/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_set_keyblock.c | 35 return (kb->enctype); 51 krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype) argument 53 kb->enctype = enctype;
|
H A D | init_allocated_keyblock.c | 34 krb5_enctype enctype, 43 kb->enctype = enctype; 32 krb5_init_allocated_keyblock( krb5_context context, krb5_enctype enctype, unsigned int length, krb5_keyblock *kb) argument
|
H A D | init_keyblock.c | 38 (krb5_context context, krb5_enctype enctype, 49 kb->enctype = enctype; 37 krb5_init_keyblock(krb5_context context, krb5_enctype enctype, size_t length, krb5_keyblock **out) argument
|
H A D | fwd_tgt.c | 60 krb5_enctype enctype = 0; local 76 enctype = session_key->enctype; 94 /* Got the credentials. Okay, now record the enctype and 96 enctype = out->keyblock.enctype; 177 creds.keyblock.enctype = enctype; 187 if (enctype) { 188 creds.keyblock.enctype [all...] |
H A D | gen_subkey.c | 58 if ((retval = krb5_c_make_random_key(context, key->enctype, *subkey))) {
|
H A D | rd_req_dec.c | 76 krb5_enctype enctype; local 79 enctype = req->ticket->enc_part.enctype; 85 enctype, &ktent))) 95 ktent.key.enctype = enctype; 108 "AP Request ticket decrypt fail for principal '%s' (kvno=%d, enctype=%d)"), 111 enctype); 361 etype = req->ticket->enc_part.enctype)) || 363 etype = req->ticket->enc_part2->session->enctype)) || [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | block_size.c | 32 krb5_c_block_size(krb5_context context, krb5_enctype enctype, argument 38 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | encrypt_length.c | 32 krb5_c_encrypt_length(krb5_context context, krb5_enctype enctype, argument 38 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | decrypt.c | 45 if (krb5_enctypes_list[i].etype == key->enctype) 52 if ((input->enctype != ENCTYPE_UNKNOWN) && 53 (krb5_enctypes_list[i].etype != input->enctype))
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | enctype_to_string.c | 36 krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen) argument 41 if (krb5_enctypes_list[i].etype == enctype) { 55 krb5_enctype_to_istring(krb5_enctype enctype, char *buffer, size_t buflen) argument 60 if (krb5_enctypes_list[i].etype == enctype) {
|
H A D | valid_enctype.c | 57 * is_in_keytype(): returns 1 if enctype == one of the enctypes in keytype 61 is_in_keytype(keytype, numkeytypes, enctype) 64 krb5_enctype enctype; 68 KRB5_LOG(KRB5_INFO, "is_in_keytype() enctype = %d", enctype); 80 if (keytype[i] == enctype) {
|
H A D | keylengths.c | 40 krb5_c_keylengths(krb5_context context, krb5_enctype enctype, argument 49 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | string_to_key.c | 37 krb5_enctype enctype, 45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, argument 49 return krb5_c_string_to_key_with_params(context, enctype, string, salt, 54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, argument 65 if (krb5_enctypes_list[i].etype == enctype) 77 switch (enctype) { 94 key->enctype = enctype;
|
H A D | make_random_key.c | 37 krb5_c_make_random_key(krb5_context context, krb5_enctype enctype, argument 48 if (krb5_enctypes_list[i].etype == enctype) 57 enctype); 80 random_key->enctype = enctype;
|
H A D | pbkdf2.c | 52 krb5_enctype enctype, 75 rv = get_key_type(enctype, &keytype); 88 enctype != ENCTYPE_DES_CBC_CRC && 89 enctype != ENCTYPE_DES_CBC_MD5 && 90 enctype != ENCTYPE_DES_CBC_RAW && 91 enctype != ENCTYPE_DES_HMAC_SHA1 && 92 enctype != ENCTYPE_DES3_CBC_SHA1 && 93 enctype != ENCTYPE_DES3_CBC_RAW) { 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
H A D | random_to_key.c | 41 krb5_c_random_to_key(krb5_context context, krb5_enctype enctype, argument 55 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | state.c | 50 if (krb5_enctypes_list[i].etype == key->enctype) 69 if (krb5_enctypes_list[i].etype == key->enctype)
|
H A D | keyed_checksum_types.c | 50 krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, argument 58 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) || 73 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) ||
|
H A D | old_api_glue.c | 51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size, 86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 94 inputd.enctype = eblock->key->enctype; 178 krb5_enctype enctype) 180 eblock->crypto_entry = enctype; 293 if ((ret = krb5_c_encrypt_length(context, key->enctype, data->length, 298 if ((ret = krb5_c_block_size(context, key->enctype, &blocksize))) 307 enc_data->enctype 177 krb5_use_enctype(krb5_context context, krb5_encrypt_block *eblock, krb5_enctype enctype) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | read_servi.c | 41 * principal, vno, and enctype and returns the resulting key in *key 47 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 70 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | keytab.c | 118 krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry) 123 krb5_enctype enctype; 171 /* For cross realm tgts, we match whatever enctype is provided; 172 * for other principals, we only match the first enctype that is 176 xrealm_tgt?enctype:-1, 187 if (enctype > 0) { 188 kerror = krb5_c_enctype_compare(context, enctype, 189 entry->key.enctype, &similar); 199 * Coerce the enctype of the output keyblock in case we got an 200 * inexact match on the enctype [all...] |
H A D | kdb_default.c | 44 * Given a particular enctype and optional salttype and kvno, find the 152 krb5_ui_2 enctype; local 187 enctype = key->enctype; 188 if ((fwrite((krb5_pointer) &enctype, 215 krb5_ui_2 enctype; local 236 if (fread((krb5_pointer) &enctype, 2, 1, kf) != 1) { 241 if (key->enctype == ENCTYPE_UNKNOWN) 242 key->enctype = enctype; [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 77 if (key->enctype == ENCTYPE_ARCFOUR_HMAC) 79 code = krb5_c_block_size(context, key->enctype, &blocksize); 96 code = krb5_c_block_size(context, key->enctype, &blocksize); 114 if (krb5_c_encrypt_length(context, key->enctype, n, &enclen) != 0) 138 code = krb5_c_block_size(context, key->enctype, &blocksize); 185 code = krb5_c_block_size(context, key->enctype, &blocksize); 199 inputd.enctype = ENCTYPE_UNKNOWN; 233 usage_key.enctype = longterm_key->enctype; 246 seq_enc_key.enctype [all...] |
H A D | util_seqnum.c | 48 if (key->enctype == ENCTYPE_ARCFOUR_HMAC ) { 80 if (key->enctype == ENCTYPE_ARCFOUR_HMAC) { 97 if (key->enctype == ENCTYPE_ARCFOUR_HMAC) {
|
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kdb5_stash.c | 147 if (!krb5_c_valid_enctype(global_params.enctype)) { 149 if (krb5_enctype_to_string(global_params.enctype, 153 gettext("while setting up enctype %d"), 154 global_params.enctype); 184 global_params.enctype,
|