et 87 source4/heimdal/kdc/524.c const EncTicketPart *et, et 96 source4/heimdal/kdc/524.c et->cname, et->crealm); et 118 source4/heimdal/kdc/524.c const EncTicketPart *et, et 121 source4/heimdal/kdc/524.c if(et->endtime < kdc_time){ et 125 source4/heimdal/kdc/524.c if(et->flags.invalid){ et 140 source4/heimdal/kdc/524.c EncTicketPart *et, et 158 source4/heimdal/kdc/524.c if (et->caddr && !krb5_address_search (context, v4_addr, et->caddr)) { et 169 source4/heimdal/kdc/524.c if (et->caddr != NULL) { et 170 source4/heimdal/kdc/524.c free_HostAddresses(et->caddr); et 172 source4/heimdal/kdc/524.c et->caddr = malloc (sizeof (*et->caddr)); et 173 source4/heimdal/kdc/524.c if (et->caddr == NULL) { et 179 source4/heimdal/kdc/524.c et->caddr->val = v4_addr; et 180 source4/heimdal/kdc/524.c et->caddr->len = 1; et 226 source4/heimdal/kdc/524.c const char *spn, const EncTicketPart et, et 253 source4/heimdal/kdc/524.c if (!config->enable_v4_cross_realm && strcmp (et.crealm, t->realm) != 0) { et 254 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "524 cross-realm %s -> %s disabled", et.crealm, et 261 source4/heimdal/kdc/524.c &et, &t->sname, &len); et 302 source4/heimdal/kdc/524.c EncTicketPart et; et 346 source4/heimdal/kdc/524.c &et, &len); et 354 source4/heimdal/kdc/524.c ret = log_524 (context, config, &et, from, spn); et 356 source4/heimdal/kdc/524.c free_EncTicketPart(&et); et 360 source4/heimdal/kdc/524.c ret = verify_flags (context, config, &et, spn); et 362 source4/heimdal/kdc/524.c free_EncTicketPart(&et); et 366 source4/heimdal/kdc/524.c ret = set_address (context, config, &et, addr, from); et 368 source4/heimdal/kdc/524.c free_EncTicketPart(&et); et 372 source4/heimdal/kdc/524.c ret = encode_524_response(context, config, spn, et, t, et 374 source4/heimdal/kdc/524.c free_EncTicketPart(&et); et 645 source4/heimdal/kdc/kerberos4.c void *buf, size_t len, const EncTicketPart *et, et 658 source4/heimdal/kdc/kerberos4.c et->crealm); et 670 source4/heimdal/kdc/kerberos4.c et->cname, et 671 source4/heimdal/kdc/kerberos4.c et->crealm); et 692 source4/heimdal/kdc/kerberos4.c if(et->caddr){ et 693 source4/heimdal/kdc/kerberos4.c for(i = 0; i < et->caddr->len; i++) et 694 source4/heimdal/kdc/kerberos4.c if(et->caddr->val[i].addr_type == AF_INET && et 695 source4/heimdal/kdc/kerberos4.c et->caddr->val[i].address.length == 4){ et 696 source4/heimdal/kdc/kerberos4.c memcpy(tmp, et->caddr->val[i].address.data, 4); et 703 source4/heimdal/kdc/kerberos4.c if((et->key.keytype != ETYPE_DES_CBC_MD5 && et 704 source4/heimdal/kdc/kerberos4.c et->key.keytype != ETYPE_DES_CBC_MD4 && et 705 source4/heimdal/kdc/kerberos4.c et->key.keytype != ETYPE_DES_CBC_CRC) || et 706 source4/heimdal/kdc/kerberos4.c et->key.keyvalue.length != 8) et 708 source4/heimdal/kdc/kerberos4.c krb5_storage_write(sp, et->key.keyvalue.data, 8); et 711 source4/heimdal/kdc/kerberos4.c time_t start = et->starttime ? *et->starttime : et->authtime; et 712 source4/heimdal/kdc/kerberos4.c krb5_store_int8(sp, krb_time_to_life(start, et->endtime)); et 260 source4/heimdal/kdc/kerberos5.c KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, et 273 source4/heimdal/kdc/kerberos5.c ASN1_MALLOC_ENCODE(EncTicketPart, buf, buf_size, et, &len, ret); et 979 source4/heimdal/kdc/kerberos5.c EncTicketPart et; et 1083 source4/heimdal/kdc/kerberos5.c memset(&et, 0, sizeof(et)); et 1136 source4/heimdal/kdc/kerberos5.c et.flags.pre_authent = 1; et 1276 source4/heimdal/kdc/kerberos5.c et.flags.pre_authent = 1; et 1295 source4/heimdal/kdc/kerberos5.c if(found_pa && et.flags.pre_authent == 0){ et 1469 source4/heimdal/kdc/kerberos5.c et.flags.initial = 1; et 1471 source4/heimdal/kdc/kerberos5.c et.flags.forwardable = f.forwardable; et 1479 source4/heimdal/kdc/kerberos5.c et.flags.proxiable = f.proxiable; et 1487 source4/heimdal/kdc/kerberos5.c et.flags.may_postdate = f.allow_postdate; et 1503 source4/heimdal/kdc/kerberos5.c ret = krb5_generate_random_keyblock(context, sessionetype, &et.key); et 1506 source4/heimdal/kdc/kerberos5.c copy_PrincipalName(&rep.cname, &et.cname); et 1507 source4/heimdal/kdc/kerberos5.c copy_Realm(&rep.crealm, &et.crealm); et 1513 source4/heimdal/kdc/kerberos5.c start = et.authtime = kdc_time; et 1516 source4/heimdal/kdc/kerberos5.c ALLOC(et.starttime); et 1517 source4/heimdal/kdc/kerberos5.c start = *et.starttime = *req->req_body.from; et 1518 source4/heimdal/kdc/kerberos5.c et.flags.invalid = 1; et 1519 source4/heimdal/kdc/kerberos5.c et.flags.postdated = 1; /* XXX ??? */ et 1533 source4/heimdal/kdc/kerberos5.c et.endtime = t; et 1534 source4/heimdal/kdc/kerberos5.c if(f.renewable_ok && et.endtime < *b->till){ et 1554 source4/heimdal/kdc/kerberos5.c ALLOC(et.renew_till); et 1555 source4/heimdal/kdc/kerberos5.c *et.renew_till = t; et 1556 source4/heimdal/kdc/kerberos5.c et.flags.renewable = 1; et 1561 source4/heimdal/kdc/kerberos5.c et.flags.anonymous = 1; et 1564 source4/heimdal/kdc/kerberos5.c ALLOC(et.caddr); et 1565 source4/heimdal/kdc/kerberos5.c copy_HostAddresses(b->addresses, et.caddr); et 1568 source4/heimdal/kdc/kerberos5.c et.transited.tr_type = DOMAIN_X500_COMPRESS; et 1569 source4/heimdal/kdc/kerberos5.c krb5_data_zero(&et.transited.contents); et 1571 source4/heimdal/kdc/kerberos5.c copy_EncryptionKey(&et.key, &ek.key); et 1618 source4/heimdal/kdc/kerberos5.c ek.flags = et.flags; et 1619 source4/heimdal/kdc/kerberos5.c ek.authtime = et.authtime; et 1620 source4/heimdal/kdc/kerberos5.c if (et.starttime) { et 1622 source4/heimdal/kdc/kerberos5.c *ek.starttime = *et.starttime; et 1624 source4/heimdal/kdc/kerberos5.c ek.endtime = et.endtime; et 1625 source4/heimdal/kdc/kerberos5.c if (et.renew_till) { et 1627 source4/heimdal/kdc/kerberos5.c *ek.renew_till = *et.renew_till; et 1631 source4/heimdal/kdc/kerberos5.c if(et.caddr){ et 1633 source4/heimdal/kdc/kerberos5.c copy_HostAddresses(et.caddr, ek.caddr); et 1651 source4/heimdal/kdc/kerberos5.c &et); et 1680 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, &et.key, 0, &crypto); et 1728 source4/heimdal/kdc/kerberos5.c ret = _krb5_pac_sign(context, p, et.authtime, et 1740 source4/heimdal/kdc/kerberos5.c ret = _kdc_tkt_add_if_relevant_ad(context, &et, et 1749 source4/heimdal/kdc/kerberos5.c _kdc_log_timestamp(context, config, "AS-REQ", et.authtime, et.starttime, et 1750 source4/heimdal/kdc/kerberos5.c et.endtime, et.renew_till); et 1759 source4/heimdal/kdc/kerberos5.c &et); et 1764 source4/heimdal/kdc/kerberos5.c &rep, &et, &ek, setype, server->entry.kvno, et 1767 source4/heimdal/kdc/kerberos5.c free_EncTicketPart(&et); et 363 source4/heimdal/kdc/krb5tgs.c KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) et 379 source4/heimdal/kdc/krb5tgs.c et->flags.invalid = 0; et 392 source4/heimdal/kdc/krb5tgs.c et->flags.forwardable = 1; et 400 source4/heimdal/kdc/krb5tgs.c et->flags.forwarded = 1; et 401 source4/heimdal/kdc/krb5tgs.c et->caddr = b->addresses; et 404 source4/heimdal/kdc/krb5tgs.c et->flags.forwarded = 1; et 412 source4/heimdal/kdc/krb5tgs.c et->flags.proxiable = 1; et 420 source4/heimdal/kdc/krb5tgs.c et->flags.proxy = 1; et 421 source4/heimdal/kdc/krb5tgs.c et->caddr = b->addresses; et 424 source4/heimdal/kdc/krb5tgs.c et->flags.proxy = 1; et 432 source4/heimdal/kdc/krb5tgs.c et->flags.may_postdate = 1; et 441 source4/heimdal/kdc/krb5tgs.c *et->starttime = *b->from; et 442 source4/heimdal/kdc/krb5tgs.c et->flags.postdated = 1; et 443 source4/heimdal/kdc/krb5tgs.c et->flags.invalid = 1; et 455 source4/heimdal/kdc/krb5tgs.c et->flags.renewable = 1; et 456 source4/heimdal/kdc/krb5tgs.c ALLOC(et->renew_till); et 458 source4/heimdal/kdc/krb5tgs.c *et->renew_till = *b->rtime; et 472 source4/heimdal/kdc/krb5tgs.c et->endtime = *et->starttime + old_life; et 473 source4/heimdal/kdc/krb5tgs.c if (et->renew_till != NULL) et 474 source4/heimdal/kdc/krb5tgs.c et->endtime = min(*et->renew_till, et->endtime); et 526 source4/heimdal/kdc/krb5tgs.c const EncTicketPart *et, et 529 source4/heimdal/kdc/krb5tgs.c if(et->endtime < kdc_time){ et 533 source4/heimdal/kdc/krb5tgs.c if(et->flags.invalid){ et 549 source4/heimdal/kdc/krb5tgs.c EncTicketPart *et, et 640 source4/heimdal/kdc/krb5tgs.c et->flags.transited_policy_checked = 1; et 642 source4/heimdal/kdc/krb5tgs.c et->transited.tr_type = DOMAIN_X500_COMPRESS; et 643 source4/heimdal/kdc/krb5tgs.c ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents); et 679 source4/heimdal/kdc/krb5tgs.c EncTicketPart et; et 685 source4/heimdal/kdc/krb5tgs.c memset(&et, 0, sizeof(et)); et 691 source4/heimdal/kdc/krb5tgs.c et.authtime = tgt->authtime; et 693 source4/heimdal/kdc/krb5tgs.c et.endtime = min(tgt->endtime, *b->till); et 694 source4/heimdal/kdc/krb5tgs.c ALLOC(et.starttime); et 695 source4/heimdal/kdc/krb5tgs.c *et.starttime = kdc_time; et 697 source4/heimdal/kdc/krb5tgs.c ret = check_tgs_flags(context, config, b, tgt, &et); et 727 source4/heimdal/kdc/krb5tgs.c &tgt->transited, &et, et 746 source4/heimdal/kdc/krb5tgs.c ek.caddr = et.caddr; et 747 source4/heimdal/kdc/krb5tgs.c if(et.caddr == NULL) et 748 source4/heimdal/kdc/krb5tgs.c et.caddr = tgt->caddr; et 752 source4/heimdal/kdc/krb5tgs.c life = et.endtime - *et.starttime; et 757 source4/heimdal/kdc/krb5tgs.c et.endtime = *et.starttime + life; et 760 source4/heimdal/kdc/krb5tgs.c et.renew_till == NULL && et.endtime < *b->till){ et 761 source4/heimdal/kdc/krb5tgs.c et.flags.renewable = 1; et 762 source4/heimdal/kdc/krb5tgs.c ALLOC(et.renew_till); et 763 source4/heimdal/kdc/krb5tgs.c *et.renew_till = *b->till; et 765 source4/heimdal/kdc/krb5tgs.c if(et.renew_till){ et 767 source4/heimdal/kdc/krb5tgs.c renew = *et.renew_till - et.authtime; et 772 source4/heimdal/kdc/krb5tgs.c *et.renew_till = et.authtime + renew; et 775 source4/heimdal/kdc/krb5tgs.c if(et.renew_till){ et 776 source4/heimdal/kdc/krb5tgs.c *et.renew_till = min(*et.renew_till, *tgt->renew_till); et 777 source4/heimdal/kdc/krb5tgs.c *et.starttime = min(*et.starttime, *et.renew_till); et 778 source4/heimdal/kdc/krb5tgs.c et.endtime = min(et.endtime, *et.renew_till); et 781 source4/heimdal/kdc/krb5tgs.c *et.starttime = min(*et.starttime, et.endtime); et 783 source4/heimdal/kdc/krb5tgs.c if(*et.starttime == et.endtime){ et 787 source4/heimdal/kdc/krb5tgs.c if(et.renew_till && et.endtime == *et.renew_till){ et 788 source4/heimdal/kdc/krb5tgs.c free(et.renew_till); et 789 source4/heimdal/kdc/krb5tgs.c et.renew_till = NULL; et 790 source4/heimdal/kdc/krb5tgs.c et.flags.renewable = 0; et 793 source4/heimdal/kdc/krb5tgs.c et.flags.pre_authent = tgt->flags.pre_authent; et 794 source4/heimdal/kdc/krb5tgs.c et.flags.hw_authent = tgt->flags.hw_authent; et 795 source4/heimdal/kdc/krb5tgs.c et.flags.anonymous = tgt->flags.anonymous; et 796 source4/heimdal/kdc/krb5tgs.c et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate; et 800 source4/heimdal/kdc/krb5tgs.c et.authorization_data = calloc(1, sizeof(*et.authorization_data)); et 801 source4/heimdal/kdc/krb5tgs.c if (et.authorization_data == NULL) { et 805 source4/heimdal/kdc/krb5tgs.c ret = copy_AuthorizationData(auth_data, et.authorization_data); et 810 source4/heimdal/kdc/krb5tgs.c ret = find_KRB5SignedPath(context, et.authorization_data, NULL); et 812 source4/heimdal/kdc/krb5tgs.c if (et.authorization_data->len == 1) { et 813 source4/heimdal/kdc/krb5tgs.c free_AuthorizationData(et.authorization_data); et 814 source4/heimdal/kdc/krb5tgs.c free(et.authorization_data); et 815 source4/heimdal/kdc/krb5tgs.c et.authorization_data = NULL; et 817 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = et.authorization_data; et 829 source4/heimdal/kdc/krb5tgs.c ret = _kdc_tkt_add_if_relevant_ad(context, &et, et 836 source4/heimdal/kdc/krb5tgs.c ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key); et 839 source4/heimdal/kdc/krb5tgs.c et.crealm = tgt->crealm; et 840 source4/heimdal/kdc/krb5tgs.c et.cname = tgt_name->name; et 842 source4/heimdal/kdc/krb5tgs.c ek.key = et.key; et 851 source4/heimdal/kdc/krb5tgs.c ek.flags = et.flags; et 852 source4/heimdal/kdc/krb5tgs.c ek.authtime = et.authtime; et 853 source4/heimdal/kdc/krb5tgs.c ek.starttime = et.starttime; et 854 source4/heimdal/kdc/krb5tgs.c ek.endtime = et.endtime; et 855 source4/heimdal/kdc/krb5tgs.c ek.renew_till = et.renew_till; et 859 source4/heimdal/kdc/krb5tgs.c _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime, et 860 source4/heimdal/kdc/krb5tgs.c et.endtime, et.renew_till); et 873 source4/heimdal/kdc/krb5tgs.c &et); et 890 source4/heimdal/kdc/krb5tgs.c if (krb5_enctype_valid(context, et.key.keytype) != 0 et 891 source4/heimdal/kdc/krb5tgs.c && _kdc_is_weak_expection(server->entry.principal, et.key.keytype)) et 893 source4/heimdal/kdc/krb5tgs.c krb5_enctype_enable(context, et.key.keytype); et 909 source4/heimdal/kdc/krb5tgs.c &rep, &et, &ek, et.key.keytype, et 913 source4/heimdal/kdc/krb5tgs.c krb5_enctype_disable(context, et.key.keytype); et 917 source4/heimdal/kdc/krb5tgs.c free_TransitedEncoding(&et.transited); et 918 source4/heimdal/kdc/krb5tgs.c if(et.starttime) et 919 source4/heimdal/kdc/krb5tgs.c free(et.starttime); et 920 source4/heimdal/kdc/krb5tgs.c if(et.renew_till) et 921 source4/heimdal/kdc/krb5tgs.c free(et.renew_till); et 922 source4/heimdal/kdc/krb5tgs.c if(et.authorization_data) { et 923 source4/heimdal/kdc/krb5tgs.c free_AuthorizationData(et.authorization_data); et 924 source4/heimdal/kdc/krb5tgs.c free(et.authorization_data); et 927 source4/heimdal/kdc/krb5tgs.c memset(et.key.keyvalue.data, 0, et.key.keyvalue.length); et 928 source4/heimdal/kdc/krb5tgs.c free_EncryptionKey(&et.key); et 163 source4/heimdal/lib/com_err/com_err.c struct et_list *et; et 165 source4/heimdal/lib/com_err/com_err.c for (et = _et_list; et; et = et->next) { et 166 source4/heimdal/lib/com_err/com_err.c if (et->table->base == new_table->table->base) et 69 source4/heimdal/lib/com_err/error.c struct error_table et; et 78 source4/heimdal/lib/com_err/error.c struct et_list *et, **end; et 80 source4/heimdal/lib/com_err/error.c for (end = list, et = *list; et; end = &et->next, et = et->next) et 81 source4/heimdal/lib/com_err/error.c if (et->table->msgs == messages) et 86 source4/heimdal/lib/com_err/error.c et = &f->etl; et 87 source4/heimdal/lib/com_err/error.c et->table = &f->et; et 88 source4/heimdal/lib/com_err/error.c et->table->msgs = messages; et 89 source4/heimdal/lib/com_err/error.c et->table->n_msgs = num_errors; et 90 source4/heimdal/lib/com_err/error.c et->table->base = base; et 91 source4/heimdal/lib/com_err/error.c et->next = NULL; et 92 source4/heimdal/lib/com_err/error.c *end = et; et 97 source4/heimdal/lib/com_err/error.c free_error_table(struct et_list *et) et 99 source4/heimdal/lib/com_err/error.c while(et){ et 100 source4/heimdal/lib/com_err/error.c struct et_list *p = et; et 101 source4/heimdal/lib/com_err/error.c et = et->next; et 68 source4/heimdal/lib/com_err/parse.y header : id et et 69 source4/heimdal/lib/com_err/parse.y | et et 78 source4/heimdal/lib/com_err/parse.y et : ET STRING et 66 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et; et 72 source4/heimdal/lib/krb5/crypto.c #define CRYPTO_ETYPE(C) ((C)->et->type) et 153 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et, et 651 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et; et 663 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype); et 664 source4/heimdal/lib/krb5/crypto.c if (et == NULL) et 674 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); et 683 source4/heimdal/lib/krb5/crypto.c et->keytype->size, kd.key->keyvalue.data); et 685 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et); et 691 source4/heimdal/lib/krb5/crypto.c ret = derive_key(context, et, &kd, "kerberos", strlen("kerberos")); et 694 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et); et 1046 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et =_find_enctype(enctype); et 1048 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 1054 source4/heimdal/lib/krb5/crypto.c for(st = et->keytype->string_to_key; st && st->type; st++) et 1103 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type); et 1104 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 1110 source4/heimdal/lib/krb5/crypto.c *keysize = et->keytype->size; et 1119 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type); et 1120 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 1126 source4/heimdal/lib/krb5/crypto.c *keybits = et->keytype->bits; et 1136 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type); et 1137 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 1143 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); et 1147 source4/heimdal/lib/krb5/crypto.c if(et->keytype->random_key) et 1148 source4/heimdal/lib/krb5/crypto.c (*et->keytype->random_key)(context, key); et 1160 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(key->key->keytype); et 1161 source4/heimdal/lib/krb5/crypto.c struct key_type *kt = et->keytype; et 1796 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->keyed_checksum; et 1798 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->checksum; et 1918 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->keyed_checksum; et 1920 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->checksum; et 2317 source4/heimdal/lib/krb5/crypto.c struct checksum_type *ct = crypto->et->checksum; et 2335 source4/heimdal/lib/krb5/crypto.c if (result.checksum.length < crypto->et->blocksize) et 2340 source4/heimdal/lib/krb5/crypto.c crypto->et->type, "prf", 3, &derived); et 2344 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(out, crypto->et->blocksize); et 2349 source4/heimdal/lib/krb5/crypto.c const EVP_CIPHER *c = (*crypto->et->keytype->evp)(); et 2755 source4/heimdal/lib/krb5/crypto.c return (crypto->et->flags & F_DERIVED) != 0; et 2762 source4/heimdal/lib/krb5/crypto.c return (crypto->et->flags & F_SPECIAL) != 0; et 2782 source4/heimdal/lib/krb5/crypto.c const struct encryption_type *et = crypto->et; et 2784 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->keyed_checksum); et 2786 source4/heimdal/lib/krb5/crypto.c sz = et->confoundersize + len; et 2787 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */ et 2796 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(q, et->confoundersize); /* XXX */ et 2797 source4/heimdal/lib/krb5/crypto.c q += et->confoundersize; et 2801 source4/heimdal/lib/krb5/crypto.c et->keyed_checksum, et 2822 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, block_sz, 1, usage, ivec); et 2847 source4/heimdal/lib/krb5/crypto.c const struct encryption_type *et = crypto->et; et 2849 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->checksum); et 2851 source4/heimdal/lib/krb5/crypto.c sz = et->confoundersize + checksum_sz + len; et 2852 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */ et 2860 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(q, et->confoundersize); /* XXX */ et 2861 source4/heimdal/lib/krb5/crypto.c q += et->confoundersize; et 2867 source4/heimdal/lib/krb5/crypto.c et->checksum, et 2880 source4/heimdal/lib/krb5/crypto.c memcpy(p + et->confoundersize, cksum.checksum.data, cksum.checksum.length); et 2885 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, block_sz, 1, 0, ivec); et 2909 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 2910 source4/heimdal/lib/krb5/crypto.c size_t cksum_sz = CHECKSUMSIZE(et->checksum); et 2911 source4/heimdal/lib/krb5/crypto.c size_t sz = len + cksum_sz + et->confoundersize; et 2923 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(p, et->confoundersize); et 2924 source4/heimdal/lib/krb5/crypto.c p += et->confoundersize; et 2926 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, tmp, sz, TRUE, usage, ivec); et 2951 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 2954 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->keyed_checksum); et 2955 source4/heimdal/lib/krb5/crypto.c if (len < checksum_sz + et->confoundersize) { et 2962 source4/heimdal/lib/krb5/crypto.c if (((len - checksum_sz) % et->padsize) != 0) { et 2986 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec); et 2994 source4/heimdal/lib/krb5/crypto.c cksum.cksumtype = CHECKSUMTYPE(et->keyed_checksum); et 3006 source4/heimdal/lib/krb5/crypto.c l = len - et->confoundersize; et 3007 source4/heimdal/lib/krb5/crypto.c memmove(p, p + et->confoundersize, l); et 3030 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 3032 source4/heimdal/lib/krb5/crypto.c if ((len % et->padsize) != 0) { et 3037 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->checksum); et 3050 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, len, 0, 0, ivec); et 3055 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_copy(&cksum.checksum, p + et->confoundersize, checksum_sz); et 3060 source4/heimdal/lib/krb5/crypto.c memset(p + et->confoundersize, 0, checksum_sz); et 3061 source4/heimdal/lib/krb5/crypto.c cksum.cksumtype = CHECKSUMTYPE(et->checksum); et 3068 source4/heimdal/lib/krb5/crypto.c l = len - et->confoundersize - checksum_sz; et 3069 source4/heimdal/lib/krb5/crypto.c memmove(p, p + et->confoundersize + checksum_sz, l); et 3089 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 3090 source4/heimdal/lib/krb5/crypto.c size_t cksum_sz = CHECKSUMSIZE(et->checksum); et 3091 source4/heimdal/lib/krb5/crypto.c size_t sz = len - cksum_sz - et->confoundersize; et 3095 source4/heimdal/lib/krb5/crypto.c if ((len % et->padsize) != 0) { et 3107 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, len, FALSE, usage, ivec); et 3113 source4/heimdal/lib/krb5/crypto.c memmove (p, p + cksum_sz + et->confoundersize, sz); et 3172 source4/heimdal/lib/krb5/crypto.c const struct encryption_type *et = crypto->et; et 3180 source4/heimdal/lib/krb5/crypto.c headersz = et->confoundersize; et 3181 source4/heimdal/lib/krb5/crypto.c trailersz = CHECKSUMSIZE(et->keyed_checksum); et 3191 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */ et 3251 source4/heimdal/lib/krb5/crypto.c et->keyed_checksum, et 3314 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, len, 1, usage, ivec); et 3372 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 3380 source4/heimdal/lib/krb5/crypto.c headersz = et->confoundersize; et 3381 source4/heimdal/lib/krb5/crypto.c trailersz = CHECKSUMSIZE(et->keyed_checksum); et 3388 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */ et 3442 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec); et 3489 source4/heimdal/lib/krb5/crypto.c cksum.cksumtype = CHECKSUMTYPE(et->keyed_checksum); et 3591 source4/heimdal/lib/krb5/crypto.c return crypto->et->blocksize; et 3593 source4/heimdal/lib/krb5/crypto.c if (crypto->et->padsize > 1) et 3594 source4/heimdal/lib/krb5/crypto.c return crypto->et->padsize; et 3597 source4/heimdal/lib/krb5/crypto.c return CHECKSUMSIZE(crypto->et->keyed_checksum); et 3599 source4/heimdal/lib/krb5/crypto.c if (crypto->et->keyed_checksum) et 3600 source4/heimdal/lib/krb5/crypto.c return CHECKSUMSIZE(crypto->et->keyed_checksum); et 3601 source4/heimdal/lib/krb5/crypto.c return CHECKSUMSIZE(crypto->et->checksum); et 3782 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et, et 3790 source4/heimdal/lib/krb5/crypto.c struct key_type *kt = et->keytype; et 3795 source4/heimdal/lib/krb5/crypto.c if(et->blocksize * 8 < kt->bits || len != et->blocksize) { et 3796 source4/heimdal/lib/krb5/crypto.c nblocks = (kt->bits + et->blocksize * 8 - 1) / (et->blocksize * 8); et 3797 source4/heimdal/lib/krb5/crypto.c k = malloc(nblocks * et->blocksize); et 3802 source4/heimdal/lib/krb5/crypto.c ret = _krb5_n_fold(constant, len, k, et->blocksize); et 3810 source4/heimdal/lib/krb5/crypto.c memcpy(k + i * et->blocksize, et 3811 source4/heimdal/lib/krb5/crypto.c k + (i - 1) * et->blocksize, et 3812 source4/heimdal/lib/krb5/crypto.c et->blocksize); et 3813 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize, et 3826 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, c, len, 1, 0, NULL); et 3845 source4/heimdal/lib/krb5/crypto.c DES3_postproc(context, k, nblocks * et->blocksize, key); et 3862 source4/heimdal/lib/krb5/crypto.c memset(k, 0, nblocks * et->blocksize); et 3890 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et; et 3895 source4/heimdal/lib/krb5/crypto.c et = _find_enctype (etype); et 3896 source4/heimdal/lib/krb5/crypto.c if (et == NULL) { et 3908 source4/heimdal/lib/krb5/crypto.c ret = derive_key(context, et, &d, constant, constant_len); et 3911 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &d, et); et 3937 source4/heimdal/lib/krb5/crypto.c derive_key(context, crypto->et, d, constant, sizeof(constant)); et 3957 source4/heimdal/lib/krb5/crypto.c (*crypto)->et = _find_enctype(etype); et 3958 source4/heimdal/lib/krb5/crypto.c if((*crypto)->et == NULL || ((*crypto)->et->flags & F_DISABLED)) { et 3966 source4/heimdal/lib/krb5/crypto.c if((*crypto)->et->keytype->size != key->keyvalue.length) { et 3987 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et) et 3991 source4/heimdal/lib/krb5/crypto.c if (et->keytype->cleanup) et 3992 source4/heimdal/lib/krb5/crypto.c (*et->keytype->cleanup)(context, key); et 4000 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et) et 4002 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &ku->key, et); et 4012 source4/heimdal/lib/krb5/crypto.c free_key_usage(context, &crypto->key_usage[i], crypto->et); et 4014 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &crypto->key, crypto->et); et 4024 source4/heimdal/lib/krb5/crypto.c *blocksize = crypto->et->blocksize; et 4033 source4/heimdal/lib/krb5/crypto.c *enctype = crypto->et->type; et 4042 source4/heimdal/lib/krb5/crypto.c *padsize = crypto->et->padsize; et 4051 source4/heimdal/lib/krb5/crypto.c *confoundersize = crypto->et->confoundersize; et 4071 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype); et 4072 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 4079 source4/heimdal/lib/krb5/crypto.c et->flags |= F_DISABLED; et 4098 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype); et 4099 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 4106 source4/heimdal/lib/krb5/crypto.c et->flags &= ~F_DISABLED; et 4118 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(etype); et 4124 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 4130 source4/heimdal/lib/krb5/crypto.c keylen = et->keytype->bits / 8; et 4138 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); et 4161 source4/heimdal/lib/krb5/crypto.c et, et 4166 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et); et 4170 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et); et 4179 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 4180 source4/heimdal/lib/krb5/crypto.c size_t padsize = et->padsize; et 4181 source4/heimdal/lib/krb5/crypto.c size_t checksumsize = CHECKSUMSIZE(et->checksum); et 4184 source4/heimdal/lib/krb5/crypto.c res = et->confoundersize + checksumsize + data_len; et 4194 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 4195 source4/heimdal/lib/krb5/crypto.c size_t padsize = et->padsize; et 4198 source4/heimdal/lib/krb5/crypto.c res = et->confoundersize + data_len; et 4200 source4/heimdal/lib/krb5/crypto.c if (et->keyed_checksum) et 4201 source4/heimdal/lib/krb5/crypto.c res += et->keyed_checksum->checksumsize; et 4203 source4/heimdal/lib/krb5/crypto.c res += et->checksum->checksumsize; et 4230 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 4233 source4/heimdal/lib/krb5/crypto.c res = CHECKSUMSIZE(et->checksum); et 4234 source4/heimdal/lib/krb5/crypto.c res += et->confoundersize; et 4235 source4/heimdal/lib/krb5/crypto.c if (et->padsize > 1) et 4236 source4/heimdal/lib/krb5/crypto.c res += et->padsize; et 4244 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 4247 source4/heimdal/lib/krb5/crypto.c if (et->keyed_checksum) et 4248 source4/heimdal/lib/krb5/crypto.c res = CHECKSUMSIZE(et->keyed_checksum); et 4250 source4/heimdal/lib/krb5/crypto.c res = CHECKSUMSIZE(et->checksum); et 4251 source4/heimdal/lib/krb5/crypto.c res += et->confoundersize; et 4252 source4/heimdal/lib/krb5/crypto.c if (et->padsize > 1) et 4253 source4/heimdal/lib/krb5/crypto.c res += et->padsize; et 4274 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type); et 4275 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 4281 source4/heimdal/lib/krb5/crypto.c if ((et->keytype->bits + 7) / 8 > size) { et 4286 source4/heimdal/lib/krb5/crypto.c et->name, (int)et->keytype->size); et 4289 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); et 4293 source4/heimdal/lib/krb5/crypto.c if (et->keytype->random_to_key) et 4294 source4/heimdal/lib/krb5/crypto.c (*et->keytype->random_to_key)(context, key, data, size); et 4296 source4/heimdal/lib/krb5/crypto.c memcpy(key->keyvalue.data, data, et->keytype->size); et 4310 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type); et 4317 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 4323 source4/heimdal/lib/krb5/crypto.c keylen = (et->keytype->bits + 7) / 8; et 4460 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et; et 4483 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype); et 4484 source4/heimdal/lib/krb5/crypto.c if(et == NULL) { et 4490 source4/heimdal/lib/krb5/crypto.c keylen = (et->keytype->bits + 7) / 8; et 4542 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type); et 4544 source4/heimdal/lib/krb5/crypto.c if(et == NULL || et->prf_length == 0) { et 4551 source4/heimdal/lib/krb5/crypto.c *length = et->prf_length; et 4561 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et; et 4565 source4/heimdal/lib/krb5/crypto.c if(et->prf == NULL) { et 4568 source4/heimdal/lib/krb5/crypto.c et->name); et 4572 source4/heimdal/lib/krb5/crypto.c return (*et->prf)(context, crypto, input, output);