/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.h | 134 pkinit_req_crypto_context reqctx; member in struct:_pkinit_cert_data 144 pkinit_req_crypto_context reqctx; member in struct:_pkinit_cert_iter_data
|
H A D | pkinit_clnt.c | 65 pkinit_req_context reqctx, krb5_timestamp ctsec, 73 pkinit_req_context reqctx, krb5_preauthtype pa_type, 82 pkinit_req_context reqctx, 101 reqctx->pa_type = in_padata->pa_type; 111 retval = pkinit_get_kdc_cert(context, plgctx->cryptoctx, reqctx->cryptoctx, 112 reqctx->idctx, request->server); 145 retval = pkinit_as_req_create(context, plgctx, reqctx, ctsec, cusec, 187 && reqctx->opts->win2k_require_cksum) || (longhorn == 1)) { 220 pkinit_req_context reqctx, 236 int protocol = reqctx 80 pa_pkinit_gen_req(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_pa_data *** out_padata, krb5_prompter_fct prompter, void *prompter_data, krb5_get_init_creds_opt *gic_opt) argument 218 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal client, krb5_principal server, krb5_data ** as_req) argument 460 pa_pkinit_parse_rep(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_enctype etype, krb5_keyblock * as_key, krb5_data *encoded_request) argument 502 verify_kdc_san(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_principal kdcprinc, int *valid_san, int *need_eku_checking) argument 616 verify_kdc_eku(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, int *eku_accepted) argument 654 pkinit_as_rep_parse(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_preauthtype pa_type, krb5_kdc_req *request, const krb5_data *as_rep, krb5_keyblock *key_block, krb5_enctype etype, krb5_data *encoded_request) argument 905 pkinit_client_profile(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, const krb5_data *realm) argument 1006 pkinit_req_context reqctx = (pkinit_req_context)request_context; local 1119 pkinit_req_context reqctx = (pkinit_req_context)request_context; local 1221 pkinit_req_context reqctx = NULL; local 1283 pkinit_req_context reqctx = request_context; local [all...] |
H A D | pkinit_srv.c | 144 pkinit_kdc_req_context reqctx, 157 reqctx->cryptoctx, plgctx->idctx, 168 retval = call_san_checking_plugins(context, plgctx, reqctx, princs, 264 pkinit_kdc_req_context reqctx, 279 reqctx->cryptoctx, plgctx->idctx, 315 pkinit_kdc_req_context reqctx; local 351 retval = pkinit_init_kdc_req_context(context, (void **)&reqctx); 354 reqctx->pa_type = data->pa_type; 373 reqctx->cryptoctx, plgctx->idctx, CMS_SIGN_CLIENT, 395 reqctx 142 verify_client_san(krb5_context context, pkinit_kdc_context plgctx, pkinit_kdc_req_context reqctx, krb5_principal client, int *valid_san) argument 262 verify_client_eku(krb5_context context, pkinit_kdc_context plgctx, pkinit_kdc_req_context reqctx, int *eku_accepted) argument 705 pkinit_kdc_req_context reqctx; local 1377 pkinit_kdc_req_context reqctx = NULL; local 1404 pkinit_kdc_req_context reqctx = (pkinit_kdc_req_context)ctx; local [all...] |
H A D | pkinit_crypto_openssl.c | 1324 pkinit_req_crypto_context reqctx, 1527 reqctx->received_cert = X509_dup(cert_ctx.current_cert); 1543 reqctx->received_cert), buf, sizeof(buf)); 1633 reqctx->received_cert = X509_dup(x); 1698 pkinit_req_crypto_context reqctx, 1733 retval = cms_signeddata_create(context, plgctx, reqctx, idctx, 1742 if (reqctx->received_cert == NULL) { 1747 sk_X509_push(encerts, reqctx->received_cert); 1992 pkinit_req_crypto_context reqctx, 2157 pkinit_req_crypto_context reqctx, 1322 cms_signeddata_verify(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, int cms_msg_type, int require_crl_checking, unsigned char *signed_data, unsigned int signed_data_len, unsigned char **data, unsigned int *data_len, unsigned char **authz_data, unsigned int *authz_data_len, int *is_signed) argument 1696 cms_envelopeddata_create(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, krb5_preauthtype pa_type, int include_certchain, unsigned char *key_pack, unsigned int key_pack_len, unsigned char **out, unsigned int *out_len) argument 1990 crypto_retrieve_X509_sans(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, X509 *cert, krb5_principal **princs_ret, krb5_principal **upn_ret, unsigned char ***dns_ret) argument 2155 crypto_retrieve_cert_sans(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, krb5_principal **princs_ret, krb5_principal **upn_ret, unsigned char ***dns_ret) argument 2177 crypto_check_cert_eku(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, int checking_kdc_cert, int allow_secondary_usage, int *valid_eku) argument [all...] |