/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_tgs_req.c | 121 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) { in process_tgs_req() 131 (errcode2 = krb5_unparse_name(kdc_context, in process_tgs_req() 163 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server, in process_tgs_req() 180 if (krb5_princ_size(kdc_context, request->server) == 2) { in process_tgs_req() 182 krb5_princ_component(kdc_context, request->server, 1); in process_tgs_req() 184 krb5_princ_component(kdc_context, tgs_server, 1); in process_tgs_req() 188 krb5_db_free_principal(kdc_context, &server, nprincs); in process_tgs_req() 196 krb5_db_free_principal(kdc_context, &server, nprincs); in process_tgs_req() 202 if ((errcode = krb5_timeofday(kdc_context, &kdc_time))) { in process_tgs_req() 241 errcode = krb5_decrypt_tkt_part(kdc_context, st_sealing_key, in process_tgs_req() [all …]
|
H A D | do_as_req.c | 116 if ((errcode = krb5_unparse_name(kdc_context, request->client, &cname))) { in process_as_req() 126 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) { in process_as_req() 133 if ((errcode = krb5_db_get_principal(kdc_context, request->client, in process_as_req() 154 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server, in process_as_req() 169 if ((errcode = krb5_timeofday(kdc_context, &kdc_time))) { in process_as_req() 185 if ((useenctype = select_session_keytype(kdc_context, &server, in process_as_req() 194 if ((errcode = krb5_c_make_random_key(kdc_context, useenctype, in process_as_req() 293 errcode = check_padata(kdc_context, &client, req_pkt, request, in process_as_req() 336 if ((errcode = krb5_dbe_find_enctype(kdc_context, &server, in process_as_req() 347 if ((errcode = krb5_dbekd_decrypt_key_data(kdc_context, &master_keyblock, in process_as_req() [all …]
|
H A D | kdc_util.c | 117 krb5_free_authdata(kdc_context, retdata); in concat_authorization_data() 125 krb5_free_authdata(kdc_context, retdata); in concat_authorization_data() 142 krb5_data *realm1 = krb5_princ_realm(kdc_context, princ1); in realm_compare() 143 krb5_data *realm2 = krb5_princ_realm(kdc_context, princ2); in realm_compare() 155 if ((krb5_princ_size(kdc_context, principal) > 0) && in krb5_is_tgs_principal() 156 (krb5_princ_component(kdc_context, principal, 0)->length == in krb5_is_tgs_principal() 158 (!memcmp(krb5_princ_component(kdc_context, principal, 0)->data, in krb5_is_tgs_principal() 242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != in kdc_process_tgs_req() 243 krb5_princ_realm(kdc_context, tgs_server)->length) || in kdc_process_tgs_req() 244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, in kdc_process_tgs_req() [all …]
|
H A D | replay.c | 77 if (krb5_timeofday(kdc_context, &timenow) || in kdc_check_lookaside() 78 krb5_db_get_age(kdc_context, 0, &db_age)) in kdc_check_lookaside() 94 if (krb5_copy_data(kdc_context, eptr->reply_packet, outpkt)) in kdc_check_lookaside() 104 krb5_free_data(kdc_context, eptr->req_packet); in kdc_check_lookaside() 105 krb5_free_data(kdc_context, eptr->reply_packet); in kdc_check_lookaside() 129 if (krb5_timeofday(kdc_context, &timenow) || in kdc_insert_lookaside() 130 krb5_db_get_age(kdc_context, 0, &db_age)) in kdc_insert_lookaside() 144 if (krb5_copy_data(kdc_context, inpkt, &eptr->req_packet)) { in kdc_insert_lookaside() 148 if (krb5_copy_data(kdc_context, outpkt, &eptr->reply_packet)) { in kdc_insert_lookaside() 149 krb5_free_data(kdc_context, eptr->req_packet); in kdc_insert_lookaside()
|
H A D | dispatch.c | 83 krb5_c_random_os_entropy(kdc_context, 0, NULL); in dispatch() 90 krb5_c_random_add_entropy(kdc_context, in dispatch() 108 krb5_free_kdc_req(kdc_context, as_req); in dispatch()
|
H A D | kdc_preauth.c | 839 retval = (ap->get_edata)(kdc_context, request, client, server, in get_preauth_hint_list() 863 krb5_free_pa_data(kdc_context, pa_data); in get_preauth_hint_list() 1654 if ((retval = krb5_principal2salt_norealm(kdc_context, in return_pw_salt() 1668 scratch = krb5_princ_realm(kdc_context, request->client); in return_pw_salt() 1678 scratch = krb5_princ_realm(kdc_context, request->client); in return_pw_salt() 1897 retval = krb5_copy_principal(kdc_context, request->client, &newp); in get_sam_edata() 1906 krb5_princ_name(kdc_context, newp) = in get_sam_edata() 1907 realloc(krb5_princ_name(kdc_context, newp), in get_sam_edata() 1911 krb5_princ_component(kdc_context,newp,probeslot)->data = sam_ptr->name; in get_sam_edata() 1912 krb5_princ_component(kdc_context,newp,probeslot)->length = in get_sam_edata() [all …]
|
H A D | network.c | 770 krb5_free_data(kdc_context, response); in process_packet() 780 krb5_free_data(kdc_context, response); in process_packet() 785 krb5_free_data(kdc_context, response); in process_packet() 894 krb5_free_data(kdc_context, conn->u.tcp.response); in kill_tcp_connection() 919 retval = krb5_us_timeofday(kdc_context, &errpkt.stime, &errpkt.susec); in make_toolong_error() 934 retval = krb5_mk_error(kdc_context, &errpkt, scratch); in make_toolong_error() 1094 krb5_klog_reopen(kdc_context); in listen_and_process()
|
H A D | extern.h | 91 #define kdc_context kdc_active_realm->realm_context macro
|
H A D | main.c | 434 return krb5_c_make_random_key(kdc_context, ENCTYPE_DES_CBC_MD5, &psr_key); 845 krb5_klog_close(kdc_context);
|