Searched refs:subkey (Results 1 - 25 of 26) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgen_subkey.c47 krb5_keyblock **subkey)
53 *subkey = NULL;
76 free(*subkey);
80 *subkey = keyblock;
85 krb5_generate_subkey(krb5_context context, const krb5_keyblock *key, krb5_keyblock **subkey) argument
87 return krb5_generate_subkey_extended(context, key, key->enctype, subkey);
44 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype enctype, krb5_keyblock **subkey) argument
H A Dcopy_athctr.c56 if (authfrom->subkey) {
57 retval = krb5_copy_keyblock(context, authfrom->subkey, &tempto->subkey);
59 free(tempto->subkey);
71 free(tempto->subkey);
H A Dmk_rep.c104 repl.subkey = NULL;
113 repl.subkey = &auth_context->send_subkey->keyblock;
115 repl.subkey = auth_context->authentp->subkey;
H A Drd_rep.c129 /* Set auth subkey. */
130 if (enc->subkey) {
132 enc->subkey);
136 enc->subkey);
142 auth_context->negotiated_etype = enc->subkey->enctype;
202 if (repl->subkey != NULL) {
H A Dsend_tgs.c57 krb5_creds *in_cred, krb5_data *outbuf, krb5_keyblock *subkey)
96 authent.subkey = subkey; /*owned by caller*/
152 * and request subkey, for binding preauthentication data
180 krb5_keyblock **subkey,
193 assert (subkey != NULL);
194 *subkey = NULL;
220 /* Generate subkey*/
383 *subkey = local_subkey;
411 krb5_keyblock *subkey;
56 tgs_construct_tgsreq(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf, krb5_keyblock *subkey) argument
162 krb5int_make_tgs_request_ext(krb5_context context, krb5_flags kdcoptions, const krb5_ticket_times *timestruct, const krb5_enctype *ktypes, krb5_const_principal sname, krb5_address *const *addrs, krb5_authdata *const *authorization_data, krb5_pa_data *const *padata, const krb5_data *second_ticket, krb5_creds *in_cred, krb5_error_code (*pacb_fct)(krb5_context, krb5_keyblock *, krb5_kdc_req *, void *), void *pacb_data, krb5_data *request_data, krb5_timestamp *timestamp, krb5_int32 *nonce, krb5_keyblock **subkey, krb5_kdc_req **retreq) argument
[all...]
H A Dint-proto.h121 krb5_keyblock **subkey,
139 krb5_keyblock **subkey,
152 krb5_keyblock *subkey,
170 krb5_keyblock **subkey);
171 /* The subkey field is an output parameter; if a
172 * tgs-rep is received then the subkey will be filled
173 * in with the subkey needed to decrypt the TGS
H A Dgc_via_tkt.c196 krb5_keyblock **subkey,
205 *subkey = NULL;
253 timestamp, nonce, subkey, retreq);
270 krb5_keyblock *subkey,
409 subkey,
529 krb5_keyblock *subkey = NULL; local
551 &subkey, &retreq);
594 timestamp, nonce, subkey,
609 if (subkey != NULL) {
611 *out_subkey = subkey;
182 krb5int_make_tgs_request(krb5_context context, krb5_creds *tkt, krb5_flags kdcoptions, krb5_address *const *address, krb5_pa_data **in_padata, krb5_creds *in_cred, krb5_error_code (*pacb_fct)(krb5_context, krb5_keyblock *, krb5_kdc_req *, void *), void *pacb_data, krb5_data *request_data, krb5_timestamp *timestamp, krb5_int32 *nonce, krb5_keyblock **subkey, krb5_kdc_req **retreq) argument
261 krb5int_process_tgs_reply(krb5_context context, krb5_data *response_data, krb5_creds *tkt, krb5_flags kdcoptions, krb5_address *const *address, krb5_pa_data **in_padata, krb5_creds *in_cred, krb5_timestamp timestamp, krb5_int32 nonce, krb5_keyblock *subkey, krb5_pa_data ***out_padata, krb5_pa_data ***out_enc_padata, krb5_creds **out_cred, const char *hostname_used) argument
[all...]
H A Ds4u_creds.c249 * subkey without requiring them to be generated by the caller.
253 krb5_keyblock *subkey,
273 if (subkey->enctype == ENCTYPE_ARCFOUR_HMAC ||
274 subkey->enctype == ENCTYPE_ARCFOUR_HMAC_EXP) {
277 code = krb5int_c_mandatory_cksumtype(context, subkey->enctype,
283 code = krb5_c_make_checksum(context, cksumtype, subkey,
336 krb5_keyblock *subkey,
351 switch (subkey->enctype) {
402 code = krb5_c_verify_checksum(context, subkey, usage, datap,
552 krb5_keyblock *subkey local
252 build_pa_s4u_x509_user(krb5_context context, krb5_keyblock *subkey, krb5_kdc_req *tgsreq, void *gcvt_data) argument
335 verify_s4u2self_reply(krb5_context context, krb5_keyblock *subkey, krb5_pa_s4u_x509_user *req_s4u_user, krb5_pa_data **rep_padata, krb5_pa_data **enc_padata) argument
[all...]
H A Dfast.c66 krb5_keyblock *subkey = NULL, *armor_key = NULL; local
77 retval = krb5_auth_con_getsendsubkey(context, authcontext, &subkey);
79 retval = krb5_c_fx_cf2_simple(context, subkey, "subkeyarmor",
97 krb5_free_keyblock(context, subkey);
H A Dmk_req_ext.c148 /* generate subkey if needed */
290 retval = krb5_k_key_keyblock(context, key, &authent->subkey);
294 authent->subkey = 0;
H A Drd_req_dec.c588 * subkey (if that is present) or the service ticket session key, the
589 * server MUST create a subkey using that enctype. This negotiated
590 * subkey is sent in the subkey field of AP-REP message, and it is then
602 * the AP-REQ subkey enctype. Also a client has no way of distinguishing
604 * enctype as the ticket session key for the acceptor subkey, surely.
607 if ((*auth_context)->authentp->subkey != NULL) {
608 desired_etypes[desired_etypes_len++] = (*auth_context)->authentp->subkey->enctype;
639 if ((*auth_context)->authentp->subkey) {
646 (*auth_context)->authentp->subkey,
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Dcamellia.h5 void camellia_setup128(const unsigned char *key, grub_uint32_t *subkey);
6 void camellia_setup192(const unsigned char *key, grub_uint32_t *subkey);
7 void camellia_setup256(const unsigned char *key, grub_uint32_t *subkey);
8 void camellia_encrypt128(const grub_uint32_t *subkey, grub_uint32_t *io);
9 void camellia_encrypt192(const grub_uint32_t *subkey, grub_uint32_t *io);
10 void camellia_encrypt256(const grub_uint32_t *subkey, grub_uint32_t *io);
11 void camellia_decrypt128(const grub_uint32_t *subkey, grub_uint32_t *io);
12 void camellia_decrypt192(const grub_uint32_t *subkey, grub_uint32_t *io);
13 void camellia_decrypt256(const grub_uint32_t *subkey, grub_uint32_t *io);
H A Ddes.c317 * subkeys in the subkey scheduling process.
436 #define DES_ROUND(from, to, work, subkey) \
437 work = from ^ *subkey++; \
442 work = ((from << 28) | (from >> 4)) ^ *subkey++; \
481 * subkey: Array of at least 32 u32s. Will be filled
486 des_key_schedule (const byte * rawkey, u32 * subkey) argument
525 *subkey++ = (((left << 4) & 0x24000000)
548 *subkey++ = (((left << 15) & 0x20000000)
H A Dcamellia.c79 #define CamelliaSubkeyL(INDEX) (subkey[(INDEX)*2])
80 #define CamelliaSubkeyR(INDEX) (subkey[(INDEX)*2 + 1])
449 void camellia_setup128(const unsigned char *key, u32 *subkey) argument
660 void camellia_setup256(const unsigned char *key, u32 *subkey) argument
946 void camellia_setup192(const unsigned char *key, u32 *subkey) argument
958 camellia_setup256(kk, subkey);
968 void camellia_encrypt128(const u32 *subkey, u32 *io) argument
1058 void camellia_decrypt128(const u32 *subkey, u32 *io) argument
1151 void camellia_encrypt256(const u32 *subkey, u32 *io) argument
1265 void camellia_decrypt256(const u32 *subkey, u3 argument
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dwinreg_svc.c33 * the terms key and subkey are used interchangeably. Values, analogous
36 * A specific subkey can be identifies by its fully qualified name (FQN),
43 * The HKEY_LOCAL_MACHINE root key contains a subkey called System, and
44 * System contains a subkey called CurrentControlSet.
197 char subkey[MAXPATHLEN]; local
211 (void) snprintf(subkey, MAXPATHLEN, "%s", winreg_log[i]);
212 winreg_add_predefined(subkey);
214 (void) snprintf(subkey, MAXPATHLEN, "%s\\%s",
216 winreg_add_predefined(subkey);
218 (void) snprintf(subkey, MAXPATHLE
240 winreg_add_predefined(const char *subkey) argument
400 char *subkey; local
490 char *subkey; local
537 winreg_key_has_subkey(const char *subkey) argument
566 winreg_enum_subkey(ndr_xa_t *mxa, const char *subkey, uint32_t index) argument
637 char *subkey; local
816 char *subkey = (char *)param->name.str; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/dtrace/
H A Dkerberos_dtrace.c895 if (encp->subkey != NULL) {
898 encp->subkey->enctype);
900 encp->subkey->length;
902 encp->subkey->contents;
970 if (auth->subkey != NULL) {
972 k5_etype_lookup, auth->subkey->enctype);
973 ka->subkey_length = auth->subkey->length;
974 ka->subkey_value = auth->subkey->contents;
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c192 * "recv_subkey" field might contain a session subkey. Either of
198 * subkey, so this code works fine against a JCSI client.) Up to the
800 if ((authdat->authenticator->subkey == NULL) ||
818 krb5_key subkey; local
821 code = krb5_auth_con_getkey_k(context, auth_context, &subkey);
831 subkey,
836 krb5_k_free_key(context, subkey);
1101 &ctx->subkey))) {
1106 /* use the session key if the subkey isn't present */
1108 if (ctx->subkey
[all...]
H A Dinit_sec_context.c407 /* call mk_req. subkey and ap_req need to be used or destroyed */
624 code = krb5_k_create_key(context, keyblock, &ctx->subkey);
635 code = kg_setup_keys(context, ctx, ctx->subkey, &ctx->cksumtype);
691 if (ctx_free->subkey)
692 krb5_k_free_key(context, ctx_free->subkey);
840 &ctx->subkey->keyblock);
852 if (ap_rep_data->subkey != NULL &&
854 ap_rep_data->subkey->enctype != ctx->subkey->keyblock.enctype)) {
855 /* Keep acceptor's subkey
[all...]
H A Dinq_context.c202 key = ctx->have_acceptor_subkey ? ctx->acceptor_subkey : ctx->subkey;
H A Dlucid_context.c228 /* (subkey is always present, either a copy of the kerberos
229 session key or a subkey) */
230 if ((retval = copy_keyblock_to_lucid_key(&gctx->subkey->keyblock,
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dcamellia.c77 #define CamelliaSubkeyL(INDEX) (subkey[(INDEX)*2])
78 #define CamelliaSubkeyR(INDEX) (subkey[(INDEX)*2 + 1])
447 void camellia_setup128(const unsigned char *key, u32 *subkey) argument
658 void camellia_setup256(const unsigned char *key, u32 *subkey) argument
944 void camellia_setup192(const unsigned char *key, u32 *subkey) argument
956 camellia_setup256(kk, subkey);
966 void camellia_encrypt128(const u32 *subkey, u32 *io) argument
1056 void camellia_decrypt128(const u32 *subkey, u32 *io) argument
1149 void camellia_encrypt256(const u32 *subkey, u32 *io) argument
1263 void camellia_decrypt256(const u32 *subkey, u3 argument
[all...]
H A Ddes.c319 * subkeys in the subkey scheduling process.
442 #define DES_ROUND(from, to, work, subkey) \
443 work = from ^ *subkey++; \
448 work = ((from << 28) | (from >> 4)) ^ *subkey++; \
487 * subkey: Array of at least 32 u32s. Will be filled
492 des_key_schedule (const byte * rawkey, u32 * subkey) argument
531 *subkey++ = (((left << 4) & 0x24000000)
554 *subkey++ = (((left << 15) & 0x20000000)
H A Dserpent.c557 #define ROUND_INVERSE(which, subkey, block, block_tmp) \
561 BLOCK_XOR (block_tmp, subkey[round]); \
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dkrb5_decode.c250 clear_field(rep,subkey);
266 opt_field(rep->subkey,6,asn1_decode_encryption_key_ptr);
504 clear_field(rep,subkey);
510 opt_field(rep->subkey,2,asn1_decode_encryption_key_ptr);
H A Dasn1_k_encode.c726 /* subkey[6] EncryptionKey OPTIONAL */
727 FIELDOF_OPT(krb5_authenticator, ptr_encryption_key, subkey, 6, 6),
745 if (val->subkey != NULL)
891 /* subkey[2] EncryptionKey OPTIONAL */
892 FIELDOF_OPT(krb5_ap_rep_enc_part, ptr_encryption_key, subkey, 2, 2),
904 if (val->subkey != NULL)

Completed in 841 milliseconds

12