Searched refs:sam_challenge (Results 1 – 7 of 7) sorted by relevance
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth.c | 398 char *challenge = sc->sam_challenge.data; in handle_sam_labels() 399 unsigned int challenge_len = sc->sam_challenge.length; in handle_sam_labels() 468 krb5_sam_challenge *sam_challenge = 0; in obtain_sam_padata() local 477 retval = decode_krb5_sam_challenge(&tmpsam, &sam_challenge); in obtain_sam_padata() 481 if (sam_challenge->sam_flags & KRB5_SAM_MUST_PK_ENCRYPT_SAD) { in obtain_sam_padata() 485 enc_sam_response_enc.sam_nonce = sam_challenge->sam_nonce; in obtain_sam_padata() 486 if (!sam_challenge->sam_nonce) { in obtain_sam_padata() 494 if (sam_challenge->sam_flags & KRB5_SAM_SEND_ENCRYPTED_SAD) { in obtain_sam_padata() 500 prompt = handle_sam_labels(sam_challenge); in obtain_sam_padata() 514 } else if (sam_challenge->sam_flags & KRB5_SAM_USE_SAD_AS_KEY) { in obtain_sam_padata() [all …]
|
H A D | preauth2.c | 781 krb5_sam_challenge *sam_challenge = 0; in pa_sam() local 797 if ((ret = decode_krb5_sam_challenge(&tmpsam, &sam_challenge))) in pa_sam() 800 if (sam_challenge->sam_flags & KRB5_SAM_MUST_PK_ENCRYPT_SAD) { in pa_sam() 801 krb5_xfree(sam_challenge); in pa_sam() 809 if (!(sam_challenge->sam_flags & KRB5_SAM_USE_SAD_AS_KEY) || in pa_sam() 810 (sam_challenge->sam_type == PA_SAM_TYPE_CRYPTOCARD)) { in pa_sam() 824 SAMDATA(sam_challenge->sam_type_name, "SAM Authentication", in pa_sam() 828 SAMDATA(sam_challenge->sam_challenge_label, in pa_sam() 829 sam_challenge_banner(sam_challenge->sam_type), in pa_sam() 834 sam_challenge->sam_challenge.length?"Challenge is [":"", in pa_sam() [all …]
|
/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 1983 sc.sam_challenge.data = "12345"; in get_sam_edata() 1984 sc.sam_challenge.length = strlen(sc.sam_challenge.data); in get_sam_edata() 1996 if ((retval = krb5_c_string_to_key(context, type, &sc.sam_challenge, in get_sam_edata() 2042 sc.sam_challenge.data, in get_sam_edata() 2043 sc.sam_challenge.length, in get_sam_edata() 2104 sc.sam_challenge.data = inputblock; in get_sam_edata() 2105 sc.sam_challenge.length = 6; in get_sam_edata() 2218 sc.sam_challenge.data, in get_sam_edata() 2219 sc.sam_challenge.length, in get_sam_edata()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 692 if (sc->sam_challenge.data) in krb5_free_sam_challenge_contents() 693 krb5_free_data_contents(ctx, &sc->sam_challenge); in krb5_free_sam_challenge_contents() 747 if (sc2->sam_challenge.data) in krb5_free_sam_challenge_2_body_contents() 748 krb5_free_data_contents(ctx, &sc2->sam_challenge); in krb5_free_sam_challenge_2_body_contents()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 499 FIELDOF_OPT(krb5_sam_challenge, ostring_data, sam_challenge,5, 5), 518 if (val->sam_challenge.length > 0) optional |= (1u << 5); in optional_sam_challenge() 525 DEFSEQTYPE(sam_challenge,krb5_sam_challenge,sam_challenge_fields, 568 FIELDOF_OPT(krb5_sam_challenge_2_body, ostring_data, sam_challenge,5, 5), 581 if (val->sam_challenge.length > 0) optional |= (1u << 5); 1318 MAKE_FULL_ENCODER(encode_krb5_sam_challenge, sam_challenge);
|
H A D | asn1_k_decode.c | 1022 opt_string(val->sam_challenge,5,asn1_decode_charstring); in asn1_decode_sam_challenge() 1067 opt_string(val->sam_challenge,5,asn1_decode_charstring); in asn1_decode_sam_challenge_2_body()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 485 krb5_data sam_challenge; member 528 krb5_data sam_challenge; member
|