Searched refs:enc_part (Results 1 - 25 of 29) sorted by relevance

12

/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dfree.c40 free_EncTGSRepPart(&rep->enc_part);
H A Dmk_priv.c96 krb5_data_zero (&s.enc_part.cipher);
106 s.enc_part.etype = key->keytype;
107 s.enc_part.kvno = NULL;
119 &s.enc_part.cipher);
134 krb5_data_free (&s.enc_part.cipher);
151 krb5_data_free (&s.enc_part.cipher);
H A Dticket.c626 !rep->enc_part.flags.enc_pa_rep)
660 &dec_rep->kdc_rep.enc_part,
669 &dec_rep->enc_part,
674 &dec_rep->enc_part,
713 if (rep->enc_part.flags.enc_pa_rep && request && (flags & EXTRACT_TICKET_REQUIRE_ENC_PA)) {
721 if (rep->enc_part.encrypted_pa_data == NULL ||
722 (pa = krb5_find_padata(rep->enc_part.encrypted_pa_data->val,
723 rep->enc_part.encrypted_pa_data->len,
759 creds->session.keytype = rep->enc_part.key.keytype;
761 rep->enc_part
[all...]
H A Dmk_rep.c91 ap.enc_part.etype = auth_context->keyblock->keytype;
92 ap.enc_part.kvno = NULL;
101 0 /* ap.enc_part.etype */, &crypto);
111 &ap.enc_part.cipher);
H A Drd_cred.c99 if (cred.enc_part.etype == ETYPE_NULL) {
101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length;
102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data;
120 &cred.enc_part,
137 &cred.enc_part,
150 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
H A Dtest_pknistkdf.c208 t.enc_part.etype = ETYPE_AES256_CTS_HMAC_SHA1_96;
209 t.enc_part.kvno = NULL;
210 t.enc_part.cipher.length = 6;
211 t.enc_part.cipher.data = "hejhej";
H A Drd_req.c39 EncryptedData *enc_part,
53 enc_part,
71 EncryptedData *enc_part,
86 enc_part,
93 enc_part,
198 ret = decrypt_tkt_enc_part(context, key, &ticket->enc_part, &t);
771 if (ap_req->ticket.enc_part.kvno)
772 kvno = *ap_req->ticket.enc_part.kvno;
780 ap_req->ticket.enc_part.etype,
946 if (ap_req.ticket.enc_part
37 decrypt_tkt_enc_part(krb5_context context, krb5_keyblock *key, EncryptedData *enc_part, EncTicketPart *decr_part) argument
69 decrypt_authenticator(krb5_context context, EncryptionKey *key, EncryptedData *enc_part, Authenticator *authenticator, krb5_key_usage usage) argument
[all...]
H A Drd_rep.c70 &ap_rep.enc_part,
H A Drd_priv.c95 &priv.enc_part,
H A Dtkt.c413 &dec_rep->kdc_rep.enc_part,
423 &dec_rep->kdc_rep.enc_part,
441 &dec_rep->kdc_rep.enc_part,
450 &dec_rep->enc_part,
455 &dec_rep->enc_part,
H A Dinit_creds_pw.c87 EncKDCRepPart enc_part; member in struct:krb5_init_creds_context_data
183 free_EncKDCRepPart(&ctx->enc_part);
309 lr = &ctx->enc_part.last_req;
371 lr = &ctx->enc_part.last_req;
1150 rep->enc_part.etype,
1173 rep->enc_part.etype,
1311 paid.etype = rep->enc_part.etype;
1866 rep->enc_part.etype,
1956 paid.etype = rep->enc_part.etype;
1975 ppaid->salt, ppaid->s2kparams, rep->enc_part
[all...]
H A Dscache.c736 if(t.enc_part.kvno)
737 kvno = *t.enc_part.kvno;
739 etype = t.enc_part.etype;
H A Dget_for_creds.c426 &cred.enc_part);
H A Dget_in_tkt.c470 etype = rep.kdc_rep.enc_part.etype;
H A Dkrb5.h699 EncKDCRepPart enc_part; member in struct:__anon623
/macosx-10.10/Heimdal-398.1.2/kuser/
H A Dkvno.c198 (ticket.enc_part.kvno != NULL)?
199 *ticket.enc_part.kvno : 0,
200 ticket.enc_part.etype,
206 (ticket.enc_part.kvno != NULL)?
207 *ticket.enc_part.kvno : 0);
221 &ticket.enc_part, &dec_data);
242 (ticket.enc_part.kvno != NULL)?
243 *ticket.enc_part.kvno : 0);
249 (ticket.enc_part.kvno != NULL)? *ticket.enc_part
[all...]
H A Dkimpersonate.c71 EncryptedData enc_part; local
75 memset (&enc_part, 0, sizeof(enc_part));
79 * Set up `enc_part'
101 * Encrypt `enc_part' of ticket with service key
117 &ticket.enc_part);
H A Dkdecode_ticket.c67 &tkt.enc_part, &dec_data);
H A Dklist.c181 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s);
187 printf(N_("unknown-enctype(%d)", ""), t.enc_part.etype);
189 if(t.enc_part.kvno)
190 printf(N_(", kvno %d", ""), *t.enc_part.kvno);
192 if(cred->session.keytype != t.enc_part.etype) {
/macosx-10.10/MITKerberosShim-66/
H A Dcreds.c59 (*rep)->enc_part.kvno = t.enc_part.kvno ? *t.enc_part.kvno : 0;
H A Dmisc.c395 mit_krb5_ap_rep_enc_part *enc_part)
398 if (enc_part->subkey)
399 krb5_free_keyblock(context, enc_part->subkey);
400 free(enc_part);
598 if (ticket->enc_part.ciphertext.data)
599 krb5_free_data_contents(context, &ticket->enc_part.ciphertext);
394 krb5_free_ap_rep_enc_part(mit_krb5_context context, mit_krb5_ap_rep_enc_part *enc_part) argument
/macosx-10.10/OpenSSL098-52/src/ssl/
H A Dkssl.c1275 new5ticket->enc_part.enctype = asn1ticket->encdata->etype->data[0];
1276 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0];
1277 new5ticket->enc_part.ciphertext.length =
1279 if ((new5ticket->enc_part.ciphertext.data =
1290 memcpy(new5ticket->enc_part.ciphertext.data,
1464 krb5ticket->server, krb5ticket->enc_part.kvno,
1465 krb5ticket->enc_part.enctype, &kt_entry)) != 0) {
1541 kssl_ctx->enctype = krb5ticket->enc_part.enctype;
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dkrb5tgs.c1183 ret = _kdc_db_fetch(r->context, r->config, r->server_princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, &r->server);
1198 if (ap_req.ticket.enc_part.kvno &&
1199 *ap_req.ticket.enc_part.kvno != r->server->entry.kvno){
1203 *ap_req.ticket.enc_part.kvno,
1210 r->server_enctype = ap_req.ticket.enc_part.etype;
1213 ap_req.ticket.enc_part.etype, &tkey);
1217 krb5_enctype_to_string(r->context, ap_req.ticket.enc_part.etype, &str);
1559 HDB_F_GET_KRBTGT, t->enc_part.kvno,
1568 t->enc_part.etype, &uukey);
2060 t->enc_part
[all...]
H A Dfast.c487 ap_req.ticket.enc_part.etype,
/macosx-10.10/Heimdal-398.1.2/lib/kafs/
H A Dafskrb5.c72 ASN1_MALLOC_ENCODE(EncryptedData, buf, buf_len, &t.enc_part,

Completed in 304 milliseconds

12