/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | hprop.h | 63 int kvno; member in struct:v4_principal
|
H A D | kadb.h | 64 int32_t kvno; member in struct:ka_entry
|
H A D | 524.c | 228 EncryptedData *ticket, int *kvno) 247 ticket->kvno = NULL; 248 *kvno = 213; /* 2b's use this magic kvno */ 280 *kvno = server->entry.kvno; 308 int kvno = 0; local 373 server, &ticket, &kvno); 383 krb5_store_int32(sp, kvno); 224 encode_524_response(krb5_context context, krb5_kdc_configuration *config, const char *spn, const EncTicketPart et, const Ticket *t, hdb_entry_ex *server, EncryptedData *ticket, int *kvno) argument
|
H A D | kerberos4.c | 326 server->entry.kvno % 255, 346 client->entry.kvno % 256, 356 int8_t kvno; local 370 RCHECK(krb5_ret_int8(sp, &kvno), out2); 398 if(tgt->entry.kvno % 256 != kvno){ 400 "tgs-req (krb4) with old kvno %d (current %d) for " 401 "krbtgt.%s@%s", kvno, tgt->entry.kvno % 256, 404 "old krbtgt kvno use [all...] |
H A D | v4_dump.c | 108 &pr.max_life, &pr.mkvno, &pr.kvno,
|
/freebsd-9.3-release/crypto/heimdal/admin/ |
H A D | change.c | 40 krb5_principal principal, krb5_kvno kvno, 112 new_entry.vno = kvno + 1; 130 krb5_kvno kvno; member in struct:change_set 163 if (changeset[i].kvno < entry.vno) 164 changeset[i].kvno = entry.vno; 212 changeset[j].kvno = entry.vno; 230 printf("Changing %s kvno %d\n", 231 client_name, changeset[i].kvno); 236 changeset[i].principal, changeset[i].kvno, 39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument
|
H A D | get.c | 192 princ.kvno = 1; 219 entry.vno = princ.kvno;
|
/freebsd-9.3-release/crypto/heimdal/kcm/ |
H A D | acquire.c | 282 unsigned *kvno) 298 *kvno = 0; 332 if (reply.kdc_rep.enc_part.kvno != NULL) 333 *kvno = *(reply.kdc_rep.enc_part.kvno); 351 unsigned kvno) 388 entry.vno = kvno; 411 unsigned kvno) 418 cpn, spn, newpw, salt, kvno); 458 unsigned kvno; local 276 get_salt_and_kvno(krb5_context context, kcm_ccache ccache, krb5_enctype *etypes, char *cpn, char *newpw, krb5_salt *salt, unsigned *kvno) argument 344 update_keytab_entry(krb5_context context, kcm_ccache ccache, krb5_enctype etype, char *cpn, char *spn, char *newpw, krb5_salt salt, unsigned kvno) argument 404 update_keytab_entries(krb5_context context, kcm_ccache ccache, krb5_enctype *etypes, char *cpn, char *spn, char *newpw, krb5_salt salt, unsigned kvno) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | keytab.c | 184 * find the keytab entry in `id' for `principal, kvno, enctype' and return 192 krb5_kvno kvno, 234 if(kvno && ent.entry.kvno != kvno) { 246 entry->vno = ent.entry.kvno; 189 hdb_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | keytab_keyfile.c | 44 * <int32_t numkeys> {[<int32_t kvno> <char[8] deskey>] * numkeys} 226 int32_t kvno; local 240 ret = krb5_ret_int32(cursor->sp, &kvno); 246 entry->vno = kvno; 347 int32_t kvno; local 351 ret = krb5_ret_int32(sp, &kvno); 353 krb5_set_error_string (context, "Failed to get kvno "); 360 if (kvno == entry->vno) { 389 krb5_set_error_string(context, "keytab keyfile failed store kvno");
|
H A D | build_ap_req.c | 66 ap.authenticator.kvno = NULL;
|
H A D | krb5-v4compat.h | 87 int kvno; /* Key version number */ member in struct:credentials
|
H A D | keytab.c | 317 * Retrieve the keytab entry for `principal, kvno, enctype' into `entry' 319 * kvno == 0 is a wildcard and gives the keytab with the highest vno. 327 krb5_kvno kvno, 336 return (*id->get)(context, id, principal, kvno, enctype, entry); 348 the kvno, so only compare those bits */ 349 if (kvno == tmp.vno 350 || (tmp.vno < 256 && kvno % 256 == tmp.vno)) { 355 } else if (kvno == 0 && tmp.vno > entry->vno) { 374 if (kvno) 375 snprintf(kvno_str, sizeof(kvno_str), "(kvno 324 krb5_kt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
H A D | mk_rep.c | 96 ap.enc_part.kvno = NULL;
|
/freebsd-9.3-release/crypto/heimdal/tests/db/ |
H A D | add-modify-delete.in | 89 echo checking kvno 111 echo checking kvno
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 143 krb5_kvno kvno; member in struct:_kadm5_principal_ent_t 230 kvno, krb5_keyblock *keyblock,
|
H A D | chpass_s.c | 71 ent.entry.kvno++; 164 ent.entry.kvno++;
|
H A D | randkey_s.c | 68 ent.entry.kvno++;
|
H A D | get_s.c | 143 out->kvno = ent.entry.kvno; 185 kd->key_data_kvno = ent.entry.kvno;
|
/freebsd-9.3-release/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 52 int kvno, ret; local 66 kvno = KAFS_RXKAD_2B_KVNO; 88 kvno = KAFS_RXKAD_K5_KVNO; 103 kt->ct.AuthHandle = kvno;
|
/freebsd-9.3-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 79 * kvno[1] INTEGER OPTIONAL, 85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
|
/freebsd-9.3-release/crypto/heimdal/appl/ftp/ftpd/ |
H A D | kauth.c | 72 unsigned char kvno; local 117 kvno = (unsigned char) ptr[1]; 169 lifetime, kvno, &tkt, local_time);
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | ext.c | 91 keys[i].vno = princ.kvno + 1; /* XXX get entry again */
|
/freebsd-9.3-release/crypto/heimdal/lib/45/ |
H A D | get_ad_tkt.c | 110 cred.session, cred.lifetime, cred.kvno,
|
H A D | mk_req.c | 102 krb5_store_int8(sp, cr.kvno);
|