/freebsd/crypto/heimdal/lib/krb5/ |
H A D | ticket.c | 624 &dec_rep->kdc_rep.enc_part, in decrypt_tkt() 633 &dec_rep->enc_part, in decrypt_tkt() 638 &dec_rep->enc_part, in decrypt_tkt() 681 creds->session.keytype = rep->enc_part.key.keytype; in _krb5_extract_ticket() 683 rep->enc_part.key.keyvalue.data, in _krb5_extract_ticket() 684 rep->enc_part.key.keyvalue.length); in _krb5_extract_ticket() 716 rep->enc_part.sname, in _krb5_extract_ticket() 717 rep->enc_part.srealm); in _krb5_extract_ticket() 740 if (strcmp(rep->enc_part.srealm, srealm) != 0 || in _krb5_extract_ticket() 741 strcmp(rep->enc_part.srealm, crealm) != 0) in _krb5_extract_ticket() [all …]
|
H A D | mk_priv.c | 96 krb5_data_zero (&s.enc_part.cipher); in krb5_mk_priv() 106 s.enc_part.etype = key->keytype; in krb5_mk_priv() 107 s.enc_part.kvno = NULL; in krb5_mk_priv() 119 &s.enc_part.cipher); in krb5_mk_priv() 134 krb5_data_free (&s.enc_part.cipher); in krb5_mk_priv() 151 krb5_data_free (&s.enc_part.cipher); in krb5_mk_priv()
|
H A D | rd_cred.c | 99 if (cred.enc_part.etype == ETYPE_NULL) { in krb5_rd_cred() 101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length; in krb5_rd_cred() 102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data; in krb5_rd_cred() 120 &cred.enc_part, in krb5_rd_cred() 142 &cred.enc_part, in krb5_rd_cred() 155 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data) in krb5_rd_cred()
|
H A D | rd_req.c | 40 EncryptedData *enc_part, in decrypt_tkt_enc_part() argument 54 enc_part, in decrypt_tkt_enc_part() 72 EncryptedData *enc_part, in decrypt_authenticator() argument 87 enc_part, in decrypt_authenticator() 94 enc_part, in decrypt_authenticator() 232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); in krb5_decrypt_ticket() 794 if (ap_req->ticket.enc_part.kvno) in get_key_from_keytab() 795 kvno = *ap_req->ticket.enc_part.kvno; in get_key_from_keytab() 803 ap_req->ticket.enc_part.etype, in get_key_from_keytab() 968 if (ap_req.ticket.enc_part.kvno) in krb5_rd_req_ctx() [all …]
|
H A D | mk_rep.c | 91 ap.enc_part.etype = auth_context->keyblock->keytype; in krb5_mk_rep() 92 ap.enc_part.kvno = NULL; in krb5_mk_rep() 111 &ap.enc_part.cipher); in krb5_mk_rep()
|
H A D | build_ap_req.c | 60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part); in krb5_build_ap_req()
|
H A D | get_for_creds.c | 410 cred.enc_part.etype = ENCTYPE_NULL; in krb5_get_forwarded_creds() 411 cred.enc_part.kvno = NULL; in krb5_get_forwarded_creds() 412 cred.enc_part.cipher.data = buf; in krb5_get_forwarded_creds() 413 cred.enc_part.cipher.length = buf_size; in krb5_get_forwarded_creds() 434 &cred.enc_part); in krb5_get_forwarded_creds()
|
H A D | free.c | 40 free_EncTGSRepPart(&rep->enc_part); in krb5_free_kdc_rep()
|
H A D | init_creds_pw.c | 73 EncKDCRepPart enc_part; member 147 free_EncKDCRepPart(&ctx->enc_part); in free_init_creds_ctx() 271 lr = &ctx->enc_part.last_req; in process_last_request() 334 && ctx->enc_part.key_expiration in process_last_request() 335 && *ctx->enc_part.key_expiration <= t) { in process_last_request() 339 *ctx->enc_part.key_expiration); in process_last_request() 1264 etype = rep->enc_part.etype; in process_pa_data_to_key() 1720 ret = copy_EncKDCRepPart(&rep.enc_part, &ctx->enc_part); in krb5_init_creds_step() 1723 free_EncASRepPart(&rep.enc_part); in krb5_init_creds_step()
|
H A D | rd_rep.c | 70 &ap_rep.enc_part, in krb5_rd_rep()
|
H A D | rd_priv.c | 95 &priv.enc_part, in krb5_rd_priv()
|
H A D | get_cred.c | 350 &dec_rep->kdc_rep.enc_part, in decrypt_tkt_with_subkey() 360 &dec_rep->kdc_rep.enc_part, in decrypt_tkt_with_subkey() 372 &dec_rep->kdc_rep.enc_part, in decrypt_tkt_with_subkey() 381 &dec_rep->enc_part, in decrypt_tkt_with_subkey() 386 &dec_rep->enc_part, in decrypt_tkt_with_subkey()
|
H A D | scache.c | 736 if(t.enc_part.kvno) in scc_store_cred() 737 kvno = *t.enc_part.kvno; in scc_store_cred() 739 etype = t.enc_part.etype; in scc_store_cred()
|
H A D | krb5.h | 649 EncKDCRepPart enc_part; member
|
H A D | get_in_tkt.c | 470 etype = rep.kdc_rep.enc_part.etype; in krb5_get_in_cred()
|
/freebsd/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 71 EncryptedData enc_part; in encode_ticket() local 75 memset (&enc_part, 0, sizeof(enc_part)); in encode_ticket() 117 &ticket.enc_part); in encode_ticket()
|
H A D | klist.c | 160 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s); in print_cred_verbose() 166 printf(N_("unknown-enctype(%d)", ""), t.enc_part.etype); in print_cred_verbose() 168 if(t.enc_part.kvno) in print_cred_verbose() 169 printf(N_(", kvno %d", ""), *t.enc_part.kvno); in print_cred_verbose() 171 if(cred->session.keytype != t.enc_part.etype) { in print_cred_verbose()
|
H A D | kdecode_ticket.c | 67 &tkt.enc_part, &dec_data); in print_and_decode_tkt()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 1194 …ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, k… in tgs_parse_request() 1223 if(ap_req.ticket.enc_part.kvno && in tgs_parse_request() 1224 *ap_req.ticket.enc_part.kvno != (*krbtgt)->entry.kvno){ in tgs_parse_request() 1233 *ap_req.ticket.enc_part.kvno, in tgs_parse_request() 1242 *krbtgt_etype = ap_req.ticket.enc_part.etype; in tgs_parse_request() 1245 ap_req.ticket.enc_part.etype, &tkey); in tgs_parse_request() 1249 krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str); in tgs_parse_request() 1555 HDB_F_GET_KRBTGT, t->enc_part.kvno, in tgs_build_reply() 1564 t->enc_part.etype, &uukey); in tgs_build_reply() 2058 t->enc_part.etype, &clientkey); in tgs_build_reply()
|
H A D | kerberos5.c | 368 &rep->ticket.enc_part); in _kdc_encode_reply() 409 &rep->enc_part); in _kdc_encode_reply() 419 &rep->enc_part); in _kdc_encode_reply()
|
/freebsd/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 72 ASN1_MALLOC_ENCODE(EncryptedData, buf, buf_len, &t.enc_part, in v5_to_kt()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.1998 | 797 * lib/krb5/mk_rep.c: Make sure enc_part.etype is an encryption
|