Searched defs:kvno (Results 1 - 16 of 16) sorted by relevance

/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb_cpw.c66 int i, kvno; local
68 for (kvno = i = 0; i < count; i++) {
69 if (kvno < data[i].key_data_kvno) {
70 kvno = data[i].key_data_kvno;
73 return(kvno);
98 add_key_rnd(context, master_key, ks_tuple, ks_tuple_count, db_entry, kvno)
104 int kvno;
142 /* Get max kvno */
190 &key, NULL, kvno,
243 * Assumes the max kvno
260 int kvno; local
316 int kvno; local
[all...]
H A Dkdb_default.c43 * Given a particular enctype and optional salttype and kvno, find the
46 * If stype or kvno is negative, it is ignored.
47 * If kvno is 0 get the key which is maxkvno for the princ and matches
51 krb5_dbe_def_search_enctype(kcontext, dbentp, start, ktype, stype, kvno, kdatap)
57 krb5_int32 kvno;
67 if (kvno == -1 && stype == -1 && ktype == -1)
68 kvno = 0;
70 if (kvno == 0) {
73 if (kvno < dbentp->key_data[i].key_data_kvno) {
74 kvno
237 krb5_def_store_mkey(krb5_context context, char *keyfile, krb5_principal mname, krb5_kvno kvno, krb5_keyblock *key, char *master_pwd) argument
254 krb5_db_def_fetch_mkey_stash(krb5_context context, const char *keyfile, krb5_keyblock *key, krb5_kvno *kvno) argument
334 krb5_db_def_fetch_mkey_keytab(krb5_context context, const char *keyfile, krb5_principal mname, krb5_keyblock *key, krb5_kvno *kvno) argument
398 krb5_db_def_fetch_mkey(krb5_context context, krb5_principal mname, krb5_keyblock *key, krb5_kvno *kvno, char *db_args) argument
441 krb5_def_verify_master_key(krb5_context context, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock *mkey) argument
[all...]
H A Dkdb5.c1263 krb5_kvno kvno,
1274 status = v->store_master_key(kcontext, keyfile, mname, kvno, key,
1318 krb5_kvno * kvno,
1359 * If a kvno pointer was passed in and it dereferences the IGNORE_VNO
1360 * value then it should be assigned the value of the kvno associated
1362 * otherwise assign 1 which is the default kvno value for the mkey
1365 if (kvno != NULL && *kvno == IGNORE_VNO) {
1375 *kvno = (krb5_kvno) master_entry.key_data->key_data_kvno;
1377 *kvno
1260 krb5_db_store_master_key(krb5_context kcontext, char *keyfile, krb5_principal mname, krb5_kvno kvno, krb5_keyblock * key, char *master_pwd) argument
1312 krb5_db_fetch_mkey(krb5_context context, krb5_principal mname, krb5_enctype etype, krb5_boolean fromkeyboard, krb5_boolean twice, char * db_args, krb5_kvno * kvno, krb5_data * salt, krb5_keyblock * key) argument
1427 krb5_db_verify_master_key(krb5_context kcontext, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock * mkey) argument
1652 krb5_dbe_find_enctype(krb5_context kcontext, krb5_db_entry * dbentp, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_key_data ** kdatap) argument
1664 krb5_dbe_search_enctype(krb5_context kcontext, krb5_db_entry * dbentp, krb5_int32 * start, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_key_data ** kdatap) argument
1887 krb5_kvno kvno; local
[all...]
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_kpasswd.c195 smb_krb5_kt_update_startup(char *fqdn, krb5_kvno kvno, uint32_t kt_flags) argument
251 fqdn, kvno, kt_flags, pwd)) != 0) {
280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd, argument
310 fqdn, kvno, kt_flags, passwd)) != 0) {
H A Dsmbns_ads.c201 krb5_kvno kvno; local
229 kvno = smb_ads_lookup_kvno(ah, dn);
249 if (smb_krb5_kt_update_startup(fqdn, kvno, flags) != 0) {
2484 int kvno = 1; local
2489 kvno = atoi(avpair.avp_val);
2493 return (kvno);
2839 krb5_kvno kvno; local
2847 kvno = smb_ads_lookup_kvno(ah, ctx->c_account->m_dn);
2850 if (smb_krb5_kt_update_adjoin(ah->domain, kvno,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dldap_key_seq.c14 * kvno [2] UInt32,
315 int kvno, maj, min; local
347 /* kvno (assuming all keys in array have same version) */
349 kvno = lval; /* XXX range check? */
372 (*out)[i - 1].key_data_kvno = kvno;
H A Dkrb5_decode.c257 { krb5_kvno kvno; local
258 get_field(kvno,0,asn1_decode_kvno);
259 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); }
296 { krb5_kvno kvno; local
297 get_field(kvno,0,asn1_decode_kvno);
298 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO);
449 { krb5_kvno kvno; local
450 get_field(kvno,0,asn1_decode_kvno);
451 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); }
479 { krb5_kvno kvno; local
624 { krb5_kvno kvno; local
673 { krb5_kvno kvno; local
738 { krb5_kvno kvno; local
799 { krb5_kvno kvno; local
[all...]
H A Dasn1_k_decode.c573 opt_field(val->kvno,1,asn1_decode_kvno,0);
743 { krb5_kvno kvno; local
744 get_field(kvno,1,asn1_decode_kvno);
745 if (kvno != KVNO) clean_return(KRB5KDC_ERR_BAD_PVNO); }
805 val->authorization_data.kvno = 0;
1608 fld.kvno = 0; \
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_memory.c383 krb5_const_principal principal, krb5_kvno kvno,
418 if (kvno == IGNORE_VNO) {
424 if (entry->vno == kvno) {
382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument
H A Dkt_solaris.c70 const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno,
92 entry.vno = kvno;
107 * krb5_kvno kvno, uint_t flags, char *password)
117 * where kvno is the key version number of the set of service principal
152 * Note: The kvno was previously determined by performing an LDAP query of the
155 * one could derive the principal's kvno by requesting a service ticket.
159 krb5_kvno kvno, uint_t flags, char *password)
241 kvno, password);
412 * a corresponding service principal, of key version number (kvno) n. It would
413 * consider more than one kvno se
69 k5_kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
158 k5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument
[all...]
H A Dkt_srvtab.c166 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
194 if (kvno == IGNORE_VNO) {
200 if (ent.vno == kvno) {
H A Dkt_file.c262 krb5_const_principal principal, krb5_kvno kvno,
354 if (kvno == IGNORE_VNO) {
382 /* if this kvno matches, free the current (will there ever
387 for the kvno, so we're toast if the kvno requested is
391 if (new_entry.vno == (kvno & 0xff)) {
261 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c533 kvno, krb5_keyblock *keyblock,
530 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c467 password, (mask & KADM5_KVNO)?entry->kvno:1,
753 kdb.key_data[i].key_data_kvno = entry->kvno;
941 for (entry->kvno = 0, i=0; i<kdb.n_key_data; i++)
942 if (kdb.key_data[i].key_data_kvno > entry->kvno)
943 entry->kvno = kdb.key_data[i].key_data_kvno;
1159 * hist_kvno (r) kvno of current history key
1469 password, 0 /* increment kvno */,
1776 int i, k, kvno, ret, have_pol = 0;
1803 for (kvno = 0, i=0; i<kdb.n_key_data; i++)
1804 if (kdb.key_data[i].key_data_kvno > kvno)
1945 int i, j, k, kvno, ret, have_pol = 0; local
2250 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h249 krb5_kvno mkey_kvno; /* kvno of mkey protecting the latest_mkey */
255 krb5_kvno kvno; member in struct:_krb5_keylist_node
465 krb5_kvno kvno,
478 krb5_kvno *kvno,
483 krb5_kvno kvno,
497 krb5_int32 kvno,
506 krb5_int32 kvno,
692 krb5_int32 kvno,
699 krb5_kvno kvno,
714 krb5_kvno *kvno,
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/
H A Dadmin.h246 krb5_kvno kvno; member in struct:_kadm5_principal_ent_t
324 krb5_kvno kvno; member in struct:_kadm5_config_params
540 kvno, krb5_keyblock *keyblock,

Completed in 93 milliseconds