Home
last modified time | relevance | path

Searched refs:etypes (Results 1 – 22 of 22) sorted by relevance

/freebsd/crypto/heimdal/kadmin/
H A Dadd_enctype.c51 krb5_enctype *etypes; in add_enctype() local
61 etypes = malloc (n_etypes * sizeof(*etypes)); in add_enctype()
62 if (etypes == NULL) { in add_enctype()
68 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); in add_enctype()
100 if (etypes[j] == key->key_data_type[0]) { in add_enctype()
102 (int)etypes[j]); in add_enctype()
118 ret = krb5_generate_random_keyblock (context, etypes[i], &keyblock); in add_enctype()
120 krb5_warnx(context, "genernate enctype %d failed", (int)etypes[i]); in add_enctype()
127 new_key_data[n].key_data_type[0] = etypes[i]; in add_enctype()
161 free (etypes); in add_enctype()
H A Ddel_enctype.c51 krb5_enctype *etypes; in del_enctype() local
56 etypes = malloc (n_etypes * sizeof(*etypes)); in del_enctype()
57 if (etypes == NULL) { in del_enctype()
63 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); in del_enctype()
95 if (etypes[k] == key->key_data_type[0]) { in del_enctype()
119 free (etypes); in del_enctype()
H A DChangeLog520 * load.c: remove unused etypes code, and add parsing of the
/freebsd/crypto/heimdal/lib/asn1/
H A Dsetchgpw2.asn143 etypes[2] SEQUENCE OF ENCTYPE OPTIONAL,
50 etypes[2] SEQUENCE OF ENCTYPE OPTIONAL
69 etypes[0] SEQUENCE OF ENCTYPE,
124 Req-get-supported-etypes ::= NULL
126 Rep-get-supported-etypes ::= SEQUENCE OF ENCTYPE
128 Err-get-supported-etypes ::= NULL
138 get-supported-etypes[5] Req-get-supported-etypes,
148 get-supported-etypes[5] Rep-get-supported-etypes,
158 get-supported-etypes[5] Err-get-supported-etypes,
H A DChangeLog1273 * k5.asn1: shift the last added etypes one step so rc2 doesn't
/freebsd/crypto/heimdal/lib/krb5/
H A Dcontext.c62 krb5_enctype *etypes = NULL; in set_etypes() local
69 etypes = malloc((i+1) * sizeof(*etypes)); in set_etypes()
70 if (etypes == NULL) { in set_etypes()
81 etypes[k++] = e; in set_etypes()
83 etypes[k] = ETYPE_NULL; in set_etypes()
86 *ret_enctypes = etypes; in set_etypes()
123 free(context->etypes); in init_context_from_config_file()
124 context->etypes = tmptypes; in init_context_from_config_file()
437 krb5_enctype **etypes) in krb5_get_permitted_enctypes() argument
439 return krb5_get_default_in_tkt_etypes(context, KRB5_PDU_NONE, etypes); in krb5_get_permitted_enctypes()
[all …]
H A Dbuild_auth.c40 EtypeList etypes; in make_etypelist() local
48 &etypes.len, &etypes.val, in make_etypelist()
53 ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret); in make_etypelist()
55 free_EtypeList(&etypes); in make_etypelist()
60 free_EtypeList(&etypes); in make_etypelist()
H A Dinit_creds_pw.c42 krb5_enctype *etypes; member
131 if (ctx->etypes) in free_init_creds_ctx()
132 free(ctx->etypes); in free_init_creds_ctx()
355 krb5_enctype *etypes; in get_init_creds_common() local
393 ctx->etypes = NULL; in get_init_creds_common()
437 if (ctx->etypes) in get_init_creds_common()
438 free(ctx->etypes); in get_init_creds_common()
440 etypes = malloc((options->etype_list_length + 1) in get_init_creds_common()
442 if (etypes == NULL) { in get_init_creds_common()
447 memcpy (etypes, options->etype_list, in get_init_creds_common()
[all …]
H A Drd_req.c173 EtypeList *etypes) in find_etypelist() argument
182 etypes->len = 0; in find_etypelist()
183 etypes->val = NULL; in find_etypelist()
213 etypes, in find_etypelist()
349 EtypeList etypes; in krb5_verify_ap_req2() local
464 ret = find_etypelist(context, ac, &etypes); in krb5_verify_ap_req2()
470 if (etypes.val) { in krb5_verify_ap_req2()
473 for (i = 0; i < etypes.len; i++) { in krb5_verify_ap_req2()
474 if (krb5_enctype_valid(context, etypes.val[i]) == 0) { in krb5_verify_ap_req2()
475 ac->keytype = etypes.val[i]; in krb5_verify_ap_req2()
[all …]
H A Dget_in_tkt.c114 enctypes = context->etypes; in add_padata()
149 const krb5_enctype *etypes, in init_as_req() argument
214 etypes); in init_as_req()
367 const krb5_enctype *etypes, in krb5_get_in_cred() argument
404 etypes, in krb5_get_in_cred()
532 const krb5_enctype *etypes, in krb5_get_in_tkt() argument
548 etypes, in krb5_get_in_tkt()
H A Dkrb5_locl.h253 krb5_enctype *etypes; member
/freebsd/crypto/heimdal/admin/
H A Dget.c91 krb5_enctype *etypes = NULL; in kt_get() local
105 etypes = malloc (opt->enctypes_strings.num_strings * sizeof(*etypes)); in kt_get()
106 if (etypes == NULL) { in kt_get()
114 &etypes[i]); in kt_get()
213 if (keys[j].keytype == etypes[k]) { in kt_get()
234 free(etypes); in kt_get()
/freebsd/crypto/heimdal/lib/hdb/
H A Dhdb-ldap.c687 if (ent->entry.etypes) { in LDAP_entry2mods()
709 for (i = 0; i < ent->entry.etypes->len; i++) { in LDAP_entry2mods()
717 ent->entry.etypes->val[i]); in LDAP_entry2mods()
1053 ent->entry.etypes = malloc(sizeof(*(ent->entry.etypes))); in LDAP_message2entry()
1054 if (ent->entry.etypes == NULL) { in LDAP_message2entry()
1059 ent->entry.etypes->len = ldap_count_values_len(vals); in LDAP_message2entry()
1060 ent->entry.etypes->val = calloc(ent->entry.etypes->len, sizeof(int)); in LDAP_message2entry()
1061 if (ent->entry.etypes in LDAP_message2entry()
1091 unsigned *etypes; LDAP_message2entry() local
[all...]
H A Dhdb.asn1130 etypes[11] SEQUENCE OF INTEGER (0..4294967295) OPTIONAL,
/freebsd/crypto/heimdal/kdc/
H A Dkerberos5.c128 krb5_enctype *etypes, unsigned len, in _kdc_find_etype() argument
168 if (p[i] != etypes[j]) in _kdc_find_etype()
202 if (krb5_enctype_valid(context, etypes[i]) != 0 && in _kdc_find_etype()
203 !_kdc_is_weak_exception(princ->entry.principal, etypes[i])) in _kdc_find_etype()
206 while (hdb_next_enctype2key(context, &princ->entry, etypes[i], &key) == 0) { in _kdc_find_etype()
214 *ret_enctype = etypes[i]; in _kdc_find_etype()
/freebsd/crypto/heimdal/
H A DChangeLog.1999233 (init_context_from_config_file): set both `etypes' and `etypes_des'
644 * lib/krb5/crypto.c (etypes): remove NEW_DES3_CODE, enable
1288 (etypes): add F_PSEUDO flags
2054 * lib/krb5/get_in_tkt.c (krb5_init_etype): etypes are now `int'
H A DChangeLog.2002551 requested KDC-REQ etypes
H A DChangeLog.2000677 * lib/krb5/krb5.h: change some funny etypes to use negative
H A DChangeLog.2004667 case, make sure ent->etypes are allocated, From: Andrew Bartlett
H A DChangeLog.20031669 * lib/krb5/krb5.conf.5: documentation for of boolean, etypes,
H A DChangeLog.20061028 to support not-as-good etypes for the krbtgt.
H A DChangeLog.199853 etypes