Home
last modified time | relevance | path

Searched refs:sam_challenge (Results 1 – 7 of 7) sorted by relevance

/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpreauth.c398 char *challenge = sc->sam_challenge.data; in handle_sam_labels()
399 unsigned int challenge_len = sc->sam_challenge.length; in handle_sam_labels()
468 krb5_sam_challenge *sam_challenge = 0; in obtain_sam_padata() local
477 retval = decode_krb5_sam_challenge(&tmpsam, &sam_challenge); in obtain_sam_padata()
481 if (sam_challenge->sam_flags & KRB5_SAM_MUST_PK_ENCRYPT_SAD) { in obtain_sam_padata()
485 enc_sam_response_enc.sam_nonce = sam_challenge->sam_nonce; in obtain_sam_padata()
486 if (!sam_challenge->sam_nonce) { in obtain_sam_padata()
494 if (sam_challenge->sam_flags & KRB5_SAM_SEND_ENCRYPTED_SAD) { in obtain_sam_padata()
500 prompt = handle_sam_labels(sam_challenge); in obtain_sam_padata()
514 } else if (sam_challenge->sam_flags & KRB5_SAM_USE_SAD_AS_KEY) { in obtain_sam_padata()
[all …]
H A Dpreauth2.c781 krb5_sam_challenge *sam_challenge = 0; in pa_sam() local
797 if ((ret = decode_krb5_sam_challenge(&tmpsam, &sam_challenge))) in pa_sam()
800 if (sam_challenge->sam_flags & KRB5_SAM_MUST_PK_ENCRYPT_SAD) { in pa_sam()
801 krb5_xfree(sam_challenge); in pa_sam()
809 if (!(sam_challenge->sam_flags & KRB5_SAM_USE_SAD_AS_KEY) || in pa_sam()
810 (sam_challenge->sam_type == PA_SAM_TYPE_CRYPTOCARD)) { in pa_sam()
824 SAMDATA(sam_challenge->sam_type_name, "SAM Authentication", in pa_sam()
828 SAMDATA(sam_challenge->sam_challenge_label, in pa_sam()
829 sam_challenge_banner(sam_challenge->sam_type), in pa_sam()
834 sam_challenge->sam_challenge.length?"Challenge is [":"", in pa_sam()
[all …]
/titanic_41/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c1983 sc.sam_challenge.data = "12345"; in get_sam_edata()
1984 sc.sam_challenge.length = strlen(sc.sam_challenge.data); in get_sam_edata()
1996 if ((retval = krb5_c_string_to_key(context, type, &sc.sam_challenge, in get_sam_edata()
2042 sc.sam_challenge.data, in get_sam_edata()
2043 sc.sam_challenge.length, in get_sam_edata()
2104 sc.sam_challenge.data = inputblock; in get_sam_edata()
2105 sc.sam_challenge.length = 6; in get_sam_edata()
2218 sc.sam_challenge.data, in get_sam_edata()
2219 sc.sam_challenge.length, in get_sam_edata()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c692 if (sc->sam_challenge.data) in krb5_free_sam_challenge_contents()
693 krb5_free_data_contents(ctx, &sc->sam_challenge); in krb5_free_sam_challenge_contents()
747 if (sc2->sam_challenge.data) in krb5_free_sam_challenge_2_body_contents()
748 krb5_free_data_contents(ctx, &sc2->sam_challenge); in krb5_free_sam_challenge_2_body_contents()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_k_encode.c499 FIELDOF_OPT(krb5_sam_challenge, ostring_data, sam_challenge,5, 5),
518 if (val->sam_challenge.length > 0) optional |= (1u << 5); in optional_sam_challenge()
525 DEFSEQTYPE(sam_challenge,krb5_sam_challenge,sam_challenge_fields,
568 FIELDOF_OPT(krb5_sam_challenge_2_body, ostring_data, sam_challenge,5, 5),
581 if (val->sam_challenge.length > 0) optional |= (1u << 5);
1318 MAKE_FULL_ENCODER(encode_krb5_sam_challenge, sam_challenge);
H A Dasn1_k_decode.c1022 opt_string(val->sam_challenge,5,asn1_decode_charstring); in asn1_decode_sam_challenge()
1067 opt_string(val->sam_challenge,5,asn1_decode_charstring); in asn1_decode_sam_challenge_2_body()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dk5-int.h485 krb5_data sam_challenge; member
528 krb5_data sam_challenge; member