/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pkcs11slot.c | 16 get_algo(krb5_enctype etype, KRB5_MECH_TO_PKCS *algos) argument 18 switch (etype) { 79 get_key_type(krb5_enctype etype, CK_KEY_TYPE *keyType) argument 81 switch (etype) { 127 tempenctype = krb5_enctypes_list[i].etype; 134 krb5_enctypes_list[i].etype = -1; 154 krb5_enctypes_list[i].etype = -1;
|
H A D | enctype_util.c | 41 krb5_c_valid_enctype(krb5_enctype etype) argument 43 return (find_enctype(etype) != NULL); 47 krb5int_c_weak_enctype(krb5_enctype etype) argument 51 ktp = find_enctype(etype); 81 *enctypep = ktp->etype; 90 *enctypep = ktp->etype;
|
H A D | old_api_glue.c | 350 valid_enctype(krb5_enctype etype) argument 352 return krb5_c_valid_enctype(etype);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_keytab.c | 41 krb5_enctype etype, 54 /* if there's already a key of the correct etype, we're done. 55 if the etype is wrong, free the existing key, and make 59 if (as_key->enctype == etype) 66 if (!krb5_c_valid_enctype(etype)) 71 etype, &kt_ent))) 39 get_as_key_keytab(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
|
H A D | init_creds_ctx.h | 31 krb5_enctype etype; member in struct:_krb5_init_creds_context 43 krb5_enctype etype,
|
H A D | gic_pwd.c | 31 krb5_enctype etype, 49 /* If there's already a key of the correct etype, we're done. 50 If the etype is wrong, free the existing key, and make 58 if (as_key->enctype != etype) { 98 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, 29 krb5_get_as_key_password(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
|
H A D | auth_con.c | 575 krb5_enctype *etype) 577 *etype = auth_context->negotiated_etype; 573 krb5_auth_con_get_subkey_enctype(krb5_context context, krb5_auth_context auth_context, krb5_enctype *etype) argument
|
H A D | s4u_creds.c | 46 krb5_enctype etype, 43 krb5_get_as_key_noop( krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
|
H A D | preauth2.c | 63 krb5_enctype *etype, 471 *eptr = *rock->etype; 653 krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, 674 krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, 698 krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, 717 fprintf (stderr, "; *etype=%d request->ktype[0]=%d\n", 718 *etype, request->ktype[0]); 722 *etype ? *etype : request->ktype[0], 835 krb5_enctype *etype, krb5_keybloc 651 pa_salt(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 672 pa_fx_cookie(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 696 pa_enc_timestamp(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 833 pa_sam(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1085 pa_pkinit_gen_req(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1259 pa_pkinit_parse_rep(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1388 pa_sam_2(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1714 pa_s4u_x509_user(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1822 krb5_do_preauth_tryagain(krb5_context kcontext, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **padata, krb5_pa_data ***return_padata, krb5_error *err_reply, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument 1893 krb5_do_preauth(krb5_context context, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **in_padata, krb5_pa_data ***out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/libsm/ |
H A D | exc.c | 209 ** etype -- type of exception. 237 sm_exc_vnew_x(etype, ap) 238 const SM_EXC_TYPE_T *etype; 252 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 253 argc = strlen(etype->etype_argformat); 265 exc->exc_type = etype; 279 switch (etype->etype_argformat[i]) 294 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 299 etype->etype_argformat[i]); 313 switch (etype 407 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument 637 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument [all...] |
/osnet-11/usr/src/lib/libdiskmgt/common/ |
H A D | events.c | 178 events_new_event(char *name, int dtype, char *etype) argument 202 if (nvlist_add_string(event, DM_EV_TYPE, etype) != 0) {
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | eventlog_svc.c | 389 logr_set_event_typeid(int le_pri, WORD *etype, DWORD *eid) argument 397 *etype = EVENTLOG_ERROR_TYPE; 401 *etype = EVENTLOG_WARNING_TYPE; 407 *etype = EVENTLOG_INFORMATION_TYPE; 411 *etype = EVENTLOG_SUCCESS;
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 75 krb5_keyblock *key_block, krb5_enctype etype, krb5_data *); 465 krb5_enctype etype, 487 request, &asRep, as_key, etype, encoded_request); 661 krb5_enctype etype, 785 retval = pkinit_octetstring2key(context, etype, client_key, 460 pa_pkinit_parse_rep(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_enctype etype, krb5_keyblock * as_key, krb5_data *encoded_request) argument 654 pkinit_as_rep_parse(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_preauthtype pa_type, krb5_kdc_req *request, const krb5_data *as_rep, krb5_keyblock *key_block, krb5_enctype etype, krb5_data *encoded_request) argument
|
H A D | pkinit_crypto_openssl.c | 1356 const ASN1_OBJECT *type = NULL, *etype = NULL; local 1570 etype = CMS_get0_eContentType(cms); 1574 if (!OBJ_cmp(etype, oid)) 1586 if (!OBJ_cmp(etype, client_oid) || 1587 !OBJ_cmp(etype, server_oid) || 1588 !OBJ_cmp(etype, rsa_oid)) 1596 print_buffer(etype->data, 1597 (unsigned int)etype->length); 2261 krb5_enctype etype, 2301 key_block->enctype = etype; 2260 pkinit_octetstring2key(krb5_context context, krb5_enctype etype, unsigned char *key, unsigned int dh_key_len, krb5_keyblock * key_block) argument [all...] |
/osnet-11/usr/src/lib/libradproto/common/ |
H A D | radclient.c | 516 rc_response_error(message_wrapper_t *mw, adr_data_t **error, adr_type_t *etype) argument 519 (void) xdr_unembed_optdata(error, etype, 525 radclient_error(message_wrapper_t *mw, adr_type_t *etype, adr_data_t **error) argument 530 if (err == 1 && etype != NULL && error != NULL) { 531 rc_response_error(mw, error, etype); 542 message_wrapper_t **mwp, adr_type_t *etype, adr_data_t **errorp) 552 rc_err_t result = radclient_error(mw, etype, errorp); 541 radclient_write_sync(rc_conn_t *c, operation op, xdrproc_t proc, void *obj, message_wrapper_t **mwp, adr_type_t *etype, adr_data_t **errorp) argument
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 1314 krb5_enctype etype, 1352 if (etype == ENCTYPE_UNKNOWN) 1353 etype = DEFAULT_KDC_ENCTYPE; 1356 krb5_c_string_to_key(context, etype, &pwd, salt ? salt : &scratch, 1312 krb5_db_fetch_mkey(krb5_context context, krb5_principal mname, krb5_enctype etype, krb5_boolean fromkeyboard, krb5_boolean twice, char * db_args, krb5_kvno * kvno, krb5_data * salt, krb5_keyblock * key) argument
|