| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | rd_req.c | 109 krb5_ap_req *ap_req) in krb5_decode_ap_req() argument 113 ret = decode_AP_REQ(inbuf->data, inbuf->length, ap_req, &len); in krb5_decode_ap_req() 116 if (ap_req->pvno != 5){ in krb5_decode_ap_req() 117 free_AP_REQ(ap_req); in krb5_decode_ap_req() 121 if (ap_req->msg_type != krb_ap_req){ in krb5_decode_ap_req() 122 free_AP_REQ(ap_req); in krb5_decode_ap_req() 126 if (ap_req->ticket.tkt_vno != 5){ in krb5_decode_ap_req() 127 free_AP_REQ(ap_req); in krb5_decode_ap_req() 317 krb5_ap_req *ap_req, in krb5_verify_ap_req() argument 326 ap_req, in krb5_verify_ap_req() [all …]
|
| H A D | sendauth.c | 82 krb5_data ap_req, error_data; in krb5_sendauth() local 163 &ap_req); in krb5_sendauth() 177 &ap_req); in krb5_sendauth() 181 krb5_data_free (&ap_req); in krb5_sendauth()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | chpw.c | 15 krb5_data *ap_req, in krb5int_mk_chpw_req() argument 37 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 57 store_16_be(ap_req->length, ptr); in krb5int_mk_chpw_req() 62 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req() 63 ptr += ap_req->length; in krb5int_mk_chpw_req() 284 krb5_data *ap_req, in krb5int_mk_setpw_req() argument 317 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_setpw_req() 334 store_16_be(ap_req->length, ptr); in krb5int_mk_setpw_req() 337 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_setpw_req() 338 ptr += ap_req->length; in krb5int_mk_setpw_req()
|
| H A D | send_tgs.c | 59 krb5_ap_req ap_req; in tgs_construct_ap_req() local 66 memset(&ap_req, 0, sizeof(ap_req)); in tgs_construct_ap_req() 99 ap_req.authenticator = authent_enc; in tgs_construct_ap_req() 100 ap_req.ticket = ticket; in tgs_construct_ap_req() 101 ret = encode_krb5_ap_req(&ap_req, ap_req_asn1_out); in tgs_construct_ap_req()
|
| H A D | vfy_increds.c | 86 krb5_data ap_req = empty_data(); in get_vfy_cred() local 92 ret = krb5_mk_req_extended(context, &authcon, 0, NULL, creds, &ap_req); in get_vfy_cred() 130 &ap_req); in get_vfy_cred() 151 ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, NULL, NULL); in get_vfy_cred() 182 krb5_free_data_contents(context, &ap_req); in get_vfy_cred()
|
| H A D | authdata.c | 503 const krb5_ap_req *ap_req, in k5_get_kdc_issued_authdata() argument 514 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in k5_get_kdc_issued_authdata() 527 ap_req->ticket->enc_part2->session, in k5_get_kdc_issued_authdata() 588 get_cammac_authdata(krb5_context kcontext, const krb5_ap_req *ap_req, in get_cammac_authdata() argument 596 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in get_cammac_authdata() 616 const krb5_ap_req *ap_req) in krb5int_authdata_verify() argument 627 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in krb5int_authdata_verify() 629 code = k5_get_kdc_issued_authdata(kcontext, ap_req, &kdc_issuer, in krb5int_authdata_verify() 634 code = get_cammac_authdata(kcontext, ap_req, key, &cammac_authdata); in krb5int_authdata_verify() 710 ap_req); in krb5int_authdata_verify()
|
| H A D | authdata.h | 42 const krb5_ap_req *ap_req);
|
| H A D | int-proto.h | 184 krb5_data *ap_req, const char *passwd, krb5_data *packet); 197 krb5_data *ap_req, krb5_principal targetprinc,
|
| /freebsd/crypto/krb5/src/kadmin/server/ |
| H A D | schpw.c | 28 krb5_data ap_req, ap_rep = empty_data(); in process_chpw_request() local 86 ap_req.length = (*ptr++ & 0xff); in process_chpw_request() 87 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); in process_chpw_request() 89 if (ptr + ap_req.length >= req->data + req->length) { in process_chpw_request() 99 ap_req.data = ptr; in process_chpw_request() 100 ptr += ap_req.length; in process_chpw_request() 128 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab, in process_chpw_request()
|
| /freebsd/crypto/krb5/src/lib/krb5/os/ |
| H A D | changepw.c | 52 krb5_data ap_req; member 176 &ctx->ap_req, in kpasswd_sendto_msg_callback() 183 &ctx->ap_req, in kpasswd_sendto_msg_callback() 239 &callback_ctx.ap_req))) in change_set_password() 301 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req); in change_set_password()
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | init_sec_context.c | 374 krb5_data ap_req; in make_ap_req_v1() local 380 ap_req.data = 0; in make_ap_req_v1() 408 NULL, k_cred, &ap_req); in make_ap_req_v1() 425 code = data_to_gss(&ap_req, token); in make_ap_req_v1() 430 tlen = g_token_size((gss_OID) mech_type, ap_req.length); in make_ap_req_v1() 437 g_make_token_header(&buf, mech_type, ap_req.length, KG_TOK_CTX_AP_REQ); in make_ap_req_v1() 438 k5_buf_add_len(&buf, ap_req.data, ap_req.length); in make_ap_req_v1() 450 if (ap_req.data) in make_ap_req_v1() 451 krb5_free_data_contents(context, &ap_req); in make_ap_req_v1()
|
| H A D | accept_sec_context.c | 677 krb5_data ap_rep, ap_req; in kg_accept_krb5() local 723 ap_req.data = 0; in kg_accept_krb5() 763 code = parse_init_token(input_token, &mech_used, &ap_req); in kg_accept_krb5() 771 ap_req = make_data(input_token->value, input_token->length); in kg_accept_krb5() 794 code = decode_krb5_ap_req(&ap_req, &request); in kg_accept_krb5()
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | krb5tgs.c | 1157 krb5_ap_req ap_req; in tgs_parse_request() local 1173 memset(&ap_req, 0, sizeof(ap_req)); in tgs_parse_request() 1174 ret = krb5_decode_ap_req(context, &tgs_req->padata_value, &ap_req); in tgs_parse_request() 1182 if(!get_krbtgt_realm(&ap_req.ticket.sname)){ in tgs_parse_request() 1191 ap_req.ticket.sname, in tgs_parse_request() 1192 ap_req.ticket.realm); in tgs_parse_request() 1194 …ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, k… in tgs_parse_request() 1223 if(ap_req.ticket.enc_part.kvno && in tgs_parse_request() 1224 *ap_req.ticket.enc_part.kvno != (*krbtgt)->entry.kvno){ in tgs_parse_request() 1233 *ap_req.ticket.enc_part.kvno, in tgs_parse_request() [all …]
|
| /freebsd/crypto/heimdal/lib/gssapi/krb5/ |
| H A D | accept_sec_context.c | 304 AP_REQ ap_req; in send_error_token() local 306 ret = krb5_decode_ap_req(context, indata, &ap_req); in send_error_token() 313 ap_req.ticket.sname, in send_error_token() 314 ap_req.ticket.realm); in send_error_token() 315 free_AP_REQ(&ap_req); in send_error_token()
|
| /freebsd/crypto/krb5/src/lib/krb5/asn.1/ |
| H A D | asn1_k_encode.c | 758 DEFAPPTAGGEDTYPE(ap_req, 14, untagged_ap_req); 1161 MAKE_ENCODER(encode_krb5_ap_req, ap_req); 1162 MAKE_DECODER(decode_krb5_ap_req, ap_req);
|
| /freebsd/crypto/krb5/src/windows/include/ |
| H A D | loadfuncs-krb5.h | 680 krb5_data *ap_req, char *passwd, krb5_data *packet)
|
| /freebsd/crypto/heimdal/ |
| H A D | ChangeLog.1998 | 2432 * kdc/kerberos5.c (tgs_rep2): Free ticket and ap_req.
|
| /freebsd/crypto/openssl/ |
| H A D | CHANGES.md | 15099 Added openssl-style ASN.1 macros for Kerberos ticket, ap_req,
|