| /src/crypto/krb5/src/kdc/ |
| H A D | do_as_req.c | 172 krb5_pa_data **e_data; member 375 errcode, state->e_data, in finish_process_as_req() 414 krb5_free_pa_data(context, state->e_data); in finish_process_as_req() 445 get_preauth_hint_list(state->request, &state->rock, &state->e_data, in finish_preauth() 459 get_preauth_hint_list(state->request, &state->rock, &state->e_data, in finish_preauth() 632 &state->status, &state->e_data); in process_as_req() 759 &state->enc_tkt_reply, &state->pa_context, &state->e_data, in process_as_req() 780 krb5_pa_data **e_data = NULL, *cookie = NULL; in prepare_error_as() local 789 e_data = calloc(count + 2, sizeof(*e_data)); in prepare_error_as() 790 if (e_data == NULL) in prepare_error_as() [all …]
|
| H A D | do_tgs_req.c | 185 const char *status, krb5_pa_data **e_data) in prepare_error_tgs() argument 214 if (e_data != NULL) { in prepare_error_tgs() 215 retval = encode_krb5_padata_sequence(e_data, &e_data_asn1); in prepare_error_tgs() 221 errpkt.e_data = *e_data_asn1; in prepare_error_tgs() 223 errpkt.e_data = empty_data(); in prepare_error_tgs() 225 retval = kdc_fast_handle_error(context, state, request, e_data, in prepare_error_tgs() 234 errpkt.e_data = *fast_edata; in prepare_error_tgs() 860 krb5_pa_data ***e_data) in check_tgs_req() argument 876 status, e_data); in check_tgs_req() 885 t->is_crossrealm, t->is_referral, status, e_data); in check_tgs_req() [all …]
|
| H A D | tgs_policy.c | 267 const char **status, krb5_pa_data ***e_data) in check_tgs_s4u2self() argument 346 status, e_data); in check_tgs_s4u2self() 676 const char **status, krb5_pa_data ***e_data) in check_tgs_constraints() argument 703 e_data); in check_tgs_constraints() 739 krb5_pa_data ***e_data) in check_tgs_policy() argument 769 e_data); in check_tgs_policy()
|
| H A D | dispatch.c | 196 errpkt.e_data.length = 0; in make_too_big_error() 197 errpkt.e_data.data = 0; in make_too_big_error()
|
| H A D | kdc_preauth.c | 1214 krb5_kdcpreauth_modreq modreq, krb5_pa_data **e_data, in finish_verify_padata() argument 1248 state->pa_e_data = e_data; in finish_verify_padata() 1257 state->pa_e_data = e_data; in finish_verify_padata() 1260 } else if (e_data != NULL) { in finish_verify_padata() 1262 krb5_free_pa_data(state->context, e_data); in finish_verify_padata() 1270 if (e_data != NULL) in finish_verify_padata() 1271 krb5_free_pa_data(state->context, e_data); in finish_verify_padata() 1340 krb5_pa_data ***e_data, krb5_boolean *typed_e_data, in check_padata() argument 1368 state->e_data_out = e_data; in check_padata()
|
| H A D | kdc_util.h | 93 const char **status, krb5_pa_data ***e_data); 102 krb5_pa_data ***e_data); 201 krb5_pa_data ***e_data, krb5_boolean *typed_e_data,
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | mk_error.c | 40 const krb5_data *e_data, in krb5_mk_error() argument 72 if (e_data) in krb5_mk_error() 73 msg.e_data = rk_UNCONST(e_data); in krb5_mk_error()
|
| H A D | changepw.c | 348 if (error.e_data->length < 2) { in process_reply() 356 p = error.e_data->data; in process_reply() 358 if (error.e_data->length == 2) in process_reply() 363 error.e_data->length - 2); in process_reply() 439 if (error.e_data->length < 2) { in process_reply() 444 p = error.e_data->data; in process_reply() 448 error.e_data->length - 2); in process_reply()
|
| H A D | get_in_tkt.c | 331 if(error->e_data) { in set_ptypes() 334 decode_METHOD_DATA(error->e_data->data, in set_ptypes() 335 error->e_data->length, in set_ptypes()
|
| /src/crypto/heimdal/kpasswd/ |
| H A D | kpasswdd.c | 154 krb5_data e_data; in reply_error() local 157 if (make_result(&e_data, result_code, expl)) in reply_error() 164 krb5_data_free (&e_data); in reply_error() 172 &e_data, in reply_error() 180 krb5_data_free (&e_data); in reply_error() 200 krb5_data e_data; in reply_priv() local 210 if (make_result(&e_data, result_code, expl)) in reply_priv() 215 &e_data, in reply_priv() 218 krb5_data_free (&e_data); in reply_priv()
|
| /src/crypto/heimdal/kdc/ |
| H A D | windc.c | 114 krb5_data *e_data) in _kdc_check_access() argument 126 req, e_data); in _kdc_check_access()
|
| H A D | kerberos5.c | 971 krb5_data e_data; in _kdc_as_rep() local 988 krb5_data_zero(&e_data); in _kdc_as_rep() 1434 e_data.data = buf; in _kdc_as_rep() 1435 e_data.length = len; in _kdc_as_rep() 1457 req, &e_data); in _kdc_as_rep() 1833 (e_data.data ? &e_data : NULL), in _kdc_as_rep() 1845 if (e_data.data) in _kdc_as_rep() 1846 free(e_data.data); in _kdc_as_rep()
|
| /src/crypto/krb5/src/include/ |
| H A D | kdb.h | 206 krb5_octet * e_data; /* Extra data to be saved */ member 682 krb5_pa_data ***e_data); 689 krb5_pa_data ***e_data); 1328 krb5_pa_data ***e_data); 1345 krb5_pa_data ***e_data); 1388 void (*free_principal_e_data)(krb5_context kcontext, krb5_octet *e_data);
|
| /src/crypto/krb5/src/kadmin/server/ |
| H A D | misc.c | 156 errpkt.e_data.length = 0; in make_toolong_error() 157 errpkt.e_data.data = 0; in make_toolong_error()
|
| /src/crypto/krb5/src/plugins/kdb/db2/ |
| H A D | db2_exp.c | 165 krb5_pa_data ***e_data), 166 (kcontext, request, client, server, kdc_time, status, e_data));
|
| H A D | kdb_xdr.c | 170 memcpy(nextloc, entry->e_data, entry->e_length); in krb5_encode_princ_entry() 316 entry->e_data = k5memdup(nextloc, entry->e_length, &retval); in krb5_decode_princ_entry() 317 if (entry->e_data == NULL) in krb5_decode_princ_entry()
|
| H A D | kdb_db2.h | 133 krb5_pa_data ***e_data);
|
| /src/crypto/openssl/test/ |
| H A D | rsa_test.c | 412 unsigned char e_data[] = { 0x01, 0x00, 0x01 }; in test_EVP_rsa_legacy_key() local 473 && TEST_ptr((e = BN_bin2bn(e_data, sizeof(e_data), NULL))) in test_EVP_rsa_legacy_key()
|
| H A D | evp_pkey_provided_test.c | 565 static unsigned char e_data[] = { 0x01, 0x00, 0x01 }; in test_fromdata_rsa_derive_from_pq_sp800() local 590 || !TEST_ptr(e = BN_bin2bn(e_data, sizeof(e_data), NULL)) in test_fromdata_rsa_derive_from_pq_sp800() 672 static unsigned char e_data[] = { 0x01, 0x00, 0x01 }; in test_fromdata_rsa_derive_from_pq_multiprime() local 762 || !TEST_ptr(e = BN_bin2bn(e_data, sizeof(e_data), NULL)) in test_fromdata_rsa_derive_from_pq_multiprime() 842 static const unsigned char e_data[] = { in test_evp_pkey_get_bn_param_large() local 854 || !TEST_ptr(e = BN_bin2bn(e_data, sizeof(e_data), NULL)) in test_evp_pkey_get_bn_param_large()
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | fast.c | 446 retval = decode_krb5_padata_sequence(&err_reply->e_data, &result); in krb5int_fast_process_error() 497 *retry = (err_reply->e_data.length > 0); in krb5int_fast_process_error() 500 retval = decode_krb5_padata_sequence(&err_reply->e_data, in krb5int_fast_process_error() 503 (void)decode_krb5_typed_data(&err_reply->e_data, out_padata); in krb5int_fast_process_error()
|
| H A D | chpw.c | 91 if (krberror->e_data.data == NULL) { in get_error_edata() 97 ret = krb5_copy_data(context, &krberror->e_data, edata_out); in get_error_edata()
|
| /src/crypto/krb5/src/plugins/preauth/securid_sam2/ |
| H A D | securid_sam2_main.c | 265 krb5_data scratch, *scratch2, *e_data = NULL; in kdc_verify_preauth() local 337 retval = encode_krb5_padata_sequence(pa_array, &e_data); in kdc_verify_preauth()
|
| /src/crypto/krb5/src/include/krb5/ |
| H A D | kdcpreauth_plugin.h | 343 krb5_pa_data **e_data,
|
| /src/crypto/krb5/src/lib/kdb/ |
| H A D | kdb5.c | 866 if (entry->e_data != NULL) { in krb5_db_free_principal() 868 v->free_principal_e_data(kcontext, entry->e_data); in krb5_db_free_principal() 870 free(entry->e_data); in krb5_db_free_principal() 2661 krb5_pa_data ***e_data) in krb5_db_check_policy_as() argument 2667 *e_data = NULL; in krb5_db_check_policy_as() 2674 status, e_data); in krb5_db_check_policy_as() 2680 const char **status, krb5_pa_data ***e_data) in krb5_db_check_policy_tgs() argument 2686 *e_data = NULL; in krb5_db_check_policy_tgs() 2693 e_data); in krb5_db_check_policy_tgs()
|
| /src/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | ldap_principal.c | 116 if (entry->e_data) in krb5_dbe_free_contents() 117 free(entry->e_data); in krb5_dbe_free_contents()
|