Lines Matching defs:in

6  * You may not use this file except in compliance with the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
100 * where SAM account is in the format of <NetBIOS name>$
150 smbfs_gss_tok2mbdata(gss_buffer_desc *in, struct mbdata *out)
155 length = in->length;
163 m->m_data = in->value;
176 smbfs_gss_mbdata2tok(struct mbdata *in, gss_buffer_desc *out)
180 m = in->mb_top;
243 * result in re-acquiring of Kerberos credentials.
326 * SMBFS client needs to acquire the credentials of the user in order to
333 * For all other type of requests, the credential cache will be queried in the
512 * The subkey in the EncAPRepPart of the KRB_AP_REP message SHOULD be used as
514 * message and its fields are defined in section 5.5.2 of [RFC4120].) When DES
515 * and RC4 are used, the implementation is as described in [RFC1964]. With DES
516 * and RC4, the subkey in the KRB_AP_REQ message can be used as the session key,
517 * as it is the same as the subkey in KRB_AP_REP message; however when AES is
518 * used (see [RFC4121]), the subkeys are different and the subkey in the
519 * KRB_AP_REP SHOULD be used. (The KRB_AP_REQ message is defined in section
575 * [MS-SMB] If the capabilities returned in the SMB_COM_NEGOTIATE response
577 * the value returned in the SecurityBlob field in the SMB_COM_NEGOTIATE server
579 * the gss_init_sec_context() interface, as specified in [RFC2743], by passing
580 * in the input GSSNegotiateToken.
583 * returned by the SMB server in SMB_COM_NEGOTIATE response. This input_tok
588 * mechanism in Solaris.
590 * Every token generated by gss_init_sec_context() is stored in send_tok
591 * which is then transmitted to the server; every received token is stored in