Searched refs:dec_rep (Results 1 - 5 of 5) sorted by relevance
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encode_kdc.c | 45 dec_rep->enc_part.ciphertext is allocated and filled in. 53 krb5_kdc_rep *dec_rep, krb5_data **enc_rep) 60 if (!krb5_c_valid_enctype(dec_rep->enc_part.enctype)) 102 &dec_rep->enc_part); 105 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \ 106 dec_rep->enc_part.ciphertext.length); \ 107 free(dec_rep->enc_part.ciphertext.data); \ 108 dec_rep->enc_part.ciphertext.length = 0; \ 109 dec_rep->enc_part.ciphertext.data = 0;} 120 retval = encode_krb5_as_rep(dec_rep, enc_re 50 krb5_encode_kdc_rep(krb5_context context, krb5_msgtype type, const krb5_enc_kdc_rep_part *encpart, int using_subkey, const krb5_keyblock *client_key, krb5_kdc_rep *dec_rep, krb5_data **enc_rep) argument [all...] |
H A D | kdc_rep_dc.c | 41 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument 56 scratch.length = dec_rep->enc_part.ciphertext.length; 57 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { 61 /*dec_rep->enc_part.enctype;*/ 63 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part, 78 dec_rep->enc_part2 = local_encpart;
|
H A D | decode_kdc.c | 43 dec_rep->client,ticket,session,last_req,server,caddrs 55 krb5_keyusage usage, krb5_kdc_rep **dec_rep) 78 *dec_rep = local_dec_rep; 81 k5_trace_kdc_rep_read(enc_rep, retval == 0 ? *dec_rep : NULL); 54 krb5int_decode_tgs_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, krb5_keyusage usage, krb5_kdc_rep **dec_rep) argument
|
H A D | gc_via_tkt.c | 106 krb5_creds *in_cred, krb5_kdc_rep *dec_rep) 109 if (!krb5_principal_compare(context, dec_rep->ticket->server, 110 dec_rep->enc_part2->server)) 115 if (krb5_principal_compare(context, dec_rep->ticket->server, 128 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server); 137 !IS_TGS_PRINC(context, dec_rep->ticket->server)) { 277 krb5_kdc_rep *dec_rep = NULL; local 411 &dec_rep); 415 KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY, &dec_rep)) == 0) 421 if (dec_rep 105 check_reply_server(krb5_context context, krb5_flags kdcoptions, krb5_creds *in_cred, krb5_kdc_rep *dec_rep) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/dtrace/ |
H A D | kerberos_dtrace.c | 1203 void k5_trace_kdc_rep_read(const krb5_data *msg, const krb5_kdc_rep *dec_rep) { argument 1204 KERBEROS_PROBE_KRB_KDC_REP(READ, msg, dec_rep, 1205 dec_rep == NULL ? NULL : dec_rep->enc_part2, 1206 dec_rep == NULL ? NULL : dec_rep->ticket);
|
Completed in 22 milliseconds