Home
last modified time | relevance | path

Searched refs:ap_req (Results 1 – 18 of 18) sorted by relevance

/freebsd/crypto/heimdal/lib/krb5/
H A Drd_req.c109 krb5_ap_req *ap_req) in krb5_decode_ap_req() argument
113 ret = decode_AP_REQ(inbuf->data, inbuf->length, ap_req, &len); in krb5_decode_ap_req()
116 if (ap_req->pvno != 5){ in krb5_decode_ap_req()
117 free_AP_REQ(ap_req); in krb5_decode_ap_req()
121 if (ap_req->msg_type != krb_ap_req){ in krb5_decode_ap_req()
122 free_AP_REQ(ap_req); in krb5_decode_ap_req()
126 if (ap_req->ticket.tkt_vno != 5){ in krb5_decode_ap_req()
127 free_AP_REQ(ap_req); in krb5_decode_ap_req()
317 krb5_ap_req *ap_req, in krb5_verify_ap_req() argument
326 ap_req, in krb5_verify_ap_req()
[all …]
H A Dsendauth.c82 krb5_data ap_req, error_data; in krb5_sendauth() local
163 &ap_req); in krb5_sendauth()
177 &ap_req); in krb5_sendauth()
181 krb5_data_free (&ap_req); in krb5_sendauth()
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dchpw.c15 krb5_data *ap_req, in krb5int_mk_chpw_req() argument
37 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req()
57 store_16_be(ap_req->length, ptr); in krb5int_mk_chpw_req()
62 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req()
63 ptr += ap_req->length; in krb5int_mk_chpw_req()
284 krb5_data *ap_req, in krb5int_mk_setpw_req() argument
317 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_setpw_req()
334 store_16_be(ap_req->length, ptr); in krb5int_mk_setpw_req()
337 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_setpw_req()
338 ptr += ap_req->length; in krb5int_mk_setpw_req()
H A Dsend_tgs.c59 krb5_ap_req ap_req; in tgs_construct_ap_req() local
66 memset(&ap_req, 0, sizeof(ap_req)); in tgs_construct_ap_req()
99 ap_req.authenticator = authent_enc; in tgs_construct_ap_req()
100 ap_req.ticket = ticket; in tgs_construct_ap_req()
101 ret = encode_krb5_ap_req(&ap_req, ap_req_asn1_out); in tgs_construct_ap_req()
H A Dvfy_increds.c86 krb5_data ap_req = empty_data(); in get_vfy_cred() local
92 ret = krb5_mk_req_extended(context, &authcon, 0, NULL, creds, &ap_req); in get_vfy_cred()
130 &ap_req); in get_vfy_cred()
151 ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, NULL, NULL); in get_vfy_cred()
182 krb5_free_data_contents(context, &ap_req); in get_vfy_cred()
H A Dauthdata.c503 const krb5_ap_req *ap_req, in k5_get_kdc_issued_authdata() argument
514 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in k5_get_kdc_issued_authdata()
527 ap_req->ticket->enc_part2->session, in k5_get_kdc_issued_authdata()
588 get_cammac_authdata(krb5_context kcontext, const krb5_ap_req *ap_req, in get_cammac_authdata() argument
596 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in get_cammac_authdata()
616 const krb5_ap_req *ap_req) in krb5int_authdata_verify() argument
627 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in krb5int_authdata_verify()
629 code = k5_get_kdc_issued_authdata(kcontext, ap_req, &kdc_issuer, in krb5int_authdata_verify()
634 code = get_cammac_authdata(kcontext, ap_req, key, &cammac_authdata); in krb5int_authdata_verify()
710 ap_req); in krb5int_authdata_verify()
H A Dauthdata.h42 const krb5_ap_req *ap_req);
H A Dint-proto.h184 krb5_data *ap_req, const char *passwd, krb5_data *packet);
197 krb5_data *ap_req, krb5_principal targetprinc,
/freebsd/crypto/krb5/src/kadmin/server/
H A Dschpw.c28 krb5_data ap_req, ap_rep = empty_data(); in process_chpw_request() local
86 ap_req.length = (*ptr++ & 0xff); in process_chpw_request()
87 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); in process_chpw_request()
89 if (ptr + ap_req.length >= req->data + req->length) { in process_chpw_request()
99 ap_req.data = ptr; in process_chpw_request()
100 ptr += ap_req.length; in process_chpw_request()
128 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab, in process_chpw_request()
/freebsd/crypto/krb5/src/lib/krb5/os/
H A Dchangepw.c52 krb5_data ap_req; member
176 &ctx->ap_req, in kpasswd_sendto_msg_callback()
183 &ctx->ap_req, in kpasswd_sendto_msg_callback()
239 &callback_ctx.ap_req))) in change_set_password()
301 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req); in change_set_password()
/freebsd/crypto/krb5/src/lib/gssapi/krb5/
H A Dinit_sec_context.c374 krb5_data ap_req; in make_ap_req_v1() local
380 ap_req.data = 0; in make_ap_req_v1()
408 NULL, k_cred, &ap_req); in make_ap_req_v1()
425 code = data_to_gss(&ap_req, token); in make_ap_req_v1()
430 tlen = g_token_size((gss_OID) mech_type, ap_req.length); in make_ap_req_v1()
437 g_make_token_header(&buf, mech_type, ap_req.length, KG_TOK_CTX_AP_REQ); in make_ap_req_v1()
438 k5_buf_add_len(&buf, ap_req.data, ap_req.length); in make_ap_req_v1()
450 if (ap_req.data) in make_ap_req_v1()
451 krb5_free_data_contents(context, &ap_req); in make_ap_req_v1()
H A Daccept_sec_context.c677 krb5_data ap_rep, ap_req; in kg_accept_krb5() local
723 ap_req.data = 0; in kg_accept_krb5()
763 code = parse_init_token(input_token, &mech_used, &ap_req); in kg_accept_krb5()
771 ap_req = make_data(input_token->value, input_token->length); in kg_accept_krb5()
794 code = decode_krb5_ap_req(&ap_req, &request); in kg_accept_krb5()
/freebsd/crypto/heimdal/kdc/
H A Dkrb5tgs.c1157 krb5_ap_req ap_req; in tgs_parse_request() local
1173 memset(&ap_req, 0, sizeof(ap_req)); in tgs_parse_request()
1174 ret = krb5_decode_ap_req(context, &tgs_req->padata_value, &ap_req); in tgs_parse_request()
1182 if(!get_krbtgt_realm(&ap_req.ticket.sname)){ in tgs_parse_request()
1191 ap_req.ticket.sname, in tgs_parse_request()
1192 ap_req.ticket.realm); in tgs_parse_request()
1194 …ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, k… in tgs_parse_request()
1223 if(ap_req.ticket.enc_part.kvno && in tgs_parse_request()
1224 *ap_req.ticket.enc_part.kvno != (*krbtgt)->entry.kvno){ in tgs_parse_request()
1233 *ap_req.ticket.enc_part.kvno, in tgs_parse_request()
[all …]
/freebsd/crypto/heimdal/lib/gssapi/krb5/
H A Daccept_sec_context.c304 AP_REQ ap_req; in send_error_token() local
306 ret = krb5_decode_ap_req(context, indata, &ap_req); in send_error_token()
313 ap_req.ticket.sname, in send_error_token()
314 ap_req.ticket.realm); in send_error_token()
315 free_AP_REQ(&ap_req); in send_error_token()
/freebsd/crypto/krb5/src/lib/krb5/asn.1/
H A Dasn1_k_encode.c758 DEFAPPTAGGEDTYPE(ap_req, 14, untagged_ap_req);
1161 MAKE_ENCODER(encode_krb5_ap_req, ap_req);
1162 MAKE_DECODER(decode_krb5_ap_req, ap_req);
/freebsd/crypto/krb5/src/windows/include/
H A Dloadfuncs-krb5.h680 krb5_data *ap_req, char *passwd, krb5_data *packet)
/freebsd/crypto/heimdal/
H A DChangeLog.19982432 * kdc/kerberos5.c (tgs_rep2): Free ticket and ap_req.
/freebsd/crypto/openssl/
H A DCHANGES.md15099 Added openssl-style ASN.1 macros for Kerberos ticket, ap_req,