Searched defs:ap_req (Results 1 - 8 of 8) sorted by relevance

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dvfy_increds.c81 krb5_data ap_req; local
90 ap_req.data = NULL;
151 /* make an ap_req */
153 &ap_req)))
187 /* make an ap_req */
189 &ap_req)))
199 /* verify the ap_req */
201 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab,
247 if (ap_req.data)
248 krb5_xfree(ap_req
[all...]
H A Dchpw.c20 krb5_data *ap_req,
43 packet->length = 6 + ap_req->length + cipherpw.length;
62 /* ap_req length, big-endian */
64 *ptr++ = (ap_req->length>>8) & 0xff;
65 *ptr++ = ap_req->length & 0xff;
69 memcpy(ptr, ap_req->data, ap_req->length);
70 ptr += ap_req->length;
280 krb5_data *ap_req,
314 packet->length = 6 + ap_req
17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
277 krb5int_mk_setpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet ) argument
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/
H A Dchpw.c20 krb5_data *ap_req,
43 packet->length = 6 + ap_req->length + cipherpw.length;
65 /* ap_req length, big-endian */
67 *ptr++ = (ap_req->length>>8) & 0xff;
68 *ptr++ = ap_req->length & 0xff;
72 memcpy(ptr, ap_req->data, ap_req->length);
73 ptr += ap_req->length;
17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
H A Dchangepw.c49 krb5_data *ap_req, char *passwd,
95 krb5_data ap_req, chpw_req, chpw_rep; local
113 memset(&ap_req, 0, sizeof (krb5_data));
121 NULL, creds, &ap_req))
271 &ap_req, newpw, &chpw_req))
356 krb5_xfree(ap_req.data);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dchangepw.c50 krb5_data ap_req; member in struct:sendto_callback_context
165 &ctx->ap_req,
172 &ctx->ap_req,
225 &callback_ctx.ap_req)))
332 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c293 krb5_data ap_rep, ap_req; local
347 ap_req.data = 0;
378 /* verify the token's integrity, and leave the token in ap_req.
384 (uint32_t *)&(ap_req.length),
390 (uint32_t *)&(ap_req.length),
396 (uint32_t *)&(ap_req.length),
414 ap_req.length = input_token->length;
415 ap_req.data = input_token->value;
424 TREAD_STR(sptr, ap_req.data, ap_req
[all...]
H A Dinit_sec_context.c273 krb5_data ap_req; local
280 ap_req.data = 0;
310 /* call mk_req. subkey and ap_req need to be used or destroyed */
318 checksum_data, k_cred, &ap_req);
330 tlen = g_token_size((gss_OID) mech_type, ap_req.length);
341 g_make_token_header(mech_type, ap_req.length,
344 TWRITE_STR(ptr, (unsigned char *) ap_req.data, ap_req.length);
356 if (ap_req.data)
357 krb5_free_data_contents(context, &ap_req);
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c56 krb5_data ap_req, ap_rep; local
125 ap_req.length = (*ptr++ & 0xff);
126 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff);
128 if (ptr + ap_req.length >= req->data + req->length) {
137 * Verify ap_req
139 ap_req.data = ptr;
140 ptr += ap_req.length;
180 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab,

Completed in 67 milliseconds