/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | init_allocated_keyblock.c | 34 krb5_enctype enctype, 43 kb->enctype = enctype; 32 krb5_init_allocated_keyblock( krb5_context context, krb5_enctype enctype, unsigned int length, krb5_keyblock *kb) argument
|
H A D | init_keyblock.c | 38 (krb5_context context, krb5_enctype enctype, 49 kb->enctype = enctype; 37 krb5_init_keyblock(krb5_context context, krb5_enctype enctype, size_t length, krb5_keyblock **out) argument
|
H A D | get_set_keyblock.c | 35 return (kb->enctype); 51 krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype) argument 53 kb->enctype = enctype;
|
H A D | fwd_tgt.c | 60 krb5_enctype enctype = 0; local 76 enctype = session_key->enctype; 94 /* Got the credentials. Okay, now record the enctype and 96 enctype = out->keyblock.enctype; 177 creds.keyblock.enctype = enctype; 187 if (enctype) { 188 creds.keyblock.enctype [all...] |
H A D | rd_req_dec.c | 76 krb5_enctype enctype; local 79 enctype = req->ticket->enc_part.enctype; 85 enctype, &ktent))) 95 ktent.key.enctype = enctype; 108 "AP Request ticket decrypt fail for principal '%s' (kvno=%d, enctype=%d)"), 111 enctype); 361 etype = req->ticket->enc_part.enctype)) || 363 etype = req->ticket->enc_part2->session->enctype)) || [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | block_size.c | 32 krb5_c_block_size(krb5_context context, krb5_enctype enctype, argument 38 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | encrypt_length.c | 32 krb5_c_encrypt_length(krb5_context context, krb5_enctype enctype, argument 38 if (krb5_enctypes_list[i].etype == enctype)
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | enctype_to_string.c | 36 krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen) argument 41 if (krb5_enctypes_list[i].etype == enctype) { 55 krb5_enctype_to_istring(krb5_enctype enctype, char *buffer, size_t buflen) argument 60 if (krb5_enctypes_list[i].etype == enctype) {
|
H A D | keylengths.c | 40 krb5_c_keylengths(krb5_context context, krb5_enctype enctype, argument 49 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | random_to_key.c | 41 krb5_c_random_to_key(krb5_context context, krb5_enctype enctype, argument 55 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | keyed_checksum_types.c | 50 krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, argument 58 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) || 73 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) ||
|
H A D | make_random_key.c | 37 krb5_c_make_random_key(krb5_context context, krb5_enctype enctype, argument 48 if (krb5_enctypes_list[i].etype == enctype) 57 enctype); 80 random_key->enctype = enctype;
|
H A D | string_to_key.c | 37 krb5_enctype enctype, 45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, argument 49 return krb5_c_string_to_key_with_params(context, enctype, string, salt, 54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, argument 65 if (krb5_enctypes_list[i].etype == enctype) 77 switch (enctype) { 94 key->enctype = enctype;
|
H A D | pbkdf2.c | 52 krb5_enctype enctype, 75 rv = get_key_type(enctype, &keytype); 88 enctype != ENCTYPE_DES_CBC_CRC && 89 enctype != ENCTYPE_DES_CBC_MD5 && 90 enctype != ENCTYPE_DES_CBC_RAW && 91 enctype != ENCTYPE_DES_HMAC_SHA1 && 92 enctype != ENCTYPE_DES3_CBC_SHA1 && 93 enctype != ENCTYPE_DES3_CBC_RAW) { 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
H A D | old_api_glue.c | 51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size, 86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 94 inputd.enctype = eblock->key->enctype; 178 krb5_enctype enctype) 180 eblock->crypto_entry = enctype; 293 if ((ret = krb5_c_encrypt_length(context, key->enctype, data->length, 298 if ((ret = krb5_c_block_size(context, key->enctype, &blocksize))) 307 enc_data->enctype 177 krb5_use_enctype(krb5_context context, krb5_encrypt_block *eblock, krb5_enctype enctype) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | read_servi.c | 41 * principal, vno, and enctype and returns the resulting key in *key 47 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 70 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
|
H A D | ktfns.c | 55 krb5_enctype enctype, krb5_keytab_entry *entry) 70 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype, 53 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
H A D | kt_solaris.c | 70 const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 465 (entry.key.enctype == *tenctype)) { 472 if ((entry.key.enctype == AES128) || 473 (entry.key.enctype == AES256)) { 69 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal svc_princ, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
|
H A D | kt_srvtab.c | 187 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 198 switch (enctype) { 213 ent.key.enctype = enctype; 480 ret_entry->key.enctype = ENCTYPE_DES_CBC_CRC;
|
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kadm5_create.c | 303 krb5_enctype *tmpenc, *enctype = NULL; local 308 ret = krb5_get_permitted_enctypes(context, &enctype); 309 if (ret || *enctype == NULL) { 318 for (tmpenc = enctype, num_ks = 0; *tmpenc; tmpenc++) 325 krb5_free_ktypes(context, enctype); 336 krb5_free_ktypes(context, enctype); 344 keysalt[i].ks_enctype = enctype[i]; 351 krb5_free_ktypes (context, enctype);
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksetpw.c | 41 krb5_enctype enctype, krb5_kvno kvno, const char *pw); 138 "or unsupported enctype %s"), 330 const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno, 339 if ((code = krb5_enctype_to_string(enctype, buf, sizeof (buf)))) { 341 enctype); 356 gettext("Could not compute salt for %s"), enctype); 360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key); 364 enctype); 329 kt_add_entry(krb5_context ctx, krb5_keytab kt, const krb5_principal princ, const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno, const char *pw) argument
|
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/ |
H A D | ktutil.c | 204 char *enctype = NULL; local 218 enctype = argv[++i]; 231 if (argc != 8 || !(princ && kvno && enctype) || (use_pass+use_key != 1)) { 233 "-k kvno -e enctype\n", gettext("usage"), argv[0]); 237 retval = ktutil_add(kcontext, &ktlist, princ, kvno, enctype, use_pass); 320 lp->entry->key.enctype, buf, 256))) { 323 lp->entry->key.enctype); 327 "enctype to string"));
|
H A D | ktutil_funcs.c | 112 krb5_enctype enctype; local 132 retval = krb5_string_to_enctype(enctype_str, &enctype); 182 retval = krb5_c_string_to_key(context, enctype, &password, 207 lp->entry->key.enctype = enctype; 424 entry->key.enctype = ENCTYPE_DES_CBC_CRC; 487 if ((lp->entry->key.enctype != ENCTYPE_DES_CBC_CRC) && 488 (lp->entry->key.enctype != ENCTYPE_DES_CBC_MD5) && 489 (lp->entry->key.enctype != ENCTYPE_DES_CBC_MD4) && 490 (lp->entry->key.enctype ! [all...] |
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb_default.c | 44 * Given a particular enctype and optional salttype and kvno, find the 152 krb5_ui_2 enctype; local 187 enctype = key->enctype; 188 if ((fwrite((krb5_pointer) &enctype, 215 krb5_ui_2 enctype; local 236 if (fread((krb5_pointer) &enctype, 2, 1, kf) != 1) { 241 if (key->enctype == ENCTYPE_UNKNOWN) 242 key->enctype = enctype; [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_compat.h | 47 krb5_enctype enctype; member in struct:_old_krb5_encrypted_keyblock
|