Lines Matching refs:request
35 * kerberos kdc request, with various hardware/software verification devices.
55 krb5_kdc_req *request,
299 * function to give the plugin a chance to allocate a per-request context. */
320 /* Free the per-AS-REQ context. This means clearing any request-specific
469 /* Tweak the request body, for now adding any enctypes which the module claims
475 krb5_kdc_req *request)
482 /* Add the module-specific enctype list to the request, but only if
489 grow_ktypes(&request->ktype, &request->nktypes,
502 krb5_kdc_req *request,
560 request,
590 krb5_kdc_req *request,
617 krb5_kdc_req *request,
643 fprintf (stderr, "; *etype=%d request->ktype[0]=%d\n",
644 *etype, request->ktype[0]);
647 if ((ret = ((*gak_fct)(context, request->client,
648 *etype ? *etype : request->ktype[0],
761 krb5_kdc_req *request,
819 if ((ret = (gak_fct)(context, request->client, *etype, prompter,
885 if ((ret = krb5_principal2salt(context, request->client,
923 if (ret = krb5_principal2salt(context, request->client,
1032 krb5_kdc_req *request,
1105 retval = (gak_fct)(context, request->client,
1152 krb5_principal2salt(context, request->client, &defsalt))) {
1399 krb5_kdc_req *request,
1445 request,
1470 krb5_kdc_req *request,
1562 * Select first etype in our request which is also in
1563 * etype-info (preferring client request ktype order).
1566 !etype_found && k < request->nktypes; k++) {
1568 if (etype_info[l]->etype == request->ktype[k]) {
1640 if ((ret = ((*pa_types[j].fct)(context, request,
1669 request,