/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | ser_key.c | 62 krb5_keyblock *keyblock; 69 * keyblock->length for contents 74 keyblock = (krb5_keyblock *) arg; 75 if (keyblock) { 81 (size_t) keyblock->length); 95 krb5_keyblock *keyblock; 105 keyblock = (krb5_keyblock *) arg; 106 if (keyblock) { 114 (void) krb5_ser_pack_int32((krb5_int32) keyblock->enctype, 118 (void) krb5_ser_pack_int32((krb5_int32) keyblock 61 krb5_keyblock *keyblock; local 93 krb5_keyblock *keyblock; local 144 krb5_keyblock *keyblock; local [all...] |
H A D | ser_actx.c | 103 if (auth_context->i_vector && auth_context->keyblock) { 104 kret = krb5_c_block_size(kcontext, auth_context->keyblock->enctype, 152 /* Calculate size required by keyblock, if appropriate */ 153 if (!kret && auth_context->keyblock) { 156 (krb5_pointer) auth_context->keyblock, 239 auth_context->keyblock->enctype, 302 /* Now handle keyblock, if appropriate */ 303 if (!kret && auth_context->keyblock) { 308 auth_context->keyblock, 478 /* This is the keyblock */ [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | string2key.c | 34 of type "enctype". *keyblock is filled in with the key info; 35 in particular, keyblock->contents is to be set to allocated storage. 50 krb5_keyblock *keyblock, 70 keyblock->magic = KV5M_KEYBLOCK; 71 keyblock->length = sizeof(mit_des_cblock); 72 key = keyblock->contents; 88 return mit_afs_string_to_key(context, keyblock, data, &afssalt); 157 length, keyblock, key); 169 * Because this routine actually modifies the original keyblock 175 if (keyblock 49 mit_des_string_to_key_int(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | auth_con.c | 67 if (auth_context->keyblock) 68 krb5_free_keyblock(context, auth_context->keyblock); 161 * This function overloads the keyblock field. It is only useful prior to 168 krb5_auth_con_setuseruserkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument 170 if (auth_context->keyblock) 171 krb5_free_keyblock(context, auth_context->keyblock); 172 return(krb5_copy_keyblock(context, keyblock, &(auth_context->keyblock))); 176 krb5_auth_con_getkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 178 if (auth_context->keyblock) 185 krb5_auth_con_getlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 191 krb5_auth_con_getremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 197 krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument 209 krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument 221 krb5_auth_con_getsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument 230 krb5_auth_con_getrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument [all...] |
H A D | mk_rep.c | 55 if ((retval = krb5_generate_seq_number(context, auth_context->keyblock, 64 auth_context->keyblock); 76 if ((retval = krb5_encrypt_helper(context, auth_context->keyblock,
|
H A D | mk_req_ext.c | 82 krb5_keyblock *keyblock) 111 if ((retval = krb5_generate_subkey(context, keyblock, &auth_context->send_subkey))) 165 if ((*auth_context)->keyblock != NULL) { 166 krb5_free_keyblock(context, (*auth_context)->keyblock); 167 (*auth_context)->keyblock = NULL; 170 /* set auth context keyblock */ 171 if ((retval = krb5_copy_keyblock(context, &in_creds->keyblock, 172 &((*auth_context)->keyblock)))) 179 if ((retval = krb5_generate_seq_number(context, &in_creds->keyblock, 196 &in_creds->keyblock); 80 krb5int_generate_and_save_subkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument [all...] |
H A D | mk_priv.c | 42 krb5_mk_priv_basic(krb5_context context, const krb5_data *userdata, const krb5_keyblock *keyblock, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_pointer i_vector, krb5_data *outbuf) argument 51 privmsg.enc_part.enctype = keyblock->enctype; 67 if ((retval = krb5_c_encrypt_length(context, keyblock->enctype, 80 if ((retval = krb5_c_block_size(context, keyblock->enctype, 88 if ((retval = krb5_c_encrypt(context, keyblock, 122 krb5_keyblock * keyblock; local 128 /* Get keyblock */ 129 if ((keyblock = auth_context->send_subkey) == NULL) 130 keyblock = auth_context->keyblock; [all...] |
H A D | copy_creds.c | 53 retval = krb5_copy_keyblock_contents(context, &incred->keyblock, 54 &tempcred->keyblock); 86 krb5_xfree(tempcred->keyblock.contents);
|
H A D | mk_safe.c | 65 const krb5_keyblock *keyblock, krb5_replay_data *replaydata, 112 if ((retval = krb5_c_make_checksum(context, sumtype, keyblock, 144 krb5_keyblock * keyblock; local 153 /* Get keyblock */ 154 if ((keyblock = auth_context->send_subkey) == NULL) 155 keyblock = auth_context->keyblock; 240 retval = krb5_c_keyed_checksum_types (context, keyblock->enctype, 260 if ((retval = krb5_mk_safe_basic(context, userdata, keyblock, &replaydata, 64 krb5_mk_safe_basic(krb5_context context, const krb5_data *userdata, const krb5_keyblock *keyblock, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_cksumtype sumtype, krb5_data *outbuf) argument
|
H A D | rd_priv.c | 60 krb5_rd_priv_basic(krb5_context context, const krb5_data *inbuf, const krb5_keyblock *keyblock, const krb5_address *local_addr, const krb5_address *remote_addr, krb5_pointer i_vector, krb5_replay_data *replaydata, krb5_data *outbuf) argument 77 if ((retval = krb5_c_block_size(context, keyblock->enctype, 91 if ((retval = krb5_c_decrypt(context, keyblock, 158 krb5_keyblock * keyblock; local 161 /* Get keyblock */ 162 if ((keyblock = auth_context->recv_subkey) == NULL) 163 keyblock = auth_context->keyblock; 213 if ((retval = krb5_rd_priv_basic(context, inbuf, keyblock,
|
H A D | rd_safe.c | 49 const krb5_keyblock *keyblock, 127 retval = krb5_c_verify_checksum(context, keyblock, 139 retval = krb5_c_verify_checksum(context, keyblock, 167 krb5_keyblock * keyblock; local 183 /* Get keyblock */ 184 if ((keyblock = auth_context->recv_subkey) == NULL) 185 keyblock = auth_context->keyblock; 223 if ((retval = krb5_rd_safe_basic(context, inbuf, keyblock, 48 krb5_rd_safe_basic(krb5_context context, const krb5_data *inbuf, const krb5_keyblock *keyblock, const krb5_address *recv_addr, const krb5_address *sender_addr, krb5_replay_data *replaydata, krb5_data *outbuf) argument
|
H A D | rd_cred.c | 127 &pcur->keyblock))) 177 krb5_keyblock * keyblock; local 180 /* Get keyblock */ 181 if ((keyblock = auth_context->recv_subkey) == NULL) 182 keyblock = auth_context->keyblock; 196 * If decrypting with the first keyblock we try fails, perhaps the 200 if ((retval = krb5_rd_cred_basic(context, pcreddata, keyblock, 203 auth_context->keyblock,
|
H A D | get_creds.c | 44 specified in in_creds->keyblock.enctype (if non-zero) 86 ret = krb5_copy_keyblock_contents(context, &in_creds->keyblock, 87 &mcreds->keyblock); 98 if (mcreds->keyblock.enctype) { 105 if (ktypes[i] == mcreds->keyblock.enctype) 111 krb5_free_keyblock_contents(context, &mcreds->keyblock); 122 krb5_free_keyblock_contents(context, &mcreds->keyblock); 149 krb5_free_keyblock_contents(context, &mcreds.keyblock); 168 krb5_free_keyblock_contents(context, &mcreds.keyblock); 217 krb5_free_keyblock_contents(context, &mcreds.keyblock); [all...] |
H A D | mk_cred.c | 41 * If the keyblock is NULL, just copy the data from the encoded 72 krb5_mk_ncred_basic(krb5_context context, krb5_creds **ppcreds, krb5_int32 nppcreds, krb5_keyblock *keyblock, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_cred *pcred) argument 117 if ((retval = krb5_copy_keyblock(context, &ppcreds[i]->keyblock, 140 retval = encrypt_credencpart(context, &credenc, keyblock, 162 krb5_keyblock * keyblock; local 191 /* Get keyblock */ 192 if ((keyblock = auth_context->send_subkey) == NULL) 193 keyblock = auth_context->keyblock; 248 if ((retval = krb5_mk_ncred_basic(context, ppcreds, ncred, keyblock, [all...] |
H A D | rd_req_dec.c | 184 if ((*auth_context)->keyblock) { /* User to User authentication */ 185 if ((retval = krb5_decrypt_tkt_part(context, (*auth_context)->keyblock, 188 krb5_free_keyblock(context, (*auth_context)->keyblock); 189 (*auth_context)->keyblock = NULL; 462 if ((*auth_context)->keyblock != NULL) { 463 krb5_free_keyblock(context, (*auth_context)->keyblock); 464 (*auth_context)->keyblock = NULL; 467 &((*auth_context)->keyblock))))
|
H A D | rd_rep.c | 67 if ((retval = krb5_c_decrypt(context, auth_context->keyblock,
|
H A D | fwd_tgt.c | 96 enctype = out->keyblock.enctype; 177 creds.keyblock.enctype = enctype; 188 creds.keyblock.enctype = 0;
|
H A D | gc_via_tkt.c | 61 &(*ppcreds)->keyblock))) 95 krb5_free_keyblock(context, &(*ppcreds)->keyblock); 220 if (in_cred->keyblock.enctype) { 224 enctypes[0] = in_cred->keyblock.enctype; 387 &tkt->keyblock, &dec_rep)))
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/old/ |
H A D | des_stringtokey.c | 34 krb5_keyblock * keyblock,
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | auth_con.h | 11 krb5_keyblock * keyblock; member in struct:_krb5_auth_context
|
H A D | des_int.h | 110 /* the first byte of the key is already in the keyblock */ 137 krb5_keyblock *keyblock, 226 const krb5_keyblock * keyblock); 231 krb5_keyblock * keyblock,
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 197 (mcreds->keyblock.enctype == creds->keyblock.enctype))) 241 fetched.pref = pref (fetchcreds.keyblock.enctype, 257 creds->keyblock.hKey = CK_INVALID_HANDLE; 275 creds->keyblock.hKey = CK_INVALID_HANDLE; 332 equal = (in_creds->keyblock.enctype == in_compare_creds->keyblock.enctype && 333 in_creds->keyblock.length == in_compare_creds->keyblock.length && 334 (!in_creds->keyblock [all...] |
H A D | cc_file.c | 52 keyblock (keyblock) 138 (krb5_context, krb5_ccache id, krb5_keyblock *keyblock); 188 (krb5_context, krb5_ccache id, krb5_keyblock *keyblock); 228 * FCC version 3 contains keyblock encryption type information, and is 572 krb5_fcc_read_keyblock(krb5_context context, krb5_ccache id, krb5_keyblock *keyblock) argument 581 keyblock->magic = KV5M_KEYBLOCK; 582 keyblock->contents = 0; 585 keyblock->enctype = ui2; 590 /* keyblock 1002 krb5_fcc_store_keyblock(krb5_context context, krb5_ccache id, krb5_keyblock *keyblock) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 126 krb5_keyblock *keyblock, const krb5_data *data, 130 keyblock)); 135 const krb5_keyblock *keyblock, krb5_pointer *ptr) 139 data.length = keyblock->length; 140 data.data = (char *) keyblock->contents; 154 krb5_pointer ptr, krb5_keyblock **keyblock) 165 *keyblock = key; 125 krb5_string_to_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument 134 krb5_init_random_key(krb5_context context, const krb5_encrypt_block *eblock, const krb5_keyblock *keyblock, krb5_pointer *ptr) argument 153 krb5_random_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_pointer ptr, krb5_keyblock **keyblock) argument
|
/illumos-gate/usr/src/lib/libast/common/uwin/ |
H A D | crypt.c | 799 C_block keyblock; local 807 keyblock.b[i] = k; 809 return (des_setkey((char *)keyblock.b)); 849 C_block keyblock, rsltblock; local 861 keyblock.b[i] = t; 863 if (des_setkey((char *)keyblock.b)) /* also initializes "a64toi" */ 873 if (des_cipher((char *)&keyblock, 874 (char *)&keyblock, 0L, 1)) 879 keyblock.b[i] ^= t; 881 if (des_setkey((char *)keyblock [all...] |