Searched refs:keyblock (Results 1 - 25 of 40) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgen_subkey.c51 krb5_keyblock *keyblock; local
67 keyblock = malloc(sizeof(krb5_keyblock));
68 if (!keyblock)
72 (void) memset(keyblock, 0, sizeof(krb5_keyblock));
74 retval = krb5_c_make_random_key(context, enctype, keyblock);
80 *subkey = keyblock;
H A Dgen_save_subkey.c41 krb5_keyblock *keyblock,
70 retval = krb5_generate_subkey_extended(context, keyblock, enctype, &kb);
39 krb5int_generate_and_save_subkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock, krb5_enctype enctype) argument
H A Dauth_con.c156 * This function overloads the keyblock field. It is only useful prior to
163 krb5_auth_con_setuseruserkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument
167 return(krb5_k_create_key(context, keyblock, &(auth_context->key)));
171 krb5_auth_con_getkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
174 return krb5_k_key_keyblock(context, auth_context->key, keyblock);
175 *keyblock = NULL;
189 krb5_auth_con_getlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
191 return krb5_auth_con_getsendsubkey(context, auth_context, keyblock);
195 krb5_auth_con_getremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument
197 return krb5_auth_con_getrecvsubkey(context, auth_context, keyblock);
201 krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument
213 krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument
225 krb5_auth_con_getsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument
243 krb5_auth_con_getrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument
[all...]
H A Dcopy_creds.c74 retval = krb5_copy_keyblock_contents(context, &incred->keyblock,
75 &tempcred->keyblock);
108 free(tempcred->keyblock.contents);
H A Dmk_rep.c91 &auth_context->key->keyblock,
109 &auth_context->key->keyblock,
113 repl.subkey = &auth_context->send_subkey->keyblock;
H A Dget_creds.c42 specified in in_creds->keyblock.enctype (if non-zero)
78 /* Solaris Kerberos: our keyblock needs different handling */
79 ret = krb5_copy_keyblock_contents(context, &in_creds->keyblock,
80 &mcreds->keyblock);
90 if (mcreds->keyblock.enctype) {
97 if (ktypes[i] == mcreds->keyblock.enctype)
103 /* Solaris Kerberos: our keyblock needs different handling */
104 krb5_free_keyblock_contents(context, &mcreds->keyblock);
118 /* Solaris Kerberos: our keyblock needs different handling */
119 krb5_free_keyblock_contents(context, &mcreds->keyblock);
[all...]
H A Dmk_req_ext.c135 /* set auth context keyblock */
136 if ((retval = krb5_k_create_key(context, &in_creds->keyblock,
144 if ((retval = krb5_generate_seq_number(context, &in_creds->keyblock,
151 &in_creds->keyblock,
152 in_creds->keyblock.enctype);
220 in_creds->keyblock.enctype)))
229 if ((retval = krb5_encrypt_helper(context, &in_creds->keyblock,
H A Dfwd_tgt.c100 enctype = out->keyblock.enctype;
183 creds.keyblock.enctype = enctype;
194 creds.keyblock.enctype = 0;
H A Dsend_tgs.c72 switch (in_cred->keyblock.enctype) {
81 retval = krb5int_c_mandatory_cksumtype(context, in_cred->keyblock.enctype, &cksumtype);
88 &in_cred->keyblock,
119 if ((retval = krb5_encrypt_helper(context, &in_cred->keyblock,
221 if ((retval = krb5_generate_subkey( context, &in_cred->keyblock,
H A Dgc_via_tkt.c62 &(*ppcreds)->keyblock)))
96 krb5_free_keyblock_contents(context, &(*ppcreds)->keyblock);
237 if (in_cred->keyblock.enctype) {
241 enctypes[0] = in_cred->keyblock.enctype;
414 &tkt->keyblock,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dstring2key.c36 of type "enctype". *keyblock is filled in with the key info;
37 in particular, keyblock->contents is to be set to allocated storage.
52 krb5_keyblock *keyblock,
73 keyblock->magic = KV5M_KEYBLOCK;
74 keyblock->length = sizeof(mit_des_cblock);
75 key = keyblock->contents;
91 return mit_afs_string_to_key(context, keyblock, data, &afssalt);
160 length, keyblock, key);
172 * Because this routine actually modifies the original keyblock
178 if (keyblock
51 mit_des_string_to_key_int(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument
[all...]
H A Dafsstring2key.c77 krb5_keyblock *keyblock, const krb5_data *data,
85 which is mit_des_string_to_key; in particular, *keyblock is already
90 krb5_octet *key = keyblock->contents;
76 mit_afs_string_to_key(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dprf.c63 ktp = find_enctype(key->keyblock.enctype);
77 krb5_c_prf(krb5_context context, const krb5_keyblock *keyblock, argument
83 ret = krb5_k_create_key(context, keyblock, &key);
H A Dmake_checksum_iov.c76 const krb5_keyblock *keyblock,
84 ret = krb5_k_create_key(context, keyblock, &key);
74 krb5_c_make_checksum_iov(krb5_context context, krb5_cksumtype cksumtype, const krb5_keyblock *keyblock, krb5_keyusage usage, krb5_crypto_iov *data, size_t num_data) argument
H A Dold_api_glue.c124 krb5_keyblock *keyblock, const krb5_data *data,
128 keyblock));
133 const krb5_keyblock *keyblock, krb5_pointer *ptr)
137 data.length = keyblock->length;
138 data.data = (char *) keyblock->contents;
152 krb5_pointer ptr, krb5_keyblock **keyblock)
163 *keyblock = key;
123 krb5_string_to_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument
132 krb5_init_random_key(krb5_context context, const krb5_encrypt_block *eblock, const krb5_keyblock *keyblock, krb5_pointer *ptr) argument
151 krb5_random_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_pointer ptr, krb5_keyblock **keyblock) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcc_retr.c201 (mcreds->keyblock.enctype == creds->keyblock.enctype)))
245 fetched.pref = pref (fetchcreds.keyblock.enctype,
261 creds->keyblock.hKey = CK_INVALID_HANDLE;
279 creds->keyblock.hKey = CK_INVALID_HANDLE;
333 equal = (in_creds->keyblock.enctype == in_compare_creds->keyblock.enctype &&
334 in_creds->keyblock.length == in_compare_creds->keyblock.length &&
335 (!in_creds->keyblock
[all...]
H A Dcc_file.c53 keyblock (keyblock)
142 (krb5_context, krb5_ccache id, krb5_keyblock *keyblock);
211 (krb5_context, krb5_ccache id, krb5_keyblock *keyblock);
254 * FCC version 3 contains keyblock encryption type information, and is
600 krb5_fcc_read_keyblock(krb5_context context, krb5_ccache id, krb5_keyblock *keyblock) argument
609 keyblock->magic = KV5M_KEYBLOCK;
610 keyblock->contents = 0;
613 keyblock->enctype = ui2;
618 /* keyblock
1026 krb5_fcc_store_keyblock(krb5_context context, krb5_ccache id, krb5_keyblock *keyblock) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/old/
H A Ddes_stringtokey.c34 krb5_keyblock * keyblock,
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dluks.c58 } keyblock[8]; member in struct:grub_luks_phdr
322 for (i = 0; i < ARRAY_SIZE (header.keyblock); i++)
323 if (grub_be_to_cpu32 (header.keyblock[i].active) == LUKS_KEY_ENABLED
324 && grub_be_to_cpu32 (header.keyblock[i].stripes) > max_stripes)
325 max_stripes = grub_be_to_cpu32 (header.keyblock[i].stripes);
346 for (i = 0; i < ARRAY_SIZE (header.keyblock); i++)
353 if (grub_be_to_cpu32 (header.keyblock[i].active) != LUKS_KEY_ENABLED)
361 header.keyblock[i].passwordSalt,
362 sizeof (header.keyblock[i].passwordSalt),
363 grub_be_to_cpu32 (header.keyblock[
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinq_context.c204 keyvalue.value = key->keyblock.contents;
205 keyvalue.length = key->keyblock.length;
217 key->keyblock.enctype,
H A Dlucid_context.c222 if ((retval = copy_keyblock_to_lucid_key(&gctx->seq->keyblock,
230 if ((retval = copy_keyblock_to_lucid_key(&gctx->subkey->keyblock,
234 if ((retval = copy_keyblock_to_lucid_key(&gctx->acceptor_subkey->keyblock,
H A Dinit_sec_context.c197 in_creds.keyblock.enctype = 0;
306 if (data->ctx->auth_context->keyblock != NULL
307 && data->ctx->auth_context->keyblock->enctype == 18) {
390 switch (k_cred->keyblock.enctype) {
499 krb5_keyblock *keyblock; local
621 &keyblock);
624 code = krb5_k_create_key(context, keyblock, &ctx->subkey);
625 krb5_free_keyblock(context, keyblock);
840 &ctx->subkey->keyblock);
854 ap_rep_data->subkey->enctype != ctx->subkey->keyblock
[all...]
H A Dutil_cksum.c165 conf_len = kg_confounder_size(context, enc->keyblock.enctype);
235 code = krb5_c_crypto_length(context, key->keyblock.enctype, KRB5_CRYPTO_TYPE_CHECKSUM, &k5_checksumlen);
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c313 krb5_keyblock *keyblock)
322 arg.keyblock = keyblock;
325 if(princ == NULL || keyblock == NULL)
533 kvno, krb5_keyblock *keyblock,
311 kadm5_setv4key_principal(void *server_handle, krb5_principal princ, krb5_keyblock *keyblock) argument
530 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb_default.c207 new_entry.key = keylist->keyblock;
247 list.keyblock = *key;
595 &((*mkey_list_node)->keyblock),
607 * latest version of cur_mkey should be copied to mkey_list_head->keyblock
614 mkey_list_head->keyblock = cur_mkey;
624 * mkey_list_head->keyblock hasn't been set so just free mkey_list_head

Completed in 104 milliseconds

12