Searched refs:krb5_subject_pk_info (Results 1 – 8 of 8) sorted by relevance
66 } krb5_subject_pk_info; typedef71 krb5_subject_pk_info *clientPublicValue; /* Optional */79 krb5_subject_pk_info *clientPublicValue; /* Optional */
309 void init_krb5_subject_pk_info(krb5_subject_pk_info **in);325 void free_krb5_subject_pk_info(krb5_subject_pk_info **in);
300 free_krb5_subject_pk_info(krb5_subject_pk_info **in) in free_krb5_subject_pk_info()420 init_krb5_subject_pk_info(krb5_subject_pk_info **in) in init_krb5_subject_pk_info()422 (*in) = malloc(sizeof(krb5_subject_pk_info)); in init_krb5_subject_pk_info()
282 krb5_subject_pk_info *info = NULL;
80 (asn1buf *buf, const krb5_subject_pk_info *val, unsigned int *retlen);
177 (asn1buf *buf, krb5_subject_pk_info *val);
1377 asn1_error_code asn1_decode_subject_pk_info(asn1buf *buf, krb5_subject_pk_info *val) in asn1_decode_subject_pk_info()1475 if (tagnum == 1) { alloc_field(val->clientPublicValue, krb5_subject_pk_info); } in asn1_decode_auth_pack()1508 alloc_field(val->clientPublicValue, krb5_subject_pk_info); in asn1_decode_auth_pack_draft9()
1521 asn1_error_code asn1_encode_subject_pk_info(asn1buf *buf, const krb5_subject_pk_info *val, unsigned… in asn1_encode_subject_pk_info()