/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | keyblock.c | 37 * Zero out a keyblock 39 * @param keyblock keyblock to zero out 45 krb5_keyblock_zero(krb5_keyblock *keyblock) argument 47 keyblock->keytype = 0; 48 krb5_data_zero(&keyblock->keyvalue); 52 * Free a keyblock's content, also zero out the content of the keyblock. 55 * @param keyblock keyblock conten 61 krb5_free_keyblock_contents(krb5_context context, krb5_keyblock *keyblock) argument 83 krb5_free_keyblock(krb5_context context, krb5_keyblock *keyblock) argument [all...] |
H A D | mk_req_ext.c | 72 krb5_free_keyblock(context, ac->keyblock); 73 ret = krb5_copy_keyblock(context, &in_creds->session, &ac->keyblock); 83 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { 92 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || 93 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || 94 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || 95 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { 107 ret = krb5_crypto_init(context, ac->keyblock, 0, &crypto); 129 ac->keyblock->keytype, 139 ret = krb5_build_ap_req (context, ac->keyblock [all...] |
H A D | auth_context.c | 81 krb5_free_keyblock(context, auth_context->keyblock); 297 krb5_keyblock **keyblock) 299 return copy_key(context, auth_context->keyblock, keyblock); 305 krb5_keyblock **keyblock) 307 return copy_key(context, auth_context->local_subkey, keyblock); 314 krb5_keyblock **keyblock) 316 return copy_key(context, auth_context->remote_subkey, keyblock); 322 krb5_keyblock *keyblock) 324 if(auth_context->keyblock) 295 krb5_auth_con_getkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 303 krb5_auth_con_getlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 312 krb5_auth_con_getremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 320 krb5_auth_con_setkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument 330 krb5_auth_con_setlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument 360 krb5_auth_con_setremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument 494 krb5_auth_con_setuserkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument [all...] |
H A D | rd_req.c | 318 krb5_keyblock *keyblock, 327 keyblock, 339 krb5_keyblock *keyblock, 368 if (ap_req->ap_options.use_session_key && ac->keyblock){ 370 ac->keyblock, 373 krb5_free_keyblock(context, ac->keyblock); 374 ac->keyblock = NULL; 377 keyblock, 481 ret = krb5_copy_keyblock(context, &t->ticket.key, &ac->keyblock); 519 krb5_keyblock *keyblock; member in struct:krb5_rd_req_in_ctx_data 314 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 335 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument 524 krb5_keyblock *keyblock; member in struct:krb5_rd_req_out_ctx_data 603 krb5_rd_req_in_set_keyblock(krb5_context context, krb5_rd_req_in_ctx in, krb5_keyblock *keyblock) argument 629 krb5_rd_req_out_get_keyblock(krb5_context context, krb5_rd_req_out_ctx out, krb5_keyblock **keyblock) argument 740 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
H A D | mk_rep.c | 60 auth_context->keyblock); 79 auth_context->keyblock, 91 ap.enc_part.etype = auth_context->keyblock->keytype; 100 ret = krb5_crypto_init(context, auth_context->keyblock,
|
H A D | keytab_keyfile.c | 267 entry->keyblock.keytype = ETYPE_DES_CBC_MD5; 269 entry->keyblock.keytype = ETYPE_DES_CBC_CRC; 270 entry->keyblock.keyvalue.length = 8; 271 entry->keyblock.keyvalue.data = malloc (8); 272 if (entry->keyblock.keyvalue.data == NULL) { 280 ret = krb5_storage_read(cursor->sp, entry->keyblock.keyvalue.data, 8); 322 if (entry->keyblock.keyvalue.length != 8) 324 switch(entry->keyblock.keytype) { 436 ret = krb5_storage_write(sp, entry->keyblock.keyvalue.data, 437 entry->keyblock [all...] |
H A D | mit_glue.c | 400 krb5_keyblock **keyblock) 402 return krb5_auth_con_getlocalsubkey(context, auth_context, keyblock); 407 krb5_keyblock **keyblock) 409 return krb5_auth_con_getremotesubkey(context, auth_context, keyblock); 414 krb5_keyblock *keyblock) 416 return krb5_auth_con_setlocalsubkey(context, auth_context, keyblock); 421 krb5_keyblock *keyblock) 423 return krb5_auth_con_setremotesubkey(context, auth_context, keyblock); 399 krb5_auth_con_getsendsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 406 krb5_auth_con_getrecvsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 413 krb5_auth_con_setsendsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument 420 krb5_auth_con_setrecvsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | add_enctype.c | 114 krb5_keyblock keyblock; local 120 ret = krb5_generate_random_keyblock (context, etypes[i], &keyblock); 130 new_key_data[n].key_data_contents[0] = malloc(keyblock.keyvalue.length); 138 new_key_data[n].key_data_length[0] = keyblock.keyvalue.length; 140 keyblock.keyvalue.data, 141 keyblock.keyvalue.length); 142 krb5_free_keyblock_contents(context, &keyblock);
|
H A D | ext.c | 78 keys[i].keyblock.keytype = kd->key_data_type[0]; 79 keys[i].keyblock.keyvalue.length = kd->key_data_length[0]; 80 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0]; 100 keys[i].keyblock = k[i];
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/ |
H A D | import_sec_context.c | 52 krb5_keyblock keyblock; local 122 if (krb5_ret_keyblock (sp, &keyblock) != 0) 124 krb5_auth_con_setkey (context, ac, &keyblock); 125 krb5_free_keyblock_contents (context, &keyblock); 128 if (krb5_ret_keyblock (sp, &keyblock) != 0) 130 krb5_auth_con_setlocalsubkey (context, ac, &keyblock); 131 krb5_free_keyblock_contents (context, &keyblock); 134 if (krb5_ret_keyblock (sp, &keyblock) != 0) 136 krb5_auth_con_setremotesubkey (context, ac, &keyblock); 137 krb5_free_keyblock_contents (context, &keyblock); [all...] |
H A D | test_cfx.c | 138 krb5_keyblock keyblock; local 150 &keyblock); 154 ret = krb5_crypto_init(context, &keyblock, 0, &crypto); 166 krb5_free_keyblock_contents(context, &keyblock);
|
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | crypto.c | 75 mit_krb5_keyblock * keyblock, 84 keyblock); 148 krb5_keyblock keyblock; local 153 mshim_mkeyblock2hkeyblock(key, &keyblock); 155 ret = heim_krb5_crypto_init(HC(context), &keyblock, input->enctype, &crypto); 156 heim_krb5_free_keyblock_contents(HC(context), &keyblock); local 200 krb5_keyblock keyblock; local 203 mshim_mkeyblock2hkeyblock(key, &keyblock); 205 ret = heim_krb5_crypto_init(HC(context), &keyblock, 0, &crypto); 206 heim_krb5_free_keyblock_contents(HC(context), &keyblock); local 73 krb5_string_to_key(mit_krb5_context context, const mit_krb5_encrypt_block * eblock, mit_krb5_keyblock * keyblock, const mit_krb5_data * data, const mit_krb5_data * salt) argument [all...] |
H A D | creds.c | 112 ret = krb5_copy_keyblock_contents(context, &from->keyblock, 113 &c->keyblock);
|
H A D | keytab.c | 74 mshim_hkeyblock2mkeyblock(&e.keyblock, &entry->key); 289 e.keyblock.keytype = entry->key.enctype; 290 e.keyblock.keyvalue.data = entry->key.contents; 291 e.keyblock.keyvalue.length = entry->key.length;
|
/macosx-10.9.5/Heimdal-323.92.1/admin/ |
H A D | copy.c | 90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); 98 entry.keyblock.keytype, 104 if(!compare_keyblock(&entry.keyblock, &dummy.keyblock)) {
|
H A D | list.c | 98 entry.keyblock.keytype, &s); 100 snprintf(buf, sizeof(buf), "unknown (%d)", entry.keyblock.keytype); 117 s = malloc(2 * entry.keyblock.keyvalue.length + 1); 123 for(i = 0; i < entry.keyblock.keyvalue.length; i++) 125 ((unsigned char*)entry.keyblock.keyvalue.data)[i]);
|
H A D | add.c | 144 data, len, &entry.keyblock); 156 &entry.keyblock); 159 entry.principal, &entry.keyblock); 163 ret = krb5_generate_random_keyblock(context, enctype, &entry.keyblock);
|
H A D | remove.c | 82 entry.keyblock.keytype = enctype;
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | store.c | 162 krb5_keyblock keyblock; local 163 keyblock.keytype = ETYPE_AES128_CTS_HMAC_SHA1_96; 164 keyblock.keyvalue.data = inseed; 165 keyblock.keyvalue.length = 16; 167 ret = krb5_crypto_init(context, &keyblock, 0, &crypto);
|
/macosx-10.9.5/MITKerberosShim-62.1/mittestcc/ |
H A D | test_ccapi_util.c | 64 v5creds->keyblock.type = 1; 65 v5creds->keyblock.length = 0; 66 v5creds->keyblock.data = NULL; 112 if (v5creds->keyblock.data) { free(v5creds->keyblock.data); }
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/ |
H A D | common_glue.c | 150 * @keyblock is where the key will be placed 158 int32_t kvno, krb5_keyblock *keyblock, 170 keyblock->keytype = ktype; 171 keyblock->keyvalue.length = entry->key_data[i].key_data_length[0]; 172 keyblock->keyvalue.data = malloc(keyblock->keyvalue.length); 173 if (keyblock->keyvalue.data == NULL) 175 memcpy(keyblock->keyvalue.data, 177 keyblock->keyvalue.length); 155 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, int32_t ktype, int32_t stype, int32_t kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/mech/ |
H A D | gss_krb5.c | 243 set_key(krb5_keyblock *keyblock, gss_krb5_lucid_key_t *key) argument 245 key->type = keyblock->keytype; 246 key->length = (OM_uint32)keyblock->keyvalue.length; 250 memcpy(key->data, keyblock->keyvalue.data, key->length); 712 krb5_keyblock **keyblock) 752 *keyblock = calloc(1, sizeof(**keyblock)); 753 if (keyblock == NULL) { 758 ret = krb5_ret_keyblock(sp, *keyblock); 764 if (ret && keyblock) { 709 gsskrb5_extract_key(OM_uint32 *minor_status, gss_ctx_id_t context_handle, const gss_OID oid, krb5_keyblock **keyblock) argument 783 gsskrb5_extract_service_keyblock(OM_uint32 *minor_status, gss_ctx_id_t context_handle, struct EncryptionKey **keyblock) argument 794 gsskrb5_get_initiator_subkey(OM_uint32 *minor_status, gss_ctx_id_t context_handle, struct EncryptionKey **keyblock) argument 805 gsskrb5_get_subkey(OM_uint32 *minor_status, gss_ctx_id_t context_handle, struct EncryptionKey **keyblock) argument [all...] |
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/ |
H A D | CredentialsCache2.h | 61 /*
* This is backwards compatibility for CCache API v2 clients to be able to run
* against the CCache API v3 library
*/
#ifndef __CREDENTIALSCACHE2__
#define __CREDENTIALSCACHE2__
#include <CredentialsCache/CredentialsCache.h>
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#include <KerberosSupport/KerberosConditionalMacros.h>
#if PRAGMA_IMPORT
# pragma import on
#endif
/* This stuff is to make sure that we always use the same compiler options for
this header file. Otherwise we get really exciting failure modes -- meeroh */
/* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS
(where our implementation defined it to be 2-byte aligned) */
#if TARGET_OS_MAC
#if PRAGMA_STRUCT_ALIGN
#pragma options align=mac68k
#elif PRAGMA_STRUCT_PACKPUSH
#pragma pack(push, 2)
#elif PRAGMA_STRUCT_PACK
#pragma pack(2)
#endif
#endif
#if PRAGMA_ENUM_ALWAYSINT
#pragma enumsalwaysint on
#endif
#if TARGET_CPU_68K
#pragma fourbyteints on
#endif
/* Some old types get directly mapped to new types */
typedef cc_context_d apiCB;
typedef cc_ccache_d ccache_p;
typedef cc_credentials_iterator_d ccache_cit_creds;
typedef cc_ccache_iterator_d ccache_cit_ccache;
typedef cc_data cc_data_compat;
typedef cc_int32 cc_cred_vers;
typedef cc_int32 cc_result;
/* This doesn't exist in API v3 */
typedef cc_uint32 cc_flags;
/* Credentials types are visible to the caller so we have to keep binary compatibility */
typedef struct cc_credentials_v5_compat {
char* client;
char* server;
cc_data_compat keyblock;
cc_time_t authtime;
cc_time_t starttime;
cc_time_t endtime;
cc_time_t renew_till;
cc (…) 1 / member in struct:cc_credentials_v5_compat
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/saslauthd/ |
H A D | auth_krb5.c | 263 krb5_keyblock *keyblock = NULL; local 284 0, &keyblock)) { 288 if (keyblock) { 289 krb5_free_keyblock(context, keyblock);
|
/macosx-10.9.5/Heimdal-323.92.1/appl/kx/ |
H A D | krb5.c | 42 krb5_keyblock *keyblock; member in struct:krb5_kx_context 88 if (K5DATA(kc)->keyblock) 89 krb5_free_keyblock (CONTEXT(kc), K5DATA(kc)->keyblock); 140 &K5DATA(kc)->keyblock); 147 ret = krb5_crypto_init (CONTEXT(kc), K5DATA(kc)->keyblock, 426 ret = krb5_auth_con_getkey (CONTEXT(kc), auth_context, &K5DATA(kc)->keyblock); 432 ret = krb5_crypto_init (CONTEXT(kc), K5DATA(kc)->keyblock, 0, &K5DATA(kc)->crypto);
|