Searched refs:keyblock (Results 26 - 40 of 40) sorted by relevance

12

/osnet-11/usr/src/lib/krb5/kadm5/
H A Dadmin.h522 krb5_keyblock *keyblock);
540 kvno, krb5_keyblock *keyblock,
H A Dkadm_rpc.h107 krb5_keyblock *keyblock; member in struct:setv4key_arg
H A Dkadm_rpc_xdr.c723 if (!xdr_array(xdrs, (caddr_t *) &objp->keyblock,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drd_cred.c134 &pcur->keyblock)))
H A Dmk_cred.c44 * If the keyblock is NULL, just copy the data from the encoded
124 if ((retval = krb5_copy_keyblock(context, &ppcreds[i]->keyblock,
208 /* Get keyblock */
H A Dgc_frm_kdc.c564 if (!krb5_c_valid_enctype(ts->cur_tgt->keyblock.enctype))
1158 if ((*out_cred)->keyblock.enctype == context->tgs_etypes[i]) {
1373 if (!krb5_c_valid_enctype(tgtptr->keyblock.enctype)) {
H A Drd_req_dec.c297 &(*auth_context)->key->keyblock,
304 decrypt_key = (*auth_context)->key->keyblock;
305 (*auth_context)->key->keyblock.contents = NULL;
H A Dget_in_tkt.c512 &creds->keyblock)))
548 if (creds->keyblock.contents) {
549 memset(creds->keyblock.contents, 0,
550 creds->keyblock.length);
551 free(creds->keyblock.contents);
552 creds->keyblock.contents = 0;
553 creds->keyblock.length = 0;
1911 /* Solaris Kerberos: our keyblock has more fields */
H A Dfast.c80 &out_creds->keyblock, "ticketarmor", &armor_key);
H A Ds4u_creds.c213 code = make_pa_for_user_checksum(context, &tgt->keyblock,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Ds4u_gss_glue.c131 in_creds.keyblock.enctype = impersonator_cred->req_enctypes[0];
H A Daccept_sec_context.c139 krb_creds.keyblock = *(ticket->enc_part2->session);
190 * called in krb5_gss_accept_sec_context), the "keyblock" field of
194 * "keyblock") might have been used to encrypt the encrypted part of
203 * created by krb5_auth_con_init. All of its keyblock fields will be
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c1091 * mkey (r) master keyblock to decrypt key data with
1092 * hist_key (r) history keyblock to encrypt key data with
1769 krb5_keyblock *keyblock)
1790 if (principal == NULL || keyblock == NULL)
1797 if (keyblock->enctype != ENCTYPE_DES_CBC_CRC)
1827 keyblock, &keysalt, kvno + 1,
2233 * keyblock (w) keyblock to fill in
2241 * it with the master key, and return the key in keyblock, the salt
2253 kvno, krb5_keyblock *keyblock,
2250 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
[all...]
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb5.c79 krb5_free_keyblock_contents(context, &cur->keyblock);
142 krb5_free_keyblock_contents(context, &(prev->keyblock));
1545 *act_mkey = &cur_keyblock->keyblock;
1585 *act_mkey = &cur_keyblock->keyblock;
1618 *mkey = &cur_keyblock->keyblock;
2496 status = v->dbekd_decrypt_key_data(kcontext, &n->keyblock, key_data, dbkey,
2525 cur_mkey = &kcontext->dal_handle->master_keylist->keyblock;
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h254 krb5_keyblock keyblock; member in struct:_krb5_keylist_node

Completed in 805 milliseconds

12