Searched refs:keyblock (Results 26 - 40 of 40) sorted by relevance
12
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | admin.h | 522 krb5_keyblock *keyblock); 540 kvno, krb5_keyblock *keyblock,
|
H A D | kadm_rpc.h | 107 krb5_keyblock *keyblock; member in struct:setv4key_arg
|
H A D | kadm_rpc_xdr.c | 723 if (!xdr_array(xdrs, (caddr_t *) &objp->keyblock,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_cred.c | 134 &pcur->keyblock)))
|
H A D | mk_cred.c | 44 * If the keyblock is NULL, just copy the data from the encoded 124 if ((retval = krb5_copy_keyblock(context, &ppcreds[i]->keyblock, 208 /* Get keyblock */
|
H A D | gc_frm_kdc.c | 564 if (!krb5_c_valid_enctype(ts->cur_tgt->keyblock.enctype)) 1158 if ((*out_cred)->keyblock.enctype == context->tgs_etypes[i]) { 1373 if (!krb5_c_valid_enctype(tgtptr->keyblock.enctype)) {
|
H A D | rd_req_dec.c | 297 &(*auth_context)->key->keyblock, 304 decrypt_key = (*auth_context)->key->keyblock; 305 (*auth_context)->key->keyblock.contents = NULL;
|
H A D | get_in_tkt.c | 512 &creds->keyblock))) 548 if (creds->keyblock.contents) { 549 memset(creds->keyblock.contents, 0, 550 creds->keyblock.length); 551 free(creds->keyblock.contents); 552 creds->keyblock.contents = 0; 553 creds->keyblock.length = 0; 1911 /* Solaris Kerberos: our keyblock has more fields */
|
H A D | fast.c | 80 &out_creds->keyblock, "ticketarmor", &armor_key);
|
H A D | s4u_creds.c | 213 code = make_pa_for_user_checksum(context, &tgt->keyblock,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | s4u_gss_glue.c | 131 in_creds.keyblock.enctype = impersonator_cred->req_enctypes[0];
|
H A D | accept_sec_context.c | 139 krb_creds.keyblock = *(ticket->enc_part2->session); 190 * called in krb5_gss_accept_sec_context), the "keyblock" field of 194 * "keyblock") might have been used to encrypt the encrypted part of 203 * created by krb5_auth_con_init. All of its keyblock fields will be
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 1091 * mkey (r) master keyblock to decrypt key data with 1092 * hist_key (r) history keyblock to encrypt key data with 1769 krb5_keyblock *keyblock) 1790 if (principal == NULL || keyblock == NULL) 1797 if (keyblock->enctype != ENCTYPE_DES_CBC_CRC) 1827 keyblock, &keysalt, kvno + 1, 2233 * keyblock (w) keyblock to fill in 2241 * it with the master key, and return the key in keyblock, the salt 2253 kvno, krb5_keyblock *keyblock, 2250 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument [all...] |
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 79 krb5_free_keyblock_contents(context, &cur->keyblock); 142 krb5_free_keyblock_contents(context, &(prev->keyblock)); 1545 *act_mkey = &cur_keyblock->keyblock; 1585 *act_mkey = &cur_keyblock->keyblock; 1618 *mkey = &cur_keyblock->keyblock; 2496 status = v->dbekd_decrypt_key_data(kcontext, &n->keyblock, key_data, dbkey, 2525 cur_mkey = &kcontext->dal_handle->master_keylist->keyblock;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 254 krb5_keyblock keyblock; member in struct:_krb5_keylist_node
|
Completed in 805 milliseconds
12