Searched defs:etype (Results 1 - 16 of 16) sorted by relevance

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dpkcs11slot.c16 get_algo(krb5_enctype etype, KRB5_MECH_TO_PKCS *algos) argument
18 switch (etype) {
79 get_key_type(krb5_enctype etype, CK_KEY_TYPE *keyType) argument
81 switch (etype) {
127 tempenctype = krb5_enctypes_list[i].etype;
134 krb5_enctypes_list[i].etype = -1;
154 krb5_enctypes_list[i].etype = -1;
H A Denctype_util.c41 krb5_c_valid_enctype(krb5_enctype etype) argument
43 return (find_enctype(etype) != NULL);
47 krb5int_c_weak_enctype(krb5_enctype etype) argument
51 ktp = find_enctype(etype);
81 *enctypep = ktp->etype;
90 *enctypep = ktp->etype;
H A Dold_api_glue.c350 valid_enctype(krb5_enctype etype) argument
352 return krb5_c_valid_enctype(etype);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgic_keytab.c41 krb5_enctype etype,
54 /* if there's already a key of the correct etype, we're done.
55 if the etype is wrong, free the existing key, and make
59 if (as_key->enctype == etype)
66 if (!krb5_c_valid_enctype(etype))
71 etype, &kt_ent)))
39 get_as_key_keytab(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
H A Dinit_creds_ctx.h31 krb5_enctype etype; member in struct:_krb5_init_creds_context
43 krb5_enctype etype,
H A Dgic_pwd.c31 krb5_enctype etype,
49 /* If there's already a key of the correct etype, we're done.
50 If the etype is wrong, free the existing key, and make
58 if (as_key->enctype != etype) {
98 ret = krb5_c_string_to_key_with_params(context, etype, password, salt,
29 krb5_get_as_key_password(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
H A Dauth_con.c575 krb5_enctype *etype)
577 *etype = auth_context->negotiated_etype;
573 krb5_auth_con_get_subkey_enctype(krb5_context context, krb5_auth_context auth_context, krb5_enctype *etype) argument
H A Ds4u_creds.c46 krb5_enctype etype,
43 krb5_get_as_key_noop( krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
H A Dpreauth2.c63 krb5_enctype *etype,
471 *eptr = *rock->etype;
653 krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter,
674 krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype,
698 krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype,
717 fprintf (stderr, "; *etype=%d request->ktype[0]=%d\n",
718 *etype, request->ktype[0]);
722 *etype ? *etype : request->ktype[0],
835 krb5_enctype *etype, krb5_keybloc
651 pa_salt(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
672 pa_fx_cookie(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
696 pa_enc_timestamp(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
833 pa_sam(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
1085 pa_pkinit_gen_req(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
1259 pa_pkinit_parse_rep(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
1388 pa_sam_2(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
1714 pa_s4u_x509_user(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument
1822 krb5_do_preauth_tryagain(krb5_context kcontext, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **padata, krb5_pa_data ***return_padata, krb5_error *err_reply, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument
1893 krb5_do_preauth(krb5_context context, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **in_padata, krb5_pa_data ***out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/libsm/
H A Dexc.c209 ** etype -- type of exception.
237 sm_exc_vnew_x(etype, ap)
238 const SM_EXC_TYPE_T *etype;
252 SM_REQUIRE_ISA(etype, SmExcTypeMagic);
253 argc = strlen(etype->etype_argformat);
265 exc->exc_type = etype;
279 switch (etype->etype_argformat[i])
294 SM_REQUIRE(etype->etype_argformat[i+1] == '\0');
299 etype->etype_argformat[i]);
313 switch (etype
407 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument
637 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument
[all...]
/osnet-11/usr/src/lib/libdiskmgt/common/
H A Devents.c178 events_new_event(char *name, int dtype, char *etype) argument
202 if (nvlist_add_string(event, DM_EV_TYPE, etype) != 0) {
/osnet-11/usr/src/lib/libntsvcs/common/
H A Deventlog_svc.c389 logr_set_event_typeid(int le_pri, WORD *etype, DWORD *eid) argument
397 *etype = EVENTLOG_ERROR_TYPE;
401 *etype = EVENTLOG_WARNING_TYPE;
407 *etype = EVENTLOG_INFORMATION_TYPE;
411 *etype = EVENTLOG_SUCCESS;
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_clnt.c75 krb5_keyblock *key_block, krb5_enctype etype, krb5_data *);
465 krb5_enctype etype,
487 request, &asRep, as_key, etype, encoded_request);
661 krb5_enctype etype,
785 retval = pkinit_octetstring2key(context, etype, client_key,
460 pa_pkinit_parse_rep(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_enctype etype, krb5_keyblock * as_key, krb5_data *encoded_request) argument
654 pkinit_as_rep_parse(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_preauthtype pa_type, krb5_kdc_req *request, const krb5_data *as_rep, krb5_keyblock *key_block, krb5_enctype etype, krb5_data *encoded_request) argument
H A Dpkinit_crypto_openssl.c1356 const ASN1_OBJECT *type = NULL, *etype = NULL; local
1570 etype = CMS_get0_eContentType(cms);
1574 if (!OBJ_cmp(etype, oid))
1586 if (!OBJ_cmp(etype, client_oid) ||
1587 !OBJ_cmp(etype, server_oid) ||
1588 !OBJ_cmp(etype, rsa_oid))
1596 print_buffer(etype->data,
1597 (unsigned int)etype->length);
2261 krb5_enctype etype,
2301 key_block->enctype = etype;
2260 pkinit_octetstring2key(krb5_context context, krb5_enctype etype, unsigned char *key, unsigned int dh_key_len, krb5_keyblock * key_block) argument
[all...]
/osnet-11/usr/src/lib/libradproto/common/
H A Dradclient.c516 rc_response_error(message_wrapper_t *mw, adr_data_t **error, adr_type_t *etype) argument
519 (void) xdr_unembed_optdata(error, etype,
525 radclient_error(message_wrapper_t *mw, adr_type_t *etype, adr_data_t **error) argument
530 if (err == 1 && etype != NULL && error != NULL) {
531 rc_response_error(mw, error, etype);
542 message_wrapper_t **mwp, adr_type_t *etype, adr_data_t **errorp)
552 rc_err_t result = radclient_error(mw, etype, errorp);
541 radclient_write_sync(rc_conn_t *c, operation op, xdrproc_t proc, void *obj, message_wrapper_t **mwp, adr_type_t *etype, adr_data_t **errorp) argument
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb5.c1314 krb5_enctype etype,
1352 if (etype == ENCTYPE_UNKNOWN)
1353 etype = DEFAULT_KDC_ENCTYPE;
1356 krb5_c_string_to_key(context, etype, &pwd, salt ? salt : &scratch,
1312 krb5_db_fetch_mkey(krb5_context context, krb5_principal mname, krb5_enctype etype, krb5_boolean fromkeyboard, krb5_boolean twice, char * db_args, krb5_kvno * kvno, krb5_data * salt, krb5_keyblock * key) argument

Completed in 117 milliseconds