Searched defs:ap_req (Results 1 - 8 of 8) sorted by relevance

/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dchpw.c20 krb5_data *ap_req,
43 packet->length = 6 + ap_req->length + cipherpw.length;
65 /* ap_req length, big-endian */
67 *ptr++ = (ap_req->length>>8) & 0xff;
68 *ptr++ = ap_req->length & 0xff;
72 memcpy(ptr, ap_req->data, ap_req->length);
73 ptr += ap_req->length;
17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dchpw.c14 krb5_data *ap_req,
37 packet->length = 6 + ap_req->length + cipherpw.length;
55 /* ap_req length, big-endian */
57 store_16_be(ap_req->length, ptr);
62 memcpy(ptr, ap_req->data, ap_req->length);
63 ptr += ap_req->length;
266 krb5_data *ap_req,
300 packet->length = 6 + ap_req->length + cipherpw.length;
316 /* the ap_req lengt
12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument
[all...]
H A Dvfy_increds.c88 krb5_data ap_req; local
93 ap_req.data = NULL;
99 /* make an ap_req */
101 &ap_req)))
165 /* make an ap_req */
167 &ap_req)))
177 /* verify the ap_req */
179 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab,
218 if (ap_req.data)
219 free(ap_req
[all...]
H A Dauthdata.c503 const krb5_ap_req *ap_req,
514 ticket_authdata = ap_req->ticket->enc_part2->authorization_data;
530 ap_req->ticket->enc_part2->session,
612 const krb5_ap_req *ap_req)
622 ticket_authdata = ap_req->ticket->enc_part2->authorization_data;
623 k5_get_kdc_issued_authdata(kcontext, ap_req,
678 ap_req);
502 k5_get_kdc_issued_authdata(krb5_context kcontext, const krb5_ap_req *ap_req, krb5_principal *kdc_issuer, krb5_authdata ***kdc_issued_authdata) argument
607 krb5int_authdata_verify(krb5_context kcontext, krb5_authdata_context context, krb5_flags usage, const krb5_auth_context *auth_context, const krb5_keyblock *key, const krb5_ap_req *ap_req) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dchangepw.c53 krb5_data ap_req; member in struct:sendto_callback_context
188 &ctx->ap_req,
195 &ctx->ap_req,
252 &callback_ctx.ap_req)))
372 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req);
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c65 krb5_data ap_req, ap_rep; local
135 ap_req.length = (*ptr++ & 0xff);
136 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff);
138 if (ptr + ap_req.length >= req->data + req->length) {
147 * Verify ap_req
149 ap_req.data = ptr;
150 ptr += ap_req.length;
190 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c442 krb5_data ap_rep, ap_req; local
499 ap_req.data = 0;
542 /* verify the token's integrity, and leave the token in ap_req.
548 &(ap_req.length),
554 &(ap_req.length),
560 &(ap_req.length),
578 ap_req.length = input_token->length;
579 ap_req.data = input_token->value;
588 TREAD_STR(sptr, ap_req.data, ap_req
[all...]
H A Dinit_sec_context.c370 krb5_data ap_req; local
377 ap_req.data = 0;
407 /* call mk_req. subkey and ap_req need to be used or destroyed */
416 checksum_data, k_cred, &ap_req);
432 token->length = ap_req.length;
433 token->value = ap_req.data;
435 ap_req.data = NULL; /* don't double free */
438 tlen = g_token_size((gss_OID) mech_type, ap_req.length);
448 g_make_token_header(mech_type, ap_req.length,
451 TWRITE_STR(ptr, ap_req
[all...]

Completed in 68 milliseconds