| /src/crypto/heimdal/lib/krb5/ |
| H A D | test_crypto.c | 160 krb5_enctype enctypes[] = { in main() local 192 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { in main() 194 krb5_enctype_enable(context, enctypes[i]); in main() 196 time_encryption(context, 16, enctypes[i], enciter); in main() 197 time_encryption(context, 32, enctypes[i], enciter); in main() 198 time_encryption(context, 512, enctypes[i], enciter); in main() 199 time_encryption(context, 1024, enctypes[i], enciter); in main() 200 time_encryption(context, 2048, enctypes[i], enciter); in main() 201 time_encryption(context, 4096, enctypes[i], enciter); in main() 202 time_encryption(context, 8192, enctypes[i], enciter); in main() [all …]
|
| H A D | test_crypto_wrapping.c | 125 krb5_enctype enctypes[] = { in main() local 157 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { in main() 158 krb5_enctype_enable(context, enctypes[i]); in main() 160 test_wrapping(context, 0, 1024, 1, enctypes[i]); in main() 161 test_wrapping(context, 1024, 1024 * 100, 1024, enctypes[i]); in main()
|
| H A D | context.c | 448 krb5_enctype *enctypes, in copy_etypes() argument 453 for (i = 0; enctypes[i]; i++) in copy_etypes() 463 memcpy(*ret_enctypes, enctypes, sizeof(ret_enctypes[0]) * i); in copy_etypes() 995 krb5_enctype *enctypes = NULL; in krb5_get_default_in_tkt_etypes() local 1004 enctypes = context->as_etypes; in krb5_get_default_in_tkt_etypes() 1006 enctypes = context->tgs_etypes; in krb5_get_default_in_tkt_etypes() 1008 enctypes = context->etypes; in krb5_get_default_in_tkt_etypes() 1010 if (enctypes != NULL) { in krb5_get_default_in_tkt_etypes() 1011 ret = copy_enctypes(context, enctypes, &p); in krb5_get_default_in_tkt_etypes()
|
| H A D | get_in_tkt.c | 96 krb5_enctype *enctypes, in add_padata() argument 113 if (!enctypes) { in add_padata() 114 enctypes = context->etypes; in add_padata() 116 for (ep = enctypes; *ep != ETYPE_NULL; ep++) in add_padata() 129 ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key); in add_padata() 133 enctypes[i], key); in add_padata()
|
| H A D | init_creds_pw.c | 985 krb5_enctype *enctypes, in add_enc_ts_padata() argument 1002 if (!enctypes) { in add_enc_ts_padata() 1003 enctypes = context->etypes; in add_enc_ts_padata() 1005 for (ep = enctypes; *ep != ETYPE_NULL; ep++) in add_enc_ts_padata() 1012 _krb5_debug(context, 5, "krb5_get_init_creds: using ENC-TS with enctype %d", enctypes[i]); in add_enc_ts_padata() 1014 ret = (*keyproc)(context, enctypes[i], keyseed, in add_enc_ts_padata() 1018 ret = make_pa_enc_timestamp (context, md, enctypes[i], key); in add_enc_ts_padata()
|
| /src/crypto/heimdal/lib/gssapi/krb5/ |
| H A D | set_cred_option.c | 135 krb5_enctype *enctypes = NULL; in allowed_enctypes() local 153 enctypes = malloc((len + 1) * 4); in allowed_enctypes() 154 if (enctypes == NULL) { in allowed_enctypes() 176 enctypes[i] = e; in allowed_enctypes() 178 enctypes[i] = 0; in allowed_enctypes() 180 if (cred->enctypes) in allowed_enctypes() 181 free(cred->enctypes); in allowed_enctypes() 182 cred->enctypes = enctypes; in allowed_enctypes() 191 if (enctypes) in allowed_enctypes() 192 free(enctypes); in allowed_enctypes()
|
| H A D | release_cred.c | 68 if (cred->enctypes) in _gsskrb5_release_cred() 69 free(cred->enctypes); in _gsskrb5_release_cred()
|
| H A D | init_sec_context.c | 432 krb5_enctype *enctypes = NULL; in init_auth() local 434 if (cred && cred->enctypes) in init_auth() 435 enctypes = cred->enctypes; in init_auth() 436 krb5_set_default_in_tkt_etypes(context, enctypes); in init_auth()
|
| H A D | gsskrb5_locl.h | 103 krb5_enctype *enctypes; member
|
| /src/crypto/heimdal/lib/hdb/ |
| H A D | keys.c | 105 const krb5_enctype *enctypes = NULL; in parse_key_set() local 122 if(enctypes == NULL && num_buf > 1) { in parse_key_set() 127 enctypes = des_etypes; in parse_key_set() 131 enctypes = &e; in parse_key_set() 136 enctypes = &e; in parse_key_set() 149 if(enctypes == NULL) { in parse_key_set() 150 enctypes = all_etypes; in parse_key_set() 155 if(enctypes == NULL) { in parse_key_set() 156 enctypes = des_etypes; in parse_key_set() 177 if(enctypes == NULL || salt->salttype == 0) { in parse_key_set() [all …]
|
| /src/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_decrypt.c | 526 enctypes[] = { variable 559 for (i = 0; i < sizeof(enctypes) / sizeof(*enctypes); i++) { in generate() 561 ret = krb5_c_make_random_key(context, enctypes[i], &kb); in generate() 564 ret = krb5_c_encrypt_length(context, enctypes[i], plain.length, in generate() 571 krb5_enctype_to_name(enctypes[i], FALSE, buf, sizeof(buf)); in generate()
|
| /src/tools/regression/kgssapi/ |
| H A D | gsstest.c | 111 int32_t enctypes[] = { in main() local 119 int num_enctypes = sizeof(enctypes) / sizeof(enctypes[0]); in main() 124 printf("testing etype %d\n", enctypes[i]); in main() 151 client_cred, 1, &enctypes[i]); in main()
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | send_tgs.c | 137 krb5_enctype enctypes[2], *defenctypes = NULL; in k5_make_tgs_req() local 200 enctypes[0] = desired->keyblock.enctype; in k5_make_tgs_req() 201 enctypes[1] = ENCTYPE_NULL; in k5_make_tgs_req() 202 req.ktype = enctypes; in k5_make_tgs_req()
|
| /src/crypto/krb5/src/lib/krb5/os/ |
| H A D | t_trace.ref | 44 krb5_enctype *, display list of enctypes: 5, rc4-hmac-exp, 511 45 krb5_enctype *, display list of enctypes: (empty)
|
| H A D | t_trace.c | 67 krb5_enctype enctypes[4] = { in main() local 208 TRACE(ctx, "krb5_enctype *, display list of enctypes: {etypes}", enctypes); in main()
|
| /src/crypto/heimdal/lib/gssapi/gssapi/ |
| H A D | gssapi_krb5.h | 221 int32_t *enctypes);
|
| /src/crypto/krb5/src/lib/krb5/ccache/ |
| H A D | cc_kcm.c | 884 krb5_enctype *enctypes = NULL; in kcm_retrieve() local 911 ret = krb5_get_tgs_ktypes(context, cred.server, &enctypes); in kcm_retrieve() 914 if (!k5_etypes_contains(enctypes, cred.keyblock.enctype)) { in kcm_retrieve() 927 free(enctypes); in kcm_retrieve()
|
| /src/crypto/heimdal/kadmin/ |
| H A D | kadmin-commands.in | 236 help = "Delete all the mentioned enctypes for principal." 248 help = "Add new enctypes for principal."
|
| /src/kerberos5/lib/libgssapi_krb5/ |
| H A D | gss_krb5.c | 419 int32_t *enctypes) in gss_krb5_set_allowable_enctypes() argument 436 ret = krb5_store_int32(sp, enctypes[i]); in gss_krb5_set_allowable_enctypes()
|
| /src/crypto/heimdal/lib/asn1/ |
| H A D | setchgpw2.asn1 | 88 enctypes[1] SEQUENCE OF ENCTYPE OPTIONAL,
|
| /src/crypto/heimdal/lib/gssapi/mech/ |
| H A D | gss_krb5.c | 435 int32_t *enctypes) in gss_krb5_set_allowable_enctypes() argument 452 ret = krb5_store_int32(sp, enctypes[i]); in gss_krb5_set_allowable_enctypes()
|
| /src/crypto/krb5/src/lib/kadm5/ |
| H A D | kadm_err.et | 60 error_code KADM5_SETKEY3_ETYPE_MISMATCH, "Mismatched enctypes for setkey3"
|
| /src/crypto/heimdal/admin/ |
| H A D | ktutil-commands.in | 133 long = "enctypes"
|
| /src/crypto/heimdal/ |
| H A D | ChangeLog.2004 | 154 enctypes 235 * lib/asn1/k5.asn1: sync enctypes with pkinit branch 391 * kdc/kerberos5.c (get_pa_etype_info{,2}): check for dup enctypes 858 krb5_string_to_key_derived is broken for non 3des enctypes and 878 * kdc/pkinit.c: at least try to handle diffrent enveloped enctypes
|
| H A D | ChangeLog.1998 | 96 * kuser/klist.c: try to list enctypes as keytypes 98 * kuser/kinit.c: remove extra `--cache' option, add `--enctypes' 99 to set list of enctypes to use 309 * kdc/kerberos5.c: always treat keytypes as enctypes; use new 316 * admin/srvconvert.c: add keys for all possible enctypes 785 * kdc/kerberos5.c: Check at runtime whether to use enctypes 825 from protocol keytypes (that really are enctypes) to internal 863 * kdc/kerberos5.c: Add some support for using enctypes instead of
|