/freebsd/crypto/heimdal/lib/krb5/ |
H A D | rd_req.c | 321 krb5_flags *ap_req_options, in krb5_verify_ap_req() argument 330 ap_req_options, in krb5_verify_ap_req() 342 krb5_flags *ap_req_options, in krb5_verify_ap_req2() argument 485 if (ap_req_options) { in krb5_verify_ap_req2() 486 *ap_req_options = 0; in krb5_verify_ap_req2() 488 *ap_req_options |= AP_OPTS_USE_SUBKEY; in krb5_verify_ap_req2() 490 *ap_req_options |= AP_OPTS_USE_SESSION_KEY; in krb5_verify_ap_req2() 492 *ap_req_options |= AP_OPTS_MUTUAL_REQUIRED; in krb5_verify_ap_req2() 526 krb5_flags ap_req_options; member 614 krb5_flags *ap_req_options) in krb5_rd_req_out_get_ap_req_options() argument [all …]
|
H A D | mk_req_ext.c | 39 const krb5_flags ap_req_options, in _krb5_mk_req_internal() argument 63 if(ac->local_subkey == NULL && (ap_req_options & AP_OPTS_USE_SUBKEY)) { in _krb5_mk_req_internal() 139 in_creds, ap_req_options, authenticator, outbuf); in _krb5_mk_req_internal() 149 const krb5_flags ap_req_options, in krb5_mk_req_extended() argument 156 ap_req_options, in krb5_mk_req_extended()
|
H A D | mk_req.c | 39 const krb5_flags ap_req_options, in krb5_mk_req_exact() argument 72 ap_req_options, in krb5_mk_req_exact() 83 const krb5_flags ap_req_options, in krb5_mk_req() argument 110 ret = krb5_mk_req_exact (context, auth_context, ap_req_options, in krb5_mk_req()
|
H A D | sendauth.c | 70 krb5_flags ap_req_options, in krb5_sendauth() argument 160 ap_req_options, in krb5_sendauth() 212 if (ap_req_options & AP_OPTS_MUTUAL_REQUIRED) { in krb5_sendauth()
|
/freebsd/crypto/krb5/src/lib/krb5/krb/ |
H A D | mk_req_ext.c | 86 krb5_flags ap_req_options, krb5_data *in_data, in krb5_mk_req_extended() argument 98 krb5_boolean cbt_flag = (ap_req_options & AP_OPTS_CBT_FLAG) != 0; in krb5_mk_req_extended() 100 request.ap_options = ap_req_options & AP_OPTS_WIRE_MASK; in krb5_mk_req_extended() 107 if ((ap_req_options & AP_OPTS_ETYPE_NEGOTIATION) && in krb5_mk_req_extended() 108 !(ap_req_options & AP_OPTS_MUTUAL_REQUIRED)) in krb5_mk_req_extended() 146 if ((ap_req_options & AP_OPTS_USE_SUBKEY)&&(!(*auth_context)->send_subkey)) { in krb5_mk_req_extended() 187 if (ap_req_options & AP_OPTS_ETYPE_NEGOTIATION) { in krb5_mk_req_extended()
|
H A D | sendauth.c | 40 krb5_principal server, krb5_flags ap_req_options, in krb5_sendauth() argument 131 ap_req_options, in_data, credsp, in krb5_sendauth() 169 if ((ap_req_options & AP_OPTS_MUTUAL_REQUIRED)) { in krb5_sendauth()
|
H A D | mk_req.c | 51 krb5_flags ap_req_options, const char *service, in krb5_mk_req() argument 77 retval = krb5_mk_req_extended(context, auth_context, ap_req_options, in krb5_mk_req()
|
H A D | rd_req.c | 48 krb5_keytab keytab, krb5_flags *ap_req_options, in krb5_rd_req() argument 88 keytab, ap_req_options, NULL); in krb5_rd_req()
|
H A D | rd_req_dec.c | 475 krb5_keytab keytab, krb5_flags *ap_req_options, in rd_req_decoded_opt() argument 766 if (ap_req_options) { in rd_req_decoded_opt() 767 *ap_req_options = req->ap_options & AP_OPTS_WIRE_MASK; in rd_req_decoded_opt() 769 *ap_req_options |= AP_OPTS_ETYPE_NEGOTIATION; in rd_req_decoded_opt() 772 *ap_req_options |= AP_OPTS_USE_SUBKEY; in rd_req_decoded_opt() 792 krb5_keytab keytab, krb5_flags *ap_req_options, in krb5_rd_req_decoded() argument 798 ap_req_options, ticket, in krb5_rd_req_decoded() 808 krb5_flags *ap_req_options, krb5_ticket **ticket) in krb5_rd_req_decoded_anyflag() argument 813 ap_req_options, ticket, in krb5_rd_req_decoded_anyflag()
|
/freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 467 krb5_auth_context auth_context, krb5_flags ap_req_options, in process_checksum() argument 515 if (ap_req_options & AP_OPTS_MUTUAL_REQUIRED) in process_checksum() 698 krb5_flags ap_req_options = 0; in kg_accept_krb5() local 831 &ap_req_options, NULL); in kg_accept_krb5() 842 auth_context, ap_req_options, in kg_accept_krb5() 1000 (ap_req_options & AP_OPTS_USE_SUBKEY)) { in kg_accept_krb5() 1015 ap_req_options &= ~(AP_OPTS_USE_SUBKEY); in kg_accept_krb5() 1021 (ap_req_options & AP_OPTS_USE_SUBKEY)) in kg_accept_krb5()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kx509.c | 297 krb5_flags ap_req_options; in _kdc_do_kx509() local 328 &ap_req_options, in _kdc_do_kx509()
|
H A D | digest.c | 215 krb5_flags ap_req_options; in _kdc_do_digest() local 252 &ap_req_options, in _kdc_do_digest()
|
H A D | krb5tgs.c | 1161 krb5_flags ap_req_options; in tgs_parse_request() local 1272 &ap_req_options, in tgs_parse_request()
|
/freebsd/crypto/krb5/src/include/krb5/ |
H A D | krb5.hin | 3155 * @param [in] ap_req_options Options (see AP_OPTS macros) 3174 krb5_flags ap_req_options, const char *service, 3183 * @param [in] ap_req_options Options (see AP_OPTS macros) 3190 * Valid @a ap_req_options are: 3217 krb5_flags ap_req_options, krb5_data *in_data, 5198 * @param [out] ap_req_options If non-null, the AP-REQ flags on output 5248 krb5_keytab keytab, krb5_flags *ap_req_options, 5380 * @param [in] ap_req_options Options (see AP_OPTS macros) 5386 * @param [out] rep_result If non-null and @a ap_req_options is 5422 krb5_principal server, krb5_flags ap_req_options,
|