Home
last modified time | relevance | path

Searched refs:permitted_etypes (Results 1 – 4 of 4) sorted by relevance

/titanic_41/usr/src/cmd/krb5/kadmin/cli/
H A Dkeytab.c270 krb5_key_salt_tuple *permitted_etypes = NULL; in add_principal() local
300 permitted_etypes = (krb5_key_salt_tuple *)malloc ( in add_principal()
302 if (permitted_etypes == NULL) { in add_principal()
314 permitted_etypes[i].ks_enctype = ktypes[i]; in add_principal()
315 permitted_etypes[i].ks_salttype = salttype; in add_principal()
324 permitted_etypes = ks_tuple; in add_principal()
329 keepold, nktypes, permitted_etypes, in add_principal()
355 et = permitted_etypes[0].ks_enctype; in add_principal()
361 et = permitted_etypes[i].ks_enctype; in add_principal()
418 if (permitted_etypes != NULL && ks_tuple == NULL) in add_principal()
[all …]
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drd_req_dec.c357 } else if ((*auth_context)->permitted_etypes == NULL) { in krb5_rd_req_decoded_opt()
380 for (i=0; (*auth_context)->permitted_etypes[i]; i++) in krb5_rd_req_decoded_opt()
381 if ((*auth_context)->permitted_etypes[i] == in krb5_rd_req_decoded_opt()
384 if (!(*auth_context)->permitted_etypes[i]) { in krb5_rd_req_decoded_opt()
396 for (i=0; (*auth_context)->permitted_etypes[i]; i++) in krb5_rd_req_decoded_opt()
397 if ((*auth_context)->permitted_etypes[i] == in krb5_rd_req_decoded_opt()
400 if (!(*auth_context)->permitted_etypes[i]) { in krb5_rd_req_decoded_opt()
413 for (i=0; (*auth_context)->permitted_etypes[i]; i++) in krb5_rd_req_decoded_opt()
414 if ((*auth_context)->permitted_etypes[i] == in krb5_rd_req_decoded_opt()
417 if (!(*auth_context)->permitted_etypes[i]) { in krb5_rd_req_decoded_opt()
H A Dauth_con.c76 if (auth_context->permitted_etypes) in krb5_auth_con_free()
77 krb5_xfree(auth_context->permitted_etypes); in krb5_auth_con_free()
360 if (auth_context->permitted_etypes) in krb5_auth_con_setpermetypes()
361 krb5_xfree(auth_context->permitted_etypes); in krb5_auth_con_setpermetypes()
363 auth_context->permitted_etypes = newpe; in krb5_auth_con_setpermetypes()
378 if (! auth_context->permitted_etypes) { in krb5_auth_con_getpermetypes()
383 for (i=0; auth_context->permitted_etypes[i]; i++) in krb5_auth_con_getpermetypes()
393 memcpy(newpe, auth_context->permitted_etypes, i*sizeof(krb5_enctype)); in krb5_auth_con_getpermetypes()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dauth_con.h23 krb5_enctype * permitted_etypes; /* rd_req */ member