/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | authdata.h | 43 const krb5_ap_req *ap_req);
|
H A D | chpw.c | 14 krb5_data *ap_req, 37 packet->length = 6 + ap_req->length + cipherpw.length; 55 /* ap_req length, big-endian */ 57 store_16_be(ap_req->length, ptr); 62 memcpy(ptr, ap_req->data, ap_req->length); 63 ptr += ap_req->length; 266 krb5_data *ap_req, 300 packet->length = 6 + ap_req->length + cipherpw.length; 316 /* the ap_req lengt 12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument 264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument [all...] |
H A D | vfy_increds.c | 88 krb5_data ap_req; local 93 ap_req.data = NULL; 99 /* make an ap_req */ 101 &ap_req))) 165 /* make an ap_req */ 167 &ap_req))) 177 /* verify the ap_req */ 179 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, 218 if (ap_req.data) 219 free(ap_req [all...] |
H A D | authdata.c | 503 const krb5_ap_req *ap_req, 514 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; 530 ap_req->ticket->enc_part2->session, 612 const krb5_ap_req *ap_req) 622 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; 623 k5_get_kdc_issued_authdata(kcontext, ap_req, 678 ap_req); 502 k5_get_kdc_issued_authdata(krb5_context kcontext, const krb5_ap_req *ap_req, krb5_principal *kdc_issuer, krb5_authdata ***kdc_issued_authdata) argument 607 krb5int_authdata_verify(krb5_context kcontext, krb5_authdata_context context, krb5_flags usage, const krb5_auth_context *auth_context, const krb5_keyblock *key, const krb5_ap_req *ap_req) argument
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 20 krb5_data *ap_req, 43 packet->length = 6 + ap_req->length + cipherpw.length; 65 /* ap_req length, big-endian */ 67 *ptr++ = (ap_req->length>>8) & 0xff; 68 *ptr++ = ap_req->length & 0xff; 72 memcpy(ptr, ap_req->data, ap_req->length); 73 ptr += ap_req->length; 17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
|
H A D | changepw.c | 47 krb5_data *ap_req, char *passwd,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | changepw.c | 53 krb5_data ap_req; member in struct:sendto_callback_context 188 &ctx->ap_req, 195 &ctx->ap_req, 252 &callback_ctx.ap_req))) 372 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req);
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 65 krb5_data ap_req, ap_rep; local 135 ap_req.length = (*ptr++ & 0xff); 136 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); 138 if (ptr + ap_req.length >= req->data + req->length) { 147 * Verify ap_req 149 ap_req.data = ptr; 150 ptr += ap_req.length; 190 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 442 krb5_data ap_rep, ap_req; local 499 ap_req.data = 0; 542 /* verify the token's integrity, and leave the token in ap_req. 548 &(ap_req.length), 554 &(ap_req.length), 560 &(ap_req.length), 578 ap_req.length = input_token->length; 579 ap_req.data = input_token->value; 588 TREAD_STR(sptr, ap_req.data, ap_req [all...] |
H A D | init_sec_context.c | 370 krb5_data ap_req; local 377 ap_req.data = 0; 407 /* call mk_req. subkey and ap_req need to be used or destroyed */ 416 checksum_data, k_cred, &ap_req); 432 token->length = ap_req.length; 433 token->value = ap_req.data; 435 ap_req.data = NULL; /* don't double free */ 438 tlen = g_token_size((gss_OID) mech_type, ap_req.length); 448 g_make_token_header(mech_type, ap_req.length, 451 TWRITE_STR(ptr, ap_req [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 871 DEFAPPTAGGEDTYPE(ap_req, 14, untagged_ap_req); 1409 MAKE_FULL_ENCODER(encode_krb5_ap_req, ap_req);
|