/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | free.c | 41 krb5_key_data *key_data) 45 if(key_data[i].key_data_contents[0]){ 46 memset(key_data[i].key_data_contents[0], 48 key_data[i].key_data_length[0]); 49 free(key_data[i].key_data_contents[0]); 51 if(key_data[i].key_data_contents[1]) 52 free(key_data[i].key_data_contents[1]); 67 kadm5_free_key_data(server_handle, &princ->n_key_data, princ->key_data); 77 if (princ->key_data != NULL) 78 free (princ->key_data); 39 kadm5_free_key_data(void *server_handle, int16_t *n_key_data, krb5_key_data *key_data) argument [all...] |
H A D | set_keys.c | 76 * Set the keys of `ent' to (`n_key_data', `key_data') 83 krb5_key_data *key_data) 99 keys[i].key.keytype = key_data[i].key_data_type[0]; 101 key_data[i].key_data_contents[0], 102 key_data[i].key_data_length[0]); 105 if(key_data[i].key_data_ver == 2) { 114 salt->type = key_data[i].key_data_type[1]; 116 key_data[i].key_data_contents[1], 117 key_data[i].key_data_length[1]); 80 _kadm5_set_keys2(kadm5_server_context *context, hdb_entry *ent, int16_t n_key_data, krb5_key_data *key_data) argument
|
H A D | chpass_c.c | 84 krb5_key_data *key_data) 107 kadm5_store_key_data (sp, &key_data[i]); 81 kadm5_c_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument
|
H A D | common_glue.c | 52 krb5_key_data *key_data) 55 (server_handle, princ, n_key_data, key_data)); 49 kadm5_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument
|
H A D | marshall.c | 153 kadm5_store_key_data(sp, &princ->key_data[i]); 262 princ->key_data = malloc(princ->n_key_data * sizeof(*princ->key_data)); 263 if (princ->key_data == NULL) 266 kadm5_ret_key_data(sp, &princ->key_data[i]);
|
H A D | chpass_s.c | 147 krb5_key_data *key_data) 161 ret = _kadm5_set_keys2(context, &ent.entry, n_key_data, key_data); 144 kadm5_s_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument
|
H A D | get_s.c | 176 out->key_data = malloc(ent.entry.keys.len * sizeof(*out->key_data)); 177 if (out->key_data == NULL) { 183 kd = &out->key_data[i];
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | cpw.c | 43 krb5_key_data *key_data; member in struct:cpw_entry_data 110 set_key_data (krb5_principal principal, krb5_key_data *key_data) argument 115 3, key_data); 128 else if (e->key_data) 129 return set_key_data (principal, e->key_data); 141 krb5_key_data key_data[3]; local 146 data.key_data = NULL; 167 if (parse_des_key (opt->key_string, key_data, &error)) { 172 data.key_data = key_data; [all...] |
H A D | del_enctype.c | 93 krb5_key_data *key = &princ.key_data[i]; 110 free (princ.key_data); 112 princ.key_data = new_key_data;
|
H A D | ank.c | 73 krb5_key_data *key_data, 118 if(rand_key || key_data) { 168 } else if (key_data) { 170 3, key_data); 214 krb5_key_data key_data[3]; local 236 if (parse_des_key (opt->key_string, key_data, &error)) { 241 kdp = key_data; 263 kadm5_free_key_data (kadm_handle, &dummy, key_data); 68 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
|
H A D | util.c | 622 parse_des_key (const char *key_string, krb5_key_data *key_data, argument 645 key_data[i].key_data_ver = 2; 646 key_data[i].key_data_kvno = 0; 648 key_data[i].key_data_type[0] = ETYPE_DES_CBC_CRC; 649 key_data[i].key_data_length[0] = 8; 650 key_data[i].key_data_contents[0] = malloc(8); 651 if (key_data[i].key_data_contents[0] == NULL) { 655 memcpy (key_data[i].key_data_contents[0], bits, 8); 657 key_data[i].key_data_type[1] = KRB5_PW_SALT; 658 key_data[ [all...] |
H A D | check.c | 89 princ.key_data[i].key_data_type[0], 91 if (ret == 0 && keysize != princ.key_data[i].key_data_length[0]) { 94 name, princ.key_data[i].key_data_type[0], 95 (unsigned long)princ.key_data[i].key_data_length);
|
H A D | server.c | 264 krb5_key_data *key_data; local 278 n_key_data > UINT_MAX/sizeof(*key_data)) { 284 key_data = malloc (n_key_data * sizeof(*key_data)); 285 if (key_data == NULL) { 292 ret = kadm5_ret_key_data (sp, &key_data[i]); 296 kadm5_free_key_data (context, &dummy, key_data); 297 free (key_data); 315 kadm5_free_key_data (context, &dummy, key_data); 316 free (key_data); [all...] |
H A D | add_enctype.c | 99 krb5_key_data *key = &princ.key_data[i]; 150 free (princ.key_data); 152 princ.key_data = new_key_data;
|
H A D | ext.c | 66 krb5_key_data *kd = &princ.key_data[i];
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_tls.c | 29 u8 *key_data; member in struct:eap_tls_data 77 os_free(data->key_data); 126 os_free(data->key_data); 127 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 131 if (data->key_data) { 133 data->key_data, EAP_TLS_KEY_LEN); 135 data->key_data + EAP_TLS_KEY_LEN, 201 os_free(data->key_data); 202 data->key_data = NULL; 222 return data->key_data ! [all...] |
H A D | eap_peap.c | 64 u8 *key_data; member in struct:eap_peap_data 187 os_free(data->key_data); 259 tk = data->key_data; 1087 os_free(data->key_data); 1101 data->key_data = 1104 if (data->key_data) { 1107 data->key_data, 1183 os_free(data->key_data); 1184 data->key_data = NULL; 1225 return data->key_data ! [all...] |
H A D | eap_ttls.c | 73 u8 *key_data; member in struct:eap_ttls_data 181 os_free(data->key_data); 285 os_free(data->key_data); 286 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 289 if (!data->key_data) { 295 data->key_data, EAP_TLS_KEY_LEN); 308 os_free(data->key_data); 309 data->key_data = NULL; 322 data->key_data = os_malloc(EAP_TLS_KEY_LEN); 323 if (rnd == NULL || data->key_data [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 115 ret->key_data = NULL; 150 if ((x->key_data != NULL) && (x->key_free)) 151 OPENSSL_free(x->key_data);
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 44 struct key_data { struct 51 struct key_data key; 56 struct key_data key; 89 void (*schedule)(krb5_context, struct key_data *); 101 struct key_data *key, 106 struct key_data *key, 124 struct key_data *key, 142 unsigned, struct key_data**); 143 static struct key_data *_new_derived_key(krb5_crypto crypto, unsigned usage); 146 struct key_data *ke [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | db.c | 98 krb5_data key_data, data; local 119 key_data.data = key.data; 120 key_data.length = key.size; 138 hdb_key2principal(context, &key_data, entry->entry.principal);
|
H A D | db3.c | 98 krb5_data key_data, data; local 112 key_data.data = key.data; 113 key_data.length = key.size; 131 hdb_key2principal(context, &key_data, entry->entry.principal);
|
H A D | ndbm.c | 85 krb5_data key_data, data; local 94 key_data.data = key.dptr; 95 key_data.length = key.dsize; 117 hdb_key2principal (context, &key_data, entry->entry.principal);
|
/freebsd-9.3-release/sys/netipsec/ |
H A D | xform_tcp.c | 122 bzero(sav->key_auth->key_data, _KEYLEN(sav->key_auth));
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | collector.c | 119 const heim_octet_string *key_data, 148 key_data->data, key_data->length, 115 _hx509_collector_private_key_add(hx509_context context, struct hx509_collector *c, const AlgorithmIdentifier *alg, hx509_private_key private_key, const heim_octet_string *key_data, const heim_octet_string *localKeyId) argument
|