/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 20 krb5_data *ap_req, in krb5int_mk_chpw_req() argument 43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 64 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_chpw_req() 65 *ptr++ = ap_req->length & 0xff; in krb5int_mk_chpw_req() 69 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req() 70 ptr += ap_req->length; in krb5int_mk_chpw_req() 280 krb5_data *ap_req, in krb5int_mk_setpw_req() argument 314 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_setpw_req() 331 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_setpw_req() 332 *ptr++ = ap_req->length & 0xff; in krb5int_mk_setpw_req() [all …]
|
H A D | vfy_increds.c | 81 krb5_data ap_req; in krb5_verify_init_creds() local 90 ap_req.data = NULL; in krb5_verify_init_creds() 153 &ap_req))) in krb5_verify_init_creds() 189 &ap_req))) in krb5_verify_init_creds() 201 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, in krb5_verify_init_creds() 247 if (ap_req.data) in krb5_verify_init_creds() 248 krb5_xfree(ap_req.data); in krb5_verify_init_creds()
|
/titanic_41/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 20 krb5_data *ap_req, in krb5int_mk_chpw_req() argument 43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 67 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_chpw_req() 68 *ptr++ = ap_req->length & 0xff; in krb5int_mk_chpw_req() 72 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req() 73 ptr += ap_req->length; in krb5int_mk_chpw_req()
|
H A D | changepw.c | 49 krb5_data *ap_req, char *passwd, 95 krb5_data ap_req, chpw_req, chpw_rep; local 113 memset(&ap_req, 0, sizeof (krb5_data)); 121 NULL, creds, &ap_req)) 271 &ap_req, newpw, &chpw_req)) 356 krb5_xfree(ap_req.data);
|
/titanic_41/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 56 krb5_data ap_req, ap_rep; in process_chpw_request() local 125 ap_req.length = (*ptr++ & 0xff); in process_chpw_request() 126 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); in process_chpw_request() 128 if (ptr + ap_req.length >= req->data + req->length) { in process_chpw_request() 139 ap_req.data = ptr; in process_chpw_request() 140 ptr += ap_req.length; in process_chpw_request() 180 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab, in process_chpw_request()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | changepw.c | 50 krb5_data ap_req; member 165 &ctx->ap_req, in kpasswd_sendto_msg_callback() 172 &ctx->ap_req, in kpasswd_sendto_msg_callback() 225 &callback_ctx.ap_req))) in krb5_change_set_password() 332 krb5_free_data_contents(callback_ctx.context, &callback_ctx.ap_req); in krb5_change_set_password()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 293 krb5_data ap_rep, ap_req; local 347 ap_req.data = 0; 384 (uint32_t *)&(ap_req.length), 390 (uint32_t *)&(ap_req.length), 396 (uint32_t *)&(ap_req.length), 414 ap_req.length = input_token->length; 415 ap_req.data = input_token->value; 424 TREAD_STR(sptr, ap_req.data, ap_req.length); 432 if (!krb5_is_ap_req(&ap_req)) { 437 if ((code = decode_krb5_ap_req(&ap_req, &request))) {
|
H A D | init_sec_context.c | 273 krb5_data ap_req; local 280 ap_req.data = 0; 318 checksum_data, k_cred, &ap_req); 330 tlen = g_token_size((gss_OID) mech_type, ap_req.length); 341 g_make_token_header(mech_type, ap_req.length, 344 TWRITE_STR(ptr, (unsigned char *) ap_req.data, ap_req.length); 356 if (ap_req.data) 357 krb5_free_data_contents(context, &ap_req);
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 2284 krb5_data *ap_req, char *passwd, krb5_data *packet); 2294 krb5_data *ap_req, krb5_principal targetprinc, char *passwd, krb5_data *packet);
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 854 DEFAPPTAGGEDTYPE(ap_req, 14, untagged_ap_req); 1285 MAKE_FULL_ENCODER(encode_krb5_ap_req, ap_req);
|