| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | t_get_etype_info.c | 45 krb5_data salt, s2kparams; in main() local 82 ret = krb5_get_etype_info(context, princ, opt, &etype, &salt, &s2kparams); in main() 95 if (s2kparams.length > 0) { in main() 96 ret = k5_hex_encode(s2kparams.data, s2kparams.length, TRUE, &hex); in main() 104 krb5_free_data_contents(context, &s2kparams); in main()
|
| H A D | get_etype_info.c | 98 krb5_data salt = empty_data(), s2kparams = empty_data(); in krb5_get_etype_info() local 160 if (icc->s2kparams.length > 0) { in krb5_get_etype_info() 161 ret = krb5int_copy_data_contents(context, &icc->s2kparams, &s2kparams); in krb5_get_etype_info() 167 *s2kparams_out = s2kparams; in krb5_get_etype_info() 170 s2kparams = empty_data(); in krb5_get_etype_info() 177 krb5_free_data_contents(context, &s2kparams); in krb5_get_etype_info()
|
| H A D | preauth2.c | 450 &ctx->s2kparams, &ctx->as_key, ctx->gak_data, in get_as_key() 776 krb5_free_data_contents(context, &ctx->s2kparams); in get_salt() 777 ret = alloc_data(&ctx->s2kparams, 1); in get_salt() 780 ctx->s2kparams.data[0] = '\1'; in get_salt() 846 krb5_free_data_contents(context, &ctx->s2kparams); in k5_get_etype_info() 847 ctx->s2kparams = entry->s2kparams; in k5_get_etype_info() 848 entry->s2kparams = empty_data(); in k5_get_etype_info() 849 TRACE_PREAUTH_ETYPE_INFO(context, ctx->etype, &ctx->salt, &ctx->s2kparams); in k5_get_etype_info()
|
| H A D | init_creds_ctx.h | 61 krb5_data s2kparams; member
|
| H A D | preauth_sam2.c | 154 prompter, prompter_data, salt, &ctx->s2kparams, in sam2_process()
|
| H A D | int-proto.h | 37 void *prompter_data, krb5_data *salt, krb5_data *s2kparams,
|
| H A D | kfree.c | 268 krb5_free_data_contents(context, &info[i]->s2kparams); in krb5_free_etype_info() 808 free(val->s2kparams.data); in k5_free_pa_otp_challenge()
|
| H A D | get_in_tkt.c | 117 TRACE_INIT_CREDS_GAK(context, &ctx->salt, &ctx->s2kparams); in decrypt_as_reply() 120 ctx->prompter_data, &ctx->salt, &ctx->s2kparams, in decrypt_as_reply() 538 krb5_free_data_contents(context, &ctx->s2kparams); in krb5_init_creds_free()
|
| /src/crypto/heimdal/kdc/ |
| H A D | kerberos5.c | 583 ent->s2kparams = NULL; in make_etype_info2_entry() 588 ALLOC(ent->s2kparams); in make_etype_info2_entry() 589 if (ent->s2kparams == NULL) in make_etype_info2_entry() 591 ent->s2kparams->length = 4; in make_etype_info2_entry() 592 ent->s2kparams->data = malloc(ent->s2kparams->length); in make_etype_info2_entry() 593 if (ent->s2kparams->data == NULL) { in make_etype_info2_entry() 594 free(ent->s2kparams); in make_etype_info2_entry() 595 ent->s2kparams = NULL; in make_etype_info2_entry() 598 _krb5_put_int(ent->s2kparams->data, in make_etype_info2_entry() 600 ent->s2kparams->length); in make_etype_info2_entry() [all …]
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | init_creds_pw.c | 86 krb5_data *s2kparams; member 93 if (ppaid->s2kparams) in free_paid() 94 krb5_free_data(context, ppaid->s2kparams); in free_paid() 726 krb5_data *s2kparams) in set_paid() argument 738 if (s2kparams) { in set_paid() 741 ret = krb5_copy_data(context, s2kparams, &paid->s2kparams); in set_paid() 748 paid->s2kparams = NULL; in set_paid() 787 e.val[i].s2kparams); in pa_etype_info2() 988 krb5_data *s2kparams) in add_enc_ts_padata() argument 1015 *salt, s2kparams, &key); in add_enc_ts_padata() [all …]
|
| /src/crypto/krb5/src/kadmin/ktutil/ |
| H A D | ktutil_funcs.c | 150 krb5_data params = empty_data(), *s2kparams; in ktutil_add() local 198 s2kparams = (params.length > 0) ? ¶ms : NULL; in ktutil_add() 200 &salt, s2kparams, &key); in ktutil_add()
|
| /src/crypto/krb5/src/include/ |
| H A D | k5-trace.h | 228 #define TRACE_INIT_CREDS_GAK(c, salt, s2kparams) \ argument 230 salt, s2kparams) 322 #define TRACE_PREAUTH_ETYPE_INFO(c, etype, salt, s2kparams) \ argument 324 "params \"{data}\"", etype, salt, s2kparams)
|
| H A D | k5-int.h | 435 krb5_data s2kparams; member 542 krb5_data s2kparams; member
|
| /src/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | kerberos.schema | 371 ##### s2kparams [2] OCTET STRING OPTIONAL, 456 ##### s2kparams [2] OCTET STRING OPTIONAL,
|
| H A D | kerberos.ldif | 465 ##### s2kparams [2] OCTET STRING OPTIONAL, 567 ##### s2kparams [2] OCTET STRING OPTIONAL,
|
| /src/crypto/krb5/src/kdc/ |
| H A D | kdc_preauth.c | 1528 entry->s2kparams = empty_data(); in _make_etype_info_entry() 1542 krb5_free_data_contents(context, &entry->s2kparams); in _make_etype_info_entry()
|
| /src/crypto/krb5/src/lib/krb5/asn.1/ |
| H A D | asn1_k_encode.c | 623 DEFFIELD(etype_info2_2, krb5_etype_info_entry, s2kparams, 2, opt_ostring_data); 1592 DEFFIELD_IMPLICIT(otp_ch_4, krb5_pa_otp_challenge, s2kparams, 4,
|
| /src/crypto/heimdal/lib/asn1/ |
| H A D | krb5.asn1 | 434 s2kparams[2] OCTET STRING OPTIONAL
|
| /src/crypto/krb5/src/include/krb5/ |
| H A D | krb5.hin | 7304 * Retrieve enctype, salt and s2kparams from KDC
|