/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encode_kdc.c | 57 if (!krb5_c_valid_enctype(dec_rep->enc_part.enctype)) in krb5_encode_kdc_rep() 99 &dec_rep->enc_part); in krb5_encode_kdc_rep() 102 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \ in krb5_encode_kdc_rep() 103 dec_rep->enc_part.ciphertext.length); \ in krb5_encode_kdc_rep() 104 free(dec_rep->enc_part.ciphertext.data); \ in krb5_encode_kdc_rep() 105 dec_rep->enc_part.ciphertext.length = 0; \ in krb5_encode_kdc_rep() 106 dec_rep->enc_part.ciphertext.data = 0;} in krb5_encode_kdc_rep()
|
H A D | mk_priv.c | 50 privmsg.enc_part.kvno = 0; /* XXX allow user-set? */ in krb5_mk_priv_basic() 51 privmsg.enc_part.enctype = keyblock->enctype; in krb5_mk_priv_basic() 71 privmsg.enc_part.ciphertext.length = enclen; in krb5_mk_priv_basic() 72 if (!(privmsg.enc_part.ciphertext.data = in krb5_mk_priv_basic() 73 malloc(privmsg.enc_part.ciphertext.length))) { in krb5_mk_priv_basic() 91 scratch1, &privmsg.enc_part))) in krb5_mk_priv_basic() 102 memset(privmsg.enc_part.ciphertext.data, 0, in krb5_mk_priv_basic() 103 privmsg.enc_part.ciphertext.length); in krb5_mk_priv_basic() 104 free(privmsg.enc_part.ciphertext.data); in krb5_mk_priv_basic() 105 privmsg.enc_part.ciphertext.length = 0; in krb5_mk_priv_basic() [all …]
|
H A D | mk_rep.c | 78 scratch, &reply.enc_part))) in krb5_mk_rep() 86 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); in krb5_mk_rep() 87 free(reply.enc_part.ciphertext.data); in krb5_mk_rep() 88 reply.enc_part.ciphertext.length = 0; in krb5_mk_rep() 89 reply.enc_part.ciphertext.data = 0; in krb5_mk_rep()
|
H A D | decrypt_tk.c | 50 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) in krb5_decrypt_tkt_part() 53 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part() 54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part() 60 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part()
|
H A D | kdc_rep_dc.c | 55 scratch.length = dec_rep->enc_part.ciphertext.length; in krb5_kdc_rep_decrypt_proc() 56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { in krb5_kdc_rep_decrypt_proc() 62 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part, in krb5_kdc_rep_decrypt_proc()
|
H A D | copy_tick.c | 109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); in krb5_copy_ticket() 115 tempto->enc_part.ciphertext = *scratch; in krb5_copy_ticket() 119 krb5_xfree(tempto->enc_part.ciphertext.data); in krb5_copy_ticket()
|
H A D | rd_rep.c | 61 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep() 69 &reply->enc_part, &scratch))) in krb5_rd_rep()
|
H A D | rd_req_dec.c | 79 enctype = req->ticket->enc_part.enctype; in krb5_rd_req_decrypt_tkt_part() 84 req->ticket->enc_part.kvno, in krb5_rd_req_decrypt_tkt_part() 110 req->ticket->enc_part.kvno, in krb5_rd_req_decrypt_tkt_part() 361 etype = req->ticket->enc_part.enctype)) || in krb5_rd_req_decoded_opt() 382 req->ticket->enc_part.enctype) in krb5_rd_req_decoded_opt() 387 if (krb5_enctype_to_string(req->ticket->enc_part.enctype, in krb5_rd_req_decoded_opt()
|
H A D | rd_priv.c | 85 scratch.length = privmsg->enc_part.ciphertext.length; in krb5_rd_priv_basic() 94 &privmsg->enc_part, &scratch))) in krb5_rd_priv_basic() 148 krb5_xfree(privmsg->enc_part.ciphertext.data); in krb5_rd_priv_basic()
|
H A D | rd_cred.c | 26 scratch.length = pcred->enc_part.ciphertext.length; in decrypt_credencdata() 33 &pcred->enc_part, &scratch))) in decrypt_credencdata() 37 (void) memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length); in decrypt_credencdata()
|
H A D | encrypt_tk.c | 63 &dec_ticket->enc_part); in krb5_encrypt_tkt_part()
|
H A D | get_in_tkt.c | 266 retval = (*key_proc)(context, as_reply->enc_part.enctype, in decrypt_as_reply() 289 as_reply->enc_part.enctype)) { in decrypt_as_reply() 291 decrypt_key->enctype = as_reply->enc_part.enctype; in decrypt_as_reply() 1406 local_as_reply->enc_part.enctype, in krb5_get_init_creds()
|
H A D | mk_cred.c | 141 &pcred->enc_part); in krb5_mk_ncred_basic()
|
H A D | preauth.c | 343 if ((retval = (*key_proc)(context, as_reply->enc_part.enctype, in process_pw_salt()
|
/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 92 ticket_reply.enc_part.ciphertext.data = 0; in process_as_req() 361 ticket_reply.enc_part.kvno = server_key->key_data_kvno; in process_as_req() 433 reply.enc_part.enctype = encrypting_key.enctype; in process_as_req() 439 reply.enc_part.kvno = client_key->key_data_kvno; in process_as_req() 448 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); in process_as_req() 449 free(reply.enc_part.ciphertext.data); in process_as_req() 547 if (ticket_reply.enc_part.ciphertext.data) { in process_as_req() 548 memset(ticket_reply.enc_part.ciphertext.data , 0, in process_as_req() 549 ticket_reply.enc_part.ciphertext.length); in process_as_req() 550 free(ticket_reply.enc_part.ciphertext.data); in process_as_req()
|
H A D | do_tgs_req.c | 600 ticket_reply.enc_part.kvno = 0; in process_tgs_req() 601 ticket_reply.enc_part.enctype = t2enc->session->enctype; in process_tgs_req() 636 ticket_reply.enc_part.kvno = server_key->key_data_kvno; in process_tgs_req() 643 reply.enc_part.kvno = 0; /* We are using the session key */ in process_tgs_req() 671 reply.enc_part.enctype = subkey ? subkey->enctype : in process_tgs_req() 684 if (ticket_reply.enc_part.ciphertext.data) { in process_tgs_req() 685 memset(ticket_reply.enc_part.ciphertext.data, 0, in process_tgs_req() 686 ticket_reply.enc_part.ciphertext.length); in process_tgs_req() 687 free(ticket_reply.enc_part.ciphertext.data); in process_tgs_req() 688 ticket_reply.enc_part.ciphertext.data = NULL; in process_tgs_req() [all …]
|
H A D | kdc_util.c | 417 ticket->enc_part.enctype, -1, in kdc_get_server_key() 418 ticket->enc_part.kvno, &server_key); in kdc_get_server_key() 1583 sprintf(s, "etypes {rep=%ld", (long)rep->enc_part.enctype); in rep_etypes2str() 1586 sprintf(stmp, " tkt=%ld", (long)rep->ticket->enc_part.enctype); in rep_etypes2str()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 64 if (val->enc_part.ciphertext.data) { in krb5_free_ap_rep() 65 krb5_xfree(val->enc_part.ciphertext.data); in krb5_free_ap_rep() 66 val->enc_part.ciphertext.data = 0; in krb5_free_ap_rep() 165 if (val->enc_part.ciphertext.data) { in krb5_free_cred() 166 krb5_xfree(val->enc_part.ciphertext.data); in krb5_free_cred() 167 val->enc_part.ciphertext.data = 0; in krb5_free_cred() 353 if (val->enc_part.ciphertext.data) { in krb5_free_kdc_rep() 354 krb5_xfree(val->enc_part.ciphertext.data); in krb5_free_kdc_rep() 355 val->enc_part.ciphertext.data = 0; in krb5_free_kdc_rep() 530 if (val->enc_part.ciphertext.data) { in krb5_free_priv() [all …]
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 213 FIELDOF_NORM(krb5_ticket, encrypted_data, enc_part, 3), 800 FIELDOF_NORM(krb5_kdc_rep, encrypted_data, enc_part, 6), 825 FIELDOF_NORM(krb5_kdc_rep, encrypted_data, enc_part, 6), 863 FIELDOF_NORM(krb5_ap_rep, encrypted_data, enc_part, 2), 962 FIELDOF_NORM(krb5_priv, encrypted_data, enc_part, 3), 1004 FIELDOF_NORM(krb5_cred, encrypted_data, enc_part, 3), 1203 FIELDOF_NORM( krb5_fast_armored_req, encrypted_data, enc_part, 2),
|
H A D | krb5_decode.c | 265 get_field((*rep)->enc_part,3,asn1_decode_encrypted_data); in decode_krb5_ticket() 432 get_field((*rep)->enc_part,2,asn1_decode_encrypted_data); in decode_krb5_ap_rep() 593 get_field((*rep)->enc_part,3,asn1_decode_encrypted_data); in decode_krb5_priv() 648 get_field((*rep)->enc_part,3,asn1_decode_encrypted_data); in decode_krb5_cred()
|
H A D | asn1_k_decode.c | 596 get_field(val->enc_part,3,asn1_decode_encrypted_data); in asn1_decode_ticket() 719 get_field(val->enc_part,6,asn1_decode_encrypted_data); in asn1_decode_kdc_rep()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 1086 krb5_enc_data enc_part; /* encryption type, kvno, encrypted member 1189 krb5_enc_data enc_part; /* encryption type, kvno, encrypted member 1219 krb5_enc_data enc_part; member 1263 krb5_enc_data enc_part; /* encrypted part */ member
|
H A D | k5-int.h | 1186 krb5_enc_data enc_part; member 1727 krb5_enc_data enc_part; /* encrypted part */ member
|
/titanic_41/usr/src/cmd/krb5/klist/ |
H A D | klist.c | 674 etype_string(tkt->enc_part.enctype));
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 585 request->ticket->enc_part.kvno,
|