Searched refs:keyblock (Results 1 - 25 of 84) sorted by relevance

1234

/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dkeyblock.c37 * Zero out a keyblock
39 * @param keyblock keyblock to zero out
45 krb5_keyblock_zero(krb5_keyblock *keyblock) argument
47 keyblock->keytype = 0;
48 krb5_data_zero(&keyblock->keyvalue);
52 * Free a keyblock's content, also zero out the content of the keyblock.
55 * @param keyblock keyblock conten
61 krb5_free_keyblock_contents(krb5_context context, krb5_keyblock *keyblock) argument
83 krb5_free_keyblock(krb5_context context, krb5_keyblock *keyblock) argument
[all...]
H A Dmk_req_ext.c72 krb5_free_keyblock(context, ac->keyblock);
73 ret = krb5_copy_keyblock(context, &in_creds->session, &ac->keyblock);
83 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
92 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
93 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
94 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
95 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
107 ret = krb5_crypto_init(context, ac->keyblock, 0, &crypto);
129 ac->keyblock->keytype,
139 ret = krb5_build_ap_req (context, ac->keyblock
[all...]
H A Dauth_context.c81 krb5_free_keyblock(context, auth_context->keyblock);
297 krb5_keyblock **keyblock)
299 return copy_key(context, auth_context->keyblock, keyblock);
305 krb5_keyblock **keyblock)
307 return copy_key(context, auth_context->local_subkey, keyblock);
314 krb5_keyblock **keyblock)
316 return copy_key(context, auth_context->remote_subkey, keyblock);
322 krb5_keyblock *keyblock)
324 if(auth_context->keyblock)
295 krb5_auth_con_getkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
303 krb5_auth_con_getlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
312 krb5_auth_con_getremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
320 krb5_auth_con_setkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
330 krb5_auth_con_setlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
360 krb5_auth_con_setremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
494 krb5_auth_con_setuserkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
[all...]
H A Drd_req.c318 krb5_keyblock *keyblock,
327 keyblock,
339 krb5_keyblock *keyblock,
368 if (ap_req->ap_options.use_session_key && ac->keyblock){
370 ac->keyblock,
373 krb5_free_keyblock(context, ac->keyblock);
374 ac->keyblock = NULL;
377 keyblock,
481 ret = krb5_copy_keyblock(context, &t->ticket.key, &ac->keyblock);
519 krb5_keyblock *keyblock; member in struct:krb5_rd_req_in_ctx_data
314 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
335 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument
524 krb5_keyblock *keyblock; member in struct:krb5_rd_req_out_ctx_data
603 krb5_rd_req_in_set_keyblock(krb5_context context, krb5_rd_req_in_ctx in, krb5_keyblock *keyblock) argument
629 krb5_rd_req_out_get_keyblock(krb5_context context, krb5_rd_req_out_ctx out, krb5_keyblock **keyblock) argument
740 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
H A Dmk_rep.c60 auth_context->keyblock);
79 auth_context->keyblock,
91 ap.enc_part.etype = auth_context->keyblock->keytype;
100 ret = krb5_crypto_init(context, auth_context->keyblock,
H A Dkeytab_keyfile.c267 entry->keyblock.keytype = ETYPE_DES_CBC_MD5;
269 entry->keyblock.keytype = ETYPE_DES_CBC_CRC;
270 entry->keyblock.keyvalue.length = 8;
271 entry->keyblock.keyvalue.data = malloc (8);
272 if (entry->keyblock.keyvalue.data == NULL) {
280 ret = krb5_storage_read(cursor->sp, entry->keyblock.keyvalue.data, 8);
322 if (entry->keyblock.keyvalue.length != 8)
324 switch(entry->keyblock.keytype) {
436 ret = krb5_storage_write(sp, entry->keyblock.keyvalue.data,
437 entry->keyblock
[all...]
H A Dmit_glue.c400 krb5_keyblock **keyblock)
402 return krb5_auth_con_getlocalsubkey(context, auth_context, keyblock);
407 krb5_keyblock **keyblock)
409 return krb5_auth_con_getremotesubkey(context, auth_context, keyblock);
414 krb5_keyblock *keyblock)
416 return krb5_auth_con_setlocalsubkey(context, auth_context, keyblock);
421 krb5_keyblock *keyblock)
423 return krb5_auth_con_setremotesubkey(context, auth_context, keyblock);
399 krb5_auth_con_getsendsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
406 krb5_auth_con_getrecvsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
413 krb5_auth_con_setsendsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
420 krb5_auth_con_setrecvsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
/macosx-10.9.5/Heimdal-323.92.1/kadmin/
H A Dadd_enctype.c114 krb5_keyblock keyblock; local
120 ret = krb5_generate_random_keyblock (context, etypes[i], &keyblock);
130 new_key_data[n].key_data_contents[0] = malloc(keyblock.keyvalue.length);
138 new_key_data[n].key_data_length[0] = keyblock.keyvalue.length;
140 keyblock.keyvalue.data,
141 keyblock.keyvalue.length);
142 krb5_free_keyblock_contents(context, &keyblock);
H A Dext.c78 keys[i].keyblock.keytype = kd->key_data_type[0];
79 keys[i].keyblock.keyvalue.length = kd->key_data_length[0];
80 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0];
100 keys[i].keyblock = k[i];
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/
H A Dimport_sec_context.c52 krb5_keyblock keyblock; local
122 if (krb5_ret_keyblock (sp, &keyblock) != 0)
124 krb5_auth_con_setkey (context, ac, &keyblock);
125 krb5_free_keyblock_contents (context, &keyblock);
128 if (krb5_ret_keyblock (sp, &keyblock) != 0)
130 krb5_auth_con_setlocalsubkey (context, ac, &keyblock);
131 krb5_free_keyblock_contents (context, &keyblock);
134 if (krb5_ret_keyblock (sp, &keyblock) != 0)
136 krb5_auth_con_setremotesubkey (context, ac, &keyblock);
137 krb5_free_keyblock_contents (context, &keyblock);
[all...]
H A Dtest_cfx.c138 krb5_keyblock keyblock; local
150 &keyblock);
154 ret = krb5_crypto_init(context, &keyblock, 0, &crypto);
166 krb5_free_keyblock_contents(context, &keyblock);
/macosx-10.9.5/MITKerberosShim-62.1/
H A Dcrypto.c75 mit_krb5_keyblock * keyblock,
84 keyblock);
148 krb5_keyblock keyblock; local
153 mshim_mkeyblock2hkeyblock(key, &keyblock);
155 ret = heim_krb5_crypto_init(HC(context), &keyblock, input->enctype, &crypto);
156 heim_krb5_free_keyblock_contents(HC(context), &keyblock); local
200 krb5_keyblock keyblock; local
203 mshim_mkeyblock2hkeyblock(key, &keyblock);
205 ret = heim_krb5_crypto_init(HC(context), &keyblock, 0, &crypto);
206 heim_krb5_free_keyblock_contents(HC(context), &keyblock); local
73 krb5_string_to_key(mit_krb5_context context, const mit_krb5_encrypt_block * eblock, mit_krb5_keyblock * keyblock, const mit_krb5_data * data, const mit_krb5_data * salt) argument
[all...]
H A Dcreds.c112 ret = krb5_copy_keyblock_contents(context, &from->keyblock,
113 &c->keyblock);
H A Dkeytab.c74 mshim_hkeyblock2mkeyblock(&e.keyblock, &entry->key);
289 e.keyblock.keytype = entry->key.enctype;
290 e.keyblock.keyvalue.data = entry->key.contents;
291 e.keyblock.keyvalue.length = entry->key.length;
/macosx-10.9.5/Heimdal-323.92.1/admin/
H A Dcopy.c90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str);
98 entry.keyblock.keytype,
104 if(!compare_keyblock(&entry.keyblock, &dummy.keyblock)) {
H A Dlist.c98 entry.keyblock.keytype, &s);
100 snprintf(buf, sizeof(buf), "unknown (%d)", entry.keyblock.keytype);
117 s = malloc(2 * entry.keyblock.keyvalue.length + 1);
123 for(i = 0; i < entry.keyblock.keyvalue.length; i++)
125 ((unsigned char*)entry.keyblock.keyvalue.data)[i]);
H A Dadd.c144 data, len, &entry.keyblock);
156 &entry.keyblock);
159 entry.principal, &entry.keyblock);
163 ret = krb5_generate_random_keyblock(context, enctype, &entry.keyblock);
H A Dremove.c82 entry.keyblock.keytype = enctype;
/macosx-10.9.5/Heimdal-323.92.1/kcm/
H A Dstore.c162 krb5_keyblock keyblock; local
163 keyblock.keytype = ETYPE_AES128_CTS_HMAC_SHA1_96;
164 keyblock.keyvalue.data = inseed;
165 keyblock.keyvalue.length = 16;
167 ret = krb5_crypto_init(context, &keyblock, 0, &crypto);
/macosx-10.9.5/MITKerberosShim-62.1/mittestcc/
H A Dtest_ccapi_util.c64 v5creds->keyblock.type = 1;
65 v5creds->keyblock.length = 0;
66 v5creds->keyblock.data = NULL;
112 if (v5creds->keyblock.data) { free(v5creds->keyblock.data); }
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/
H A Dcommon_glue.c150 * @keyblock is where the key will be placed
158 int32_t kvno, krb5_keyblock *keyblock,
170 keyblock->keytype = ktype;
171 keyblock->keyvalue.length = entry->key_data[i].key_data_length[0];
172 keyblock->keyvalue.data = malloc(keyblock->keyvalue.length);
173 if (keyblock->keyvalue.data == NULL)
175 memcpy(keyblock->keyvalue.data,
177 keyblock->keyvalue.length);
155 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, int32_t ktype, int32_t stype, int32_t kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/mech/
H A Dgss_krb5.c243 set_key(krb5_keyblock *keyblock, gss_krb5_lucid_key_t *key) argument
245 key->type = keyblock->keytype;
246 key->length = (OM_uint32)keyblock->keyvalue.length;
250 memcpy(key->data, keyblock->keyvalue.data, key->length);
712 krb5_keyblock **keyblock)
752 *keyblock = calloc(1, sizeof(**keyblock));
753 if (keyblock == NULL) {
758 ret = krb5_ret_keyblock(sp, *keyblock);
764 if (ret && keyblock) {
709 gsskrb5_extract_key(OM_uint32 *minor_status, gss_ctx_id_t context_handle, const gss_OID oid, krb5_keyblock **keyblock) argument
783 gsskrb5_extract_service_keyblock(OM_uint32 *minor_status, gss_ctx_id_t context_handle, struct EncryptionKey **keyblock) argument
794 gsskrb5_get_initiator_subkey(OM_uint32 *minor_status, gss_ctx_id_t context_handle, struct EncryptionKey **keyblock) argument
805 gsskrb5_get_subkey(OM_uint32 *minor_status, gss_ctx_id_t context_handle, struct EncryptionKey **keyblock) argument
[all...]
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/
H A DCredentialsCache2.h61 /* * This is backwards compatibility for CCache API v2 clients to be able to run * against the CCache API v3 library */ #ifndef __CREDENTIALSCACHE2__ #define __CREDENTIALSCACHE2__ #include <CredentialsCache/CredentialsCache.h> #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ #include <KerberosSupport/KerberosConditionalMacros.h> #if PRAGMA_IMPORT # pragma import on #endif /* This stuff is to make sure that we always use the same compiler options for this header file. Otherwise we get really exciting failure modes -- meeroh */ /* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS (where our implementation defined it to be 2-byte aligned) */ #if TARGET_OS_MAC #if PRAGMA_STRUCT_ALIGN #pragma options align=mac68k #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(push, 2) #elif PRAGMA_STRUCT_PACK #pragma pack(2) #endif #endif #if PRAGMA_ENUM_ALWAYSINT #pragma enumsalwaysint on #endif #if TARGET_CPU_68K #pragma fourbyteints on #endif /* Some old types get directly mapped to new types */ typedef cc_context_d apiCB; typedef cc_ccache_d ccache_p; typedef cc_credentials_iterator_d ccache_cit_creds; typedef cc_ccache_iterator_d ccache_cit_ccache; typedef cc_data cc_data_compat; typedef cc_int32 cc_cred_vers; typedef cc_int32 cc_result; /* This doesn't exist in API v3 */ typedef cc_uint32 cc_flags; /* Credentials types are visible to the caller so we have to keep binary compatibility */ typedef struct cc_credentials_v5_compat { char* client; char* server; cc_data_compat keyblock; cc_time_t authtime; cc_time_t starttime; cc_time_t endtime; cc_time_t renew_till; cc (…)
1 / member in struct:cc_credentials_v5_compat
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/saslauthd/
H A Dauth_krb5.c263 krb5_keyblock *keyblock = NULL; local
284 0, &keyblock)) {
288 if (keyblock) {
289 krb5_free_keyblock(context, keyblock);
/macosx-10.9.5/Heimdal-323.92.1/appl/kx/
H A Dkrb5.c42 krb5_keyblock *keyblock; member in struct:krb5_kx_context
88 if (K5DATA(kc)->keyblock)
89 krb5_free_keyblock (CONTEXT(kc), K5DATA(kc)->keyblock);
140 &K5DATA(kc)->keyblock);
147 ret = krb5_crypto_init (CONTEXT(kc), K5DATA(kc)->keyblock,
426 ret = krb5_auth_con_getkey (CONTEXT(kc), auth_context, &K5DATA(kc)->keyblock);
432 ret = krb5_crypto_init (CONTEXT(kc), K5DATA(kc)->keyblock, 0, &K5DATA(kc)->crypto);

Completed in 250 milliseconds

1234