/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | enctype_util_solaris.c | 31 * is_in_keytype(): returns 1 if enctype == one of the enctypes in keytype 38 krb5_enctype enctype) 46 if (keytype[i] == enctype) 35 is_in_keytype( krb5_const krb5_enctype *keytype, int numkeytypes, krb5_enctype enctype) argument
|
H A D | keylengths.c | 40 krb5_c_keylengths(krb5_context context, krb5_enctype enctype, argument 49 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | random_to_key.c | 41 krb5_c_random_to_key(krb5_context context, krb5_enctype enctype, argument 55 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | keyed_checksum_types.c | 50 krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, argument 55 if (enctype == ENCTYPE_ARCFOUR_HMAC || 56 enctype == ENCTYPE_ARCFOUR_HMAC_EXP) { 67 etype_match(krb5int_cksumtypes_list[i].keyed_etype, enctype)) || 82 etype_match(krb5int_cksumtypes_list[i].keyed_etype, enctype)) ||
|
H A D | make_random_key.c | 37 krb5_c_make_random_key(krb5_context context, krb5_enctype enctype, argument 48 if (krb5_enctypes_list[i].etype == enctype) 57 enctype); 80 random_key->enctype = enctype;
|
H A D | prf.c | 30 *the enctype-specific PRF and then generate pseudo-random data. This 41 krb5_c_prf_length(krb5_context context, krb5_enctype enctype, size_t *len) argument 46 ktp = find_enctype(enctype); 63 ktp = find_enctype(key->keyblock.enctype);
|
H A D | string_to_key.c | 37 krb5_enctype enctype, 45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, argument 49 return krb5_c_string_to_key_with_params(context, enctype, string, salt, 54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, argument 65 if (krb5_enctypes_list[i].etype == enctype) 77 switch (enctype) { 94 key->enctype = enctype;
|
H A D | pbkdf2.c | 52 krb5_enctype enctype, 75 rv = get_key_type(enctype, &keytype); 88 enctype != ENCTYPE_DES_CBC_CRC && 89 enctype != ENCTYPE_DES_CBC_MD5 && 90 enctype != ENCTYPE_DES_CBC_RAW && 91 enctype != ENCTYPE_DES_HMAC_SHA1 && 92 enctype != ENCTYPE_DES3_CBC_SHA1 && 93 enctype != ENCTYPE_DES3_CBC_RAW) { 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
H A D | enctype_util.c | 100 krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen) argument 104 ktp = find_enctype(enctype);
|
H A D | old_api_glue.c | 49 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 62 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size, 84 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 92 inputd.enctype = eblock->key->enctype; 176 krb5_enctype enctype) 178 eblock->crypto_entry = enctype; 297 if ((ret = krb5_c_encrypt_length(context, key->enctype, data->length, 302 if ((ret = krb5_c_block_size(context, key->enctype, &blocksize))) 311 enc_data->enctype 175 krb5_use_enctype(krb5_context context, krb5_encrypt_block *eblock, krb5_enctype enctype) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | init_allocated_keyblock.c | 34 krb5_enctype enctype, 43 kb->enctype = enctype; 32 krb5_init_allocated_keyblock( krb5_context context, krb5_enctype enctype, unsigned int length, krb5_keyblock *kb) argument
|
H A D | init_keyblock.c | 37 krb5_init_keyblock(krb5_context context, krb5_enctype enctype, argument 40 return krb5int_c_init_keyblock (context, enctype, length, out);
|
H A D | gen_save_subkey.c | 42 krb5_enctype enctype) 70 retval = krb5_generate_subkey_extended(context, keyblock, enctype, &kb); 39 krb5int_generate_and_save_subkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock, krb5_enctype enctype) argument
|
H A D | enc_keyhelper.c | 39 krb5_enctype enctype; local 43 enctype = krb5_k_key_enctype(context, key); 44 ret = krb5_c_encrypt_length(context, enctype, plain->length, &enclen);
|
H A D | get_set_keyblock.c | 35 return (kb->enctype); 51 krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype) argument 53 kb->enctype = enctype;
|
H A D | gen_subkey.c | 46 krb5_enctype enctype, 74 retval = krb5_c_make_random_key(context, enctype, keyblock); 87 return krb5_generate_subkey_extended(context, key, key->enctype, subkey); 44 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype enctype, krb5_keyblock **subkey) argument
|
H A D | mk_priv.c | 47 krb5_enctype enctype = krb5_k_key_enctype(context, key); local 55 privmsg.enc_part.enctype = enctype; 71 if ((retval = krb5_c_encrypt_length(context, enctype, 84 if ((retval = krb5_c_block_size(context, enctype, &blocksize)))
|
H A D | mk_safe.c | 209 krb5_enctype enctype = krb5_k_key_enctype(context, key); local 213 retval = krb5_c_keyed_checksum_types (context, enctype, 230 * If not found, and our enctype is DES_CBC, set sumtype to the 242 switch (enctype) { 252 enctype,
|
H A D | rd_priv.c | 74 krb5_enctype enctype; local 84 enctype = krb5_k_key_enctype(context, key); 85 if ((retval = krb5_c_block_size(context, enctype, &blocksize)))
|
H A D | fwd_tgt.c | 64 krb5_enctype enctype = 0; local 80 enctype = session_key->enctype; 98 /* Got the credentials. Okay, now record the enctype and 100 enctype = out->keyblock.enctype; 183 creds.keyblock.enctype = enctype; 193 if (enctype) { 194 creds.keyblock.enctype [all...] |
H A D | mk_req_ext.c | 152 in_creds->keyblock.enctype); 177 krb5_enctype enctype = krb5_k_key_enctype(context, local 180 retval = krb5int_c_mandatory_cksumtype(context, enctype, 220 in_creds->keyblock.enctype))) 319 /* Only send EtypeList if we prefer another enctype to tkt_enctype */ 353 * If the enctype of the ticket session key is included in the enctype
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | read_servi.c | 43 * principal, vno, and enctype and returns the resulting key in *key 49 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 72 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
|
H A D | ktfns.c | 58 krb5_enctype enctype, krb5_keytab_entry *entry) 73 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype, 56 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
H A D | kt_memory.c | 384 krb5_enctype enctype, krb5_keytab_entry *out_entry) 404 /* if the enctype is not ignored and doesn't match, 406 if (enctype != IGNORE_ENCTYPE) { 407 if ((err = krb5_c_enctype_compare(context, enctype, 408 entry->key.enctype, 410 /* we can't determine the enctype of the entry */ 442 * Coerce the enctype of the output keyblock in case we 443 * got an inexact match on the enctype. 445 if(enctype != IGNORE_ENCTYPE) 446 out_entry->key.enctype 382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument [all...] |
H A D | kt_solaris.c | 70 const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 465 (entry.key.enctype == *tenctype)) { 472 if ((entry.key.enctype == AES128) || 473 (entry.key.enctype == AES256)) { 69 k5_kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
|