/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | free.c | 40 free_EncTGSRepPart(&rep->enc_part);
|
H A D | mk_priv.c | 96 krb5_data_zero (&s.enc_part.cipher); 106 s.enc_part.etype = key->keytype; 107 s.enc_part.kvno = NULL; 119 &s.enc_part.cipher); 134 krb5_data_free (&s.enc_part.cipher); 151 krb5_data_free (&s.enc_part.cipher);
|
H A D | ticket.c | 626 !rep->enc_part.flags.enc_pa_rep) 660 &dec_rep->kdc_rep.enc_part, 669 &dec_rep->enc_part, 674 &dec_rep->enc_part, 713 if (rep->enc_part.flags.enc_pa_rep && request && (flags & EXTRACT_TICKET_REQUIRE_ENC_PA)) { 721 if (rep->enc_part.encrypted_pa_data == NULL || 722 (pa = krb5_find_padata(rep->enc_part.encrypted_pa_data->val, 723 rep->enc_part.encrypted_pa_data->len, 759 creds->session.keytype = rep->enc_part.key.keytype; 761 rep->enc_part [all...] |
H A D | mk_rep.c | 91 ap.enc_part.etype = auth_context->keyblock->keytype; 92 ap.enc_part.kvno = NULL; 101 0 /* ap.enc_part.etype */, &crypto); 111 &ap.enc_part.cipher);
|
H A D | rd_cred.c | 99 if (cred.enc_part.etype == ETYPE_NULL) { 101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length; 102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data; 120 &cred.enc_part, 137 &cred.enc_part, 150 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
|
H A D | test_pknistkdf.c | 208 t.enc_part.etype = ETYPE_AES256_CTS_HMAC_SHA1_96; 209 t.enc_part.kvno = NULL; 210 t.enc_part.cipher.length = 6; 211 t.enc_part.cipher.data = "hejhej";
|
H A D | rd_req.c | 39 EncryptedData *enc_part, 53 enc_part, 71 EncryptedData *enc_part, 86 enc_part, 93 enc_part, 198 ret = decrypt_tkt_enc_part(context, key, &ticket->enc_part, &t); 771 if (ap_req->ticket.enc_part.kvno) 772 kvno = *ap_req->ticket.enc_part.kvno; 780 ap_req->ticket.enc_part.etype, 946 if (ap_req.ticket.enc_part 37 decrypt_tkt_enc_part(krb5_context context, krb5_keyblock *key, EncryptedData *enc_part, EncTicketPart *decr_part) argument 69 decrypt_authenticator(krb5_context context, EncryptionKey *key, EncryptedData *enc_part, Authenticator *authenticator, krb5_key_usage usage) argument [all...] |
H A D | rd_rep.c | 70 &ap_rep.enc_part,
|
H A D | rd_priv.c | 95 &priv.enc_part,
|
H A D | tkt.c | 413 &dec_rep->kdc_rep.enc_part, 423 &dec_rep->kdc_rep.enc_part, 441 &dec_rep->kdc_rep.enc_part, 450 &dec_rep->enc_part, 455 &dec_rep->enc_part,
|
H A D | init_creds_pw.c | 87 EncKDCRepPart enc_part; member in struct:krb5_init_creds_context_data 183 free_EncKDCRepPart(&ctx->enc_part); 309 lr = &ctx->enc_part.last_req; 371 lr = &ctx->enc_part.last_req; 1150 rep->enc_part.etype, 1173 rep->enc_part.etype, 1311 paid.etype = rep->enc_part.etype; 1866 rep->enc_part.etype, 1956 paid.etype = rep->enc_part.etype; 1975 ppaid->salt, ppaid->s2kparams, rep->enc_part [all...] |
H A D | scache.c | 736 if(t.enc_part.kvno) 737 kvno = *t.enc_part.kvno; 739 etype = t.enc_part.etype;
|
H A D | get_for_creds.c | 426 &cred.enc_part);
|
H A D | get_in_tkt.c | 470 etype = rep.kdc_rep.enc_part.etype;
|
H A D | krb5.h | 699 EncKDCRepPart enc_part; member in struct:__anon623
|
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | kvno.c | 198 (ticket.enc_part.kvno != NULL)? 199 *ticket.enc_part.kvno : 0, 200 ticket.enc_part.etype, 206 (ticket.enc_part.kvno != NULL)? 207 *ticket.enc_part.kvno : 0); 221 &ticket.enc_part, &dec_data); 242 (ticket.enc_part.kvno != NULL)? 243 *ticket.enc_part.kvno : 0); 249 (ticket.enc_part.kvno != NULL)? *ticket.enc_part [all...] |
H A D | kimpersonate.c | 71 EncryptedData enc_part; local 75 memset (&enc_part, 0, sizeof(enc_part)); 79 * Set up `enc_part' 101 * Encrypt `enc_part' of ticket with service key 117 &ticket.enc_part);
|
H A D | kdecode_ticket.c | 67 &tkt.enc_part, &dec_data);
|
H A D | klist.c | 181 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s); 187 printf(N_("unknown-enctype(%d)", ""), t.enc_part.etype); 189 if(t.enc_part.kvno) 190 printf(N_(", kvno %d", ""), *t.enc_part.kvno); 192 if(cred->session.keytype != t.enc_part.etype) {
|
/macosx-10.10/MITKerberosShim-66/ |
H A D | creds.c | 59 (*rep)->enc_part.kvno = t.enc_part.kvno ? *t.enc_part.kvno : 0;
|
H A D | misc.c | 395 mit_krb5_ap_rep_enc_part *enc_part) 398 if (enc_part->subkey) 399 krb5_free_keyblock(context, enc_part->subkey); 400 free(enc_part); 598 if (ticket->enc_part.ciphertext.data) 599 krb5_free_data_contents(context, &ticket->enc_part.ciphertext); 394 krb5_free_ap_rep_enc_part(mit_krb5_context context, mit_krb5_ap_rep_enc_part *enc_part) argument
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | kssl.c | 1275 new5ticket->enc_part.enctype = asn1ticket->encdata->etype->data[0]; 1276 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0]; 1277 new5ticket->enc_part.ciphertext.length = 1279 if ((new5ticket->enc_part.ciphertext.data = 1290 memcpy(new5ticket->enc_part.ciphertext.data, 1464 krb5ticket->server, krb5ticket->enc_part.kvno, 1465 krb5ticket->enc_part.enctype, &kt_entry)) != 0) { 1541 kssl_ctx->enctype = krb5ticket->enc_part.enctype;
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | krb5tgs.c | 1183 ret = _kdc_db_fetch(r->context, r->config, r->server_princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, &r->server); 1198 if (ap_req.ticket.enc_part.kvno && 1199 *ap_req.ticket.enc_part.kvno != r->server->entry.kvno){ 1203 *ap_req.ticket.enc_part.kvno, 1210 r->server_enctype = ap_req.ticket.enc_part.etype; 1213 ap_req.ticket.enc_part.etype, &tkey); 1217 krb5_enctype_to_string(r->context, ap_req.ticket.enc_part.etype, &str); 1559 HDB_F_GET_KRBTGT, t->enc_part.kvno, 1568 t->enc_part.etype, &uukey); 2060 t->enc_part [all...] |
H A D | fast.c | 487 ap_req.ticket.enc_part.etype,
|
/macosx-10.10/Heimdal-398.1.2/lib/kafs/ |
H A D | afskrb5.c | 72 ASN1_MALLOC_ENCODE(EncryptedData, buf, buf_len, &t.enc_part,
|