/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_subkey.c | 47 krb5_keyblock **subkey) 53 *subkey = NULL; 76 free(*subkey); 80 *subkey = keyblock; 85 krb5_generate_subkey(krb5_context context, const krb5_keyblock *key, krb5_keyblock **subkey) argument 87 return krb5_generate_subkey_extended(context, key, key->enctype, subkey); 44 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype enctype, krb5_keyblock **subkey) argument
|
H A D | copy_athctr.c | 56 if (authfrom->subkey) { 57 retval = krb5_copy_keyblock(context, authfrom->subkey, &tempto->subkey); 59 free(tempto->subkey); 71 free(tempto->subkey);
|
H A D | mk_rep.c | 104 repl.subkey = NULL; 113 repl.subkey = &auth_context->send_subkey->keyblock; 115 repl.subkey = auth_context->authentp->subkey;
|
H A D | rd_rep.c | 129 /* Set auth subkey. */ 130 if (enc->subkey) { 132 enc->subkey); 136 enc->subkey); 142 auth_context->negotiated_etype = enc->subkey->enctype; 202 if (repl->subkey != NULL) {
|
H A D | send_tgs.c | 57 krb5_creds *in_cred, krb5_data *outbuf, krb5_keyblock *subkey) 96 authent.subkey = subkey; /*owned by caller*/ 152 * and request subkey, for binding preauthentication data 180 krb5_keyblock **subkey, 193 assert (subkey != NULL); 194 *subkey = NULL; 220 /* Generate subkey*/ 383 *subkey = local_subkey; 411 krb5_keyblock *subkey; 56 tgs_construct_tgsreq(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf, krb5_keyblock *subkey) argument 162 krb5int_make_tgs_request_ext(krb5_context context, krb5_flags kdcoptions, const krb5_ticket_times *timestruct, const krb5_enctype *ktypes, krb5_const_principal sname, krb5_address *const *addrs, krb5_authdata *const *authorization_data, krb5_pa_data *const *padata, const krb5_data *second_ticket, krb5_creds *in_cred, krb5_error_code (*pacb_fct)(krb5_context, krb5_keyblock *, krb5_kdc_req *, void *), void *pacb_data, krb5_data *request_data, krb5_timestamp *timestamp, krb5_int32 *nonce, krb5_keyblock **subkey, krb5_kdc_req **retreq) argument [all...] |
H A D | int-proto.h | 121 krb5_keyblock **subkey, 139 krb5_keyblock **subkey, 152 krb5_keyblock *subkey, 170 krb5_keyblock **subkey); 171 /* The subkey field is an output parameter; if a 172 * tgs-rep is received then the subkey will be filled 173 * in with the subkey needed to decrypt the TGS
|
H A D | gc_via_tkt.c | 196 krb5_keyblock **subkey, 205 *subkey = NULL; 253 timestamp, nonce, subkey, retreq); 270 krb5_keyblock *subkey, 409 subkey, 529 krb5_keyblock *subkey = NULL; local 551 &subkey, &retreq); 594 timestamp, nonce, subkey, 609 if (subkey != NULL) { 611 *out_subkey = subkey; 182 krb5int_make_tgs_request(krb5_context context, krb5_creds *tkt, krb5_flags kdcoptions, krb5_address *const *address, krb5_pa_data **in_padata, krb5_creds *in_cred, krb5_error_code (*pacb_fct)(krb5_context, krb5_keyblock *, krb5_kdc_req *, void *), void *pacb_data, krb5_data *request_data, krb5_timestamp *timestamp, krb5_int32 *nonce, krb5_keyblock **subkey, krb5_kdc_req **retreq) argument 261 krb5int_process_tgs_reply(krb5_context context, krb5_data *response_data, krb5_creds *tkt, krb5_flags kdcoptions, krb5_address *const *address, krb5_pa_data **in_padata, krb5_creds *in_cred, krb5_timestamp timestamp, krb5_int32 nonce, krb5_keyblock *subkey, krb5_pa_data ***out_padata, krb5_pa_data ***out_enc_padata, krb5_creds **out_cred, const char *hostname_used) argument [all...] |
H A D | s4u_creds.c | 249 * subkey without requiring them to be generated by the caller. 253 krb5_keyblock *subkey, 273 if (subkey->enctype == ENCTYPE_ARCFOUR_HMAC || 274 subkey->enctype == ENCTYPE_ARCFOUR_HMAC_EXP) { 277 code = krb5int_c_mandatory_cksumtype(context, subkey->enctype, 283 code = krb5_c_make_checksum(context, cksumtype, subkey, 336 krb5_keyblock *subkey, 351 switch (subkey->enctype) { 402 code = krb5_c_verify_checksum(context, subkey, usage, datap, 552 krb5_keyblock *subkey local 252 build_pa_s4u_x509_user(krb5_context context, krb5_keyblock *subkey, krb5_kdc_req *tgsreq, void *gcvt_data) argument 335 verify_s4u2self_reply(krb5_context context, krb5_keyblock *subkey, krb5_pa_s4u_x509_user *req_s4u_user, krb5_pa_data **rep_padata, krb5_pa_data **enc_padata) argument [all...] |
H A D | fast.c | 66 krb5_keyblock *subkey = NULL, *armor_key = NULL; local 77 retval = krb5_auth_con_getsendsubkey(context, authcontext, &subkey); 79 retval = krb5_c_fx_cf2_simple(context, subkey, "subkeyarmor", 97 krb5_free_keyblock(context, subkey);
|
H A D | mk_req_ext.c | 148 /* generate subkey if needed */ 290 retval = krb5_k_key_keyblock(context, key, &authent->subkey); 294 authent->subkey = 0;
|
H A D | rd_req_dec.c | 588 * subkey (if that is present) or the service ticket session key, the 589 * server MUST create a subkey using that enctype. This negotiated 590 * subkey is sent in the subkey field of AP-REP message, and it is then 602 * the AP-REQ subkey enctype. Also a client has no way of distinguishing 604 * enctype as the ticket session key for the acceptor subkey, surely. 607 if ((*auth_context)->authentp->subkey != NULL) { 608 desired_etypes[desired_etypes_len++] = (*auth_context)->authentp->subkey->enctype; 639 if ((*auth_context)->authentp->subkey) { 646 (*auth_context)->authentp->subkey, [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | camellia.h | 5 void camellia_setup128(const unsigned char *key, grub_uint32_t *subkey); 6 void camellia_setup192(const unsigned char *key, grub_uint32_t *subkey); 7 void camellia_setup256(const unsigned char *key, grub_uint32_t *subkey); 8 void camellia_encrypt128(const grub_uint32_t *subkey, grub_uint32_t *io); 9 void camellia_encrypt192(const grub_uint32_t *subkey, grub_uint32_t *io); 10 void camellia_encrypt256(const grub_uint32_t *subkey, grub_uint32_t *io); 11 void camellia_decrypt128(const grub_uint32_t *subkey, grub_uint32_t *io); 12 void camellia_decrypt192(const grub_uint32_t *subkey, grub_uint32_t *io); 13 void camellia_decrypt256(const grub_uint32_t *subkey, grub_uint32_t *io);
|
H A D | des.c | 317 * subkeys in the subkey scheduling process. 436 #define DES_ROUND(from, to, work, subkey) \ 437 work = from ^ *subkey++; \ 442 work = ((from << 28) | (from >> 4)) ^ *subkey++; \ 481 * subkey: Array of at least 32 u32s. Will be filled 486 des_key_schedule (const byte * rawkey, u32 * subkey) argument 525 *subkey++ = (((left << 4) & 0x24000000) 548 *subkey++ = (((left << 15) & 0x20000000)
|
H A D | camellia.c | 79 #define CamelliaSubkeyL(INDEX) (subkey[(INDEX)*2]) 80 #define CamelliaSubkeyR(INDEX) (subkey[(INDEX)*2 + 1]) 449 void camellia_setup128(const unsigned char *key, u32 *subkey) argument 660 void camellia_setup256(const unsigned char *key, u32 *subkey) argument 946 void camellia_setup192(const unsigned char *key, u32 *subkey) argument 958 camellia_setup256(kk, subkey); 968 void camellia_encrypt128(const u32 *subkey, u32 *io) argument 1058 void camellia_decrypt128(const u32 *subkey, u32 *io) argument 1151 void camellia_encrypt256(const u32 *subkey, u32 *io) argument 1265 void camellia_decrypt256(const u32 *subkey, u3 argument [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | winreg_svc.c | 33 * the terms key and subkey are used interchangeably. Values, analogous 36 * A specific subkey can be identifies by its fully qualified name (FQN), 43 * The HKEY_LOCAL_MACHINE root key contains a subkey called System, and 44 * System contains a subkey called CurrentControlSet. 197 char subkey[MAXPATHLEN]; local 211 (void) snprintf(subkey, MAXPATHLEN, "%s", winreg_log[i]); 212 winreg_add_predefined(subkey); 214 (void) snprintf(subkey, MAXPATHLEN, "%s\\%s", 216 winreg_add_predefined(subkey); 218 (void) snprintf(subkey, MAXPATHLE 240 winreg_add_predefined(const char *subkey) argument 400 char *subkey; local 490 char *subkey; local 537 winreg_key_has_subkey(const char *subkey) argument 566 winreg_enum_subkey(ndr_xa_t *mxa, const char *subkey, uint32_t index) argument 637 char *subkey; local 816 char *subkey = (char *)param->name.str; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/dtrace/ |
H A D | kerberos_dtrace.c | 895 if (encp->subkey != NULL) { 898 encp->subkey->enctype); 900 encp->subkey->length; 902 encp->subkey->contents; 970 if (auth->subkey != NULL) { 972 k5_etype_lookup, auth->subkey->enctype); 973 ka->subkey_length = auth->subkey->length; 974 ka->subkey_value = auth->subkey->contents;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 192 * "recv_subkey" field might contain a session subkey. Either of 198 * subkey, so this code works fine against a JCSI client.) Up to the 800 if ((authdat->authenticator->subkey == NULL) || 818 krb5_key subkey; local 821 code = krb5_auth_con_getkey_k(context, auth_context, &subkey); 831 subkey, 836 krb5_k_free_key(context, subkey); 1101 &ctx->subkey))) { 1106 /* use the session key if the subkey isn't present */ 1108 if (ctx->subkey [all...] |
H A D | init_sec_context.c | 407 /* call mk_req. subkey and ap_req need to be used or destroyed */ 624 code = krb5_k_create_key(context, keyblock, &ctx->subkey); 635 code = kg_setup_keys(context, ctx, ctx->subkey, &ctx->cksumtype); 691 if (ctx_free->subkey) 692 krb5_k_free_key(context, ctx_free->subkey); 840 &ctx->subkey->keyblock); 852 if (ap_rep_data->subkey != NULL && 854 ap_rep_data->subkey->enctype != ctx->subkey->keyblock.enctype)) { 855 /* Keep acceptor's subkey [all...] |
H A D | inq_context.c | 202 key = ctx->have_acceptor_subkey ? ctx->acceptor_subkey : ctx->subkey;
|
H A D | lucid_context.c | 228 /* (subkey is always present, either a copy of the kerberos 229 session key or a subkey) */ 230 if ((retval = copy_keyblock_to_lucid_key(&gctx->subkey->keyblock,
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | camellia.c | 77 #define CamelliaSubkeyL(INDEX) (subkey[(INDEX)*2]) 78 #define CamelliaSubkeyR(INDEX) (subkey[(INDEX)*2 + 1]) 447 void camellia_setup128(const unsigned char *key, u32 *subkey) argument 658 void camellia_setup256(const unsigned char *key, u32 *subkey) argument 944 void camellia_setup192(const unsigned char *key, u32 *subkey) argument 956 camellia_setup256(kk, subkey); 966 void camellia_encrypt128(const u32 *subkey, u32 *io) argument 1056 void camellia_decrypt128(const u32 *subkey, u32 *io) argument 1149 void camellia_encrypt256(const u32 *subkey, u32 *io) argument 1263 void camellia_decrypt256(const u32 *subkey, u3 argument [all...] |
H A D | des.c | 319 * subkeys in the subkey scheduling process. 442 #define DES_ROUND(from, to, work, subkey) \ 443 work = from ^ *subkey++; \ 448 work = ((from << 28) | (from >> 4)) ^ *subkey++; \ 487 * subkey: Array of at least 32 u32s. Will be filled 492 des_key_schedule (const byte * rawkey, u32 * subkey) argument 531 *subkey++ = (((left << 4) & 0x24000000) 554 *subkey++ = (((left << 15) & 0x20000000)
|
H A D | serpent.c | 557 #define ROUND_INVERSE(which, subkey, block, block_tmp) \ 561 BLOCK_XOR (block_tmp, subkey[round]); \
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | krb5_decode.c | 250 clear_field(rep,subkey); 266 opt_field(rep->subkey,6,asn1_decode_encryption_key_ptr); 504 clear_field(rep,subkey); 510 opt_field(rep->subkey,2,asn1_decode_encryption_key_ptr);
|
H A D | asn1_k_encode.c | 726 /* subkey[6] EncryptionKey OPTIONAL */ 727 FIELDOF_OPT(krb5_authenticator, ptr_encryption_key, subkey, 6, 6), 745 if (val->subkey != NULL) 891 /* subkey[2] EncryptionKey OPTIONAL */ 892 FIELDOF_OPT(krb5_ap_rep_enc_part, ptr_encryption_key, subkey, 2, 2), 904 if (val->subkey != NULL)
|