Home
last modified time | relevance | path

Searched refs:enctypes (Results 1 – 25 of 42) sorted by relevance

12

/src/crypto/heimdal/lib/krb5/
H A Dtest_crypto.c160 krb5_enctype enctypes[] = { in main() local
192 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { in main()
194 krb5_enctype_enable(context, enctypes[i]); in main()
196 time_encryption(context, 16, enctypes[i], enciter); in main()
197 time_encryption(context, 32, enctypes[i], enciter); in main()
198 time_encryption(context, 512, enctypes[i], enciter); in main()
199 time_encryption(context, 1024, enctypes[i], enciter); in main()
200 time_encryption(context, 2048, enctypes[i], enciter); in main()
201 time_encryption(context, 4096, enctypes[i], enciter); in main()
202 time_encryption(context, 8192, enctypes[i], enciter); in main()
[all …]
H A Dtest_crypto_wrapping.c125 krb5_enctype enctypes[] = { in main() local
157 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { in main()
158 krb5_enctype_enable(context, enctypes[i]); in main()
160 test_wrapping(context, 0, 1024, 1, enctypes[i]); in main()
161 test_wrapping(context, 1024, 1024 * 100, 1024, enctypes[i]); in main()
H A Dcontext.c448 krb5_enctype *enctypes, in copy_etypes() argument
453 for (i = 0; enctypes[i]; i++) in copy_etypes()
463 memcpy(*ret_enctypes, enctypes, sizeof(ret_enctypes[0]) * i); in copy_etypes()
995 krb5_enctype *enctypes = NULL; in krb5_get_default_in_tkt_etypes() local
1004 enctypes = context->as_etypes; in krb5_get_default_in_tkt_etypes()
1006 enctypes = context->tgs_etypes; in krb5_get_default_in_tkt_etypes()
1008 enctypes = context->etypes; in krb5_get_default_in_tkt_etypes()
1010 if (enctypes != NULL) { in krb5_get_default_in_tkt_etypes()
1011 ret = copy_enctypes(context, enctypes, &p); in krb5_get_default_in_tkt_etypes()
H A Dget_in_tkt.c96 krb5_enctype *enctypes, in add_padata() argument
113 if (!enctypes) { in add_padata()
114 enctypes = context->etypes; in add_padata()
116 for (ep = enctypes; *ep != ETYPE_NULL; ep++) in add_padata()
129 ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key); in add_padata()
133 enctypes[i], key); in add_padata()
H A Dinit_creds_pw.c985 krb5_enctype *enctypes, in add_enc_ts_padata() argument
1002 if (!enctypes) { in add_enc_ts_padata()
1003 enctypes = context->etypes; in add_enc_ts_padata()
1005 for (ep = enctypes; *ep != ETYPE_NULL; ep++) in add_enc_ts_padata()
1012 _krb5_debug(context, 5, "krb5_get_init_creds: using ENC-TS with enctype %d", enctypes[i]); in add_enc_ts_padata()
1014 ret = (*keyproc)(context, enctypes[i], keyseed, in add_enc_ts_padata()
1018 ret = make_pa_enc_timestamp (context, md, enctypes[i], key); in add_enc_ts_padata()
/src/crypto/heimdal/lib/gssapi/krb5/
H A Dset_cred_option.c135 krb5_enctype *enctypes = NULL; in allowed_enctypes() local
153 enctypes = malloc((len + 1) * 4); in allowed_enctypes()
154 if (enctypes == NULL) { in allowed_enctypes()
176 enctypes[i] = e; in allowed_enctypes()
178 enctypes[i] = 0; in allowed_enctypes()
180 if (cred->enctypes) in allowed_enctypes()
181 free(cred->enctypes); in allowed_enctypes()
182 cred->enctypes = enctypes; in allowed_enctypes()
191 if (enctypes) in allowed_enctypes()
192 free(enctypes); in allowed_enctypes()
H A Drelease_cred.c68 if (cred->enctypes) in _gsskrb5_release_cred()
69 free(cred->enctypes); in _gsskrb5_release_cred()
H A Dinit_sec_context.c432 krb5_enctype *enctypes = NULL; in init_auth() local
434 if (cred && cred->enctypes) in init_auth()
435 enctypes = cred->enctypes; in init_auth()
436 krb5_set_default_in_tkt_etypes(context, enctypes); in init_auth()
H A Dgsskrb5_locl.h103 krb5_enctype *enctypes; member
/src/crypto/heimdal/lib/hdb/
H A Dkeys.c105 const krb5_enctype *enctypes = NULL; in parse_key_set() local
122 if(enctypes == NULL && num_buf > 1) { in parse_key_set()
127 enctypes = des_etypes; in parse_key_set()
131 enctypes = &e; in parse_key_set()
136 enctypes = &e; in parse_key_set()
149 if(enctypes == NULL) { in parse_key_set()
150 enctypes = all_etypes; in parse_key_set()
155 if(enctypes == NULL) { in parse_key_set()
156 enctypes = des_etypes; in parse_key_set()
177 if(enctypes == NULL || salt->salttype == 0) { in parse_key_set()
[all …]
/src/crypto/krb5/src/lib/crypto/crypto_tests/
H A Dt_decrypt.c526 enctypes[] = { variable
559 for (i = 0; i < sizeof(enctypes) / sizeof(*enctypes); i++) { in generate()
561 ret = krb5_c_make_random_key(context, enctypes[i], &kb); in generate()
564 ret = krb5_c_encrypt_length(context, enctypes[i], plain.length, in generate()
571 krb5_enctype_to_name(enctypes[i], FALSE, buf, sizeof(buf)); in generate()
/src/tools/regression/kgssapi/
H A Dgsstest.c111 int32_t enctypes[] = { in main() local
119 int num_enctypes = sizeof(enctypes) / sizeof(enctypes[0]); in main()
124 printf("testing etype %d\n", enctypes[i]); in main()
151 client_cred, 1, &enctypes[i]); in main()
/src/crypto/krb5/src/lib/krb5/krb/
H A Dsend_tgs.c137 krb5_enctype enctypes[2], *defenctypes = NULL; in k5_make_tgs_req() local
200 enctypes[0] = desired->keyblock.enctype; in k5_make_tgs_req()
201 enctypes[1] = ENCTYPE_NULL; in k5_make_tgs_req()
202 req.ktype = enctypes; in k5_make_tgs_req()
/src/crypto/krb5/src/lib/krb5/os/
H A Dt_trace.ref44 krb5_enctype *, display list of enctypes: 5, rc4-hmac-exp, 511
45 krb5_enctype *, display list of enctypes: (empty)
H A Dt_trace.c67 krb5_enctype enctypes[4] = { in main() local
208 TRACE(ctx, "krb5_enctype *, display list of enctypes: {etypes}", enctypes); in main()
/src/crypto/heimdal/lib/gssapi/gssapi/
H A Dgssapi_krb5.h221 int32_t *enctypes);
/src/crypto/krb5/src/lib/krb5/ccache/
H A Dcc_kcm.c884 krb5_enctype *enctypes = NULL; in kcm_retrieve() local
911 ret = krb5_get_tgs_ktypes(context, cred.server, &enctypes); in kcm_retrieve()
914 if (!k5_etypes_contains(enctypes, cred.keyblock.enctype)) { in kcm_retrieve()
927 free(enctypes); in kcm_retrieve()
/src/crypto/heimdal/kadmin/
H A Dkadmin-commands.in236 help = "Delete all the mentioned enctypes for principal."
248 help = "Add new enctypes for principal."
/src/kerberos5/lib/libgssapi_krb5/
H A Dgss_krb5.c419 int32_t *enctypes) in gss_krb5_set_allowable_enctypes() argument
436 ret = krb5_store_int32(sp, enctypes[i]); in gss_krb5_set_allowable_enctypes()
/src/crypto/heimdal/lib/asn1/
H A Dsetchgpw2.asn188 enctypes[1] SEQUENCE OF ENCTYPE OPTIONAL,
/src/crypto/heimdal/lib/gssapi/mech/
H A Dgss_krb5.c435 int32_t *enctypes) in gss_krb5_set_allowable_enctypes() argument
452 ret = krb5_store_int32(sp, enctypes[i]); in gss_krb5_set_allowable_enctypes()
/src/crypto/krb5/src/lib/kadm5/
H A Dkadm_err.et60 error_code KADM5_SETKEY3_ETYPE_MISMATCH, "Mismatched enctypes for setkey3"
/src/crypto/heimdal/admin/
H A Dktutil-commands.in133 long = "enctypes"
/src/crypto/heimdal/
H A DChangeLog.2004154 enctypes
235 * lib/asn1/k5.asn1: sync enctypes with pkinit branch
391 * kdc/kerberos5.c (get_pa_etype_info{,2}): check for dup enctypes
858 krb5_string_to_key_derived is broken for non 3des enctypes and
878 * kdc/pkinit.c: at least try to handle diffrent enveloped enctypes
H A DChangeLog.199896 * kuser/klist.c: try to list enctypes as keytypes
98 * kuser/kinit.c: remove extra `--cache' option, add `--enctypes'
99 to set list of enctypes to use
309 * kdc/kerberos5.c: always treat keytypes as enctypes; use new
316 * admin/srvconvert.c: add keys for all possible enctypes
785 * kdc/kerberos5.c: Check at runtime whether to use enctypes
825 from protocol keytypes (that really are enctypes) to internal
863 * kdc/kerberos5.c: Add some support for using enctypes instead of

12