc(8 + (ctx->big_endian ? token.length : plainlen)))) {
534 if (ctx->big_endian) {
535 KRB5_LOG0(KRB5_INFO, "kg_unseal_v1() ctx->big_endian = 1\n");
539 KRB5_LOG0(KRB5_INFO, "kg_unseal_v1() ctx->big_endian = 0\n");
543 plaind.length = 8 + (ctx->big_endian ? token.length : plainlen);
547 ctx->seq, sign_usage,
550 xfree_wrap(data_ptr, 8 + (ctx->big_endian ? token.length : plainlen));
606 if (now > ctx->endtime) {
610 "now %d > ctx->endtime %d\n", now, ctx->endtime);
616 if ((ctx->initiate && direction != 0xff) ||
617 (!ctx->initiate && direction != 0)) {
629 "G_BAD_DIRECTION ctx->initiate = %d "
630 "direction = %d\n", ctx->initiate, direction);
635 retval = g_order_check(&(ctx->seqstate), (gssint_uint64)seqnum);
660 krb5_gss_ctx_id_rec *ctx;
678 ctx = (krb5_gss_ctx_id_rec *) context_handle;
680 if (! ctx->established) {
682 KRB5_LOG0(KRB5_ERR, "kg_unseal() end, error ! ctx->established \n");
690 if (ctx->proto)
707 err = g_verify_token_header(ctx->mech_used,
710 !ctx->proto);
716 if (ctx->proto == 0) {
717 err = kg_unseal_v1(ctx->k5_context, minor_status, ctx, ptr, bodysize,
722 err = gss_krb5int_unseal_token_v3(&ctx->k5_context, minor_status, ctx,
731 save_error_info (*minor_status, ctx->k5_context);