| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | ser_adata.c | 31 k5_size_authdata(krb5_authdata *authdata, size_t *sizep) in k5_size_authdata() argument 44 if (authdata != NULL) { in k5_size_authdata() 49 (size_t) authdata->length); in k5_size_authdata() 56 k5_externalize_authdata(krb5_authdata *authdata, in k5_externalize_authdata() argument 68 if (authdata != NULL) { in k5_externalize_authdata() 70 if (!k5_size_authdata(authdata, &required) && required <= remain) { in k5_externalize_authdata() 75 (void) krb5_ser_pack_int32((krb5_int32) authdata->ad_type, in k5_externalize_authdata() 79 (void) krb5_ser_pack_int32((krb5_int32) authdata->length, in k5_externalize_authdata() 83 (void) krb5_ser_pack_bytes(authdata->contents, in k5_externalize_authdata() 84 (size_t) authdata->length, in k5_externalize_authdata() [all …]
|
| H A D | authdata_exp.c | 41 krb5_authdata **authdata = NULL; in krb5_authdata_export_authdata() local 74 authdata = realloc(authdata, (len + j + 1) * sizeof(krb5_authdata *)); in krb5_authdata_export_authdata() 75 if (authdata == NULL) in krb5_authdata_export_authdata() 78 memcpy(&authdata[len], authdata2, j * sizeof(krb5_authdata *)); in krb5_authdata_export_authdata() 84 if (authdata != NULL) in krb5_authdata_export_authdata() 85 authdata[len] = NULL; in krb5_authdata_export_authdata() 88 krb5_free_authdata(kcontext, authdata); in krb5_authdata_export_authdata() 92 *pauthdata = authdata; in krb5_authdata_export_authdata()
|
| H A D | pac.c | 603 krb5_authdata **authdata = enc_tkt->authorization_data; in krb5_kdc_verify_ticket() local 612 if (authdata == NULL) in krb5_kdc_verify_ticket() 620 for (i = 0; authdata[i] != NULL; i++) { in krb5_kdc_verify_ticket() 621 if (authdata[i]->ad_type != KRB5_AUTHDATA_IF_RELEVANT) in krb5_kdc_verify_ticket() 626 authdata[i], &ifrel); in krb5_kdc_verify_ticket() 642 if (authdata[i] == NULL) { in krb5_kdc_verify_ticket() 663 orig = authdata[i]; in krb5_kdc_verify_ticket() 664 authdata[i] = recoded_ifrel[0]; in krb5_kdc_verify_ticket() 666 authdata[i] = orig; in krb5_kdc_verify_ticket() 777 krb5_authdata **authdata, krb5_boolean kdc_issued, in mspac_import_authdata() argument [all …]
|
| H A D | authdata_dec.c | 61 krb5_authdata ***authdata) in krb5_decode_authdata_container() argument 66 *authdata = NULL; in krb5_decode_authdata_container() 74 code = decode_krb5_authdata(&data, authdata); in krb5_decode_authdata_container() 188 krb5_authdata ***authdata) in krb5_verify_authdata_kdc_issued() argument 201 if (authdata != NULL) in krb5_verify_authdata_kdc_issued() 202 *authdata = NULL; in krb5_verify_authdata_kdc_issued() 243 if (authdata != NULL) { in krb5_verify_authdata_kdc_issued() 244 *authdata = ad_kdci->elements; in krb5_verify_authdata_kdc_issued()
|
| H A D | authdata_enc.c | 59 krb5_authdata *const*authdata, in krb5_encode_authdata_container() argument 69 code = encode_krb5_authdata((krb5_authdata * const *)authdata, &data); in krb5_encode_authdata_container() 91 krb5_authdata *const *authdata, in krb5_make_authdata_kdc_issued() argument 105 ad_kdci.elements = (krb5_authdata **)authdata; in krb5_make_authdata_kdc_issued()
|
| H A D | authdata.c | 508 krb5_authdata **authdata; in k5_get_kdc_issued_authdata() local 517 KRB5_AUTHDATA_KDC_ISSUED, &authdata); in k5_get_kdc_issued_authdata() 518 if (code != 0 || authdata == NULL) in k5_get_kdc_issued_authdata() 528 authdata[0], in k5_get_kdc_issued_authdata() 537 krb5_free_authdata(kcontext, authdata); in k5_get_kdc_issued_authdata() 640 krb5_authdata **authdata = NULL; in krb5int_authdata_verify() local 652 module->ad_type, &authdata); in krb5int_authdata_verify() 661 module->ad_type, &authdata); in krb5int_authdata_verify() 668 if (authdata == NULL) { in krb5int_authdata_verify() 686 module->ad_type, &authdata); in krb5int_authdata_verify() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/ccache/ |
| H A D | ccapi_util.c | 94 krb5_authdata **authdata = NULL; in cc_data_list_to_authdata() local 101 authdata = k5calloc(count + 1, sizeof(*authdata), &ret); in cc_data_list_to_authdata() 102 if (authdata == NULL) in cc_data_list_to_authdata() 106 authdata[i] = k5alloc(sizeof(*authdata[i]), &ret); in cc_data_list_to_authdata() 107 if (authdata[i] == NULL) in cc_data_list_to_authdata() 110 authdata[i]->contents = k5memdup(list[i]->data, list[i]->length, &ret); in cc_data_list_to_authdata() 111 if (authdata[i]->contents == NULL) in cc_data_list_to_authdata() 113 authdata[i]->length = list[i]->length; in cc_data_list_to_authdata() 114 authdata[i]->ad_type = list[i]->type; in cc_data_list_to_authdata() 115 authdata[i]->magic = KV5M_AUTHDATA; in cc_data_list_to_authdata() [all …]
|
| H A D | ccmarshal.c | 266 krb5_authdata **authdata; in unmarshal_authdata() local 274 authdata = calloc(count + 1, sizeof(*authdata)); in unmarshal_authdata() 275 if (authdata == NULL) { in unmarshal_authdata() 280 authdata[i] = unmarshal_authdatum(in, version); in unmarshal_authdata() 281 return authdata; in unmarshal_authdata() 303 creds->authdata = unmarshal_authdata(&in, version); in k5_unmarshal_cred() 414 marshal_authdata(struct k5buf *buf, int version, krb5_authdata **authdata) in marshal_authdata() argument 418 for (count = 0; authdata != NULL && authdata[count] != NULL; count++); in marshal_authdata() 421 put16(buf, version, authdata[i]->ad_type); in marshal_authdata() 422 put_len_bytes(buf, version, authdata[i]->contents, in marshal_authdata() [all …]
|
| H A D | t_marshal.c | 230 assert(c->authdata != NULL && c->authdata[0] != NULL); in verify_cred1() 231 assert(c->authdata[0]->ad_type == KRB5_AUTHDATA_SIGNTICKET); in verify_cred1() 232 assert(c->authdata[0]->length == 10); in verify_cred1() 233 assert(memcmp(c->authdata[0]->contents, "signticket", 10) == 0); in verify_cred1() 234 assert(c->authdata[1] != NULL); in verify_cred1() 235 assert(c->authdata[1]->ad_type == -100); in verify_cred1() 236 assert(c->authdata[1]->length == 0); in verify_cred1() 237 assert(c->authdata[2] == NULL); in verify_cred1() 260 assert(c->authdata == NULL || c->authdata[0] == NULL); in verify_cred2()
|
| H A D | t_cc.c | 80 test_creds.authdata = NULL; in init_structs() 103 test_creds.authdata = malloc (3 * sizeof(krb5_authdata *)); in init_test_cred() 104 if (!test_creds.authdata) { in init_test_cred() 110 test_creds.authdata[i] = 0; in init_test_cred() 127 test_creds.authdata[0] = a; in init_test_cred() 145 test_creds.authdata[1] = a; in init_test_cred() 162 if (test_creds.authdata) { in init_test_cred() 163 krb5_free_authdata(context, test_creds.authdata); in init_test_cred() 164 test_creds.authdata = 0; in init_test_cred() 179 if(test_creds.authdata) { in free_test_cred() [all …]
|
| /freebsd/contrib/libfido2/regress/ |
| H A D | cred.c | 28 static const unsigned char authdata[198] = { 1525 assert(fido_cred_set_authdata(c, authdata, sizeof(authdata)) == FIDO_OK); in valid_cred() 1550 assert(fido_cred_set_authdata(c, authdata, sizeof(authdata)) == FIDO_OK); in no_cdh() 1574 assert(fido_cred_set_authdata(c, authdata, sizeof(authdata)) == FIDO_OK); in no_rp_id() 1599 assert(fido_cred_set_authdata(c, authdata, sizeof(authdata)) == FIDO_OK); in no_rp_name() 1653 assert(fido_cred_set_authdata(c, authdata, sizeo in no_x509() 26 static const unsigned char authdata[198] = { global() variable [all...] |
| H A D | assert.c | 76 static const unsigned char authdata[39] = { variable 333 assert(fido_assert_set_authdata(a, 0, authdata, in valid_assert() 334 sizeof(authdata)) == FIDO_OK); in valid_assert() 358 assert(fido_assert_set_authdata(a, 0, authdata, in no_cdh() 359 sizeof(authdata)) == FIDO_OK); in no_cdh() 380 assert(fido_assert_set_authdata(a, 0, authdata, in no_rp() 381 sizeof(authdata)) == FIDO_OK); in no_rp() 424 assert(fido_assert_set_authdata(a, 0, authdata, in no_sig() 425 sizeof(authdata)) == FIDO_OK); in no_sig() 452 assert(fido_assert_set_authdata(a, 0, authdata, in junk_cdh() [all...] |
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | creds.c | 58 free_AuthorizationData (&c->authdata); in krb5_free_cred_contents() 105 ret = copy_AuthorizationData(&incred->authdata, &c->authdata); in krb5_copy_creds_contents() 251 if(mcreds->authdata.len != creds->authdata.len) in krb5_compare_creds() 254 for(i = 0; match && i < mcreds->authdata.len; i++) in krb5_compare_creds() 255 match = (mcreds->authdata.val[i].ad_type == in krb5_compare_creds() 256 creds->authdata.val[i].ad_type) && in krb5_compare_creds() 257 (krb5_data_cmp(&mcreds->authdata.val[i].ad_data, in krb5_compare_creds() 258 &creds->authdata.val[i].ad_data) == 0); in krb5_compare_creds()
|
| H A D | acache.c | 230 cred->authdata.val = NULL; in make_cred_from_ccred() 231 cred->authdata.len = 0; in make_cred_from_ccred() 236 for (i = 0; incred->authdata && incred->authdata[i]; i++) in make_cred_from_ccred() 240 cred->authdata.val = calloc(i, sizeof(cred->authdata.val[0])); in make_cred_from_ccred() 241 if (cred->authdata.val == NULL) in make_cred_from_ccred() 243 cred->authdata.len = i; in make_cred_from_ccred() 244 for (i = 0; i < cred->authdata.len; i++) { in make_cred_from_ccred() 245 cred->authdata.val[i].ad_type = incred->authdata[i]->type; in make_cred_from_ccred() 246 ret = krb5_data_copy(&cred->authdata.val[i].ad_data, in make_cred_from_ccred() 247 incred->authdata[i]->data, in make_cred_from_ccred() [all …]
|
| /freebsd/contrib/libfido2/tools/ |
| H A D | cred_verify.c | 24 struct blob authdata; in prepare_cred() local 33 memset(&authdata, 0, sizeof(authdata)); in prepare_cred() 41 r |= base64_read(in_f, &authdata); in prepare_cred() 55 xxd(authdata.ptr, authdata.len); in prepare_cred() 71 (r = fido_cred_set_authdata(cred, authdata.ptr, in prepare_cred() 72 authdata.len)) != FIDO_OK || in prepare_cred() 93 free(authdata.ptr); in prepare_cred()
|
| H A D | assert_verify.c | 29 struct blob authdata; in prepare_assert() local 35 memset(&authdata, 0, sizeof(authdata)); in prepare_assert() 40 r |= base64_read(in_f, &authdata); in prepare_assert() 50 xxd(authdata.ptr, authdata.len); in prepare_assert() 63 (r = fido_assert_set_authdata(assert, 0, authdata.ptr, in prepare_assert() 64 authdata.len)) != FIDO_OK || in prepare_assert() 84 free(authdata.ptr); in prepare_assert()
|
| /freebsd/contrib/libfido2/src/ |
| H A D | assert.c | 65 case 2: /* authdata */ in parse_assert_reply() 71 &stmt->authdata, &stmt->authdata_ext)); in parse_assert_reply() 394 const fido_blob_t *authdata) in get_es256_hash() 403 EVP_DigestUpdate(ctx, authdata->ptr, authdata->len) != 1 || in get_es256_hash() 418 const fido_blob_t *authdata) in get_es384_hash() 427 EVP_DigestUpdate(ctx, authdata->ptr, authdata->len) != 1 || in get_es384_hash() 442 const fido_blob_t *authdata) in get_eddsa_hash() 444 if (SIZE_MAX - authdata in get_eddsa_hash() 390 get_es256_hash(fido_blob_t * dgst,const fido_blob_t * clientdata,const fido_blob_t * authdata) get_es256_hash() argument 414 get_es384_hash(fido_blob_t * dgst,const fido_blob_t * clientdata,const fido_blob_t * authdata) get_es384_hash() argument 438 get_eddsa_hash(fido_blob_t * dgst,const fido_blob_t * clientdata,const fido_blob_t * authdata) get_eddsa_hash() argument 456 fido_blob_t authdata; fido_get_signed_hash() local [all...] |
| H A D | cred.c | 38 &cred->authdata_cbor, &cred->authdata, &cred->attcred, in parse_makecred_reply() 358 if (fido_check_rp_id(cred->rp.id, cred->authdata.rp_id_hash) != 0) { in fido_cred_verify() 364 if (fido_check_flags(cred->authdata.flags, FIDO_OPT_TRUE, in fido_cred_verify() 388 if (get_signed_hash_u2f(&dgst, cred->authdata.rp_id_hash, in fido_cred_verify() 389 sizeof(cred->authdata.rp_id_hash), &cred->cdh, in fido_cred_verify() 447 if (fido_check_rp_id(cred->rp.id, cred->authdata.rp_id_hash) != 0) { in fido_cred_verify_self() 453 if (fido_check_flags(cred->authdata.flags, FIDO_OPT_TRUE, in fido_cred_verify_self() 474 if (get_signed_hash_u2f(&dgst, cred->authdata.rp_id_hash, in fido_cred_verify_self() 475 sizeof(cred->authdata.rp_id_hash), &cred->cdh, in fido_cred_verify_self() 536 memset(&cred->authdata, 0, sizeof(cred->authdata)); in fido_cred_clean_authdata() [all …]
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | export_cred.c | 221 json_authdata(krb5_authdata **authdata, k5_json_value *val_out) in json_authdata() argument 228 if (authdata == NULL) in json_authdata() 233 for (; *authdata != NULL; authdata++) { in json_authdata() 234 ret = json_authdata_element(*authdata, &val); in json_authdata() 256 k5_json_value authdata = NULL; in json_creds() local 271 ret = json_authdata(creds->authdata, &authdata); in json_creds() 282 (size_t)creds->second_ticket.length, authdata); in json_creds() 292 k5_json_release(authdata); in json_creds()
|
| H A D | ser_sctx.c | 288 if (!kret && ctx->authdata) { in kg_ctx_size() 291 for (i = 0; !kret && ctx->authdata[i]; i++) in kg_ctx_size() 292 kret = k5_size_authdata(ctx->authdata[i], &required); in kg_ctx_size() 428 if (ctx->authdata) { in kg_ctx_externalize() 429 for (; ctx->authdata[i]; i++) in kg_ctx_externalize() 434 if (!kret && ctx->authdata) { in kg_ctx_externalize() 436 for (i = 0; !kret && ctx->authdata[i]; i++) in kg_ctx_externalize() 437 kret = k5_externalize_authdata(ctx->authdata[i], in kg_ctx_externalize() 639 ctx->authdata = (krb5_authdata **)calloc((size_t)nadata + 1, in kg_ctx_internalize() 641 if (ctx->authdata == NULL) { in kg_ctx_internalize() [all …]
|
| H A D | inq_context.c | 299 if (ctx->authdata != NULL) { in gss_krb5int_extract_authz_data_from_sec_context() 300 for (i = 0; ctx->authdata[i] != NULL; i++) { in gss_krb5int_extract_authz_data_from_sec_context() 301 if (ctx->authdata[i]->ad_type == ad_type) { in gss_krb5int_extract_authz_data_from_sec_context() 304 ad_data.length = ctx->authdata[i]->length; in gss_krb5int_extract_authz_data_from_sec_context() 305 ad_data.value = ctx->authdata[i]->contents; in gss_krb5int_extract_authz_data_from_sec_context()
|
| H A D | import_cred.c | 324 krb5_authdata **authdata = NULL; in json_to_authdata() local 334 authdata = calloc(len + 1, sizeof(*authdata)); in json_to_authdata() 337 &authdata[i])) in json_to_authdata() 340 authdata[i] = NULL; in json_to_authdata() 341 *authdata_out = authdata; in json_to_authdata() 345 krb5_free_authdata(context, authdata); in json_to_authdata() 429 &creds->authdata)) in json_to_creds()
|
| /freebsd/crypto/openssh/regress/misc/ssh-verify-attestation/ |
| H A D | ssh-verify-attestation.c | 83 struct sshbuf *attestation_cert = NULL, *sig = NULL, *authdata = NULL; in prepare_fido_cred() local 102 (r = sshbuf_froms(b, &authdata)) != 0 || in prepare_fido_cred() 110 sshbuf_len(sig), sshbuf_len(authdata), sshbuf_len(challenge)); in prepare_fido_cred() 117 fido_cred_set_authdata(cred, sshbuf_ptr(authdata), in prepare_fido_cred() 118 sshbuf_len(authdata)); in prepare_fido_cred() 132 sshbuf_free(authdata); in prepare_fido_cred()
|
| /freebsd/sys/crypto/armv8/ |
| H A D | armv8_crypto_wrap.c | 330 const uint8_t *authdata, size_t authdatalen, in armv8_aes_gmac_setup() argument 351 gcm_ghash_v8(s->Xi.u, Htable, authdata, authdatalen - trailer); in armv8_aes_gmac_setup() 352 authdata += authdatalen - trailer; in armv8_aes_gmac_setup() 356 memcpy(block, authdata, trailer); in armv8_aes_gmac_setup() 395 size_t authdatalen, const uint8_t *authdata, in armv8_aes_encrypt_gcm() argument 405 armv8_aes_gmac_setup(&s, aes_key, authdata, authdatalen, iv, Htable); in armv8_aes_encrypt_gcm() 458 size_t authdatalen, const uint8_t *authdata, in armv8_aes_decrypt_gcm() argument 470 armv8_aes_gmac_setup(&s, aes_key, authdata, authdatalen, iv, Htable); in armv8_aes_decrypt_gcm()
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | kdc_authdata.c | 111 is_kdc_issued_authdatum(krb5_authdata *authdata, in is_kdc_issued_authdatum() argument 119 if (authdata->ad_type == KRB5_AUTHDATA_IF_RELEVANT) { in is_kdc_issued_authdatum() 120 if (krb5int_get_authdata_containee_types(NULL, authdata, &count, in is_kdc_issued_authdatum() 125 ad_type = authdata->ad_type; in is_kdc_issued_authdatum() 154 has_mandatory_for_kdc_authdata(krb5_context context, krb5_authdata **authdata) in has_mandatory_for_kdc_authdata() argument 158 if (authdata == NULL) in has_mandatory_for_kdc_authdata() 160 for (i = 0; authdata[i] != NULL; i++) { in has_mandatory_for_kdc_authdata() 161 if (authdata[i]->ad_type == KRB5_AUTHDATA_MANDATORY_FOR_KDC) in has_mandatory_for_kdc_authdata()
|