Symbol: kdc_context
usr/src/cmd/krb5/krb5kdc/dispatch.c
108
krb5_free_kdc_req(kdc_context, as_req);
usr/src/cmd/krb5/krb5kdc/dispatch.c
83
krb5_c_random_os_entropy(kdc_context, 0, NULL);
usr/src/cmd/krb5/krb5kdc/dispatch.c
90
krb5_c_random_add_entropy(kdc_context,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
116
if ((errcode = krb5_unparse_name(kdc_context, request->client, &cname))) {
usr/src/cmd/krb5/krb5kdc/do_as_req.c
126
if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) {
usr/src/cmd/krb5/krb5kdc/do_as_req.c
133
if ((errcode = krb5_db_get_principal(kdc_context, request->client,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
154
if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
169
if ((errcode = krb5_timeofday(kdc_context, &kdc_time))) {
usr/src/cmd/krb5/krb5kdc/do_as_req.c
185
if ((useenctype = select_session_keytype(kdc_context, &server,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
194
if ((errcode = krb5_c_make_random_key(kdc_context, useenctype,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
293
errcode = check_padata(kdc_context, &client, req_pkt, request,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
336
if ((errcode = krb5_dbe_find_enctype(kdc_context, &server,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
347
if ((errcode = krb5_dbekd_decrypt_key_data(kdc_context, &master_keyblock,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
354
errcode = krb5_encrypt_tkt_part(kdc_context, &encrypting_key, &ticket_reply);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
355
krb5_free_keyblock_contents(kdc_context, &encrypting_key);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
373
if (!krb5_dbe_find_enctype(kdc_context, &client, useenctype, -1,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
385
if ((errcode = krb5_dbekd_decrypt_key_data(kdc_context, &master_keyblock,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
424
errcode = return_padata(kdc_context, &client, req_pkt, request,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
435
errcode = krb5_encode_kdc_rep(kdc_context, KRB5_AS_REP, &reply_encpart,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
437
krb5_free_keyblock_contents(kdc_context, &encrypting_key);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
477
free_padata_context(kdc_context, &pa_context);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
482
emsg = krb5_get_error_message (kdc_context, errcode);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
494
krb5_free_error_message (kdc_context, emsg);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
499
status = krb5_get_error_message (kdc_context, errcode);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
509
krb5_free_error_message (kdc_context, status);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
515
krb5_free_authdata(kdc_context, enc_tkt_reply.authorization_data);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
517
krb5_free_keyblock_contents(kdc_context, &encrypting_key);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
519
krb5_free_pa_data(kdc_context, reply.padata);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
528
krb5_db_put_principal(kdc_context, &client, &c_nprincs);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
532
krb5_db_fini(kdc_context);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
536
krb5_db_init(kdc_context);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
538
krb5_db_set_mkey(kdc_context, &kdc_active_realm->realm_mkey);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
541
krb5_db_free_principal(kdc_context, &client, c_nprincs);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
544
krb5_db_free_principal(kdc_context, &server, s_nprincs);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
546
krb5_free_keyblock_contents(kdc_context, &session_key);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
553
krb5_free_data_contents(kdc_context, &e_data);
usr/src/cmd/krb5/krb5kdc/do_as_req.c
569
if ((retval = krb5_us_timeofday(kdc_context, &errpkt.stime,
usr/src/cmd/krb5/krb5kdc/do_as_req.c
591
retval = krb5_mk_error(kdc_context, &errpkt, scratch);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
121
if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) {
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
131
(errcode2 = krb5_unparse_name(kdc_context,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
163
if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
180
if (krb5_princ_size(kdc_context, request->server) == 2) {
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
182
krb5_princ_component(kdc_context, request->server, 1);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
184
krb5_princ_component(kdc_context, tgs_server, 1);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
188
krb5_db_free_principal(kdc_context, &server, nprincs);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
196
krb5_db_free_principal(kdc_context, &server, nprincs);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
202
if ((errcode = krb5_timeofday(kdc_context, &kdc_time))) {
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
241
errcode = krb5_decrypt_tkt_part(kdc_context, st_sealing_key,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
243
krb5_free_keyblock(kdc_context, st_sealing_key);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
268
(useenctype = select_session_keytype(kdc_context, &server,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
277
errcode = krb5_c_make_random_key(kdc_context, useenctype, &session_key);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
448
if ((errcode = krb5_c_decrypt(kdc_context,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
525
errcode = krb5_check_transited_list (kdc_context,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
527
krb5_princ_realm (kdc_context, header_ticket->enc_part2->client),
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
528
krb5_princ_realm (kdc_context, request->server));
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
545
const char *emsg = krb5_get_error_message(kdc_context, errcode);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
554
krb5_free_error_message(kdc_context, emsg);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
580
if (!krb5_principal_compare(kdc_context, request->server, client2)) {
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
581
if ((errcode = krb5_unparse_name(kdc_context, client2, &tmp)))
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
602
if ((errcode = krb5_encrypt_tkt_part(kdc_context, t2enc->session,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
612
if ((errcode = krb5_dbe_find_enctype(kdc_context, &server,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
622
if ((errcode = krb5_dbekd_decrypt_key_data(kdc_context,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
629
errcode = krb5_encrypt_tkt_part(kdc_context, &encrypting_key,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
631
krb5_free_keyblock_contents(kdc_context, &encrypting_key);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
673
errcode = krb5_encode_kdc_rep(kdc_context, KRB5_TGS_REP, &reply_encpart,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
710
emsg = krb5_get_error_message (kdc_context, errcode);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
723
krb5_free_error_message (kdc_context, emsg);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
729
status = krb5_get_error_message (kdc_context, errcode);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
739
krb5_free_error_message (kdc_context, status);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
745
krb5_free_ticket(kdc_context, header_ticket);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
747
krb5_free_kdc_req(kdc_context, request);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
753
krb5_db_free_principal(kdc_context, &server, 1);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
755
krb5_free_keyblock_contents(kdc_context, &session_key);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
773
if ((retval = krb5_us_timeofday(kdc_context, &errpkt.stime,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
794
retval = krb5_mk_error(kdc_context, &errpkt, scratch);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
827
if ((retval = krb5_walk_realm_tree(kdc_context,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
828
krb5_princ_realm(kdc_context, request->server),
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
829
krb5_princ_component(kdc_context, request->server, 1),
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
840
tmp = *krb5_princ_realm(kdc_context, *pl2);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
841
krb5_princ_set_realm(kdc_context, *pl2,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
842
krb5_princ_realm(kdc_context, tgs_server));
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
843
retval = krb5_db_get_principal(kdc_context, *pl2, server, nprincs, more);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
844
krb5_princ_set_realm(kdc_context, *pl2, &tmp);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
848
krb5_free_realm_tree(kdc_context, plist);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
852
krb5_db_free_principal(kdc_context, server, *nprincs);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
859
tmp = *krb5_princ_realm(kdc_context, *pl2);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
860
krb5_princ_set_realm(kdc_context, *pl2,
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
861
krb5_princ_realm(kdc_context, tgs_server));
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
862
if ((retval = krb5_copy_principal(kdc_context, *pl2, &tmpprinc))) {
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
863
krb5_db_free_principal(kdc_context, server, *nprincs);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
864
krb5_princ_set_realm(kdc_context, *pl2, &tmp);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
867
krb5_princ_set_realm(kdc_context, *pl2, &tmp);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
869
krb5_free_principal(kdc_context, request->server);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
871
if (krb5_unparse_name(kdc_context, request->server, &sname)) {
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
891
krb5_db_free_principal(kdc_context, server, *nprincs);
usr/src/cmd/krb5/krb5kdc/do_tgs_req.c
897
krb5_free_realm_tree(kdc_context, plist);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1654
if ((retval = krb5_principal2salt_norealm(kdc_context,
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1668
scratch = krb5_princ_realm(kdc_context, request->client);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1678
scratch = krb5_princ_realm(kdc_context, request->client);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1897
retval = krb5_copy_principal(kdc_context, request->client, &newp);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1906
krb5_princ_name(kdc_context, newp) =
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1907
realloc(krb5_princ_name(kdc_context, newp),
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1911
krb5_princ_component(kdc_context,newp,probeslot)->data = sam_ptr->name;
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1912
krb5_princ_component(kdc_context,newp,probeslot)->length =
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1915
retval = krb5_db_get_principal(kdc_context, newp, &assoc, &npr, (uint *)&more);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1922
krb5_princ_component(kdc_context,newp,probeslot)->data = 0;
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1923
krb5_princ_component(kdc_context,newp,probeslot)->length = 0;
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1926
krb5_free_principal(kdc_context, newp);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1933
retval = krb5_dbe_find_enctype(kdc_context, &assoc,
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1940
krb5_unparse_name(kdc_context, request->client, &sname);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
1949
retval = krb5_dbekd_decrypt_key_data(kdc_context,
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2077
retval = krb5_c_make_random_key(kdc_context, ENCTYPE_DES_CBC_CRC,
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2100
krb5_free_keyblock_contents(kdc_context, &session_key);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2128
if ((retval = krb5_c_encrypt(kdc_context, &encrypting_key,
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2333
retval = krb5_rc_store(kdc_context, kdc_rcache, &rep);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
839
retval = (ap->get_edata)(kdc_context, request, client, server,
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
863
krb5_free_pa_data(kdc_context, pa_data);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1147
if (!krb5_principal_compare(kdc_context, ticket->server, request->server)) {
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1167
if (krb5_princ_size(kdc_context, ticket->server) != 2) {
usr/src/cmd/krb5/krb5kdc/kdc_util.c
117
krb5_free_authdata(kdc_context, retdata);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1177
if ((krb5_princ_size(kdc_context, ticket->server) <= 1) ||
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1178
(krb5_princ_component(kdc_context, ticket->server, 1)->length !=
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1179
krb5_princ_realm(kdc_context, request->server)->length) ||
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1180
memcmp(krb5_princ_component(kdc_context, ticket->server, 1)->data,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1181
krb5_princ_realm(kdc_context, request->server)->data,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1182
krb5_princ_realm(kdc_context, request->server)->length)) {
usr/src/cmd/krb5/krb5kdc/kdc_util.c
125
krb5_free_authdata(kdc_context, retdata);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
1330
if (!krb5_principal_compare(kdc_context, request->second_ticket[st_idx]->server,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
142
krb5_data *realm1 = krb5_princ_realm(kdc_context, princ1);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
143
krb5_data *realm2 = krb5_princ_realm(kdc_context, princ2);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
155
if ((krb5_princ_size(kdc_context, principal) > 0) &&
usr/src/cmd/krb5/krb5kdc/kdc_util.c
156
(krb5_princ_component(kdc_context, principal, 0)->length ==
usr/src/cmd/krb5/krb5kdc/kdc_util.c
158
(!memcmp(krb5_princ_component(kdc_context, principal, 0)->data,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
242
if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length !=
usr/src/cmd/krb5/krb5kdc/kdc_util.c
243
krb5_princ_realm(kdc_context, tgs_server)->length) ||
usr/src/cmd/krb5/krb5kdc/kdc_util.c
244
memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
245
krb5_princ_realm(kdc_context, tgs_server)->data,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
246
krb5_princ_realm(kdc_context, tgs_server)->length))
usr/src/cmd/krb5/krb5kdc/kdc_util.c
249
if ((retval = krb5_auth_con_init(kdc_context, &auth_context)))
usr/src/cmd/krb5/krb5kdc/kdc_util.c
252
if ((retval = krb5_auth_con_setaddrs(kdc_context, auth_context, NULL,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
256
if ((retval = krb5_auth_con_setrcache(kdc_context, auth_context,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
277
if ((retval = krb5_rd_req_decoded_anyflag(kdc_context, &auth_context, apreq,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
292
(void) krb5_rc_close(kdc_context, kdc_rcache);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
294
if (!(retval = kdc_initialize_rcache(kdc_context, (char *) NULL))) {
usr/src/cmd/krb5/krb5kdc/kdc_util.c
295
if ((retval = krb5_auth_con_setrcache(kdc_context, auth_context,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
297
(retval = krb5_rd_req_decoded_anyflag(kdc_context, &auth_context,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
318
if ((retval = krb5_auth_con_getrecvsubkey(kdc_context,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
322
if ((retval = krb5_auth_con_getauthenticator(kdc_context, auth_context,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
334
krb5_data *tkt_realm = krb5_princ_realm(kdc_context,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
336
krb5_data *tgs_realm = krb5_princ_realm(kdc_context, tgs_server);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
356
if (comp_cksum(kdc_context, &scratch1, *ticket, his_cksum)) {
usr/src/cmd/krb5/krb5kdc/kdc_util.c
358
retval = comp_cksum(kdc_context, scratch, *ticket, his_cksum);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
359
krb5_free_data(kdc_context, scratch);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
364
krb5_free_authenticator(kdc_context, authenticator);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
369
(void) krb5_auth_con_setrcache(kdc_context, auth_context, 0);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
371
krb5_auth_con_free(kdc_context, auth_context);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
374
krb5_free_ap_req(kdc_context, apreq);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
396
if ((retval = krb5_db_get_principal(kdc_context, ticket->server,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
402
krb5_db_free_principal(kdc_context, &server, nprincs);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
407
krb5_db_free_principal(kdc_context, &server, nprincs);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
408
if (!krb5_unparse_name(kdc_context, ticket->server, &sname)) {
usr/src/cmd/krb5/krb5kdc/kdc_util.c
416
retval = krb5_dbe_find_enctype(kdc_context, &server,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
427
retval = krb5_dbekd_decrypt_key_data(kdc_context, &master_keyblock,
usr/src/cmd/krb5/krb5kdc/kdc_util.c
433
krb5_db_free_principal(kdc_context, &server, nprincs);
usr/src/cmd/krb5/krb5kdc/kdc_util.c
588
realm = data2string(krb5_princ_realm(kdc_context, tgs));
usr/src/cmd/krb5/krb5kdc/kdc_util.c
639
added = (krb5_princ_realm(kdc_context, client)->length == strlen(realm) &&
usr/src/cmd/krb5/krb5kdc/kdc_util.c
640
!strncmp(krb5_princ_realm(kdc_context, client)->data, realm, strlen(realm))) ||
usr/src/cmd/krb5/krb5kdc/kdc_util.c
641
(krb5_princ_realm(kdc_context, server)->length == strlen(realm) &&
usr/src/cmd/krb5/krb5kdc/kdc_util.c
642
!strncmp(krb5_princ_realm(kdc_context, server)->data, realm, strlen(realm)));
usr/src/cmd/krb5/krb5kdc/main.c
423
return krb5_c_make_random_key(kdc_context, ENCTYPE_DES_CBC_MD5, &psr_key);
usr/src/cmd/krb5/krb5kdc/main.c
836
krb5_klog_close(kdc_context);
usr/src/cmd/krb5/krb5kdc/network.c
1094
krb5_klog_reopen(kdc_context);
usr/src/cmd/krb5/krb5kdc/network.c
770
krb5_free_data(kdc_context, response);
usr/src/cmd/krb5/krb5kdc/network.c
780
krb5_free_data(kdc_context, response);
usr/src/cmd/krb5/krb5kdc/network.c
785
krb5_free_data(kdc_context, response);
usr/src/cmd/krb5/krb5kdc/network.c
894
krb5_free_data(kdc_context, conn->u.tcp.response);
usr/src/cmd/krb5/krb5kdc/network.c
919
retval = krb5_us_timeofday(kdc_context, &errpkt.stime, &errpkt.susec);
usr/src/cmd/krb5/krb5kdc/network.c
934
retval = krb5_mk_error(kdc_context, &errpkt, scratch);
usr/src/cmd/krb5/krb5kdc/replay.c
104
krb5_free_data(kdc_context, eptr->req_packet);
usr/src/cmd/krb5/krb5kdc/replay.c
105
krb5_free_data(kdc_context, eptr->reply_packet);
usr/src/cmd/krb5/krb5kdc/replay.c
129
if (krb5_timeofday(kdc_context, &timenow) ||
usr/src/cmd/krb5/krb5kdc/replay.c
130
krb5_db_get_age(kdc_context, 0, &db_age))
usr/src/cmd/krb5/krb5kdc/replay.c
144
if (krb5_copy_data(kdc_context, inpkt, &eptr->req_packet)) {
usr/src/cmd/krb5/krb5kdc/replay.c
148
if (krb5_copy_data(kdc_context, outpkt, &eptr->reply_packet)) {
usr/src/cmd/krb5/krb5kdc/replay.c
149
krb5_free_data(kdc_context, eptr->req_packet);
usr/src/cmd/krb5/krb5kdc/replay.c
77
if (krb5_timeofday(kdc_context, &timenow) ||
usr/src/cmd/krb5/krb5kdc/replay.c
78
krb5_db_get_age(kdc_context, 0, &db_age))
usr/src/cmd/krb5/krb5kdc/replay.c
94
if (krb5_copy_data(kdc_context, eptr->reply_packet, outpkt))