/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 68 const krb5_keyblock * mkey, 92 if ((retval = krb5_c_decrypt(context, mkey, 0 /* XXX */, 0, 67 krb5_dbekd_def_decrypt_key_data( krb5_context context, const krb5_keyblock * mkey, const krb5_key_data * key_data, krb5_keyblock * dbkey, krb5_keysalt * keysalt) argument
|
H A D | encrypt_key.c | 72 const krb5_keyblock * mkey, 96 if ((retval = krb5_c_encrypt_length(context, mkey->enctype, dbkey->length, 116 if ((retval = krb5_c_encrypt(context, mkey, /* XXX */ 0, 0, 71 krb5_dbekd_def_encrypt_key_data( krb5_context context, const krb5_keyblock * mkey, const krb5_keyblock * dbkey, const krb5_keysalt * keysalt, int keyver, krb5_key_data * key_data) argument
|
H A D | kdb_default.c | 321 * can be assumed to be 1 as is the case for the mkey princ. If the kvno is 323 * verifcation trouble if the mkey princ is using a kvno other than 1. 438 * Note, this verifies that the input mkey is currently protecting all the mkeys 444 krb5_keyblock *mkey) 466 if ((retval = krb5_dbekd_decrypt_key_data(context, mkey, 473 if (mkey->length != tempkey.length || 474 memcmp((char *)mkey->contents, 475 (char *)tempkey.contents,mkey->length)) { 498 const krb5_keyblock *mkey, 532 * Check if the input mkey i 441 krb5_def_verify_master_key(krb5_context context, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock *mkey) argument 496 krb5_def_fetch_mkey_list(krb5_context context, krb5_principal mprinc, const krb5_keyblock *mkey, krb5_keylist_node **mkeys_list) argument [all...] |
H A D | kdb5.c | 1218 /* Solaris Kerberos: return a read only pointer alias to mkey list */ 1232 const krb5_keyblock *mkey) 1249 status = v->fetch_master_key_list(context, mname, mkey, &local_keylist); 1361 * with the current mkey princ key if that princ entry is available 1362 * otherwise assign 1 which is the default kvno value for the mkey 1430 krb5_keyblock * mkey) 1440 status = v->verify_master_key(kcontext, mprinc, kvno, mkey); 1485 * for mkey princ entries without KRB5_TL_ACTKVNO data provide a default 1509 * Locates the "active" mkey used when encrypting a princ's keys. Note, the 1595 * Locates the mkey use 1230 krb5_db_fetch_mkey_list(krb5_context context, krb5_principal mname, const krb5_keyblock *mkey) argument 1427 krb5_db_verify_master_key(krb5_context kcontext, krb5_principal mprinc, krb5_kvno kvno, krb5_keyblock * mkey) argument 1599 krb5_dbe_find_mkey(krb5_context context, krb5_db_entry * entry, krb5_keyblock ** mkey) argument 2505 krb5_dbekd_decrypt_key_data( krb5_context kcontext, const krb5_keyblock * mkey, const krb5_key_data * key_data, krb5_keyblock * dbkey, krb5_keysalt * keysalt) argument 2536 krb5_dbekd_encrypt_key_data( krb5_context kcontext, const krb5_keyblock * mkey, const krb5_keyblock * dbkey, const krb5_keysalt * keysalt, int keyver, krb5_key_data * key_data) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_realm.h | 71 krb5_keyblock mkey; member in struct:_krb5_ldap_realm_params
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_kdb.c | 40 krb5_keyblock master_keyblock; /* local mkey */ 75 * Fetch the local mkey, may not be the latest but that's okay because we 77 * valid mkey. 83 &mkvno /* get the kvno of the returned mkey */, 92 * krb5_db_fetch_mkey_list will verify mkey so don't call 214 krb5_keyblock *mkey; local 227 ret = krb5_dbe_find_mkey(handle->context, &kdb, &mkey); 231 ret = krb5_dbekd_decrypt_key_data(handle->context, mkey,
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 227 char *mkey; local 248 mkey = strtok_r(buf, "\t ", &lasts); 249 if (mkey == NULL) { 263 if (strcasecmp(mkey, netname) == 0) {
|