| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | send_tgs.c | 134 krb5_pa_data **padata = NULL, *pa; in k5_make_tgs_req() local 242 padata = k5calloc(count + 2, sizeof(krb5_pa_data *), &ret); in k5_make_tgs_req() 243 if (padata == NULL) in k5_make_tgs_req() 245 padata[0] = k5alloc(sizeof(krb5_pa_data), &ret); in k5_make_tgs_req() 246 if (padata[0] == NULL) in k5_make_tgs_req() 248 padata[0]->pa_type = KRB5_PADATA_AP_REQ; in k5_make_tgs_req() 249 padata[0]->contents = k5memdup(ap_req_asn1->data, ap_req_asn1->length, in k5_make_tgs_req() 251 if (padata[0] == NULL) in k5_make_tgs_req() 253 padata[0]->length = ap_req_asn1->length; in k5_make_tgs_req() 268 padata[i + 1] = pa; in k5_make_tgs_req() [all …]
|
| H A D | fast.c | 158 state->fast_outer_request.padata = NULL; in krb5int_fast_prep_req_body() 273 assert(state->fast_outer_request.padata == NULL); in krb5int_fast_prep_req() 282 if (fast_req.req_body->padata == NULL) { in krb5int_fast_prep_req() 283 fast_req.req_body->padata = calloc(1, sizeof(krb5_pa_data *)); in krb5int_fast_prep_req() 284 if (fast_req.req_body->padata == NULL) in krb5int_fast_prep_req() 289 && (tgs = krb5int_find_pa_data(context, fast_req.req_body->padata, in krb5int_fast_prep_req() 291 krb5_pa_data **paptr = &fast_req.req_body->padata[0]; in krb5int_fast_prep_req() 326 retval = make_tgs_outer_padata(tgs, pa, request->padata, in krb5int_fast_prep_req() 328 state->fast_outer_request.padata = pa_tgs_array; in krb5int_fast_prep_req() 331 state->fast_outer_request.padata = pa_array; in krb5int_fast_prep_req() [all …]
|
| H A D | get_etype_info.c | 45 krb5_pa_data **padata = NULL; in get_from_error() local 51 ret = krb5int_fast_process_error(context, icc->fast_state, &error, &padata, in get_from_error() 59 ret = k5_get_etype_info(context, icc, padata); in get_from_error() 62 krb5_free_pa_data(context, padata); in get_from_error() 83 ret = k5_get_etype_info(context, icc, asrep->padata); in get_from_reply()
|
| H A D | get_in_tkt.c | 40 krb5_pa_data **padata); 160 pa = krb5int_find_pa_data(context, reply->padata, KRB5_PADATA_PKINIT_KX); in verify_anonymous() 404 krb5_pa_data **padata) in sort_krb5_padata_sequence() argument 414 if ((padata == NULL) || (padata[0] == NULL)) { in sort_krb5_padata_sequence() 428 for (i = 0; padata[i]; i++) { in sort_krb5_padata_sequence() 429 fprintf (stderr, " %d", padata[i]->pa_type); in sort_krb5_padata_sequence() 443 for (i = base; padata[i] != NULL; i++) { in sort_krb5_padata_sequence() 445 if (padata[i]->pa_type == l) { in sort_krb5_padata_sequence() 446 tmp = padata[i]; in sort_krb5_padata_sequence() 448 padata[j] = padata[j - 1]; in sort_krb5_padata_sequence() [all …]
|
| H A D | s4u_creds.c | 147 krb5_pa_data *padata; in build_pa_for_user() local 169 padata = malloc(sizeof(*padata)); in build_pa_for_user() 170 if (padata == NULL) { in build_pa_for_user() 175 padata->magic = KV5M_PA_DATA; in build_pa_for_user() 176 padata->pa_type = KRB5_PADATA_FOR_USER; in build_pa_for_user() 177 padata->length = for_user_data->length; in build_pa_for_user() 178 padata->contents = (krb5_octet *)for_user_data->data; in build_pa_for_user() 183 *out_padata = padata; in build_pa_for_user() 244 assert(tgsreq->padata != NULL); in build_pa_s4u_x509_user() 245 for (i = 0; tgsreq->padata[i] != NULL; i++) { in build_pa_s4u_x509_user() [all …]
|
| H A D | preauth_ec.c | 53 krb5_data *encoded_previous_request, krb5_pa_data *padata, in ec_process() argument 64 if (retval == 0 && padata->length) { in ec_process() 67 scratch.length = padata->length; in ec_process() 68 scratch.data = (char *) padata->contents; in ec_process()
|
| H A D | preauth_sam2.c | 84 krb5_data *encoded_previous_request, krb5_pa_data *padata, in sam2_process() argument 109 tmp_data.length = padata->length; in sam2_process() 110 tmp_data.data = (char *)padata->contents; in sam2_process()
|
| H A D | preauth2.c | 744 krb5_pa_data **padata) in get_salt() argument 752 pa = krb5int_find_pa_data(context, padata, KRB5_PADATA_PW_SALT); in get_salt() 754 pa = krb5int_find_pa_data(context, padata, KRB5_PADATA_AFS3_SALT); in get_salt() 791 krb5_pa_data **padata) in k5_get_etype_info() argument 802 pa = krb5int_find_pa_data(context, padata, KRB5_PADATA_ETYPE_INFO2); in k5_get_etype_info() 807 pa = krb5int_find_pa_data(context, padata, KRB5_PADATA_ETYPE_INFO); in k5_get_etype_info() 816 return get_salt(context, ctx, padata); in k5_get_etype_info()
|
| H A D | fast.h | 104 krb5_pa_data **padata);
|
| H A D | gc_via_tkt.c | 310 *out_padata = dec_rep->padata; in krb5int_process_tgs_reply() 311 dec_rep->padata = NULL; in krb5int_process_tgs_reply()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | get_in_tkt.c | 250 ALLOC(a->padata, 1); in init_as_req() 251 if(a->padata == NULL) { in init_as_req() 256 a->padata->val = NULL; in init_as_req() 257 a->padata->len = 0; in init_as_req() 275 ret = add_padata(context, a->padata, creds->client, in init_as_req() 287 a->padata = NULL; in init_as_req() 289 ALLOC(a->padata, 1); in init_as_req() 290 if (a->padata == NULL) { in init_as_req() 295 a->padata->len = 0; in init_as_req() 296 a->padata->val = NULL; in init_as_req() [all …]
|
| H A D | get_cred.c | 53 PA_DATA *padata, in make_pa_tgs_req() argument 71 &padata->padata_value, in make_pa_tgs_req() 78 padata->padata_type = KRB5_PADATA_TGS_REQ; in make_pa_tgs_req() 149 const METHOD_DATA *padata, in init_tgs_req() argument 226 ALLOC(t->padata, 1); in init_tgs_req() 227 if (t->padata == NULL) { in init_tgs_req() 232 ALLOC_SEQ(t->padata, 1 + padata->len); in init_tgs_req() 233 if (t->padata->val == NULL) { in init_tgs_req() 240 for (i = 0; i < padata->len; i++) { in init_tgs_req() 241 ret = copy_PA_DATA(&padata->val[i], &t->padata->val[i + 1]); in init_tgs_req() [all …]
|
| H A D | ticket.c | 391 if (rep->kdc_rep.padata == NULL) in check_server_referral() 394 pa = krb5_find_padata(rep->kdc_rep.padata->val, in check_server_referral() 395 rep->kdc_rep.padata->len, in check_server_referral() 522 if (rep->kdc_rep.padata == NULL) in check_client_referral() 525 pa = krb5_find_padata(rep->kdc_rep.padata->val, in check_client_referral() 526 rep->kdc_rep.padata->len, in check_client_referral()
|
| H A D | init_creds_pw.c | 712 a->padata = NULL; in init_as_req() 1266 if (rep->padata) { in process_pa_data_to_key() 1269 rep->padata); in process_pa_data_to_key() 1283 if (rep->padata) { in process_pa_data_to_key() 1285 pa = krb5_find_padata(rep->padata->val, in process_pa_data_to_key() 1286 rep->padata->len, in process_pa_data_to_key() 1291 pa = krb5_find_padata(rep->padata->val, in process_pa_data_to_key() 1292 rep->padata->len, in process_pa_data_to_key() 1806 if (ctx->as_req.padata) { in krb5_init_creds_step() 1807 free_METHOD_DATA(ctx->as_req.padata); in krb5_init_creds_step() [all …]
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | kdc_preauth.c | 693 if (request->padata != NULL) { in sort_pa_order() 699 if (pa_list_includes(request->padata, in sort_pa_order() 703 if (pa_list_includes(request->padata, in sort_pa_order() 843 if (krb5int_find_pa_data(context, rock->request->padata, in add_freshness_token() 1071 krb5_pa_data **padata; member 1159 if (krb5int_find_pa_data(context, state->request->padata, in maybe_add_etype_info2() 1293 if (!state->padata) in next_padata() 1294 state->padata = state->request->padata; in next_padata() 1296 state->padata++; in next_padata() 1298 if (!*state->padata) { in next_padata() [all …]
|
| H A D | fast_util.c | 150 fast_padata = krb5int_find_pa_data(context, request->padata, in kdc_find_fast() 303 fast_response.padata = rep->padata; in kdc_fast_response_handle_padata() 304 if (fast_response.padata == NULL) in kdc_fast_response_handle_padata() 305 fast_response.padata = &empty_padata[0]; in kdc_fast_response_handle_padata() 335 krb5_free_pa_data(context, rep->padata); in kdc_fast_response_handle_padata() 336 rep->padata = pa_array; in kdc_fast_response_handle_padata() 403 resp.padata = inner_pa; in kdc_fast_handle_error() 559 pa = krb5int_find_pa_data(context, req->padata, KRB5_PADATA_FX_COOKIE); in kdc_fast_read_cookie() 597 if (is_relevant(cookie->data, req->padata)) in kdc_fast_read_cookie()
|
| /freebsd/crypto/krb5/src/lib/krb5/os/ |
| H A D | t_trace.c | 66 krb5_pa_data padata, padata2, **padatap; in main() local 190 padatap[0] = &padata; in main() 193 padata.magic = 0; in main() 194 padata.pa_type = KRB5_PADATA_NONE; in main() 195 padata.length = oct_length; in main() 196 padata.contents = oct; in main() 197 padata2 = padata; in main() 198 padata.pa_type = KRB5_PADATA_PW_SALT; in main()
|
| H A D | trace.c | 189 krb5_pa_data **padata; in trace_format() local 314 padata = va_arg(ap, krb5_pa_data **); in trace_format() 315 if (padata == NULL || *padata == NULL) in trace_format() 317 for (; padata != NULL && *padata != NULL; padata++) { in trace_format() 318 pa_type = (*padata)->pa_type; in trace_format() 325 if (*(padata + 1) != NULL) in trace_format()
|
| H A D | t_trace.ref | 41 krb5_pa_data **, display list of padata type numbers: PA-PW-SALT (3), 0 42 krb5_pa_data **, display list of padata type numbers: (empty)
|
| /freebsd/crypto/krb5/src/plugins/audit/ |
| H A D | kdc_j_encode.c | 688 krb5_pa_data **padata; in req_to_value() local 732 if (ev_success == TRUE && req->padata) { in req_to_value() 736 for (padata = req->padata; *padata; padata++) { in req_to_value() 737 if (strlen(map_patype((*padata)->pa_type)) > 1) { in req_to_value() 738 ret = k5_json_string_create(map_patype((*padata)->pa_type), in req_to_value() 786 krb5_pa_data **padata; in rep_to_value() local 801 if (rep->padata) { in rep_to_value() 805 for (padata = rep->padata; *padata; padata++) { in rep_to_value() 806 if (strlen(map_patype((*padata)->pa_type)) > 1) { in rep_to_value() 807 ret = k5_json_string_create(map_patype((*padata)->pa_type), in rep_to_value()
|
| /freebsd/crypto/krb5/src/plugins/preauth/test/ |
| H A D | cltest.c | 187 krb5_pa_data **padata, krb5_prompter_fct prompter, in test_tryagain() argument 200 for (i = 0; padata[i] != NULL; i++) { in test_tryagain() 201 if (padata[i]->pa_type == TEST_PA_TYPE) in test_tryagain() 202 printf("tryagain: %.*s\n", padata[i]->length, padata[i]->contents); in test_tryagain()
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | kerberos5.c | 74 if (req->padata == NULL) in _kdc_find_padata() 77 while((size_t)*start < req->padata->len){ in _kdc_find_padata() 79 if(req->padata->val[*start - 1].padata_type == (unsigned)type) in _kdc_find_padata() 80 return &req->padata->val[*start - 1]; in _kdc_find_padata() 277 METHOD_DATA *padata) in log_patypes() argument 283 for (i = 0; i < padata->len; i++) { in log_patypes() 284 switch(padata->val[i].padata_type) { in log_patypes() 298 p = rk_strpoolprintf(p, "%d", padata->val[i].padata_type); in log_patypes() 301 if (p && i + 1 < padata->len) in log_patypes() 990 ALLOC(rep.padata); in _kdc_as_rep() [all …]
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | k5-trace.h | 328 #define TRACE_PREAUTH_INPUT(c, padata) \ argument 329 TRACE(c, "Processing preauth types: {patypes}", padata) 330 #define TRACE_PREAUTH_OUTPUT(c, padata) \ argument 331 TRACE(c, "Produced preauth for next request: {patypes}", padata) 343 #define TRACE_PREAUTH_TRYAGAIN_INPUT(c, patype, padata) \ argument 344 TRACE(c, "Preauth tryagain input types ({int}): {patypes}", patype, padata) 348 #define TRACE_PREAUTH_TRYAGAIN_OUTPUT(c, padata) \ argument 349 TRACE(c, "Followup preauth for next request: {patypes}", padata)
|
| /freebsd/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | spake_kdc.c | 221 krb5_pa_data **padata = NULL, *pa; in send_challenge() local 270 ret = convert_to_padata(der_msg, &padata); in send_challenge() 285 pa = (padata == NULL) ? NULL : padata[0]; in send_challenge() 286 free(padata); in send_challenge() 292 (*vrespond)(arg, ret, NULL, padata, NULL); in send_challenge()
|
| /freebsd/crypto/heimdal/lib/asn1/ |
| H A D | krb5.asn1 | 419 padata-type[1] PADATA-TYPE, 420 padata-value[2] OCTET STRING 469 padata[3] METHOD-DATA OPTIONAL, 476 -- padata-type ::= PA-ENC-TIMESTAMP 477 -- padata-value ::= EncryptedData - PA-ENC-TS-ENC 496 padata[2] METHOD-DATA OPTIONAL, 774 padata [1] SEQUENCE OF PA-DATA, 807 padata [0] SEQUENCE OF PA-DATA,
|