/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | del_enctype.c | 51 krb5_enctype *etypes; local 56 etypes = malloc (n_etypes * sizeof(*etypes)); 57 if (etypes == NULL) { 63 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); 95 if (etypes[k] == key->key_data_type[0]) { 119 free (etypes);
|
H A D | add_enctype.c | 51 krb5_enctype *etypes; local 61 etypes = malloc (n_etypes * sizeof(*etypes)); 62 if (etypes == NULL) { 68 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); 100 if (etypes[j] == key->key_data_type[0]) { 102 (int)etypes[j]); 118 ret = krb5_generate_random_keyblock (context, etypes[i], &keyblock); 120 krb5_warnx(context, "genernate enctype %d failed", (int)etypes[i]); 127 new_key_data[n].key_data_type[0] = etypes[ [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | build_auth.c | 40 EtypeList etypes; local 48 &etypes.len, &etypes.val, 53 ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret); 55 free_EtypeList(&etypes); 60 free_EtypeList(&etypes);
|
H A D | context.c | 52 * Set the list of etypes `ret_etypes' from the configuration variable 62 krb5_enctype *etypes = NULL; local 69 etypes = malloc((i+1) * sizeof(*etypes)); 70 if (etypes == NULL) { 81 etypes[k++] = e; 83 etypes[k] = ETYPE_NULL; 86 *ret_enctypes = etypes; 123 free(context->etypes); 124 context->etypes 432 krb5_get_permitted_enctypes(krb5_context context, krb5_enctype **etypes) argument 955 krb5_set_default_in_tkt_etypes(krb5_context context, const krb5_enctype *etypes) argument 987 krb5_get_default_in_tkt_etypes(krb5_context context, krb5_pdu pdu_type, krb5_enctype **etypes) argument 1430 _krb5_init_etype(krb5_context context, krb5_pdu pdu_type, unsigned *len, krb5_enctype **val, const krb5_enctype *etypes) argument [all...] |
H A D | deprecated.c | 225 const krb5_enctype *etypes, 236 etypes, 267 const krb5_enctype *etypes, 279 etypes, 289 etypes, 350 const krb5_enctype *etypes, 366 etypes,
|
H A D | init_creds_pw.c | 42 krb5_enctype *etypes; member in struct:krb5_get_init_creds_ctx 131 if (ctx->etypes) 132 free(ctx->etypes); 355 krb5_enctype *etypes; local 393 ctx->etypes = NULL; 437 if (ctx->etypes) 438 free(ctx->etypes); 440 etypes = malloc((options->etype_list_length + 1) 442 if (etypes == NULL) { 447 memcpy (etypes, option 613 init_as_req(krb5_context context, KDCOptions opts, const krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, AS_REQ *a) argument 1526 krb5_enctype *etypes = NULL; local [all...] |
H A D | rd_req.c | 173 EtypeList *etypes) 182 etypes->len = 0; 183 etypes->val = NULL; 213 etypes, 349 EtypeList etypes; local 464 ret = find_etypelist(context, ac, &etypes); 470 if (etypes.val) { 473 for (i = 0; i < etypes.len; i++) { 474 if (krb5_enctype_valid(context, etypes.val[i]) == 0) { 475 ac->keytype = etypes 171 find_etypelist(krb5_context context, krb5_auth_context auth_context, EtypeList *etypes) argument [all...] |
H A D | get_in_tkt.c | 114 enctypes = context->etypes; 149 const krb5_enctype *etypes, 214 etypes); 367 const krb5_enctype *etypes, 404 etypes, 532 const krb5_enctype *etypes, 548 etypes, 145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument
|
H A D | krb5_locl.h | 252 krb5_enctype *etypes; member in struct:krb5_context_data
|
/freebsd-11-stable/crypto/heimdal/admin/ |
H A D | get.c | 91 krb5_enctype *etypes = NULL; local 105 etypes = malloc (opt->enctypes_strings.num_strings * sizeof(*etypes)); 106 if (etypes == NULL) { 114 &etypes[i]); 213 if (keys[j].keytype == etypes[k]) { 234 free(etypes);
|
/freebsd-11-stable/crypto/heimdal/lib/hdb/ |
H A D | hdb-ldap.c | 684 if (ent->entry.etypes) { 706 for (i = 0; i < ent->entry.etypes->len; i++) { 714 ent->entry.etypes->val[i]); 1050 ent->entry.etypes = malloc(sizeof(*(ent->entry.etypes))); 1051 if (ent->entry.etypes == NULL) { 1056 ent->entry.etypes->len = ldap_count_values_len(vals); 1057 ent->entry.etypes->val = calloc(ent->entry.etypes->len, sizeof(int)); 1058 if (ent->entry.etypes 1091 unsigned *etypes; local [all...] |
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 121 * all the etypes in (`etypes', `len'), stopping as soon as we find 128 krb5_enctype *etypes, unsigned len, 168 if (p[i] != etypes[j]) 202 if (krb5_enctype_valid(context, etypes[i]) != 0 && 203 !_kdc_is_weak_exception(princ->entry.principal, etypes[i])) 206 while (hdb_next_enctype2key(context, &princ->entry, etypes[i], &key) == 0) { 214 *ret_enctype = etypes[i]; 126 _kdc_find_etype(krb5_context context, krb5_boolean use_strongest_session_key, krb5_boolean is_preauth, hdb_entry_ex *princ, krb5_enctype *etypes, unsigned len, krb5_enctype *ret_enctype, Key **ret_key) argument
|