/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb_cpw.c | 66 int i, kvno; local 68 for (kvno = i = 0; i < count; i++) { 69 if (kvno < data[i].key_data_kvno) { 70 kvno = data[i].key_data_kvno; 73 return(kvno); 98 add_key_rnd(context, master_key, ks_tuple, ks_tuple_count, db_entry, kvno) 104 int kvno; 142 /* Get max kvno */ 190 &key, NULL, kvno, 243 * Assumes the max kvno 260 int kvno; local 316 int kvno; local [all...] |
H A D | kdb_default.c | 43 * Given a particular enctype and optional salttype and kvno, find the 46 * If stype or kvno is negative, it is ignored. 47 * If kvno is 0 get the key which is maxkvno for the princ and matches 51 krb5_dbe_def_search_enctype(kcontext, dbentp, start, ktype, stype, kvno, kdatap) 57 krb5_int32 kvno; 67 if (kvno == -1 && stype == -1 && ktype == -1) 68 kvno = 0; 70 if (kvno == 0) { 73 if (kvno < dbentp->key_data[i].key_data_kvno) { 74 kvno 237 krb5_def_store_mkey(krb5_context context, char *keyfile, krb5_principal mname, krb5_kvno kvno, krb5_keyblock *key, char *master_pwd) argument 254 krb5_db_def_fetch_mkey_stash(krb5_context context, const char *keyfile, krb5_keyblock *key, krb5_kvno *kvno) argument 334 krb5_db_def_fetch_mkey_keytab(krb5_context context, const char *keyfile, krb5_principal mname, krb5_keyblock *key, krb5_kvno *kvno) argument 398 krb5_db_def_fetch_mkey(krb5_context context, krb5_principal mname, krb5_keyblock *key, krb5_kvno *kvno, char *db_args) argument 441 krb5_def_verify_master_key(krb5_context context, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock *mkey) argument [all...] |
H A D | kdb5.c | 1263 krb5_kvno kvno, 1274 status = v->store_master_key(kcontext, keyfile, mname, kvno, key, 1318 krb5_kvno * kvno, 1359 * If a kvno pointer was passed in and it dereferences the IGNORE_VNO 1360 * value then it should be assigned the value of the kvno associated 1362 * otherwise assign 1 which is the default kvno value for the mkey 1365 if (kvno != NULL && *kvno == IGNORE_VNO) { 1375 *kvno = (krb5_kvno) master_entry.key_data->key_data_kvno; 1377 *kvno 1260 krb5_db_store_master_key(krb5_context kcontext, char *keyfile, krb5_principal mname, krb5_kvno kvno, krb5_keyblock * key, char *master_pwd) argument 1312 krb5_db_fetch_mkey(krb5_context context, krb5_principal mname, krb5_enctype etype, krb5_boolean fromkeyboard, krb5_boolean twice, char * db_args, krb5_kvno * kvno, krb5_data * salt, krb5_keyblock * key) argument 1427 krb5_db_verify_master_key(krb5_context kcontext, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock * mkey) argument 1652 krb5_dbe_find_enctype(krb5_context kcontext, krb5_db_entry * dbentp, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_key_data ** kdatap) argument 1664 krb5_dbe_search_enctype(krb5_context kcontext, krb5_db_entry * dbentp, krb5_int32 * start, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_key_data ** kdatap) argument 1887 krb5_kvno kvno; local [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_kpasswd.c | 195 smb_krb5_kt_update_startup(char *fqdn, krb5_kvno kvno, uint32_t kt_flags) argument 251 fqdn, kvno, kt_flags, pwd)) != 0) { 280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd, argument 310 fqdn, kvno, kt_flags, passwd)) != 0) {
|
H A D | smbns_ads.c | 201 krb5_kvno kvno; local 229 kvno = smb_ads_lookup_kvno(ah, dn); 249 if (smb_krb5_kt_update_startup(fqdn, kvno, flags) != 0) { 2484 int kvno = 1; local 2489 kvno = atoi(avpair.avp_val); 2493 return (kvno); 2839 krb5_kvno kvno; local 2847 kvno = smb_ads_lookup_kvno(ah, ctx->c_account->m_dn); 2850 if (smb_krb5_kt_update_adjoin(ah->domain, kvno,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 14 * kvno [2] UInt32, 315 int kvno, maj, min; local 347 /* kvno (assuming all keys in array have same version) */ 349 kvno = lval; /* XXX range check? */ 372 (*out)[i - 1].key_data_kvno = kvno;
|
H A D | krb5_decode.c | 257 { krb5_kvno kvno; local 258 get_field(kvno,0,asn1_decode_kvno); 259 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); } 296 { krb5_kvno kvno; local 297 get_field(kvno,0,asn1_decode_kvno); 298 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); 449 { krb5_kvno kvno; local 450 get_field(kvno,0,asn1_decode_kvno); 451 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); } 479 { krb5_kvno kvno; local 624 { krb5_kvno kvno; local 673 { krb5_kvno kvno; local 738 { krb5_kvno kvno; local 799 { krb5_kvno kvno; local [all...] |
H A D | asn1_k_decode.c | 573 opt_field(val->kvno,1,asn1_decode_kvno,0); 743 { krb5_kvno kvno; local 744 get_field(kvno,1,asn1_decode_kvno); 745 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); } 805 val->authorization_data.kvno = 0; 1608 fld.kvno = 0; \
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_memory.c | 383 krb5_const_principal principal, krb5_kvno kvno, 418 if (kvno == IGNORE_VNO) { 424 if (entry->vno == kvno) { 382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument
|
H A D | kt_solaris.c | 70 const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, 92 entry.vno = kvno; 107 * krb5_kvno kvno, uint_t flags, char *password) 117 * where kvno is the key version number of the set of service principal 152 * Note: The kvno was previously determined by performing an LDAP query of the 155 * one could derive the principal's kvno by requesting a service ticket. 159 krb5_kvno kvno, uint_t flags, char *password) 241 kvno, password); 412 * a corresponding service principal, of key version number (kvno) n. It would 413 * consider more than one kvno se 69 k5_kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument 158 k5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument [all...] |
H A D | kt_srvtab.c | 166 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 194 if (kvno == IGNORE_VNO) { 200 if (ent.vno == kvno) {
|
H A D | kt_file.c | 262 krb5_const_principal principal, krb5_kvno kvno, 354 if (kvno == IGNORE_VNO) { 382 /* if this kvno matches, free the current (will there ever 387 for the kvno, so we're toast if the kvno requested is 391 if (new_entry.vno == (kvno & 0xff)) { 261 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 533 kvno, krb5_keyblock *keyblock, 530 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 467 password, (mask & KADM5_KVNO)?entry->kvno:1, 753 kdb.key_data[i].key_data_kvno = entry->kvno; 941 for (entry->kvno = 0, i=0; i<kdb.n_key_data; i++) 942 if (kdb.key_data[i].key_data_kvno > entry->kvno) 943 entry->kvno = kdb.key_data[i].key_data_kvno; 1159 * hist_kvno (r) kvno of current history key 1469 password, 0 /* increment kvno */, 1776 int i, k, kvno, ret, have_pol = 0; 1803 for (kvno = 0, i=0; i<kdb.n_key_data; i++) 1804 if (kdb.key_data[i].key_data_kvno > kvno) 1945 int i, j, k, kvno, ret, have_pol = 0; local 2250 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 249 krb5_kvno mkey_kvno; /* kvno of mkey protecting the latest_mkey */ 255 krb5_kvno kvno; member in struct:_krb5_keylist_node 465 krb5_kvno kvno, 478 krb5_kvno *kvno, 483 krb5_kvno kvno, 497 krb5_int32 kvno, 506 krb5_int32 kvno, 692 krb5_int32 kvno, 699 krb5_kvno kvno, 714 krb5_kvno *kvno, [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | admin.h | 246 krb5_kvno kvno; member in struct:_kadm5_principal_ent_t 324 krb5_kvno kvno; member in struct:_kadm5_config_params 540 kvno, krb5_keyblock *keyblock,
|