Home
last modified time | relevance | path

Searched refs:ap_req (Results 1 – 10 of 10) sorted by relevance

/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dchpw.c20 krb5_data *ap_req, in krb5int_mk_chpw_req() argument
43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req()
64 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_chpw_req()
65 *ptr++ = ap_req->length & 0xff; in krb5int_mk_chpw_req()
69 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req()
70 ptr += ap_req->length; in krb5int_mk_chpw_req()
280 krb5_data *ap_req, in krb5int_mk_setpw_req() argument
314 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_setpw_req()
331 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_setpw_req()
332 *ptr++ = ap_req->length & 0xff; in krb5int_mk_setpw_req()
[all …]
H A Dvfy_increds.c81 krb5_data ap_req; in krb5_verify_init_creds() local
90 ap_req.data = NULL; in krb5_verify_init_creds()
153 &ap_req))) in krb5_verify_init_creds()
189 &ap_req))) in krb5_verify_init_creds()
201 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, in krb5_verify_init_creds()
247 if (ap_req.data) in krb5_verify_init_creds()
248 krb5_xfree(ap_req.data); in krb5_verify_init_creds()
/titanic_41/usr/src/lib/krb5/kadm5/clnt/
H A Dchpw.c20 krb5_data *ap_req, in krb5int_mk_chpw_req() argument
43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req()
67 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_chpw_req()
68 *ptr++ = ap_req->length & 0xff; in krb5int_mk_chpw_req()
72 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req()
73 ptr += ap_req->length; in krb5int_mk_chpw_req()
H A Dchangepw.c49 krb5_data *ap_req, char *passwd,
95 krb5_data ap_req, chpw_req, chpw_rep; local
113 memset(&ap_req, 0, sizeof (krb5_data));
121 NULL, creds, &ap_req))
271 &ap_req, newpw, &chpw_req))
356 krb5_xfree(ap_req.data);
/titanic_41/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c56 krb5_data ap_req, ap_rep; in process_chpw_request() local
125 ap_req.length = (*ptr++ & 0xff); in process_chpw_request()
126 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); in process_chpw_request()
128 if (ptr + ap_req.length >= req->data + req->length) { in process_chpw_request()
139 ap_req.data = ptr; in process_chpw_request()
140 ptr += ap_req.length; in process_chpw_request()
180 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab, in process_chpw_request()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dchangepw.c50 krb5_data ap_req; member
165 &ctx->ap_req, in kpasswd_sendto_msg_callback()
172 &ctx->ap_req, in kpasswd_sendto_msg_callback()
225 &callback_ctx.ap_req))) in krb5_change_set_password()
332 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req); in krb5_change_set_password()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c293 krb5_data ap_rep, ap_req; local
347 ap_req.data = 0;
384 (uint32_t *)&(ap_req.length),
390 (uint32_t *)&(ap_req.length),
396 (uint32_t *)&(ap_req.length),
414 ap_req.length = input_token->length;
415 ap_req.data = input_token->value;
424 TREAD_STR(sptr, ap_req.data, ap_req.length);
432 if (!krb5_is_ap_req(&ap_req)) {
437 if ((code = decode_krb5_ap_req(&ap_req, &request))) {
H A Dinit_sec_context.c273 krb5_data ap_req; local
280 ap_req.data = 0;
318 checksum_data, k_cred, &ap_req);
330 tlen = g_token_size((gss_OID) mech_type, ap_req.length);
341 g_make_token_header(mech_type, ap_req.length,
344 TWRITE_STR(ptr, (unsigned char *) ap_req.data, ap_req.length);
356 if (ap_req.data)
357 krb5_free_data_contents(context, &ap_req);
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dk5-int.h2284 krb5_data *ap_req, char *passwd, krb5_data *packet);
2294 krb5_data *ap_req, krb5_principal targetprinc, char *passwd, krb5_data *packet);
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_k_encode.c854 DEFAPPTAGGEDTYPE(ap_req, 14, untagged_ap_req);
1285 MAKE_FULL_ENCODER(encode_krb5_ap_req, ap_req);