/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | set_allowable_enctypes.c | 67 krb5_enctype *ktypes) 92 if (ktypes) { 93 for (i = 0; i < num_ktypes && ktypes[i]; i++) { 94 if (!krb5_c_valid_enctype(ktypes[i])) { 110 /* Copy the requested ktypes into the cred structure */ 112 memcpy(new_ktypes, ktypes, sizeof(krb5_enctype) * i); 64 gss_krb5int_set_allowable_enctypes(OM_uint32 *minor_status, gss_cred_id_t cred_handle, OM_uint32 num_ktypes, krb5_enctype *ktypes) argument
|
H A D | krb5_gss_glue.c | 1227 krb5_enctype *ktypes) 1236 num_ktypes, ktypes); 1241 num_ktypes, ktypes); 1223 gss_krb5_set_allowable_enctypes( OM_uint32 *minor_status, gss_cred_id_t cred, OM_uint32 num_ktypes, krb5_enctype *ktypes) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | init_ctx.c | 582 * Set the desired default ktypes, making sure they are valid. 585 krb5_set_default_in_tkt_ktypes(krb5_context context, const krb5_enctype *ktypes) argument 590 if (ktypes) { 591 for (i = 0; ktypes[i]; i++) { 592 if (!krb5_c_valid_enctype(ktypes[i])) 596 /* Now copy the default ktypes into the context pointer */ 598 (void) memcpy(new_ktypes, ktypes, sizeof(krb5_enctype) * i); 615 get_profile_etype_list(krb5_context context, krb5_enctype **ktypes, char *profstr, argument 706 *ktypes = 0; 710 *ktypes 715 krb5_get_default_in_tkt_ktypes(krb5_context context, krb5_enctype **ktypes) argument 723 krb5_set_default_tgs_enctypes(krb5_context context, const krb5_enctype *ktypes) argument 770 krb5_get_tgs_ktypes(krb5_context context, krb5_const_principal princ, krb5_enctype **ktypes) argument 785 krb5_get_permitted_enctypes(krb5_context context, krb5_enctype **ktypes) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | send_tgs.c | 135 const krb5_ticket_times *timestruct, const krb5_enctype *ktypes, 142 timestruct, ktypes, 157 const krb5_ticket_times *timestruct, const krb5_enctype *ktypes, 223 if (ktypes) { 224 /* Check passed ktypes and make sure they're valid. */ 225 for (tgsreq.nktypes = 0; ktypes[tgsreq.nktypes]; tgsreq.nktypes++) { 226 if (!krb5_c_valid_enctype(ktypes[tgsreq.nktypes])) 229 tgsreq.ktype = (krb5_enctype *)ktypes; 231 /* Get the default ktypes */ 337 if (ktypes 134 krb5_send_tgs(krb5_context context, krb5_flags kdcoptions, const krb5_ticket_times *timestruct, const krb5_enctype *ktypes, krb5_const_principal sname, krb5_address *const *addrs, krb5_authdata *const *authorization_data, krb5_pa_data *const *padata, const krb5_data *second_ticket, krb5_creds *in_cred, krb5_response *rep) argument 156 krb5_send_tgs2(krb5_context context, krb5_flags kdcoptions, const krb5_ticket_times *timestruct, const krb5_enctype *ktypes, krb5_const_principal sname, krb5_address *const *addrs, krb5_authdata *const *authorization_data, krb5_pa_data *const *padata, const krb5_data *second_ticket, krb5_creds *in_cred, krb5_response *rep, char **hostname_used) argument [all...] |
H A D | get_creds.c | 99 krb5_enctype *ktypes; local 103 ret = krb5_get_tgs_ktypes (context, mcreds->server, &ktypes); 104 for (i = 0; ktypes[i]; i++) 105 if (ktypes[i] == mcreds->keyblock.enctype) 107 if (ktypes[i] == 0) 109 free (ktypes);
|
H A D | gic_pwd.c | 517 krb5_flags options, krb5_address * const *addrs, krb5_enctype *ktypes, 528 if (ktypes) { 529 for (i=0; ktypes[i]; i++); 531 krb5_get_init_creds_opt_set_etype_list(opt, ktypes, i); 575 krb5_address *const *addrs, krb5_enctype *ktypes, 601 options, addrs, ktypes, 515 krb5int_populate_gic_opt( krb5_context context, krb5_gic_opt_ext **opte, krb5_flags options, krb5_address * const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_creds *creds) argument 574 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
|
H A D | gic_keytab.c | 208 krb5_address *const *addrs, krb5_enctype *ktypes, 221 options, addrs, ktypes, 207 krb5_get_in_tkt_with_keytab(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_keytab arg_keytab, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
|
H A D | preauth2.c | 341 /* Add the named encryption type to the existing list of ktypes. */ 346 krb5_enctype *ktypes; local 351 ktypes = malloc((*out_nktypes + 2) * sizeof(ktype)); 352 if (ktypes) { 354 ktypes[i] = (*out_ktypes)[i]; 355 ktypes[i++] = ktype; 356 ktypes[i] = 0; 358 *out_ktypes = ktypes;
|
H A D | get_in_tkt.c | 527 krb5_enctype * ktypes, 600 if (ktypes) { 602 for (req = 0; ktypes[req]; req++) { 603 if (ktypes[req] == request.ktype[next]) { 608 if (ktypes[req] == request.ktype[i]) { 612 later in our requested-ktypes list. */ 524 krb5_get_in_tkt(krb5_context context, const krb5_flags options, krb5_address * const * addrs, krb5_enctype * ktypes, krb5_preauthtype * ptypes, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg, krb5_creds * creds, krb5_ccache ccache, krb5_kdc_rep ** ret_as_reply) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 132 pref (krb5_enctype my_ktype, int nktypes, krb5_enctype *ktypes) argument 136 if (my_ktype == ktypes[i]) 205 krb5_creds *creds, int nktypes, krb5_enctype *ktypes) 240 if (ktypes) { 242 nktypes, ktypes); 284 krb5_enctype *ktypes; local 289 ret = krb5_get_tgs_ktypes (context, mcreds->server, &ktypes); 293 while (ktypes[nktypes]) 297 nktypes, ktypes); 298 free (ktypes); 203 krb5_cc_retrieve_cred_seq(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds, int nktypes, krb5_enctype *ktypes) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/cli/ |
H A D | keytab.c | 287 krb5_enctype *ptr, *ktypes = NULL; local 289 code = krb5_get_permitted_enctypes(context, &ktypes); 290 if (!code && ktypes && *ktypes) { 297 for (ptr = ktypes; *ptr; ptr++) nktypes++; 303 free(ktypes); 314 permitted_etypes[i].ks_enctype = ktypes[i]; 317 free(ktypes); 319 if (ktypes) 320 free(ktypes); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 209 krb5_enctype *ktypes; local 274 &ktypes))) { 286 for (i = 0; ktypes[i]; i++) { 287 if (ACCEPTED_ENCTYPE(ktypes[i])) 291 if (ktypes[i] == 0) { 304 creds.keyblock.enctype = ktypes[i];
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | gssapi_krb5.h | 214 krb5_enctype *ktypes);
|
H A D | gssapiP_krb5.h | 738 krb5_enctype *ktypes; member in struct:krb5_gss_set_allowable_enctypes_req 751 krb5_enctype *ktypes);
|
H A D | k5-int.h | 1402 krb5_flags options, krb5_address * const *addrs, krb5_enctype *ktypes,
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.h | 105 krb5_enctype *ktypes);
|