Searched defs:enctype (Results 1 - 25 of 38) sorted by relevance

12

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dinit_allocated_keyblock.c34 krb5_enctype enctype,
43 kb->enctype = enctype;
32 krb5_init_allocated_keyblock( krb5_context context, krb5_enctype enctype, unsigned int length, krb5_keyblock *kb) argument
H A Dinit_keyblock.c38 (krb5_context context, krb5_enctype enctype,
49 kb->enctype = enctype;
37 krb5_init_keyblock(krb5_context context, krb5_enctype enctype, size_t length, krb5_keyblock **out) argument
H A Dget_set_keyblock.c35 return (kb->enctype);
51 krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype) argument
53 kb->enctype = enctype;
H A Dfwd_tgt.c60 krb5_enctype enctype = 0; local
76 enctype = session_key->enctype;
94 /* Got the credentials. Okay, now record the enctype and
96 enctype = out->keyblock.enctype;
177 creds.keyblock.enctype = enctype;
187 if (enctype) {
188 creds.keyblock.enctype
[all...]
H A Drd_req_dec.c76 krb5_enctype enctype; local
79 enctype = req->ticket->enc_part.enctype;
85 enctype, &ktent)))
95 ktent.key.enctype = enctype;
108 "AP Request ticket decrypt fail for principal '%s' (kvno=%d, enctype=%d)"),
111 enctype);
361 etype = req->ticket->enc_part.enctype)) ||
363 etype = req->ticket->enc_part2->session->enctype)) ||
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/
H A Dblock_size.c32 krb5_c_block_size(krb5_context context, krb5_enctype enctype, argument
38 if (krb5_enctypes_list[i].etype == enctype)
H A Dencrypt_length.c32 krb5_c_encrypt_length(krb5_context context, krb5_enctype enctype, argument
38 if (krb5_enctypes_list[i].etype == enctype)
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Denctype_to_string.c36 krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen) argument
41 if (krb5_enctypes_list[i].etype == enctype) {
55 krb5_enctype_to_istring(krb5_enctype enctype, char *buffer, size_t buflen) argument
60 if (krb5_enctypes_list[i].etype == enctype) {
H A Dkeylengths.c40 krb5_c_keylengths(krb5_context context, krb5_enctype enctype, argument
49 if (krb5_enctypes_list[i].etype == enctype)
H A Drandom_to_key.c41 krb5_c_random_to_key(krb5_context context, krb5_enctype enctype, argument
55 if (krb5_enctypes_list[i].etype == enctype)
H A Dkeyed_checksum_types.c50 krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, argument
58 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) ||
73 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) ||
H A Dmake_random_key.c37 krb5_c_make_random_key(krb5_context context, krb5_enctype enctype, argument
48 if (krb5_enctypes_list[i].etype == enctype)
57 enctype);
80 random_key->enctype = enctype;
H A Dstring_to_key.c37 krb5_enctype enctype,
45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, argument
49 return krb5_c_string_to_key_with_params(context, enctype, string, salt,
54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, argument
65 if (krb5_enctypes_list[i].etype == enctype)
77 switch (enctype) {
94 key->enctype = enctype;
H A Dpbkdf2.c52 krb5_enctype enctype,
75 rv = get_key_type(enctype, &keytype);
88 enctype != ENCTYPE_DES_CBC_CRC &&
89 enctype != ENCTYPE_DES_CBC_MD5 &&
90 enctype != ENCTYPE_DES_CBC_RAW &&
91 enctype != ENCTYPE_DES_HMAC_SHA1 &&
92 enctype != ENCTYPE_DES3_CBC_SHA1 &&
93 enctype != ENCTYPE_DES3_CBC_RAW) {
48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
H A Dold_api_glue.c51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize)))
64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size,
86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize)))
94 inputd.enctype = eblock->key->enctype;
178 krb5_enctype enctype)
180 eblock->crypto_entry = enctype;
293 if ((ret = krb5_c_encrypt_length(context, key->enctype, data->length,
298 if ((ret = krb5_c_block_size(context, key->enctype, &blocksize)))
307 enc_data->enctype
177 krb5_use_enctype(krb5_context context, krb5_encrypt_block *eblock, krb5_enctype enctype) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dread_servi.c41 * principal, vno, and enctype and returns the resulting key in *key
47 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument
70 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
H A Dktfns.c55 krb5_enctype enctype, krb5_keytab_entry *entry)
70 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype,
53 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
H A Dkt_solaris.c70 const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno,
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
465 (entry.key.enctype == *tenctype)) {
472 if ((entry.key.enctype == AES128) ||
473 (entry.key.enctype == AES256)) {
69 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
H A Dkt_srvtab.c187 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
198 switch (enctype) {
213 ent.key.enctype = enctype;
480 ret_entry->key.enctype = ENCTYPE_DES_CBC_CRC;
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/
H A Dkadm5_create.c303 krb5_enctype *tmpenc, *enctype = NULL; local
308 ret = krb5_get_permitted_enctypes(context, &enctype);
309 if (ret || *enctype == NULL) {
318 for (tmpenc = enctype, num_ks = 0; *tmpenc; tmpenc++)
325 krb5_free_ktypes(context, enctype);
336 krb5_free_ktypes(context, enctype);
344 keysalt[i].ks_enctype = enctype[i];
351 krb5_free_ktypes (context, enctype);
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/
H A Dksetpw.c41 krb5_enctype enctype, krb5_kvno kvno, const char *pw);
138 "or unsupported enctype %s"),
330 const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno,
339 if ((code = krb5_enctype_to_string(enctype, buf, sizeof (buf)))) {
341 enctype);
356 gettext("Could not compute salt for %s"), enctype);
360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key);
364 enctype);
329 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/
H A Dktutil.c204 char *enctype = NULL; local
218 enctype = argv[++i];
231 if (argc != 8 || !(princ && kvno && enctype) || (use_pass+use_key != 1)) {
233 "-k kvno -e enctype\n", gettext("usage"), argv[0]);
237 retval = ktutil_add(kcontext, &ktlist, princ, kvno, enctype, use_pass);
320 lp->entry->key.enctype, buf, 256))) {
323 lp->entry->key.enctype);
327 "enctype to string"));
H A Dktutil_funcs.c112 krb5_enctype enctype; local
132 retval = krb5_string_to_enctype(enctype_str, &enctype);
182 retval = krb5_c_string_to_key(context, enctype, &password,
207 lp->entry->key.enctype = enctype;
424 entry->key.enctype = ENCTYPE_DES_CBC_CRC;
487 if ((lp->entry->key.enctype != ENCTYPE_DES_CBC_CRC) &&
488 (lp->entry->key.enctype != ENCTYPE_DES_CBC_MD5) &&
489 (lp->entry->key.enctype != ENCTYPE_DES_CBC_MD4) &&
490 (lp->entry->key.enctype !
[all...]
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb_default.c44 * Given a particular enctype and optional salttype and kvno, find the
152 krb5_ui_2 enctype; local
187 enctype = key->enctype;
188 if ((fwrite((krb5_pointer) &enctype,
215 krb5_ui_2 enctype; local
236 if (fread((krb5_pointer) &enctype, 2, 1, kf) != 1) {
241 if (key->enctype == ENCTYPE_UNKNOWN)
242 key->enctype = enctype;
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_compat.h47 krb5_enctype enctype; member in struct:_old_krb5_encrypted_keyblock

Completed in 94 milliseconds

12