/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encode_kdc.c | 34 using message type type and encryption key client_key and encryption type 49 int using_subkey, const krb5_keyblock *client_key, 98 retval = krb5_encrypt_helper(context, client_key, usage, scratch, 47 krb5_encode_kdc_rep(krb5_context context, krb5_msgtype type, const krb5_enc_kdc_rep_part *encpart, int using_subkey, const krb5_keyblock *client_key, krb5_kdc_rep *dec_rep, krb5_data **enc_rep) argument
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 75 krb5_key_data *server_key, *client_key; local 367 client_key = (krb5_key_data *) NULL; 374 0, &client_key)) 377 if (!(client_key)) { 386 client_key, &encrypting_key, 425 &reply, client_key, &encrypting_key, &pa_context); 439 reply.enc_part.kvno = client_key->key_data_kvno;
|
H A D | kdc_util.c | 1450 * This function returns salt information for a particular client_key 1454 krb5_key_data *client_key, krb5_data *salt) 1462 if (client_key->key_data_ver == 1) 1465 switch (client_key->key_data_type[1]) { 1489 salt->length = client_key->key_data_length[1]; 1492 memcpy(salt->data, client_key->key_data_contents[1], salt->length); 1453 get_salt_from_key(krb5_context context, krb5_principal client, krb5_key_data *client_key, krb5_data *salt) argument
|
H A D | kdc_preauth.c | 129 krb5_key_data *client_key, 139 krb5_key_data *client_key, 151 krb5_key_data *client_key, 163 krb5_key_data *client_key, 193 krb5_key_data *client_key, 1103 krb5_key_data *client_key, krb5_keyblock *encrypting_key, 1175 client_key, encrypting_key, send_pa, 1252 krb5_key_data * client_key; local 1275 -1, 0, &client_key))) 1279 client_key, 1101 return_padata(krb5_context context, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, void **padata_context) argument 1328 _make_etype_info_entry(krb5_context context, krb5_kdc_req *request, krb5_key_data *client_key, krb5_enctype etype, krb5_etype_info_entry **entry, int etype_info2) argument 1401 krb5_key_data *client_key; local 1510 etype_info_as_rep_helper(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, int etype_info2) argument 1587 return_etype_info2(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument 1604 return_etype_info(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etypeget_entry_data, void *pa_system_context, void **pa_request_context) argument 1620 return_pw_salt(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument 1710 return_sam_data(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, void **pa_request_context) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_find.c | 223 uint32_t client_key; local 272 &client_key); 274 client_key = 0; 279 client_key, sattr, name); 293 client_key = 0; 305 &resume_char, &index, &odid, &client_key) != 0) { 351 resume_char, name83, index, odid, client_key, 414 uint32_t client_key; local 450 client_key = 0; 460 &resume_char, &index, &odid, &client_key) ! 567 uint32_t client_key; local 634 uint32_t client_key = 0; local [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 705 unsigned char *client_key = NULL, *kdc_hostname = NULL; local 805 &client_key, &client_key_len)) != 0) { 810 retval = pkinit_octetstring2key(context, etype, client_key, 911 if (client_key != NULL) 912 free(client_key);
|
H A D | pkinit_srv.c | 67 struct _krb5_key_data * client_key, 673 struct _krb5_key_data * client_key, 667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument
|
H A D | pkinit_crypto_openssl.c | 2280 unsigned char **client_key, 2302 if ((*client_key = (unsigned char *) 2313 DH_compute_key(*client_key, server_pub_key, cryptoctx->dh); 2317 print_buffer(*client_key, *client_key_len); 2331 if (*client_key != NULL) 2332 free(*client_key); 2333 *client_key = NULL; 2274 client_process_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *subjectPublicKey_data, unsigned int subjectPublicKey_length, unsigned char **client_key, unsigned int *client_key_len) argument
|