/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksetpw.c | 41 krb5_enctype enctype, krb5_kvno kvno, const char *pw); 57 krb5_kvno kvno = 1; local 146 kvno = (krb5_kvno) atoi(optarg); 248 kt_add_entry(ctx, kt, victim, salt, enctypes[i], kvno, newpw); 330 const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno, 370 entry->vno = kvno; 329 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
|
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/ |
H A D | ktutil.c | 205 krb5_kvno kvno = 0; local 214 kvno = (krb5_kvno) atoi(argv[++i]); 231 if (argc != 8 || !(princ && kvno && enctype) || (use_pass+use_key != 1)) { 233 "-k kvno -e enctype\n", gettext("usage"), argv[0]); 237 retval = ktutil_add(kcontext, &ktlist, princ, kvno, enctype, use_pass);
|
H A D | ktutil_funcs.c | 100 krb5_error_code ktutil_add(context, list, princ_str, kvno, 105 krb5_kvno kvno; 228 lp->entry->vno = kvno; 387 unsigned char kvno; /* key version number */ local 412 fread(&kvno, 1, 1, fp) > 0 && 417 entry->vno = kvno; 527 /* Check if lp->entry is newer kvno; if so, update */ 540 unsigned char kvno; local 541 kvno = (unsigned char) lp->entry->vno; 550 fwrite((char *)&kvno, [all...] |
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb_cpw.c | 70 int i, kvno; local 72 for (kvno = i = 0; i < count; i++) { 73 if (kvno < data[i].key_data_kvno) { 74 kvno = data[i].key_data_kvno; 77 return(kvno); 102 add_key_rnd(context, master_key, ks_tuple, ks_tuple_count, db_entry, kvno) 108 int kvno; 146 /* Get max kvno */ 194 &key, NULL, kvno, 247 * Assumes the max kvno 264 int kvno; local 319 int kvno; local [all...] |
H A D | kdb_default.c | 44 * Given a particular enctype and optional salttype and kvno, find the 47 * If stype or kvno is negative, it is ignored. 48 * If kvno is 0 get the key which is maxkvno for the princ and matches 52 krb5_dbe_def_search_enctype(kcontext, dbentp, start, ktype, stype, kvno, kdatap) 58 krb5_int32 kvno; 67 if (kvno == -1 && stype == -1 && ktype == -1) 68 kvno = 0; 70 if (kvno == 0) { 73 if (kvno < dbentp->key_data[i].key_data_kvno) { 74 kvno 208 krb5_db_def_fetch_mkey( krb5_context context, krb5_principal mname, krb5_keyblock *key, int *kvno, char *db_args) argument [all...] |
H A D | kdb5.c | 1313 int kvno; local 1367 &kvno, 1475 krb5_int32 kvno, krb5_key_data ** kdatap) 1479 kvno, kdatap); 1488 krb5_int32 kvno, krb5_key_data ** kdatap) 1511 kvno, kdatap); 1471 krb5_dbe_find_enctype(krb5_context kcontext, krb5_db_entry * dbentp, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_key_data ** kdatap) argument 1483 krb5_dbe_search_enctype(krb5_context kcontext, krb5_db_entry * dbentp, krb5_int32 * start, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_key_data ** kdatap) argument
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_compat.h | 70 krb5_kvno kvno; member in struct:_old_krb5_db_entry
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 10 kvno [2] UInt32, 179 /* kvno (assuming all keys in array have same version) */ 406 int kvno, maj, min; local 428 /* kvno (assuming all keys in array have same version) */ 430 kvno = lval; /* XXX range check? */ 453 (*out)[i - 1].key_data_kvno = kvno;
|
H A D | krb5_decode.c | 213 { krb5_kvno kvno; local 214 get_field(kvno,0,asn1_decode_kvno); 215 if(kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); } 258 { krb5_kvno kvno; local 259 get_field(kvno,0,asn1_decode_kvno); 260 if(kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); 390 { krb5_kvno kvno; local 391 get_field(kvno,0,asn1_decode_kvno); 392 if(kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); } 423 { krb5_kvno kvno; local 533 { krb5_kvno kvno; local 584 { krb5_kvno kvno; local 638 { krb5_kvno kvno; local 696 { krb5_kvno kvno; local [all...] |
H A D | asn1_k_decode.c | 489 opt_field(val->kvno,1,asn1_decode_kvno,0); 612 { krb5_kvno kvno; local 613 get_field(kvno,1,asn1_decode_kvno); 614 if(kvno != KVNO) return KRB5KDC_ERR_BAD_PVNO; } 662 val->authorization_data.kvno = 0; 1121 fld.kvno = 0;\
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 70 const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, 92 entry.vno = kvno; 107 * krb5_kvno kvno, uint_t flags, char *password) 117 * where kvno is the key version number of the set of service principal 152 * Note: The kvno was previously determined by performing an LDAP query of the 155 * one could derive the principal's kvno by requesting a service ticket. 159 krb5_kvno kvno, uint_t flags, char *password) 241 kvno, password); 412 * a corresponding service principal, of key version number (kvno) n. It would 413 * consider more than one kvno se 69 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument 158 krb5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument [all...] |
H A D | kt_srvtab.c | 187 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 215 if (kvno == IGNORE_VNO) { 221 if (ent.vno == kvno) {
|
H A D | kt_file.c | 260 krb5_const_principal principal, krb5_kvno kvno, 339 if (kvno == IGNORE_VNO) { 367 /* if this kvno matches, free the current (will there ever 372 for the kvno, so we're toast if the kvno requested is 376 if (new_entry.vno == (kvno & 0xff)) { 259 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 618 kvno, krb5_keyblock *keyblock, 615 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
|
/illumos-gate/usr/src/cmd/krb5/kadmin/cli/ |
H A D | keytab.c | 77 "[kvno|\"all\"|\"old\"]\n"); 386 new_entry.vno = princ_rec.kvno; 397 printf(gettext("Entry for principal %s with kvno %d, " 399 princ_str, princ_rec.kvno, 432 krb5_kvno kvno; local 445 kvno = 0; 448 kvno = 0; 451 kvno = 0; 454 kvno = atoi(kvno_str); 457 /* kvno i [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_ksetpwd.c | 319 krb5_principal *princs, int count, char *fname, krb5_kvno kvno, 349 kvno, &salt, passwd) != 0) { 408 krb5_enctype enctype, krb5_kvno kvno, const krb5_data *salt, 446 entry->vno = kvno; 318 smb_krb5_kt_populate(krb5_context ctx, const char *fqdn, krb5_principal *princs, int count, char *fname, krb5_kvno kvno, char *passwd, krb5_enctype *enctypes, int enctype_count) argument 407 smb_krb5_kt_addkey(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, krb5_enctype enctype, krb5_kvno kvno, const krb5_data *salt, const char *pw) argument
|
H A D | smbns_ads.c | 1657 int kvno = 1; local 1662 kvno = atoi(avpair.avp_val); 1666 return (kvno); 1700 krb5_kvno kvno; local 1781 kvno = smb_ads_lookup_computer_attr_kvno(ah, dn); 1817 tmpfile, kvno, machine_passwd, encptr, num) != 0) {
|
/illumos-gate/usr/src/cmd/krb5/ldap_util/ |
H A D | kdb5_ldap_realm.c | 2326 int kvno = 0; local 2414 kvno = 1; /* New key is getting set */ 2417 &key, NULL, kvno, 2452 kvno = 1; /* New key is getting set */ 2455 NULL, kvno,
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 209 /* krb5_kvno kvno = 0;*/ 262 if ((retval = kdc_get_server_key(apreq->ticket, &key, &kvno))) 386 kdc_get_server_key(krb5_ticket *ticket, krb5_keyblock **key, krb5_kvno *kvno) argument 418 ticket->enc_part.kvno, &server_key); 425 *kvno = server_key->key_data_kvno;
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 393 (mask & KADM5_KVNO)?entry->kvno:1, 663 kdb.key_data[i].key_data_kvno = entry->kvno; 845 for (entry->kvno = 0, i=0; i<kdb.n_key_data; i++) 846 if (kdb.key_data[i].key_data_kvno > entry->kvno) 847 entry->kvno = kdb.key_data[i].key_data_kvno; 931 newv1->kvno = entry->kvno; 1390 password, 0 /* increment kvno */, 1711 int i, k, kvno, ret, have_pol = 0; 1737 for (kvno 1888 int i, j, k, kvno, ret, have_pol = 0; local 2160 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | admin.h | 226 krb5_kvno kvno; member in struct:_kadm5_principal_ent_t_v2 251 krb5_kvno kvno; member in struct:_kadm5_principal_ent_t_v1 521 kvno, krb5_keyblock *keyblock, 682 krb5_kvno kvno; member in struct:_ovsec_kadm_principal_ent_t
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 450 krb5_kvno kvno; member in struct:_krb5_enc_data 1086 krb5_enc_data enc_part; /* encryption type, kvno, encrypted 1189 krb5_enc_data enc_part; /* encryption type, kvno, encrypted
|