Searched refs:reply_key (Results 1 - 2 of 2) sorted by last modified time
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 327 int ckvno, const EncryptionKey *reply_key, 394 ret = krb5_crypto_init(context, reply_key, 0, &crypto); 980 EncryptionKey *reply_key = NULL, session_key; local 1326 reply_key = &pa_key->key; 1676 &reply_key, &et.key, rep.padata); 1694 if (reply_key == NULL) { 1809 log_as_req(context, config, reply_key->keytype, setype, b); 1814 reply_key, 0, &e_text, reply); 322 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument
|
H A D | pkinit.c | 65 EncryptionKey reply_key; member in struct:pk_client_params 192 krb5_free_keyblock_contents(context, &cp->reply_key); 300 &client_params->reply_key); 917 krb5_keyblock *reply_key, 963 ret = copy_EncryptionKey(reply_key, &kp.replyKey); 979 ret = copy_EncryptionKey(reply_key, &kp.replyKey); 985 ret = krb5_crypto_init(context, reply_key, 0, &ascrypto); 1240 krb5_keyblock **reply_key, 1287 &cp->reply_key); 1297 &cp->reply_key, 912 pk_mk_pa_reply_enckey(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock *reply_key, ContentInfo *content_info, hx509_cert *kdc_cert) argument 1233 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const hdb_entry_ex *client, krb5_enctype sessionetype, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock **reply_key, krb5_keyblock *sessionkey, METHOD_DATA *md) argument [all...] |
Completed in 99 milliseconds