krb5_enc_tkt_part
krb5_enc_tkt_part enc_tkt_reply;
krb5_enc_tkt_part *t2enc = request->second_ticket[st_idx]->enc_part2;
krb5_enc_tkt_part enc_tkt_reply;
krb5_enc_tkt_part * enc_tkt_reply, krb5_pa_data *data,
krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply,
krb5_enc_tkt_part * enc_tkt_reply, krb5_pa_data *data,
krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply,
krb5_enc_tkt_part *enc_tkt_reply)
add_authorization_data(krb5_enc_tkt_part *enc_tkt_part, krb5_authdata **ad)
krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply,
krb5_enc_tkt_part *enc_tkt_reply);
krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply,
krb5_enc_tkt_part *enc_tkt_reply,
FIELDOF_NORM(krb5_enc_tkt_part, krb5_flags, flags, 0),
FIELDOF_NORM(krb5_enc_tkt_part, ptr_encryption_key, session, 1),
FIELDOF_NORM(krb5_enc_tkt_part, realm_of_principal, client, 2),
FIELDOF_NORM(krb5_enc_tkt_part, principal, client, 3),
FIELDOF_NORM(krb5_enc_tkt_part, transited, transited, 4),
FIELDOF_NORM(krb5_enc_tkt_part, kerberos_time, times.authtime, 5),
FIELDOF_OPT(krb5_enc_tkt_part, kerberos_time, times.starttime, 6, 6),
FIELDOF_NORM(krb5_enc_tkt_part, kerberos_time, times.endtime, 7),
FIELDOF_OPT(krb5_enc_tkt_part, kerberos_time, times.renew_till, 8, 8),
FIELDOF_OPT(krb5_enc_tkt_part, ptr_seqof_host_addresses, caddrs, 9, 9),
FIELDOF_OPT(krb5_enc_tkt_part, auth_data_ptr, authorization_data, 10, 10),
const krb5_enc_tkt_part *val = p;
DEFSEQTYPE(untagged_enc_tkt_part, krb5_enc_tkt_part, enc_tkt_part_fields,
krb5_error_code decode_krb5_enc_tkt_part(const krb5_data *code, krb5_enc_tkt_part **rep)
alloc_field(*rep,krb5_enc_tkt_part);
krb5_copy_enc_tkt_part(krb5_context context, const krb5_enc_tkt_part *partfrom, krb5_enc_tkt_part **partto)
krb5_enc_tkt_part *tempto;
if (!(tempto = (krb5_enc_tkt_part *)malloc(sizeof(*tempto))))
krb5_enc_tkt_part *dec_tkt_part;
register krb5_enc_tkt_part *dec_tkt_part = dec_ticket->enc_part2;
krb5_enc_tkt_part * enc_tkt_reply,
krb5_enc_tkt_part * enc_tkt_reply,
(const krb5_enc_tkt_part *rep, krb5_data **code);
(const krb5_data *output, krb5_enc_tkt_part **rep);
krb5_enc_tkt_part *enc_part2; /* ptr to decrypted version, if
(krb5_context, krb5_enc_tkt_part * );
krb5_free_enc_tkt_part(krb5_context context, krb5_enc_tkt_part *val)