• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-12-stable/crypto/heimdal/lib/krb5/

Lines Matching refs:context

62 unsupported_enctype(krb5_context context, krb5_enctype etype)
67 ret = krb5_enctype_to_string(context, etype, &name);
71 krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
83 krb5_enctype_keysize(krb5_context context,
89 return unsupported_enctype (context, type);
96 krb5_enctype_keybits(krb5_context context,
102 return unsupported_enctype (context, type);
109 krb5_generate_random_keyblock(krb5_context context,
116 return unsupported_enctype (context, type);
123 (*et->keytype->random_key)(context, key);
131 _key_schedule(krb5_context context,
139 return unsupported_enctype (context,
151 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
160 (*kt->schedule)(context, kt, key);
169 SHA1_checksum(krb5_context context,
177 krb5_abortx(context, "sha1 checksum failed");
183 _krb5_internal_hmac(krb5_context context,
208 (*cm->checksum)(context,
225 (*cm->checksum)(context, keyblock, ipad, cm->blocksize + len,
229 (*cm->checksum)(context, keyblock, opad,
240 krb5_hmac(krb5_context context,
253 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
262 ret = _krb5_internal_hmac(context, c, data, len, usage, &kd, result);
265 krb5_free_data(context, kd.schedule);
271 _krb5_SP_HMAC_SHA1_checksum(krb5_context context,
286 ret = _krb5_internal_hmac(context, c, data, len, usage, key, &res);
288 krb5_abortx(context, "hmac failed");
314 get_checksum_key(krb5_context context,
323 ret = _get_derived_key(context, crypto, usage, key);
329 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
332 ret = krb5_copy_keyblock(context, crypto->key.key, &(*key)->key);
341 ret = _key_schedule(context, *key);
346 create_checksum (krb5_context context,
359 krb5_clear_error_message (context);
364 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
366 "crypto context (key) was passed in", ""),
371 ret = get_checksum_key(context, crypto, usage, ct, &dkey);
380 return (*ct->checksum)(context, dkey, data, len, usage, result);
391 krb5_create_checksum(krb5_context context,
412 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
420 _krb5_usage2arcfour(context, &keyusage);
424 return create_checksum(context, ct, crypto, keyusage,
429 verify_checksum(krb5_context context,
444 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
450 krb5_clear_error_message (context);
451 krb5_set_error_message(context, KRB5KRB_AP_ERR_BAD_INTEGRITY,
463 krb5_set_error_message(context, KRB5_PROG_SUMTYPE_NOSUPP,
465 "crypto context (key) was passed in", ""),
471 krb5_set_error_message(context, KRB5_PROG_SUMTYPE_NOSUPP,
479 ret = get_checksum_key(context, crypto, usage, ct, &dkey);
491 ret = (*ct->verify)(context, dkey, data, len, usage, cksum);
493 krb5_set_error_message(context, ret,
504 ret = (*ct->checksum)(context, dkey, data, len, usage, &c);
512 krb5_set_error_message(context, ret,
524 krb5_verify_checksum(krb5_context context,
536 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
544 _krb5_usage2arcfour(context, &keyusage);
548 return verify_checksum(context, crypto, keyusage,
553 krb5_crypto_get_checksum_type(krb5_context context,
566 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
578 krb5_checksumsize(krb5_context context,
584 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
594 krb5_checksum_is_keyed(krb5_context context,
599 if (context)
600 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
609 krb5_checksum_is_collision_proof(krb5_context context,
614 if (context)
615 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
624 krb5_checksum_disable(krb5_context context,
629 if (context)
630 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
655 krb5_enctype_to_string(krb5_context context,
662 krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
670 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
677 krb5_string_to_enctype(krb5_context context,
687 krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
694 krb5_enctype_to_keytype(krb5_context context,
700 return unsupported_enctype (context, etype);
709 * @param context Kerberos context
717 krb5_enctype_valid(krb5_context context,
723 if (context == NULL)
726 return unsupported_enctype (context, etype);
729 krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
738 * @param context Kerberos context
749 krb5_cksumtype_to_enctype(krb5_context context,
766 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
774 krb5_cksumtype_valid(krb5_context context,
779 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
785 krb5_set_error_message (context, KRB5_PROG_SUMTYPE_NOSUPP,
795 derived_crypto(krb5_context context,
802 special_crypto(krb5_context context,
812 encrypt_internal_derived(krb5_context context,
834 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
843 ret = create_checksum(context,
852 krb5_clear_error_message (context);
859 ret = _get_derived_key(context, crypto, ENCRYPTION_USAGE(usage), &dkey);
862 ret = _key_schedule(context, dkey);
865 ret = (*et->encrypt)(context, dkey, p, block_sz, 1, usage, ivec);
879 encrypt_internal(krb5_context context,
898 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
909 ret = create_checksum(context,
917 krb5_clear_error_message (context);
925 ret = _key_schedule(context, &crypto->key);
928 ret = (*et->encrypt)(context, &crypto->key, p, block_sz, 1, 0, ivec);
944 encrypt_internal_special(krb5_context context,
960 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
969 ret = (*et->encrypt)(context, &crypto->key, tmp, sz, TRUE, usage, ivec);
981 decrypt_internal_derived(krb5_context context,
999 krb5_set_error_message(context, KRB5_BAD_MSIZE,
1006 krb5_clear_error_message(context);
1012 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1019 ret = _get_derived_key(context, crypto, ENCRYPTION_USAGE(usage), &dkey);
1024 ret = _key_schedule(context, dkey);
1029 ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec);
1039 ret = verify_checksum(context,
1054 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1062 decrypt_internal(krb5_context context,
1076 krb5_clear_error_message(context);
1081 krb5_set_error_message(context, KRB5_BAD_MSIZE,
1089 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1094 ret = _key_schedule(context, &crypto->key);
1099 ret = (*et->encrypt)(context, &crypto->key, p, len, 0, 0, ivec);
1111 ret = verify_checksum(context, NULL, 0, p, len, &cksum);
1122 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1130 decrypt_internal_special(krb5_context context,
1145 krb5_clear_error_message(context);
1149 krb5_set_error_message(context, KRB5_BAD_MSIZE,
1157 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1162 ret = (*et->encrypt)(context, &crypto->key, p, len, FALSE, usage, ivec);
1172 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1192 * @param context Kerberos context
1193 * @param crypto Kerberos crypto context
1214 krb5_encrypt_iov_ivec(krb5_context context,
1232 krb5_clear_error_message(context);
1236 if(!derived_crypto(context, crypto)) {
1237 krb5_clear_error_message(context);
1310 ret = create_checksum(context,
1320 krb5_clear_error_message (context);
1348 ret = _get_derived_key(context, crypto, ENCRYPTION_USAGE(usage), &dkey);
1353 ret = _key_schedule(context, dkey);
1359 ret = (*et->encrypt)(context, dkey, p, block_sz, 1, usage, ivec);
1388 * @param context Kerberos context
1389 * @param crypto Kerberos crypto context
1407 krb5_decrypt_iov_ivec(krb5_context context,
1423 if(!derived_crypto(context, crypto)) {
1424 krb5_clear_error_message(context);
1451 krb5_clear_error_message(context);
1471 ret = _get_derived_key(context, crypto, ENCRYPTION_USAGE(usage), &dkey);
1476 ret = _key_schedule(context, dkey);
1482 ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec);
1525 ret = verify_checksum(context,
1538 * @param context Kerberos context
1539 * @param crypto Kerberos crypto context
1550 krb5_create_checksum_iov(krb5_context context,
1564 if(!derived_crypto(context, crypto)) {
1565 krb5_clear_error_message(context);
1591 ret = krb5_create_checksum(context, crypto, usage, 0, p, len, &cksum);
1600 krb5_set_error_message(context, KRB5_BAD_MSIZE,
1616 * @param context Kerberos context
1617 * @param crypto Kerberos crypto context
1628 krb5_verify_checksum_iov(krb5_context context,
1643 if(!derived_crypto(context, crypto)) {
1644 krb5_clear_error_message(context);
1674 ret = krb5_verify_checksum(context, crypto, usage, p, len, &cksum);
1685 krb5_crypto_length(krb5_context context,
1690 if (!derived_crypto(context, crypto)) {
1691 krb5_set_error_message(context, EINVAL, "not a derived crypto");
1722 krb5_set_error_message(context, EINVAL,
1729 krb5_crypto_length_iov(krb5_context context,
1738 ret = krb5_crypto_length(context, crypto,
1749 krb5_encrypt_ivec(krb5_context context,
1757 if(derived_crypto(context, crypto))
1758 return encrypt_internal_derived(context, crypto, usage,
1760 else if (special_crypto(context, crypto))
1761 return encrypt_internal_special (context, crypto, usage,
1764 return encrypt_internal(context, crypto, data, len, result, ivec);
1768 krb5_encrypt(krb5_context context,
1775 return krb5_encrypt_ivec(context, crypto, usage, data, len, result, NULL);
1779 krb5_encrypt_EncryptedData(krb5_context context,
1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher);
1797 krb5_decrypt_ivec(krb5_context context,
1805 if(derived_crypto(context, crypto))
1806 return decrypt_internal_derived(context, crypto, usage,
1808 else if (special_crypto (context, crypto))
1809 return decrypt_internal_special(context, crypto, usage,
1812 return decrypt_internal(context, crypto, data, len, result, ivec);
1816 krb5_decrypt(krb5_context context,
1823 return krb5_decrypt_ivec (context, crypto, usage, data, len, result,
1828 krb5_decrypt_EncryptedData(krb5_context context,
1834 return krb5_decrypt(context, crypto, usage,
1843 _krb5_derive_key(krb5_context context,
1854 ret = _key_schedule(context, key);
1862 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1867 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1876 (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize,
1886 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1890 (*et->encrypt)(context, key, c, len, 1, 0, NULL);
1895 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1901 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1909 _krb5_DES3_random_to_key(context, key->key, k, nblocks * et->blocksize);
1917 krb5_set_error_message(context, ret,
1924 free_key_schedule(context, key, et);
1949 krb5_derive_key(krb5_context context,
1964 return unsupported_enctype (context, etype);
1967 ret = krb5_copy_keyblock(context, key, &d.key);
1972 ret = _krb5_derive_key(context, et, &d, constant, constant_len);
1974 ret = krb5_copy_keyblock(context, d.key, derived_key);
1975 _krb5_free_key_data(context, &d, et);
1980 _get_derived_key(krb5_context context,
1996 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
1999 krb5_copy_keyblock(context, crypto->key.key, &d->key);
2001 _krb5_derive_key(context, crypto->et, d, constant, sizeof(constant));
2007 * Create a crypto context used for all encryption and signature
2012 * To free the crypto context, use krb5_crypto_destroy().
2014 * @param context Kerberos context
2017 * @param crypto the resulting crypto context
2025 krb5_crypto_init(krb5_context context,
2033 krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
2042 return unsupported_enctype(context, etype);
2047 krb5_set_error_message (context, KRB5_BAD_KEYSIZE,
2051 ret = krb5_copy_keyblock(context, key, &(*crypto)->key.key);
2064 free_key_schedule(krb5_context context,
2069 (*et->keytype->cleanup)(context, key);
2071 krb5_free_data(context, key->schedule);
2075 _krb5_free_key_data(krb5_context context, struct _krb5_key_data *key,
2078 krb5_free_keyblock(context, key->key);
2080 free_key_schedule(context, key, et);
2086 free_key_usage(krb5_context context, struct _krb5_key_usage *ku,
2089 _krb5_free_key_data(context, &ku->key, et);
2093 * Free a crypto context created by krb5_crypto_init().
2095 * @param context Kerberos context
2096 * @param crypto crypto context to free
2104 krb5_crypto_destroy(krb5_context context,
2110 free_key_usage(context, &crypto->key_usage[i], crypto->et);
2112 _krb5_free_key_data(context, &crypto->key, crypto->et);
2118 * Return the blocksize used algorithm referenced by the crypto context
2120 * @param context Kerberos context
2121 * @param crypto crypto context to query
2130 krb5_crypto_getblocksize(krb5_context context,
2139 * Return the encryption type used by the crypto context
2141 * @param context Kerberos context
2142 * @param crypto crypto context to query
2151 krb5_crypto_getenctype(krb5_context context,
2160 * Return the padding size used by the crypto context
2162 * @param context Kerberos context
2163 * @param crypto crypto context to query
2172 krb5_crypto_getpadsize(krb5_context context,
2181 * Return the confounder size used by the crypto context
2183 * @param context Kerberos context
2184 * @param crypto crypto context to query
2193 krb5_crypto_getconfoundersize(krb5_context context,
2205 * @param context Kerberos 5 context
2214 krb5_enctype_disable(krb5_context context,
2219 if (context)
2220 krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
2232 * @param context Kerberos 5 context
2241 krb5_enctype_enable(krb5_context context,
2246 if (context)
2247 krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
2259 * @param context Kerberos 5 context
2268 krb5_allow_weak_crypto(krb5_context context,
2284 wrapped_length (krb5_context context,
2299 wrapped_length_dervied (krb5_context context,
2321 krb5_get_wrapped_length (krb5_context context,
2325 if (derived_crypto (context, crypto))
2326 return wrapped_length_dervied (context, crypto, data_len);
2328 return wrapped_length (context, crypto, data_len);
2336 crypto_overhead (krb5_context context,
2350 crypto_overhead_dervied (krb5_context context,
2367 krb5_crypto_overhead (krb5_context context, krb5_crypto crypto)
2369 if (derived_crypto (context, crypto))
2370 return crypto_overhead_dervied (context, crypto);
2372 return crypto_overhead (context, crypto);
2381 * @param context Kerberos 5 context
2393 krb5_random_to_key(krb5_context context,
2402 krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
2408 krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
2420 (*et->keytype->random_to_key)(context, key, data, size);
2430 krb5_crypto_prf_length(krb5_context context,
2437 krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
2448 krb5_crypto_prf(krb5_context context,
2458 krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
2464 return (*et->prf)(context, crypto, input, output);
2468 krb5_crypto_prfplus(krb5_context context,
2482 krb5_clear_error_message(context);
2489 krb5_clear_error_message(context);
2500 ret = krb5_crypto_prf(context, crypto, &input2, &block);
2525 * @param context Kerberos 5 context
2539 krb5_crypto_fx_cf2(krb5_context context,
2553 ret = krb5_enctype_keysize(context, enctype, &keysize);
2560 ret = krb5_crypto_prfplus(context, crypto1, pepper1, keysize, &os1);
2563 ret = krb5_crypto_prfplus(context, crypto2, pepper2, keysize, &os2);
2593 krb5_keytype_to_enctypes (krb5_context context,
2606 && krb5_enctype_valid(context, _krb5_etypes[i]->type) == 0)
2610 krb5_set_error_message(context, KRB5_PROG_KEYTYPE_NOSUPP,
2617 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
2624 && krb5_enctype_valid(context, _krb5_etypes[i]->type) == 0)
2640 krb5_enctypes_compatible_keys(krb5_context context,