/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_req.c | 43 ap_req_options specifies the KRB_AP_REQ options desired. 55 krb5_flags ap_req_options, char *service, char *hostname, 80 retval = krb5_mk_req_extended(context, auth_context, ap_req_options, 54 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, char *service, char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
|
H A D | rd_req.c | 55 krb5_keytab keytab, krb5_flags *ap_req_options, 96 server, keytab, ap_req_options, ticket); 53 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
|
H A D | sendauth.c | 50 krb5_principal server, krb5_flags ap_req_options, 141 if (ap_req_options & AP_OPTS_USE_SUBKEY) { 169 ap_req_options, in_data, credsp, 212 if ((ap_req_options & AP_OPTS_MUTUAL_REQUIRED)) { 48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
|
H A D | mk_req_ext.c | 45 outbuf, ap_req_options, checksum, and ccache are used in the 57 ap_req_options specifies the KRB_AP_REQ options desired. 59 if ap_req_options specifies AP_OPTS_USE_SESSION_KEY, then creds->ticket 91 krb5_flags ap_req_options, krb5_data *in_data, 104 request.ap_options = ap_req_options & AP_OPTS_WIRE_MASK; 111 if ((ap_req_options & AP_OPTS_ETYPE_NEGOTIATION) && 112 !(ap_req_options & AP_OPTS_MUTUAL_REQUIRED)) 149 if ((ap_req_options & AP_OPTS_USE_SUBKEY)&&(!(*auth_context)->send_subkey)) { 203 if (ap_req_options & AP_OPTS_ETYPE_NEGOTIATION) { 90 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument
|
H A D | rd_req_dec.c | 259 krb5_keytab keytab, krb5_flags *ap_req_options, 692 if (ap_req_options) { 693 *ap_req_options = req->ap_options & AP_OPTS_WIRE_MASK; 695 *ap_req_options |= AP_OPTS_ETYPE_NEGOTIATION; 698 *ap_req_options |= AP_OPTS_USE_SUBKEY; 729 krb5_keytab keytab, krb5_flags *ap_req_options, 735 ap_req_options, ticket, 743 krb5_keytab keytab, krb5_flags *ap_req_options, 750 ap_req_options, ticket, 761 krb5_flags *ap_req_options, krb5_ticke 256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument 726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 468 krb5_flags ap_req_options = 0; local 736 &ap_req_options, 1199 (ap_req_options & AP_OPTS_USE_SUBKEY)) { 1215 ap_req_options &= ~(AP_OPTS_USE_SUBKEY); 1221 (ap_req_options & AP_OPTS_USE_SUBKEY))
|