krb5_ser_pack_int32
krb5_ser_pack_int32(krb5_int32, krb5_octet **, size_t *);
err = krb5_ser_pack_int32(KV5M_GSS_QUEUE, buffer, lenremain);
err = krb5_ser_pack_int32(KV5M_GSS_QUEUE, buffer, lenremain);
(void) krb5_ser_pack_int32(KG_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) ctx->initiate,
(void) krb5_ser_pack_int32((krb5_int32) ctx->established,
(void) krb5_ser_pack_int32((krb5_int32) ctx->have_acceptor_subkey,
(void) krb5_ser_pack_int32((krb5_int32) ctx->seed_init,
(void) krb5_ser_pack_int32((krb5_int32) ctx->gss_flags,
(void) krb5_ser_pack_int32((krb5_int32) ctx->signalg,
(void) krb5_ser_pack_int32((krb5_int32) ctx->cksum_size,
(void) krb5_ser_pack_int32((krb5_int32) ctx->sealalg,
(void) krb5_ser_pack_int32((krb5_int32) ctx->krb_times.authtime,
(void) krb5_ser_pack_int32((krb5_int32) ctx->krb_times.starttime,
(void) krb5_ser_pack_int32((krb5_int32) ctx->krb_times.endtime,
(void) krb5_ser_pack_int32((krb5_int32) ctx->krb_times.renew_till,
(void) krb5_ser_pack_int32((krb5_int32) ctx->krb_flags,
kret = krb5_ser_pack_int32((krb5_int32) ctx->proto,
kret = krb5_ser_pack_int32((krb5_int32) ctx->cksumtype,
kret = krb5_ser_pack_int32((krb5_int32) ctx->acceptor_subkey_cksumtype,
kret = krb5_ser_pack_int32((krb5_int32) ctx->cred_rcache,
kret = krb5_ser_pack_int32(i, &bp, &remain);
kret = krb5_ser_pack_int32(KG_CONTEXT, &bp, &remain);
err = krb5_ser_pack_int32(KV5M_GSS_OID, buffer, lenremain);
err = krb5_ser_pack_int32((krb5_int32) oid->length,
err = krb5_ser_pack_int32(KV5M_GSS_OID, buffer, lenremain);
return krb5_ser_pack_int32(0, buffer, lenremain);
ret = krb5_ser_pack_int32(count, &bp, &remain);
ret = krb5_ser_pack_int32(aictx->indicators[i]->length, &bp, &remain);
code = krb5_ser_pack_int32(KV5M_AUTHDATA_CONTEXT, &bp, &remain);
code = krb5_ser_pack_int32(KV5M_AUTHDATA_CONTEXT, &bp, &remain);
code = krb5_ser_pack_int32(0, &bp, &remain);
code = krb5_ser_pack_int32((krb5_int32)namelen, &bp, &remain);
krb5_ser_pack_int32(ad_count, buffer, lenremain);
krb5_ser_pack_int32(pacctx->pac->data.length, &bp, &remain);
krb5_ser_pack_int32(pacctx->pac->verified, &bp, &remain);
krb5_ser_pack_int32(0, &bp, &remain); /* length */
krb5_ser_pack_int32(0, &bp, &remain); /* verified */
(void) krb5_ser_pack_int32(KV5M_AUTH_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32(auth_context->auth_context_flags,
(void) krb5_ser_pack_int32(auth_context->remote_seq_number,
(void) krb5_ser_pack_int32(auth_context->local_seq_number,
(void) krb5_ser_pack_int32((krb5_int32) auth_context->req_cksumtype,
(void) krb5_ser_pack_int32((krb5_int32) auth_context->safe_cksumtype,
(void) krb5_ser_pack_int32(auth_context->cstate.length, &bp,
(void) krb5_ser_pack_int32(TOKEN_RADDR, &bp, &remain);
(void) krb5_ser_pack_int32(TOKEN_RPORT, &bp, &remain);
(void) krb5_ser_pack_int32(TOKEN_LADDR, &bp, &remain);
(void) krb5_ser_pack_int32(TOKEN_LPORT, &bp, &remain);
(void) krb5_ser_pack_int32(TOKEN_KEYBLOCK, &bp, &remain);
(void) krb5_ser_pack_int32(TOKEN_LSKBLOCK, &bp, &remain);
(void) krb5_ser_pack_int32(TOKEN_RSKBLOCK, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_AUTH_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_AUTHDATA, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) authdata->ad_type,
(void) krb5_ser_pack_int32((krb5_int32) authdata->length,
(void) krb5_ser_pack_int32(KV5M_AUTHDATA, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_ADDRESS, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) address->addrtype,
(void) krb5_ser_pack_int32((krb5_int32) address->length,
(void) krb5_ser_pack_int32(KV5M_ADDRESS, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) authenticator->ctime,
(void) krb5_ser_pack_int32((krb5_int32) authenticator->cusec,
(void) krb5_ser_pack_int32(authenticator->seq_number,
(void) krb5_ser_pack_int32((krb5_int32) i, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_AUTHENTICATOR, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_AUTHENTICATOR, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_CHECKSUM, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) checksum->checksum_type,
(void) krb5_ser_pack_int32((krb5_int32) checksum->length,
(void) krb5_ser_pack_int32(KV5M_CHECKSUM, &bp, &remain);
kret = krb5_ser_pack_int32(KV5M_CONTEXT, &bp, &remain);
kret = krb5_ser_pack_int32((context->default_realm) ?
kret = krb5_ser_pack_int32(etypes_len(context->tgs_etypes), &bp, &remain);
kret = krb5_ser_pack_int32(context->tgs_etypes[i], &bp, &remain);
kret = krb5_ser_pack_int32((krb5_int32) context->clockskew,
kret = krb5_ser_pack_int32((krb5_int32) context->kdc_default_options,
kret = krb5_ser_pack_int32((krb5_int32) context->library_options,
kret = krb5_ser_pack_int32((krb5_int32) context->profile_secure,
kret = krb5_ser_pack_int32((krb5_int32) context->fcc_default_format,
kret = krb5_ser_pack_int32(KV5M_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_OS_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32(os_ctx->time_offset, &bp, &remain);
(void) krb5_ser_pack_int32(os_ctx->usec_offset, &bp, &remain);
(void) krb5_ser_pack_int32(os_ctx->os_flags, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_OS_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_KEYBLOCK, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) keyblock->enctype,
(void) krb5_ser_pack_int32((krb5_int32) keyblock->length,
(void) krb5_ser_pack_int32(KV5M_KEYBLOCK, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_PRINCIPAL, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) strlen(fname),
(void) krb5_ser_pack_int32(KV5M_PRINCIPAL, &bp, &remain);
krb5_ser_pack_int32(greet->greeting.length, buffer, lenremain);
krb5_ser_pack_int32((krb5_int32)greet->verified, buffer, lenremain);