Searched defs:client_key (Results 1 - 8 of 8) sorted by relevance

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dencode_kdc.c34 using message type type and encryption key client_key and encryption type
49 int using_subkey, const krb5_keyblock *client_key,
98 retval = krb5_encrypt_helper(context, client_key, usage, scratch,
47 krb5_encode_kdc_rep(krb5_context context, krb5_msgtype type, const krb5_enc_kdc_rep_part *encpart, int using_subkey, const krb5_keyblock *client_key, krb5_kdc_rep *dec_rep, krb5_data **enc_rep) argument
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Ddo_as_req.c75 krb5_key_data *server_key, *client_key; local
367 client_key = (krb5_key_data *) NULL;
374 0, &client_key))
377 if (!(client_key)) {
386 client_key, &encrypting_key,
425 &reply, client_key, &encrypting_key, &pa_context);
439 reply.enc_part.kvno = client_key->key_data_kvno;
H A Dkdc_util.c1450 * This function returns salt information for a particular client_key
1454 krb5_key_data *client_key, krb5_data *salt)
1462 if (client_key->key_data_ver == 1)
1465 switch (client_key->key_data_type[1]) {
1489 salt->length = client_key->key_data_length[1];
1492 memcpy(salt->data, client_key->key_data_contents[1], salt->length);
1453 get_salt_from_key(krb5_context context, krb5_principal client, krb5_key_data *client_key, krb5_data *salt) argument
H A Dkdc_preauth.c129 krb5_key_data *client_key,
139 krb5_key_data *client_key,
151 krb5_key_data *client_key,
163 krb5_key_data *client_key,
193 krb5_key_data *client_key,
1103 krb5_key_data *client_key, krb5_keyblock *encrypting_key,
1175 client_key, encrypting_key, send_pa,
1252 krb5_key_data * client_key; local
1275 -1, 0, &client_key)))
1279 client_key,
1101 return_padata(krb5_context context, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, void **padata_context) argument
1328 _make_etype_info_entry(krb5_context context, krb5_kdc_req *request, krb5_key_data *client_key, krb5_enctype etype, krb5_etype_info_entry **entry, int etype_info2) argument
1401 krb5_key_data *client_key; local
1510 etype_info_as_rep_helper(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, int etype_info2) argument
1587 return_etype_info2(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument
1604 return_etype_info(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etypeget_entry_data, void *pa_system_context, void **pa_request_context) argument
1620 return_pw_salt(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument
1710 return_sam_data(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, void **pa_request_context) argument
[all...]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_find.c223 uint32_t client_key; local
272 &client_key);
274 client_key = 0;
279 client_key, sattr, name);
293 client_key = 0;
305 &resume_char, &index, &odid, &client_key) != 0) {
351 resume_char, name83, index, odid, client_key,
414 uint32_t client_key; local
450 client_key = 0;
460 &resume_char, &index, &odid, &client_key) !
567 uint32_t client_key; local
634 uint32_t client_key = 0; local
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_clnt.c705 unsigned char *client_key = NULL, *kdc_hostname = NULL; local
805 &client_key, &client_key_len)) != 0) {
810 retval = pkinit_octetstring2key(context, etype, client_key,
911 if (client_key != NULL)
912 free(client_key);
H A Dpkinit_srv.c67 struct _krb5_key_data * client_key,
673 struct _krb5_key_data * client_key,
667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument
H A Dpkinit_crypto_openssl.c2280 unsigned char **client_key,
2302 if ((*client_key = (unsigned char *)
2313 DH_compute_key(*client_key, server_pub_key, cryptoctx->dh);
2317 print_buffer(*client_key, *client_key_len);
2331 if (*client_key != NULL)
2332 free(*client_key);
2333 *client_key = NULL;
2274 client_process_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *subjectPublicKey_data, unsigned int subjectPublicKey_length, unsigned char **client_key, unsigned int *client_key_len) argument

Completed in 79 milliseconds