/freebsd/crypto/heimdal/lib/krb5/ |
H A D | test_crypto.c | 160 krb5_enctype enctypes[] = { in main() local 192 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { in main() 194 krb5_enctype_enable(context, enctypes[i]); in main() 196 time_encryption(context, 16, enctypes[i], enciter); in main() 197 time_encryption(context, 32, enctypes[i], enciter); in main() 198 time_encryption(context, 512, enctypes[i], enciter); in main() 199 time_encryption(context, 1024, enctypes[i], enciter); in main() 200 time_encryption(context, 2048, enctypes[i], enciter); in main() 201 time_encryption(context, 4096, enctypes[i], enciter); in main() 202 time_encryption(context, 8192, enctypes[i], enciter); in main() [all …]
|
H A D | test_crypto_wrapping.c | 125 krb5_enctype enctypes[] = { in main() local 157 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { in main() 158 krb5_enctype_enable(context, enctypes[i]); in main() 160 test_wrapping(context, 0, 1024, 1, enctypes[i]); in main() 161 test_wrapping(context, 1024, 1024 * 100, 1024, enctypes[i]); in main()
|
H A D | context.c | 448 krb5_enctype *enctypes, in copy_etypes() argument 453 for (i = 0; enctypes[i]; i++) in copy_etypes() 463 memcpy(*ret_enctypes, enctypes, sizeof(ret_enctypes[0]) * i); in copy_etypes() 995 krb5_enctype *enctypes = NULL; in krb5_get_default_in_tkt_etypes() local 1004 enctypes = context->as_etypes; in krb5_get_default_in_tkt_etypes() 1006 enctypes = context->tgs_etypes; in krb5_get_default_in_tkt_etypes() 1008 enctypes = context->etypes; in krb5_get_default_in_tkt_etypes() 1010 if (enctypes != NULL) { in krb5_get_default_in_tkt_etypes() 1011 ret = copy_enctypes(context, enctypes, &p); in krb5_get_default_in_tkt_etypes()
|
H A D | get_in_tkt.c | 96 krb5_enctype *enctypes, in add_padata() argument 113 if (!enctypes) { in add_padata() 114 enctypes = context->etypes; in add_padata() 116 for (ep = enctypes; *ep != ETYPE_NULL; ep++) in add_padata() 129 ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key); in add_padata() 133 enctypes[i], key); in add_padata()
|
H A D | init_creds_pw.c | 985 krb5_enctype *enctypes, in add_enc_ts_padata() argument 1002 if (!enctypes) { in add_enc_ts_padata() 1003 enctypes = context->etypes; in add_enc_ts_padata() 1005 for (ep = enctypes; *ep != ETYPE_NULL; ep++) in add_enc_ts_padata() 1012 _krb5_debug(context, 5, "krb5_get_init_creds: using ENC-TS with enctype %d", enctypes[i]); in add_enc_ts_padata() 1014 ret = (*keyproc)(context, enctypes[i], keyseed, in add_enc_ts_padata() 1018 ret = make_pa_enc_timestamp (context, md, enctypes[i], key); in add_enc_ts_padata()
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | keys.c | 92 const krb5_enctype *enctypes = NULL; in parse_key_set() local 109 if(enctypes == NULL && num_buf > 1) { in parse_key_set() 114 enctypes = des_etypes; in parse_key_set() 118 enctypes = &e; in parse_key_set() 123 enctypes = &e; in parse_key_set() 136 if(enctypes == NULL) { in parse_key_set() 137 enctypes = all_etypes; in parse_key_set() 142 if(enctypes == NULL) { in parse_key_set() 143 enctypes = des_etypes; in parse_key_set() 164 if(enctypes == NULL || salt->salttype == 0) { in parse_key_set() [all …]
|
/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | set_cred_option.c | 135 krb5_enctype *enctypes = NULL; in allowed_enctypes() local 153 enctypes = malloc((len + 1) * 4); in allowed_enctypes() 154 if (enctypes == NULL) { in allowed_enctypes() 176 enctypes[i] = e; in allowed_enctypes() 178 enctypes[i] = 0; in allowed_enctypes() 180 if (cred->enctypes) in allowed_enctypes() 181 free(cred->enctypes); in allowed_enctypes() 182 cred->enctypes = enctypes; in allowed_enctypes() 191 if (enctypes) in allowed_enctypes() 192 free(enctypes); in allowed_enctypes()
|
H A D | release_cred.c | 68 if (cred->enctypes) in _gsskrb5_release_cred() 69 free(cred->enctypes); in _gsskrb5_release_cred()
|
H A D | init_sec_context.c | 432 krb5_enctype *enctypes = NULL; in init_auth() local 434 if (cred && cred->enctypes) in init_auth() 435 enctypes = cred->enctypes; in init_auth() 436 krb5_set_default_in_tkt_etypes(context, enctypes); in init_auth()
|
H A D | gsskrb5_locl.h | 103 krb5_enctype *enctypes; member
|
/freebsd/tools/regression/kgssapi/ |
H A D | gsstest.c | 111 int32_t enctypes[] = { in main() local 119 int num_enctypes = sizeof(enctypes) / sizeof(enctypes[0]); in main() 124 printf("testing etype %d\n", enctypes[i]); in main() 151 client_cred, 1, &enctypes[i]); in main()
|
/freebsd/crypto/heimdal/lib/gssapi/gssapi/ |
H A D | gssapi_krb5.h | 221 int32_t *enctypes);
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | kadmin-commands.in | 230 help = "Delete all the mentioned enctypes for principal." 242 help = "Add new enctypes for principal."
|
/freebsd/kerberos5/lib/libgssapi_krb5/ |
H A D | gss_krb5.c | 419 int32_t *enctypes) in gss_krb5_set_allowable_enctypes() argument 436 ret = krb5_store_int32(sp, enctypes[i]); in gss_krb5_set_allowable_enctypes()
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | setchgpw2.asn1 | 88 enctypes[1] SEQUENCE OF ENCTYPE OPTIONAL,
|
H A D | krb5.asn1 | 222 --enctypes
|
/freebsd/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_krb5.c | 435 int32_t *enctypes) in gss_krb5_set_allowable_enctypes() argument 452 ret = krb5_store_int32(sp, enctypes[i]); in gss_krb5_set_allowable_enctypes()
|
/freebsd/crypto/heimdal/admin/ |
H A D | ktutil-commands.in | 133 long = "enctypes"
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2004 | 154 enctypes 235 * lib/asn1/k5.asn1: sync enctypes with pkinit branch 391 * kdc/kerberos5.c (get_pa_etype_info{,2}): check for dup enctypes 858 krb5_string_to_key_derived is broken for non 3des enctypes and 878 * kdc/pkinit.c: at least try to handle diffrent enveloped enctypes
|
H A D | ChangeLog.1998 | 96 * kuser/klist.c: try to list enctypes as keytypes 98 * kuser/kinit.c: remove extra `--cache' option, add `--enctypes' 99 to set list of enctypes to use 309 * kdc/kerberos5.c: always treat keytypes as enctypes; use new 316 * admin/srvconvert.c: add keys for all possible enctypes 785 * kdc/kerberos5.c: Check at runtime whether to use enctypes 825 from protocol keytypes (that really are enctypes) to internal 863 * kdc/kerberos5.c: Add some support for using enctypes instead of
|
H A D | ChangeLog.1999 | 973 all enctypes 1199 keytypes/enctypes are compatible, not that they are the same 1280 (init_tgs_req): add all supported enctypes for the keytype in 1400 * lib/krb5/get_in_tkt.c (add_padata): loop over all enctypes
|
H A D | ChangeLog | 37 * lib/krb5/crypto.c: Allow numbers to be enctypes to as long as
|
H A D | ChangeLog.2003 | 503 client only supports old enctypes, before it used the database 880 only matter for aes, for all other enctypes the key and unkeyed 1764 function for each enctype in preparation enctypes that uses
|
H A D | ChangeLog.2002 | 163 to a list of enctypes (it should already be an enctype)
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | ChangeLog | 529 (_kadm5_generate_key_set): free enctypes returned by parse_key_set 1197 * set_keys.c (_kadm5_set_keys_randomly): set enctypes correctly in
|