/freebsd/crypto/heimdal/kadmin/ |
H A D | add_enctype.c | 51 krb5_enctype *etypes; in add_enctype() local 61 etypes = malloc (n_etypes * sizeof(*etypes)); in add_enctype() 62 if (etypes == NULL) { in add_enctype() 68 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); in add_enctype() 100 if (etypes[j] == key->key_data_type[0]) { in add_enctype() 102 (int)etypes[j]); in add_enctype() 118 ret = krb5_generate_random_keyblock (context, etypes[i], &keyblock); in add_enctype() 120 krb5_warnx(context, "genernate enctype %d failed", (int)etypes[i]); in add_enctype() 127 new_key_data[n].key_data_type[0] = etypes[i]; in add_enctype() 161 free (etypes); in add_enctype()
|
H A D | del_enctype.c | 51 krb5_enctype *etypes; in del_enctype() local 56 etypes = malloc (n_etypes * sizeof(*etypes)); in del_enctype() 57 if (etypes == NULL) { in del_enctype() 63 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); in del_enctype() 95 if (etypes[k] == key->key_data_type[0]) { in del_enctype() 119 free (etypes); in del_enctype()
|
H A D | ChangeLog | 520 * load.c: remove unused etypes code, and add parsing of the
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | setchgpw2.asn1 | 43 etypes[2] SEQUENCE OF ENCTYPE OPTIONAL, 50 etypes[2] SEQUENCE OF ENCTYPE OPTIONAL 69 etypes[0] SEQUENCE OF ENCTYPE, 124 Req-get-supported-etypes ::= NULL 126 Rep-get-supported-etypes ::= SEQUENCE OF ENCTYPE 128 Err-get-supported-etypes ::= NULL 138 get-supported-etypes[5] Req-get-supported-etypes, 148 get-supported-etypes[5] Rep-get-supported-etypes, 158 get-supported-etypes[5] Err-get-supported-etypes,
|
H A D | ChangeLog | 1273 * k5.asn1: shift the last added etypes one step so rc2 doesn't
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | context.c | 62 krb5_enctype *etypes = NULL; in set_etypes() local 69 etypes = malloc((i+1) * sizeof(*etypes)); in set_etypes() 70 if (etypes == NULL) { in set_etypes() 81 etypes[k++] = e; in set_etypes() 83 etypes[k] = ETYPE_NULL; in set_etypes() 86 *ret_enctypes = etypes; in set_etypes() 123 free(context->etypes); in init_context_from_config_file() 124 context->etypes = tmptypes; in init_context_from_config_file() 437 krb5_enctype **etypes) in krb5_get_permitted_enctypes() argument 439 return krb5_get_default_in_tkt_etypes(context, KRB5_PDU_NONE, etypes); in krb5_get_permitted_enctypes() [all …]
|
H A D | build_auth.c | 40 EtypeList etypes; in make_etypelist() local 48 &etypes.len, &etypes.val, in make_etypelist() 53 ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret); in make_etypelist() 55 free_EtypeList(&etypes); in make_etypelist() 60 free_EtypeList(&etypes); in make_etypelist()
|
H A D | init_creds_pw.c | 42 krb5_enctype *etypes; member 131 if (ctx->etypes) in free_init_creds_ctx() 132 free(ctx->etypes); in free_init_creds_ctx() 355 krb5_enctype *etypes; in get_init_creds_common() local 393 ctx->etypes = NULL; in get_init_creds_common() 437 if (ctx->etypes) in get_init_creds_common() 438 free(ctx->etypes); in get_init_creds_common() 440 etypes = malloc((options->etype_list_length + 1) in get_init_creds_common() 442 if (etypes == NULL) { in get_init_creds_common() 447 memcpy (etypes, options->etype_list, in get_init_creds_common() [all …]
|
H A D | rd_req.c | 173 EtypeList *etypes) in find_etypelist() argument 182 etypes->len = 0; in find_etypelist() 183 etypes->val = NULL; in find_etypelist() 213 etypes, in find_etypelist() 349 EtypeList etypes; in krb5_verify_ap_req2() local 464 ret = find_etypelist(context, ac, &etypes); in krb5_verify_ap_req2() 470 if (etypes.val) { in krb5_verify_ap_req2() 473 for (i = 0; i < etypes.len; i++) { in krb5_verify_ap_req2() 474 if (krb5_enctype_valid(context, etypes.val[i]) == 0) { in krb5_verify_ap_req2() 475 ac->keytype = etypes.val[i]; in krb5_verify_ap_req2() [all …]
|
H A D | get_in_tkt.c | 114 enctypes = context->etypes; in add_padata() 149 const krb5_enctype *etypes, in init_as_req() argument 214 etypes); in init_as_req() 367 const krb5_enctype *etypes, in krb5_get_in_cred() argument 404 etypes, in krb5_get_in_cred() 532 const krb5_enctype *etypes, in krb5_get_in_tkt() argument 548 etypes, in krb5_get_in_tkt()
|
H A D | krb5_locl.h | 253 krb5_enctype *etypes; member
|
/freebsd/crypto/heimdal/admin/ |
H A D | get.c | 91 krb5_enctype *etypes = NULL; in kt_get() local 105 etypes = malloc (opt->enctypes_strings.num_strings * sizeof(*etypes)); in kt_get() 106 if (etypes == NULL) { in kt_get() 114 &etypes[i]); in kt_get() 213 if (keys[j].keytype == etypes[k]) { in kt_get() 234 free(etypes); in kt_get()
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | hdb-ldap.c | 687 if (ent->entry.etypes) { in LDAP_entry2mods() 709 for (i = 0; i < ent->entry.etypes->len; i++) { in LDAP_entry2mods() 717 ent->entry.etypes->val[i]); in LDAP_entry2mods() 1053 ent->entry.etypes = malloc(sizeof(*(ent->entry.etypes))); in LDAP_message2entry() 1054 if (ent->entry.etypes == NULL) { in LDAP_message2entry() 1059 ent->entry.etypes->len = ldap_count_values_len(vals); in LDAP_message2entry() 1060 ent->entry.etypes->val = calloc(ent->entry.etypes->len, sizeof(int)); in LDAP_message2entry() 1061 if (ent->entry.etypes in LDAP_message2entry() 1091 unsigned *etypes; LDAP_message2entry() local [all...] |
H A D | hdb.asn1 | 130 etypes[11] SEQUENCE OF INTEGER (0..4294967295) OPTIONAL,
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 128 krb5_enctype *etypes, unsigned len, in _kdc_find_etype() argument 168 if (p[i] != etypes[j]) in _kdc_find_etype() 202 if (krb5_enctype_valid(context, etypes[i]) != 0 && in _kdc_find_etype() 203 !_kdc_is_weak_exception(princ->entry.principal, etypes[i])) in _kdc_find_etype() 206 while (hdb_next_enctype2key(context, &princ->entry, etypes[i], &key) == 0) { in _kdc_find_etype() 214 *ret_enctype = etypes[i]; in _kdc_find_etype()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.1999 | 233 (init_context_from_config_file): set both `etypes' and `etypes_des' 644 * lib/krb5/crypto.c (etypes): remove NEW_DES3_CODE, enable 1288 (etypes): add F_PSEUDO flags 2054 * lib/krb5/get_in_tkt.c (krb5_init_etype): etypes are now `int'
|
H A D | ChangeLog.2002 | 551 requested KDC-REQ etypes
|
H A D | ChangeLog.2000 | 677 * lib/krb5/krb5.h: change some funny etypes to use negative
|
H A D | ChangeLog.2004 | 667 case, make sure ent->etypes are allocated, From: Andrew Bartlett
|
H A D | ChangeLog.2003 | 1669 * lib/krb5/krb5.conf.5: documentation for of boolean, etypes,
|
H A D | ChangeLog.2006 | 1028 to support not-as-good etypes for the krbtgt.
|
H A D | ChangeLog.1998 | 53 etypes
|