/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | vfy_increds.c | 81 krb5_data ap_req; local 90 ap_req.data = NULL; 151 /* make an ap_req */ 153 &ap_req))) 187 /* make an ap_req */ 189 &ap_req))) 199 /* verify the ap_req */ 201 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, 247 if (ap_req.data) 248 krb5_xfree(ap_req [all...] |
H A D | chpw.c | 20 krb5_data *ap_req, 43 packet->length = 6 + ap_req->length + cipherpw.length; 62 /* ap_req length, big-endian */ 64 *ptr++ = (ap_req->length>>8) & 0xff; 65 *ptr++ = ap_req->length & 0xff; 69 memcpy(ptr, ap_req->data, ap_req->length); 70 ptr += ap_req->length; 280 krb5_data *ap_req, 314 packet->length = 6 + ap_req 17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument 277 krb5int_mk_setpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet ) argument [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 20 krb5_data *ap_req, 43 packet->length = 6 + ap_req->length + cipherpw.length; 65 /* ap_req length, big-endian */ 67 *ptr++ = (ap_req->length>>8) & 0xff; 68 *ptr++ = ap_req->length & 0xff; 72 memcpy(ptr, ap_req->data, ap_req->length); 73 ptr += ap_req->length; 17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
|
H A D | changepw.c | 49 krb5_data *ap_req, char *passwd, 95 krb5_data ap_req, chpw_req, chpw_rep; local 113 memset(&ap_req, 0, sizeof (krb5_data)); 121 NULL, creds, &ap_req)) 271 &ap_req, newpw, &chpw_req)) 356 krb5_xfree(ap_req.data);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | changepw.c | 50 krb5_data ap_req; member in struct:sendto_callback_context 165 &ctx->ap_req, 172 &ctx->ap_req, 225 &callback_ctx.ap_req))) 332 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 293 krb5_data ap_rep, ap_req; local 347 ap_req.data = 0; 378 /* verify the token's integrity, and leave the token in ap_req. 384 (uint32_t *)&(ap_req.length), 390 (uint32_t *)&(ap_req.length), 396 (uint32_t *)&(ap_req.length), 414 ap_req.length = input_token->length; 415 ap_req.data = input_token->value; 424 TREAD_STR(sptr, ap_req.data, ap_req [all...] |
H A D | init_sec_context.c | 273 krb5_data ap_req; local 280 ap_req.data = 0; 310 /* call mk_req. subkey and ap_req need to be used or destroyed */ 318 checksum_data, k_cred, &ap_req); 330 tlen = g_token_size((gss_OID) mech_type, ap_req.length); 341 g_make_token_header(mech_type, ap_req.length, 344 TWRITE_STR(ptr, (unsigned char *) ap_req.data, ap_req.length); 356 if (ap_req.data) 357 krb5_free_data_contents(context, &ap_req); [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 56 krb5_data ap_req, ap_rep; local 125 ap_req.length = (*ptr++ & 0xff); 126 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); 128 if (ptr + ap_req.length >= req->data + req->length) { 137 * Verify ap_req 139 ap_req.data = ptr; 140 ptr += ap_req.length; 180 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab,
|