/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | kdc_locl.h | 72 krb5_keyblock reply_key; member in struct:kdc_request_desc
|
H A D | pkinit.c | 66 EncryptionKey reply_key; member in struct:pk_client_params 195 krb5_free_keyblock_contents(context, &cp->reply_key); 305 &client_params->reply_key); 948 krb5_keyblock *reply_key, 994 ret = copy_EncryptionKey(reply_key, &kp.replyKey); 1010 ret = copy_EncryptionKey(reply_key, &kp.replyKey); 1016 ret = krb5_crypto_init(context, reply_key, 0, &ascrypto); 1271 krb5_keyblock *reply_key, 1318 &cp->reply_key); 1328 &cp->reply_key, 943 pk_mk_pa_reply_enckey(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock *reply_key, ContentInfo *content_info, hx509_cert *kdc_cert) argument 1264 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const hdb_entry_ex *client, krb5_enctype sessionetype, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock *reply_key, krb5_keyblock *sessionkey, METHOD_DATA *md) argument [all...] |
H A D | kdc-private.h | 83 int ckvno, const EncryptionKey *reply_key, 185 krb5_keyblock */*reply_key*/,
|
H A D | kerberos5.c | 334 &r->reply_key, &r->session_key, &r->outpadata); 513 krb5_free_keyblock_contents(r->context, &r->reply_key); 514 ret = krb5_copy_keyblock_contents(r->context, &k->key, &r->reply_key); 663 ret = krb5_copy_keyblock_contents(r->context, &pa_key->key, &r->reply_key); 765 int ckvno, const EncryptionKey *reply_key, 889 ret = krb5_crypto_init(context, reply_key, 0, &crypto); 1512 ret = krb5_crypto_init(r->context, &r->reply_key, 0, &crypto); 2129 if (r->reply_key.keytype == ETYPE_NULL) { 2230 log_as_req(context, config, r->reply_key.keytype, setype, b); 2266 &r->reply_key, 759 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, krb5_crypto armor_crypto, uint32_t nonce, KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument [all...] |
/macosx-10.9.5/postfix-252/postfix/src/proxymap/ |
H A D | proxymap.c | 353 const char *reply_key; local 369 reply_key = reply_value = ""; 372 reply_key = reply_value = ""; 376 dict_status = dict_seq(dict, request_func, &reply_key, &reply_value); 381 reply_key = reply_value = ""; 384 reply_key = reply_value = ""; 393 ATTR_TYPE_STR, MAIL_ATTR_KEY, reply_key,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | init_creds_pw.c | 108 krb5_keyblock *reply_key; member in struct:krb5_init_creds_context_data::fast_state 1939 state->reply_key, 1946 krb5_free_keyblock_contents(context, state->reply_key); 1947 *state->reply_key = result; 2322 hostinfo, &ctx->fast_state.reply_key); 2333 ctx->fast_state.reply_key, 2345 krb5_free_keyblock(context, ctx->fast_state.reply_key); 2346 ctx->fast_state.reply_key = NULL;
|