Home
last modified time | relevance | path

Searched refs:e_data (Results 1 – 25 of 41) sorted by relevance

12

/src/crypto/krb5/src/kdc/
H A Ddo_as_req.c172 krb5_pa_data **e_data; member
375 errcode, state->e_data, in finish_process_as_req()
414 krb5_free_pa_data(context, state->e_data); in finish_process_as_req()
445 get_preauth_hint_list(state->request, &state->rock, &state->e_data, in finish_preauth()
459 get_preauth_hint_list(state->request, &state->rock, &state->e_data, in finish_preauth()
632 &state->status, &state->e_data); in process_as_req()
759 &state->enc_tkt_reply, &state->pa_context, &state->e_data, in process_as_req()
780 krb5_pa_data **e_data = NULL, *cookie = NULL; in prepare_error_as() local
789 e_data = calloc(count + 2, sizeof(*e_data)); in prepare_error_as()
790 if (e_data == NULL) in prepare_error_as()
[all …]
H A Ddo_tgs_req.c185 const char *status, krb5_pa_data **e_data) in prepare_error_tgs() argument
214 if (e_data != NULL) { in prepare_error_tgs()
215 retval = encode_krb5_padata_sequence(e_data, &e_data_asn1); in prepare_error_tgs()
221 errpkt.e_data = *e_data_asn1; in prepare_error_tgs()
223 errpkt.e_data = empty_data(); in prepare_error_tgs()
225 retval = kdc_fast_handle_error(context, state, request, e_data, in prepare_error_tgs()
234 errpkt.e_data = *fast_edata; in prepare_error_tgs()
860 krb5_pa_data ***e_data) in check_tgs_req() argument
876 status, e_data); in check_tgs_req()
885 t->is_crossrealm, t->is_referral, status, e_data); in check_tgs_req()
[all …]
H A Dtgs_policy.c267 const char **status, krb5_pa_data ***e_data) in check_tgs_s4u2self() argument
346 status, e_data); in check_tgs_s4u2self()
676 const char **status, krb5_pa_data ***e_data) in check_tgs_constraints() argument
703 e_data); in check_tgs_constraints()
739 krb5_pa_data ***e_data) in check_tgs_policy() argument
769 e_data); in check_tgs_policy()
H A Ddispatch.c196 errpkt.e_data.length = 0; in make_too_big_error()
197 errpkt.e_data.data = 0; in make_too_big_error()
H A Dkdc_preauth.c1214 krb5_kdcpreauth_modreq modreq, krb5_pa_data **e_data, in finish_verify_padata() argument
1248 state->pa_e_data = e_data; in finish_verify_padata()
1257 state->pa_e_data = e_data; in finish_verify_padata()
1260 } else if (e_data != NULL) { in finish_verify_padata()
1262 krb5_free_pa_data(state->context, e_data); in finish_verify_padata()
1270 if (e_data != NULL) in finish_verify_padata()
1271 krb5_free_pa_data(state->context, e_data); in finish_verify_padata()
1340 krb5_pa_data ***e_data, krb5_boolean *typed_e_data, in check_padata() argument
1368 state->e_data_out = e_data; in check_padata()
H A Dkdc_util.h93 const char **status, krb5_pa_data ***e_data);
102 krb5_pa_data ***e_data);
201 krb5_pa_data ***e_data, krb5_boolean *typed_e_data,
/src/crypto/heimdal/lib/krb5/
H A Dmk_error.c40 const krb5_data *e_data, in krb5_mk_error() argument
72 if (e_data) in krb5_mk_error()
73 msg.e_data = rk_UNCONST(e_data); in krb5_mk_error()
H A Dchangepw.c348 if (error.e_data->length < 2) { in process_reply()
356 p = error.e_data->data; in process_reply()
358 if (error.e_data->length == 2) in process_reply()
363 error.e_data->length - 2); in process_reply()
439 if (error.e_data->length < 2) { in process_reply()
444 p = error.e_data->data; in process_reply()
448 error.e_data->length - 2); in process_reply()
H A Dget_in_tkt.c331 if(error->e_data) { in set_ptypes()
334 decode_METHOD_DATA(error->e_data->data, in set_ptypes()
335 error->e_data->length, in set_ptypes()
/src/crypto/heimdal/kpasswd/
H A Dkpasswdd.c154 krb5_data e_data; in reply_error() local
157 if (make_result(&e_data, result_code, expl)) in reply_error()
164 krb5_data_free (&e_data); in reply_error()
172 &e_data, in reply_error()
180 krb5_data_free (&e_data); in reply_error()
200 krb5_data e_data; in reply_priv() local
210 if (make_result(&e_data, result_code, expl)) in reply_priv()
215 &e_data, in reply_priv()
218 krb5_data_free (&e_data); in reply_priv()
/src/crypto/heimdal/kdc/
H A Dwindc.c114 krb5_data *e_data) in _kdc_check_access() argument
126 req, e_data); in _kdc_check_access()
H A Dkerberos5.c971 krb5_data e_data; in _kdc_as_rep() local
988 krb5_data_zero(&e_data); in _kdc_as_rep()
1434 e_data.data = buf; in _kdc_as_rep()
1435 e_data.length = len; in _kdc_as_rep()
1457 req, &e_data); in _kdc_as_rep()
1833 (e_data.data ? &e_data : NULL), in _kdc_as_rep()
1845 if (e_data.data) in _kdc_as_rep()
1846 free(e_data.data); in _kdc_as_rep()
/src/crypto/krb5/src/include/
H A Dkdb.h206 krb5_octet * e_data; /* Extra data to be saved */ member
682 krb5_pa_data ***e_data);
689 krb5_pa_data ***e_data);
1328 krb5_pa_data ***e_data);
1345 krb5_pa_data ***e_data);
1388 void (*free_principal_e_data)(krb5_context kcontext, krb5_octet *e_data);
/src/crypto/krb5/src/kadmin/server/
H A Dmisc.c156 errpkt.e_data.length = 0; in make_toolong_error()
157 errpkt.e_data.data = 0; in make_toolong_error()
/src/crypto/krb5/src/plugins/kdb/db2/
H A Ddb2_exp.c165 krb5_pa_data ***e_data),
166 (kcontext, request, client, server, kdc_time, status, e_data));
H A Dkdb_xdr.c170 memcpy(nextloc, entry->e_data, entry->e_length); in krb5_encode_princ_entry()
316 entry->e_data = k5memdup(nextloc, entry->e_length, &retval); in krb5_decode_princ_entry()
317 if (entry->e_data == NULL) in krb5_decode_princ_entry()
H A Dkdb_db2.h133 krb5_pa_data ***e_data);
/src/crypto/openssl/test/
H A Drsa_test.c412 unsigned char e_data[] = { 0x01, 0x00, 0x01 }; in test_EVP_rsa_legacy_key() local
473 && TEST_ptr((e = BN_bin2bn(e_data, sizeof(e_data), NULL))) in test_EVP_rsa_legacy_key()
H A Devp_pkey_provided_test.c565 static unsigned char e_data[] = { 0x01, 0x00, 0x01 }; in test_fromdata_rsa_derive_from_pq_sp800() local
590 || !TEST_ptr(e = BN_bin2bn(e_data, sizeof(e_data), NULL)) in test_fromdata_rsa_derive_from_pq_sp800()
672 static unsigned char e_data[] = { 0x01, 0x00, 0x01 }; in test_fromdata_rsa_derive_from_pq_multiprime() local
762 || !TEST_ptr(e = BN_bin2bn(e_data, sizeof(e_data), NULL)) in test_fromdata_rsa_derive_from_pq_multiprime()
842 static const unsigned char e_data[] = { in test_evp_pkey_get_bn_param_large() local
854 || !TEST_ptr(e = BN_bin2bn(e_data, sizeof(e_data), NULL)) in test_evp_pkey_get_bn_param_large()
/src/crypto/krb5/src/lib/krb5/krb/
H A Dfast.c446 retval = decode_krb5_padata_sequence(&err_reply->e_data, &result); in krb5int_fast_process_error()
497 *retry = (err_reply->e_data.length > 0); in krb5int_fast_process_error()
500 retval = decode_krb5_padata_sequence(&err_reply->e_data, in krb5int_fast_process_error()
503 (void)decode_krb5_typed_data(&err_reply->e_data, out_padata); in krb5int_fast_process_error()
H A Dchpw.c91 if (krberror->e_data.data == NULL) { in get_error_edata()
97 ret = krb5_copy_data(context, &krberror->e_data, edata_out); in get_error_edata()
/src/crypto/krb5/src/plugins/preauth/securid_sam2/
H A Dsecurid_sam2_main.c265 krb5_data scratch, *scratch2, *e_data = NULL; in kdc_verify_preauth() local
337 retval = encode_krb5_padata_sequence(pa_array, &e_data); in kdc_verify_preauth()
/src/crypto/krb5/src/include/krb5/
H A Dkdcpreauth_plugin.h343 krb5_pa_data **e_data,
/src/crypto/krb5/src/lib/kdb/
H A Dkdb5.c866 if (entry->e_data != NULL) { in krb5_db_free_principal()
868 v->free_principal_e_data(kcontext, entry->e_data); in krb5_db_free_principal()
870 free(entry->e_data); in krb5_db_free_principal()
2661 krb5_pa_data ***e_data) in krb5_db_check_policy_as() argument
2667 *e_data = NULL; in krb5_db_check_policy_as()
2674 status, e_data); in krb5_db_check_policy_as()
2680 const char **status, krb5_pa_data ***e_data) in krb5_db_check_policy_tgs() argument
2686 *e_data = NULL; in krb5_db_check_policy_tgs()
2693 e_data); in krb5_db_check_policy_tgs()
/src/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_principal.c116 if (entry->e_data) in krb5_dbe_free_contents()
117 free(entry->e_data); in krb5_dbe_free_contents()

12