| /src/crypto/heimdal/lib/hdb/ |
| H A D | keys.c | 143 if(salt->salttype == 0) { in parse_key_set() 153 salt->salttype = KRB5_PW_SALT; in parse_key_set() 159 salt->salttype = KRB5_AFS3_SALT; in parse_key_set() 177 if(enctypes == NULL || salt->salttype == 0) { in parse_key_set() 184 if(salt->salttype == KRB5_PW_SALT) in parse_key_set() 186 else if(salt->salttype == KRB5_AFS3_SALT) { in parse_key_set() 292 key.salt->type = salt->salttype; in add_enctype_to_key_set() 380 if (k->salt == NULL && salt.salttype == KRB5_PW_SALT) in hdb_generate_key_set() 382 if (k->salt->type == salt.salttype && in hdb_generate_key_set() 444 salt.salttype = (*keys)[i].salt->type; in hdb_generate_key_set_password()
|
| H A D | print.c | 157 unsigned int salttype; in append_mit_key() local 186 salttype = KRB5_KDB_SALTTYPE_NORMAL; /* matches */ in append_mit_key() 190 salttype = KRB5_KDB_SALTTYPE_ONLYREALM; /* matches realm */ in append_mit_key() 194 salttype = KRB5_KDB_SALTTYPE_NOREALM; /* matches w/o realm */ in append_mit_key() 196 salttype = KRB5_KDB_SALTTYPE_NORMAL; /* hope for best */ in append_mit_key() 199 salttype = KRB5_KDB_SALTTYPE_AFS3; in append_mit_key() 201 sz = append_string(context, sp, "\t%u\t%u\t", salttype, in append_mit_key()
|
| H A D | mkey.c | 536 salt.salttype = KRB5_PW_SALT; in _hdb_unseal_keys_mkey()
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | salt.c | 75 krb5_salttype *salttype) in krb5_string_to_salttype() argument 91 *salttype = st->type; in krb5_string_to_salttype() 110 salt->salttype = KRB5_PW_SALT; in krb5_get_pw_salt() 205 if(st->type == salt.salttype) in krb5_string_to_key_data_salt_opaque() 210 salt.salttype); in krb5_string_to_key_data_salt_opaque()
|
| H A D | get_in_tkt.c | 264 if(preauth->val[i].info.val[j].salttype) in init_as_req() 265 salt.salttype = *preauth->val[i].info.val[j].salttype; in init_as_req() 267 salt.salttype = KRB5_PW_SALT; in init_as_req() 271 if(salt.salttype == KRB5_PW_SALT) in init_as_req() 304 salt.salttype = KRB5_PW_SALT; in init_as_req() 483 salt.salttype = (krb5_salttype)pa->padata_type; in krb5_get_in_cred()
|
| H A D | init_creds_pw.c | 725 krb5_salttype salttype, void *salt_string, size_t salt_len, in set_paid() argument 729 paid->salt.salttype = salttype; in set_paid() 824 salt.salttype = KRB5_PW_SALT; in pa_etype_info() 831 if (e.val[i].salttype) in pa_etype_info() 832 salt.salttype = *e.val[i].salttype; in pa_etype_info() 835 salt.salttype, in pa_etype_info() 866 paid->salt.salttype, in pa_pw_or_afs3_salt() 918 paid->salt.salttype = (krb5_salttype)pa_prefs[i].type; in process_pa_info() 1056 salt.salttype = KRB5_PW_SALT; in pa_data_to_md_ts_enc()
|
| H A D | test_crypto.c | 181 salt.salttype = KRB5_PW_SALT; in main()
|
| H A D | krb5.h | 295 krb5_salttype salttype; member
|
| H A D | aes-test.c | 211 salt.salttype = KRB5_PW_SALT; in string_to_key_test()
|
| /src/crypto/krb5/src/lib/kadm5/ |
| H A D | str_conv.c | 271 krb5_enctype enctype, krb5_int32 salttype) in krb5_keysalt_is_present() argument 280 ((ksaltlist[i].ks_salttype == salttype) || in krb5_keysalt_is_present() 281 (salttype < 0))) { in krb5_keysalt_is_present()
|
| /src/crypto/heimdal/kdc/ |
| H A D | string2key.c | 172 salt.salttype = KRB5_PW_SALT; in main() 178 salt.salttype = KRB5_AFS3_SALT; in main()
|
| H A D | kerberos5.c | 112 if (default_salt->salttype != key->salt->type) in is_default_salt_p() 479 ALLOC(ent->salttype); in make_etype_info_entry() 482 *ent->salttype = 0; /* or 1? or NULL? */ in make_etype_info_entry() 484 *ent->salttype = 2; in make_etype_info_entry() 496 ALLOC(ent->salttype); in make_etype_info_entry() 497 *ent->salttype = key->salt->type; in make_etype_info_entry() 505 ent->salttype = NULL; in make_etype_info_entry() 515 ent->salttype = NULL; in make_etype_info_entry()
|
| H A D | kstash.c | 104 salt.salttype = KRB5_PW_SALT; in main()
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | str_conv.c | 95 krb5_salttype_to_string(krb5_int32 salttype, char *buffer, size_t buflen) in krb5_salttype_to_string() argument 102 if (salttype == salttype_table[i].stt_enctype) { in krb5_salttype_to_string()
|
| /src/crypto/krb5/src/lib/kdb/ |
| H A D | kdb_default.c | 50 krb5_int32 salttype, krb5_int32 kvno, in krb5_dbe_def_search_enctype() argument 79 if (salttype >= 0 && db_salttype != salttype) in krb5_dbe_def_search_enctype()
|
| /src/crypto/krb5/src/kadmin/dbutil/ |
| H A D | tabdump.c | 210 write_salttype(struct rec_args *args, krb5_int16 salttype) in write_salttype() argument 218 ret = krb5_salttype_to_string(salttype, buf, sizeof(buf)); in write_salttype() 226 if (writefield(h, "%d", salttype) < 0) in write_salttype()
|
| /src/crypto/heimdal/kadmin/ |
| H A D | stash.c | 81 salt.salttype = KRB5_PW_SALT; in stash()
|
| H A D | get.c | 113 if (salt->salttype != (size_t)k->key_data_type[1]) in cmp_salt()
|
| /src/crypto/heimdal/admin/ |
| H A D | add.c | 129 salt.salttype = KRB5_PW_SALT; in kt_add()
|
| /src/crypto/krb5/src/kadmin/cli/ |
| H A D | kadmin.c | 1506 char enctype[BUFSIZ], salttype[BUFSIZ]; in kadmin_getprinc() local 1522 salttype, sizeof(salttype))) in kadmin_getprinc() 1523 snprintf(salttype, sizeof(salttype), _("<Salt type 0x%x>"), in kadmin_getprinc() 1525 printf(":%s", salttype); in kadmin_getprinc()
|
| /src/crypto/krb5/src/kdc/ |
| H A D | kdc_preauth.c | 810 krb5_int16 salttype; in add_pw_salt() local 817 rock->request->client, &salttype, &salt); in add_pw_salt() 1515 krb5_int16 salttype; in _make_etype_info_entry() local 1530 &salttype, &salt); in _make_etype_info_entry()
|
| /src/crypto/krb5/src/plugins/kdb/test/ |
| H A D | kdb_test.c | 191 make_keyblock(krb5_kvno kvno, krb5_enctype etype, int32_t salttype, in make_keyblock() argument 205 (int)salttype, princstr, (int)realm->length, realm->data) < 0) in make_keyblock()
|
| /src/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | kerberos.schema | 327 ##### Allowed enctype:salttype combinations for key changes
|
| H A D | kerberos.ldif | 412 ##### Allowed enctype:salttype combinations for key changes
|
| /src/crypto/heimdal/lib/asn1/ |
| H A D | krb5.asn1 | 426 salttype[2] krb5int32 OPTIONAL
|