Lines Matching defs:context

120 get_etype_info2(krb5_context context, krb5_kdc_req *request,
126 etype_info_as_rep_helper(krb5_context context, krb5_pa_data * padata,
275 load_preauth_plugins(krb5_context context)
357 ((*server_init_proc)(context, &plugin_context, (const char **)kdc_realm_names) != 0)) {
386 initerr = (*server_init_proc)(context, &plugin_context, (const char **)kdc_realm_names);
389 emsg = krb5_get_error_message(context, initerr);
394 krb5_free_error_message(context, emsg);
405 preauth_systems[k].flags = ftable->flags_proc(context, preauth_systems[k].type);
434 unload_preauth_plugins(krb5_context context)
440 (*preauth_systems[i].fini)(context,
454 * The make_padata_context() function creates a space for storing any context
456 * type gets a context storage location of its own.
467 make_padata_context(krb5_context context, void **padata_context)
497 * The free_padata_context function frees any context information pointers
504 struct request_pa_context *context;
512 context = *padata_context;
514 for (i = 0; i < context->n_contexts; i++) {
515 if (context->contexts[i].pa_context != NULL) {
516 preauth_system = context->contexts[i].pa_system;
519 pctx = &context->contexts[i].pa_context;
522 context->contexts[i].pa_context = NULL;
526 free(context->contexts);
527 free(context);
535 get_entry_tl_data(krb5_context context, krb5_db_entry *entry,
568 get_entry_data(krb5_context context,
581 return get_entry_tl_data(context, entry,
593 *delta = context->clockskew;
614 if (krb5_dbe_find_enctype(context, entry, request->ktype[i],
617 if (krb5_dbekd_decrypt_key_data(context, &master_keyblock,
620 krb5_free_keyblock_contents(context, &keys[k]);
665 struct request_pa_context *context,
672 if (context == NULL)
675 for (i = 0; i < context->n_contexts; i++) {
676 if (context->contexts[i].pa_system == pa_sys) {
677 *pa_context = &context->contexts[i].pa_context;
700 sort_pa_order(krb5_context context, krb5_kdc_req *request, int *pa_order)
925 check_padata (krb5_context context, krb5_db_entry *client, krb5_data *req_pkt,
943 if (make_padata_context(context, padata_context) != 0) {
964 retval = pa_sys->verify_padata(context, client, req_pkt, request,
969 emsg = krb5_get_error_message (context, retval);
972 krb5_free_error_message (context, emsg);
975 krb5_free_authdata(context, tmp_authz_data);
981 krb5_free_data(context, pa_e_data);
1003 krb5_free_data(context, tmp_e_data);
1013 krb5_free_data(context, tmp_e_data);
1030 krb5_free_data(context, pa_e_data);
1037 krb5_free_data(context, pa_e_data);
1043 krb5_free_data(context, pa_e_data);
1059 emsg = krb5_get_error_message(context, retval);
1061 krb5_free_error_message(context, emsg);
1101 return_padata(krb5_context context, krb5_db_entry *client, krb5_data *req_pkt,
1118 if ((!*padata_context)&& (make_padata_context(context, padata_context) != 0)) {
1133 sort_pa_order(context, request, pa_order);
1135 retval = krb5_copy_keyblock_contents(context, encrypting_key,
1174 if ((retval = ap->return_padata(context, pa, client, req_pkt, request, reply,
1195 krb5_free_pa_data(context, send_pa_list);
1198 krb5_free_keyblock_contents(context, &original_key);
1224 request_contains_enctype (krb5_context context, const krb5_kdc_req *request,
1236 verify_enc_timestamp(krb5_context context, krb5_db_entry *client,
1273 if ((retval = krb5_dbe_search_enctype(context, client,
1278 if ((retval = krb5_dbekd_decrypt_key_data(context, &master_keyblock,
1284 retval = krb5_c_decrypt(context, &key, KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS,
1286 krb5_free_keyblock_contents(context, &key);
1296 if ((retval = krb5_timeofday(context, &timenow)) != 0)
1299 if (labs(timenow - pa_enc->patimestamp) > context->clockskew) {
1310 krb5_free_data_contents(context, &enc_data->ciphertext);
1313 krb5_free_data_contents(context, &enc_ts_data);
1328 _make_etype_info_entry(krb5_context context,
1348 retval = get_salt_from_key(context, request->client,
1396 etype_info_helper(krb5_context context, krb5_kdc_req *request,
1415 retval = krb5_dbe_search_enctype(context, client, &start, -1,
1425 if (request_contains_enctype(context, request, db_etype)) {
1428 if ((retval = _make_etype_info_entry(context, request, client_key,
1452 if (request_contains_enctype(context, request, db_etype)) {
1453 if ((retval = _make_etype_info_entry(context, request,
1478 krb5_free_etype_info(context, entry);
1483 get_etype_info(krb5_context context, krb5_kdc_req *request,
1496 return etype_info_helper(context, request, client, server, pa_data, 0);
1500 get_etype_info2(krb5_context context, krb5_kdc_req *request,
1506 return etype_info_helper( context, request, client, server, pa_data, 1);
1510 etype_info_as_rep_helper(krb5_context context, krb5_pa_data * padata,
1552 retval = _make_etype_info_entry(context, request,
1576 krb5_free_etype_info(context, entry);
1582 krb5_free_data(context, scratch);
1587 return_etype_info2(krb5_context context, krb5_pa_data * padata,
1598 return etype_info_as_rep_helper(context, padata, client, request, reply,
1604 return_etype_info(krb5_context context, krb5_pa_data * padata,
1615 return etype_info_as_rep_helper(context, padata, client, request, reply,
1620 return_pw_salt(krb5_context context, krb5_pa_data *in_padata,
1710 return_sam_data(krb5_context context, krb5_pa_data *in_padata,
1756 if ((retval = krb5_c_decrypt(context, &psr_key, /* XXX */ 0, 0,
1785 krb5_free_keyblock_contents(context, encrypting_key);
1786 krb5_copy_keyblock_contents(context, &psr->sam_key, encrypting_key);
1836 krb5_free_sam_response(context, sr);
1838 krb5_free_predicted_sam_response(context, psr);
1856 get_sam_edata(krb5_context context, krb5_kdc_req *request,
1905 probeslot = krb5_princ_size(context, newp)++;
1908 krb5_princ_size(context, newp) * sizeof(krb5_data));
1924 krb5_princ_size(context, newp)--;
1970 if ((retval = krb5_copy_principal(context, request->client, &psr.client)))
1973 if ((retval = krb5_us_timeofday(context, &psr.stime, &psr.susec)))
1996 if ((retval = krb5_c_string_to_key(context, type, &sc.sam_challenge,
2007 if ((retval = krb5_c_encrypt_length(context,
2018 if ((retval = krb5_c_encrypt(context, &psr_key,
2031 /*krb5_checksum_size(context, ctype)*/
2032 /*krb5_calculate_checksum(context,ctype,in,in_length,seed,
2034 /*krb5_verify_checksum(context,ctype,cksum,in,in_length,seed,
2038 malloc(krb5_checksum_size(context, CKSUMTYPE_RSA_MD5_DES));
2041 retval = krb5_calculate_checksum(context, CKSUMTYPE_RSA_MD5_DES,
2170 retval = krb5_c_string_to_key(context, ENCTYPE_DES_CBC_MD5,
2182 if ((retval = krb5_c_encrypt_length(context,
2193 if ((retval = krb5_c_encrypt(context, &psr_key,
2207 /*krb5_checksum_size(context, ctype)*/
2208 /*krb5_calculate_checksum(context,ctype,in,in_length,seed,
2210 /*krb5_verify_checksum(context,ctype,cksum,in,in_length,seed,
2214 malloc(krb5_checksum_size(context, CKSUMTYPE_RSA_MD5_DES));
2217 retval = krb5_calculate_checksum(context, CKSUMTYPE_RSA_MD5_DES,
2238 krb5_free_keyblock_contents(context, &encrypting_key);
2243 verify_sam_response(krb5_context context, krb5_db_entry *client,
2284 if ((retval = krb5_c_decrypt(context, &psr_key, /* XXX */ 0, 0,
2300 if ((retval = krb5_unparse_name(context, request->client, &princ_req)))
2302 if ((retval = krb5_unparse_name(context, psr->client, &princ_psr)))
2310 if ((retval = krb5_timeofday(context, &timenow)))
2350 if ((retval = krb5_c_decrypt(context, &psr->sam_key, /* XXX */ 0,
2367 if (labs(timenow - sr->sam_patimestamp) > context->clockskew) {