kdc_realm_t
make_too_big_error(kdc_realm_t *realm, krb5_data **out)
static krb5_error_code make_too_big_error(kdc_realm_t *realm, krb5_data **out);
kdc_realm_t *active_realm;
kdc_realm_t *active_realm;
kdc_realm_t *realm = state->active_realm;
const struct sockaddr *remote_addr, kdc_realm_t *realm,
const struct sockaddr *from, kdc_realm_t *realm,
is_referral_req(kdc_realm_t *realm, krb5_kdc_req *request)
find_referral_tgs(kdc_realm_t *realm, krb5_kdc_req *request,
search_sprinc(kdc_realm_t *realm, krb5_kdc_req *req,
gather_tgs_req_info(kdc_realm_t *realm, krb5_kdc_req **reqptr, krb5_data *pkt,
compute_ticket_times(kdc_realm_t *realm, struct tgs_req_info *t,
check_tgs_req(kdc_realm_t *realm, struct tgs_req_info *t,
tgs_issue_ticket(kdc_realm_t *realm, struct tgs_req_info *t,
kdc_realm_t **kdc_realmlist = (kdc_realm_t **) NULL;
kdc_make_rstate(kdc_realm_t *active_realm, struct kdc_request_state **out)
kdc_realm_t *realm = state->realm_data;
handle_pac(kdc_realm_t *realm, unsigned int flags, krb5_db_entry *client,
handle_authdata(kdc_realm_t *realm, unsigned int flags, krb5_db_entry *client,
kdc_realm_t *realm;
kdc_process_tgs_req(kdc_realm_t *realm, krb5_kdc_req *request,
kdc_get_ticket_endtime(kdc_realm_t *realm, krb5_timestamp starttime,
kdc_get_ticket_renewtime(kdc_realm_t *realm, krb5_kdc_req *request,
kdc_rd_ap_req(kdc_realm_t *realm, krb5_ap_req *apreq,
check_anon(kdc_realm_t *realm, krb5_principal client, krb5_principal server)
static krb5_error_code kdc_rd_ap_req(kdc_realm_t *realm, krb5_ap_req *apreq,
validate_as_request(kdc_realm_t *realm, krb5_kdc_req *request,
kdc_realm_t *, verto_ctx *, loop_respond_fn, void *);
kdc_realm_t *, krb5_data ** );
handle_authdata(kdc_realm_t *realm, unsigned int flags, krb5_db_entry *client,
kdc_get_ticket_endtime(kdc_realm_t *realm, krb5_timestamp now,
kdc_get_ticket_renewtime(kdc_realm_t *realm, krb5_kdc_req *request,
int check_anon(kdc_realm_t *realm, krb5_principal client,
kdc_process_tgs_req (kdc_realm_t *, krb5_kdc_req *,
validate_as_request (kdc_realm_t *, krb5_kdc_req *, krb5_db_entry *,
check_tgs_constraints(kdc_realm_t *realm, krb5_kdc_req *request,
check_tgs_policy(kdc_realm_t *realm, krb5_kdc_req *request,
kdc_realm_t *
kdc_realm_t **kdc_realmlist = handle->kdc_realmlist;
return((kdc_realm_t *) NULL);
kdc_realm_t *
kdc_realm_t *newrealm;
kdc_realm_t **kdc_realmlist = handle->kdc_realmlist;
finish_realm(kdc_realm_t *rdp)
init_realm(kdc_realm_t * rdp, krb5_pointer aprof, char *realm,
memset(rdp, 0, sizeof(kdc_realm_t));
kdc_realm_t *rdatap = NULL;
if ((rdatap = (kdc_realm_t *) malloc(sizeof(kdc_realm_t)))) {
if ((rdatap = (kdc_realm_t *) malloc(sizeof(kdc_realm_t)))) {
kdc_realm_t *realm;
shandle.kdc_realmlist = malloc(sizeof(kdc_realm_t *) *
(size_t) (sizeof(kdc_realm_t *) * KRB5_KDC_MAX_REALMS));
kdc_realm_t **kdc_realmlist;
kdc_realm_t *find_realm_data(struct server_handle *, char *, krb5_ui_4);
kdc_realm_t *setup_server_realm(struct server_handle *, krb5_principal);
kdc_realm_t *realm_data;
krb5_error_code kdc_make_rstate(kdc_realm_t *active_realm,
kdc_realm_t *
check_tgs_s4u2self(kdc_realm_t *realm, krb5_kdc_req *req,
check_tgs_constraints(kdc_realm_t *realm, krb5_kdc_req *request,
check_tgs_policy(kdc_realm_t *realm, krb5_kdc_req *request,