Lines Matching defs:sp

113     KRB5SignedPath sp;
155 sp.etype = enctype;
156 sp.delegated = principals;
157 sp.method_data = NULL;
160 data.data, data.length, &sp.cksum);
166 ASN1_MALLOC_ENCODE(KRB5SignedPath, data.data, data.length, &sp, &size, ret);
167 free_Checksum(&sp.cksum);
205 KRB5SignedPath sp;
208 ret = decode_KRB5SignedPath(data.data, data.length, &sp, NULL);
215 spd.delegated = sp.delegated;
216 spd.method_data = sp.method_data;
221 free_KRB5SignedPath(&sp);
229 ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key);
234 free_KRB5SignedPath(&sp);
240 &sp.cksum);
244 free_KRB5SignedPath(&sp);
250 if (delegated && sp.delegated) {
252 *delegated = malloc(sizeof(*sp.delegated));
254 free_KRB5SignedPath(&sp);
258 ret = copy_Principals(*delegated, sp.delegated);
260 free_KRB5SignedPath(&sp);
266 free_KRB5SignedPath(&sp);
1485 krb5_principal cp = NULL, sp = NULL, rsp = NULL, tp = NULL, dp = NULL;
1576 _krb5_principalname2krb5_principal(context, &sp, *s, r);
1577 ret = krb5_unparse_name(context, sp, &spn);
1600 ret = _kdc_db_fetch(context, config, sp, HDB_F_GET_SERVER | flags,
1604 kdc_log(context, config, 5, "target %s does not have secrets at this KDC, need to proxy", sp);
1611 if ((req_rlm = get_krbtgt_realm(&sp->name)) != NULL) {
1618 krb5_free_principal(context, sp);
1620 krb5_make_principal(context, &sp, r,
1622 ret = krb5_unparse_name(context, sp, &spn);
1632 } else if(need_referral(context, config, &b->kdc_options, sp, &realms)) {
1633 if (strcmp(realms[0], sp->realm) != 0) {
1638 krb5_free_principal(context, sp);
1640 krb5_make_principal(context, &sp, r, KRB5_TGS_NAME,
1642 ret = krb5_unparse_name(context, sp, &spn);
1673 rsp = sp;
1702 krb5_principal_is_krbtgt(context, sp) ?
1979 ret = check_s4u2self(context, config, clientdb, client, sp);
2079 client, server, sp);
2264 if (sp)
2265 krb5_free_principal(context, sp);