| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| build_auth.c | 42 EtypeList etypes; local 50 &etypes.len, &etypes.val, 55 ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret); 57 free_EtypeList(&etypes); 62 free_EtypeList(&etypes);
|
| rd_req.c | 175 EtypeList *etypes) 184 ret = decode_EtypeList(data.data, data.length, etypes, NULL); 311 EtypeList etypes; local 313 memset(&etypes, 0, sizeof(etypes)); 427 ret = find_etypelist(context, ac, &etypes); 433 if (etypes.val) { 436 for (i = 0; i < etypes.len; i++) { 437 if (krb5_enctype_valid(context, etypes.val[i]) == 0) { 438 ac->keytype = etypes.val[i] [all...] |
| context.c | 62 * Set the list of etypes `ret_etypes' from the configuration variable 72 krb5_enctype *etypes = NULL; local 79 etypes = malloc((i+1) * sizeof(*etypes)); 80 if (etypes == NULL) { 90 etypes[k++] = e; 92 etypes[k] = ETYPE_NULL; 95 *ret_enctypes = etypes; 133 free(context->etypes); 134 context->etypes = tmptypes [all...] |
| krb5_locl.h | 224 krb5_enctype *etypes; member in struct:krb5_context_data
|
| init_creds_pw.c | 47 krb5_enctype *etypes; member in struct:krb5_get_init_creds_ctx 158 if (ctx->etypes) 159 free(ctx->etypes); 397 krb5_enctype *etypes; local 435 ctx->etypes = NULL; 479 if (ctx->etypes) 480 free(ctx->etypes); 482 etypes = malloc((options->etype_list_length + 1) 484 if (etypes == NULL) { 488 memcpy (etypes, options->etype_list 1576 krb5_enctype *etypes = NULL; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| add_enctype.c | 53 krb5_enctype *etypes; local 63 etypes = malloc (n_etypes * sizeof(*etypes)); 64 if (etypes == NULL) { 70 ret = krb5_string_to_enctype(context, argv[i], &etypes[i]); 109 if (etypes[j] == key->key_data_type[0]) { 112 (int)etypes[j]); 128 ret = krb5_generate_random_keyblock (context, etypes[i], &keyblock); 130 krb5_warnx(context, "genernate enctype %d failed", (int)etypes[i]); 137 new_key_data[n].key_data_type[0] = etypes[i] [all...] |
| del_enctype.c | 53 krb5_enctype *etypes; local 59 etypes = malloc (n_etypes * sizeof(*etypes)); 60 if (etypes == NULL) { 66 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); 103 if (etypes[k] == key->key_data_type[0]) { 132 free (etypes);
|
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| get.c | 93 krb5_enctype *etypes = NULL; local 107 etypes = malloc (opt->enctypes_strings.num_strings * sizeof(*etypes)); 108 if (etypes == NULL) { 116 &etypes[i]); 215 if (keys[j].keytype == etypes[k]) { 236 free(etypes);
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| remoteconf.h | 49 struct etypes { struct 51 struct etypes *next; 93 struct etypes *etypes; /* exchange type list. the head member in struct:remoteconf 205 extern void deletypes(struct etypes *); 206 extern struct etypes * dupetypes(struct etypes *);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| hdb-ldap.c | 721 if (ent->entry.etypes) { 743 for (i = 0; i < ent->entry.etypes->len; i++) { 751 ent->entry.etypes->val[i]); 1112 ent->entry.etypes = malloc(sizeof(*(ent->entry.etypes))); 1113 if (ent->entry.etypes == NULL) { 1118 ent->entry.etypes->len = ldap_count_values_len(vals); 1119 ent->entry.etypes->val = calloc(ent->entry.etypes->len, 1120 sizeof(ent->entry.etypes->val[0])) 1154 unsigned *etypes; local [all...] |