Searched refs:krb5_rd_req (Results 1 – 23 of 23) sorted by relevance
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | recvauth.c | 206 ret = krb5_rd_req (context, in krb5_recvauth_match_version()
|
H A D | test_ap-req.c | 93 ret = krb5_rd_req(context, in test_ap()
|
H A D | verify_init.c | 173 ret = krb5_rd_req (context, in krb5_verify_init_creds()
|
H A D | version-script.map | 523 krb5_rd_req;
|
H A D | libkrb5-exports.def.in | 530 krb5_rd_req
|
H A D | rd_req.c | 661 krb5_rd_req(krb5_context context, in krb5_rd_req() function
|
H A D | krb5-protos.h | 6824 krb5_rd_req (
|
/netbsd-src/usr.bin/login/ |
H A D | k5login.c | 185 kerror = krb5_rd_req(c, &auth_context, &packet, in k5_verify_creds()
|
/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | auth-krb5.c | 113 problem = krb5_rd_req(authctxt->krb5_ctx, &authctxt->krb5_auth_ctx, in auth_krb5()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | kx509.c | 437 ret = krb5_rd_req(context, in _kdc_do_kx509()
|
H A D | digest.c | 249 ret = krb5_rd_req(context, in _kdc_do_digest()
|
/netbsd-src/lib/libtelnet/ |
H A D | kerberos5.c | 315 ret = krb5_rd_req(telnet_context, &auth_context, &auth, in kerberos5_is()
|
/netbsd-src/crypto/external/bsd/heimdal/lib/libkrb5/ |
H A D | Makefile | 429 krb5_mk_req.3 krb5_rd_req.3 \
|
/netbsd-src/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 1042 retval = krb5_rd_req(context, &auth_context, &packet, princ, NULL, in verify_krb_v5_tgt()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/kpasswd/ |
H A D | kpasswdd.c | 494 ret = krb5_rd_req (context, in verify()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/ |
H A D | ChangeLog.1998 | 72 krb5_rd_req 1058 * lib/krb5/rd_req.c (krb5_rd_req): fixed obvious bug 1404 * lib/krb5/rd_req.c (krb5_rd_req): redone because we don't know 1949 always pass server == NULL to krb5_rd_req. 2023 krb5_rd_req/krb5_recvauth. Set addresses in auth_context.
|
H A D | ChangeLog.2003 | 368 * lib/krb5/rd_req.c (krb5_rd_req): always free keyblock since its 407 * lib/krb5/rd_req.c (krb5_rd_req): if we have a keyblock in auth 442 * lib/krb5/rd_req.c (krb5_rd_req): allow caller to pass in a key
|
H A D | ChangeLog.2006 | 387 * lib/krb5/krb5.h: krb5_rd_req{,_in,_out}_ctx. 390 dancing version of the krb5_rd_req and implement krb5_rd_req and
|
H A D | ChangeLog.2005 | 432 * lib/krb5/krb5_mk_req.3: Document krb5_rd_req. 437 krb5_mk_req_extended, krb5_rd_req, krb5_rd_req_with_keyblock,
|
H A D | ChangeLog.2001 | 519 * lib/krb5/rd_req.c (krb5_rd_req): use krb5_auth_con* functions
|
H A D | ChangeLog.2000 | 265 (krb5_rd_req): try not to return an allocated auth_context on error
|
/netbsd-src/crypto/external/bsd/heimdal/dist/po/heimdal_krb5/ |
H A D | heimdal_krb5.pot | 1498 msgid "krb5_rd_req: user to user auth without session key given"
|
H A D | sv_SE.po | 1468 msgid "krb5_rd_req: user to user auth without session key given"
|