Lines Matching full:contents

154         scratch.data = (char *) fast_padata->contents;  in kdc_find_fast()
333 pa[0].contents = (unsigned char *) encrypted_reply->data; in kdc_fast_response_handle_padata()
352 if (finish.ticket_checksum.contents) in kdc_fast_response_handle_padata()
399 pa[0].contents = (unsigned char *) encoded_fx_error->data; in kdc_fast_handle_error()
415 pa[0].contents = (unsigned char *) encrypted_reply->data; in kdc_fast_handle_error()
449 /* Create a pa-data entry with the specified type and contents. */
451 make_padata(krb5_preauthtype pa_type, const void *contents, size_t len, in make_padata() argument
456 memcpy((*out)->contents, contents, len); in make_padata()
540 * Locate and decode the FAST cookie in req, storing its contents in state for
542 * KRB5KDC_ERR_PREAUTH_EXPIRED if its contents are relevant to req, and ignore
565 if (pa->length <= 8 || memcmp(pa->contents, "MIT1", 4) != 0) in kdc_fast_read_cookie()
569 kvno = load_32_be(pa->contents + 4); in kdc_fast_read_cookie()
578 enc.ciphertext = make_data(pa->contents + 8, pa->length - 8); in kdc_fast_read_cookie()
595 /* Don't accept the cookie contents. Only return an error if the in kdc_fast_read_cookie()
626 *out = make_data(pa->contents, pa->length); in kdc_fast_search_cookie()
663 krb5_pa_data **contents = state->out_cookie_padata, *pa; in kdc_fast_make_cookie() local
673 /* Make a trivial cookie if there are no contents to marshal or we don't in kdc_fast_make_cookie()
675 if (contents == NULL || *contents == NULL || local_tgt_key == NULL) in kdc_fast_make_cookie()
687 cookie.data = contents; in kdc_fast_make_cookie()
708 memcpy(pa->contents, "MIT1", 4); in kdc_fast_make_cookie()
709 store_32_be(current_kvno(local_tgt), pa->contents + 4); in kdc_fast_make_cookie()
710 memcpy(pa->contents + 8, enc.ciphertext.data, enc.ciphertext.length); in kdc_fast_make_cookie()