Searched defs:mkey (Results 1 - 7 of 7) sorted by relevance

/osnet-11/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c68 const krb5_keyblock * mkey,
92 if ((retval = krb5_c_decrypt(context, mkey, 0 /* XXX */, 0,
67 krb5_dbekd_def_decrypt_key_data( krb5_context context, const krb5_keyblock * mkey, const krb5_key_data * key_data, krb5_keyblock * dbkey, krb5_keysalt * keysalt) argument
H A Dencrypt_key.c72 const krb5_keyblock * mkey,
96 if ((retval = krb5_c_encrypt_length(context, mkey->enctype, dbkey->length,
116 if ((retval = krb5_c_encrypt(context, mkey, /* XXX */ 0, 0,
71 krb5_dbekd_def_encrypt_key_data( krb5_context context, const krb5_keyblock * mkey, const krb5_keyblock * dbkey, const krb5_keysalt * keysalt, int keyver, krb5_key_data * key_data) argument
H A Dkdb_default.c321 * can be assumed to be 1 as is the case for the mkey princ. If the kvno is
323 * verifcation trouble if the mkey princ is using a kvno other than 1.
438 * Note, this verifies that the input mkey is currently protecting all the mkeys
444 krb5_keyblock *mkey)
466 if ((retval = krb5_dbekd_decrypt_key_data(context, mkey,
473 if (mkey->length != tempkey.length ||
474 memcmp((char *)mkey->contents,
475 (char *)tempkey.contents,mkey->length)) {
498 const krb5_keyblock *mkey,
532 * Check if the input mkey i
441 krb5_def_verify_master_key(krb5_context context, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock *mkey) argument
496 krb5_def_fetch_mkey_list(krb5_context context, krb5_principal mprinc, const krb5_keyblock *mkey, krb5_keylist_node **mkeys_list) argument
[all...]
H A Dkdb5.c1218 /* Solaris Kerberos: return a read only pointer alias to mkey list */
1232 const krb5_keyblock *mkey)
1249 status = v->fetch_master_key_list(context, mname, mkey, &local_keylist);
1361 * with the current mkey princ key if that princ entry is available
1362 * otherwise assign 1 which is the default kvno value for the mkey
1430 krb5_keyblock * mkey)
1440 status = v->verify_master_key(kcontext, mprinc, kvno, mkey);
1485 * for mkey princ entries without KRB5_TL_ACTKVNO data provide a default
1509 * Locates the "active" mkey used when encrypting a princ's keys. Note, the
1595 * Locates the mkey use
1230 krb5_db_fetch_mkey_list(krb5_context context, krb5_principal mname, const krb5_keyblock *mkey) argument
1427 krb5_db_verify_master_key(krb5_context kcontext, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock * mkey) argument
1599 krb5_dbe_find_mkey(krb5_context context, krb5_db_entry * entry, krb5_keyblock ** mkey) argument
2505 krb5_dbekd_decrypt_key_data( krb5_context kcontext, const krb5_keyblock * mkey, const krb5_key_data * key_data, krb5_keyblock * dbkey, krb5_keysalt * keysalt) argument
2536 krb5_dbekd_encrypt_key_data( krb5_context kcontext, const krb5_keyblock * mkey, const krb5_keyblock * dbkey, const krb5_keysalt * keysalt, int keyver, krb5_key_data * key_data) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_realm.h71 krb5_keyblock mkey; member in struct:_krb5_ldap_realm_params
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dserver_kdb.c40 krb5_keyblock master_keyblock; /* local mkey */
75 * Fetch the local mkey, may not be the latest but that's okay because we
77 * valid mkey.
83 &mkvno /* get the kvno of the returned mkey */,
92 * krb5_db_fetch_mkey_list will verify mkey so don't call
214 krb5_keyblock *mkey; local
227 ret = krb5_dbe_find_mkey(handle->context, &kdb, &mkey);
231 ret = krb5_dbekd_decrypt_key_data(handle->context, mkey,
/osnet-11/usr/src/lib/libnsl/key/
H A Dpublickey.c227 char *mkey; local
248 mkey = strtok_r(buf, "\t ", &lasts);
249 if (mkey == NULL) {
263 if (strcasecmp(mkey, netname) == 0) {

Completed in 371 milliseconds