/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_subkey.c | 51 krb5_keyblock *keyblock; local 67 keyblock = malloc(sizeof(krb5_keyblock)); 68 if (!keyblock) 72 (void) memset(keyblock, 0, sizeof(krb5_keyblock)); 74 retval = krb5_c_make_random_key(context, enctype, keyblock); 80 *subkey = keyblock;
|
H A D | gen_save_subkey.c | 41 krb5_keyblock *keyblock, 70 retval = krb5_generate_subkey_extended(context, keyblock, enctype, &kb); 39 krb5int_generate_and_save_subkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock, krb5_enctype enctype) argument
|
H A D | auth_con.c | 156 * This function overloads the keyblock field. It is only useful prior to 163 krb5_auth_con_setuseruserkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock *keyblock) argument 167 return(krb5_k_create_key(context, keyblock, &(auth_context->key))); 171 krb5_auth_con_getkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 174 return krb5_k_key_keyblock(context, auth_context->key, keyblock); 175 *keyblock = NULL; 189 krb5_auth_con_getlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 191 return krb5_auth_con_getsendsubkey(context, auth_context, keyblock); 195 krb5_auth_con_getremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock **keyblock) argument 197 return krb5_auth_con_getrecvsubkey(context, auth_context, keyblock); 201 krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument 213 krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument 225 krb5_auth_con_getsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument 243 krb5_auth_con_getrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument [all...] |
H A D | copy_creds.c | 74 retval = krb5_copy_keyblock_contents(context, &incred->keyblock, 75 &tempcred->keyblock); 108 free(tempcred->keyblock.contents);
|
H A D | mk_rep.c | 91 &auth_context->key->keyblock, 109 &auth_context->key->keyblock, 113 repl.subkey = &auth_context->send_subkey->keyblock;
|
H A D | get_creds.c | 42 specified in in_creds->keyblock.enctype (if non-zero) 78 /* Solaris Kerberos: our keyblock needs different handling */ 79 ret = krb5_copy_keyblock_contents(context, &in_creds->keyblock, 80 &mcreds->keyblock); 90 if (mcreds->keyblock.enctype) { 97 if (ktypes[i] == mcreds->keyblock.enctype) 103 /* Solaris Kerberos: our keyblock needs different handling */ 104 krb5_free_keyblock_contents(context, &mcreds->keyblock); 118 /* Solaris Kerberos: our keyblock needs different handling */ 119 krb5_free_keyblock_contents(context, &mcreds->keyblock); [all...] |
H A D | mk_req_ext.c | 135 /* set auth context keyblock */ 136 if ((retval = krb5_k_create_key(context, &in_creds->keyblock, 144 if ((retval = krb5_generate_seq_number(context, &in_creds->keyblock, 151 &in_creds->keyblock, 152 in_creds->keyblock.enctype); 220 in_creds->keyblock.enctype))) 229 if ((retval = krb5_encrypt_helper(context, &in_creds->keyblock,
|
H A D | fwd_tgt.c | 100 enctype = out->keyblock.enctype; 183 creds.keyblock.enctype = enctype; 194 creds.keyblock.enctype = 0;
|
H A D | send_tgs.c | 72 switch (in_cred->keyblock.enctype) { 81 retval = krb5int_c_mandatory_cksumtype(context, in_cred->keyblock.enctype, &cksumtype); 88 &in_cred->keyblock, 119 if ((retval = krb5_encrypt_helper(context, &in_cred->keyblock, 221 if ((retval = krb5_generate_subkey( context, &in_cred->keyblock,
|
H A D | gc_via_tkt.c | 62 &(*ppcreds)->keyblock))) 96 krb5_free_keyblock_contents(context, &(*ppcreds)->keyblock); 237 if (in_cred->keyblock.enctype) { 241 enctypes[0] = in_cred->keyblock.enctype; 414 &tkt->keyblock,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | string2key.c | 36 of type "enctype". *keyblock is filled in with the key info; 37 in particular, keyblock->contents is to be set to allocated storage. 52 krb5_keyblock *keyblock, 73 keyblock->magic = KV5M_KEYBLOCK; 74 keyblock->length = sizeof(mit_des_cblock); 75 key = keyblock->contents; 91 return mit_afs_string_to_key(context, keyblock, data, &afssalt); 160 length, keyblock, key); 172 * Because this routine actually modifies the original keyblock 178 if (keyblock 51 mit_des_string_to_key_int(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument [all...] |
H A D | afsstring2key.c | 77 krb5_keyblock *keyblock, const krb5_data *data, 85 which is mit_des_string_to_key; in particular, *keyblock is already 90 krb5_octet *key = keyblock->contents; 76 mit_afs_string_to_key(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | prf.c | 63 ktp = find_enctype(key->keyblock.enctype); 77 krb5_c_prf(krb5_context context, const krb5_keyblock *keyblock, argument 83 ret = krb5_k_create_key(context, keyblock, &key);
|
H A D | make_checksum_iov.c | 76 const krb5_keyblock *keyblock, 84 ret = krb5_k_create_key(context, keyblock, &key); 74 krb5_c_make_checksum_iov(krb5_context context, krb5_cksumtype cksumtype, const krb5_keyblock *keyblock, krb5_keyusage usage, krb5_crypto_iov *data, size_t num_data) argument
|
H A D | old_api_glue.c | 124 krb5_keyblock *keyblock, const krb5_data *data, 128 keyblock)); 133 const krb5_keyblock *keyblock, krb5_pointer *ptr) 137 data.length = keyblock->length; 138 data.data = (char *) keyblock->contents; 152 krb5_pointer ptr, krb5_keyblock **keyblock) 163 *keyblock = key; 123 krb5_string_to_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument 132 krb5_init_random_key(krb5_context context, const krb5_encrypt_block *eblock, const krb5_keyblock *keyblock, krb5_pointer *ptr) argument 151 krb5_random_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_pointer ptr, krb5_keyblock **keyblock) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 201 (mcreds->keyblock.enctype == creds->keyblock.enctype))) 245 fetched.pref = pref (fetchcreds.keyblock.enctype, 261 creds->keyblock.hKey = CK_INVALID_HANDLE; 279 creds->keyblock.hKey = CK_INVALID_HANDLE; 333 equal = (in_creds->keyblock.enctype == in_compare_creds->keyblock.enctype && 334 in_creds->keyblock.length == in_compare_creds->keyblock.length && 335 (!in_creds->keyblock [all...] |
H A D | cc_file.c | 53 keyblock (keyblock) 142 (krb5_context, krb5_ccache id, krb5_keyblock *keyblock); 211 (krb5_context, krb5_ccache id, krb5_keyblock *keyblock); 254 * FCC version 3 contains keyblock encryption type information, and is 600 krb5_fcc_read_keyblock(krb5_context context, krb5_ccache id, krb5_keyblock *keyblock) argument 609 keyblock->magic = KV5M_KEYBLOCK; 610 keyblock->contents = 0; 613 keyblock->enctype = ui2; 618 /* keyblock 1026 krb5_fcc_store_keyblock(krb5_context context, krb5_ccache id, krb5_keyblock *keyblock) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/old/ |
H A D | des_stringtokey.c | 34 krb5_keyblock * keyblock,
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | luks.c | 58 } keyblock[8]; member in struct:grub_luks_phdr 322 for (i = 0; i < ARRAY_SIZE (header.keyblock); i++) 323 if (grub_be_to_cpu32 (header.keyblock[i].active) == LUKS_KEY_ENABLED 324 && grub_be_to_cpu32 (header.keyblock[i].stripes) > max_stripes) 325 max_stripes = grub_be_to_cpu32 (header.keyblock[i].stripes); 346 for (i = 0; i < ARRAY_SIZE (header.keyblock); i++) 353 if (grub_be_to_cpu32 (header.keyblock[i].active) != LUKS_KEY_ENABLED) 361 header.keyblock[i].passwordSalt, 362 sizeof (header.keyblock[i].passwordSalt), 363 grub_be_to_cpu32 (header.keyblock[ [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | inq_context.c | 204 keyvalue.value = key->keyblock.contents; 205 keyvalue.length = key->keyblock.length; 217 key->keyblock.enctype,
|
H A D | lucid_context.c | 222 if ((retval = copy_keyblock_to_lucid_key(&gctx->seq->keyblock, 230 if ((retval = copy_keyblock_to_lucid_key(&gctx->subkey->keyblock, 234 if ((retval = copy_keyblock_to_lucid_key(&gctx->acceptor_subkey->keyblock,
|
H A D | init_sec_context.c | 197 in_creds.keyblock.enctype = 0; 306 if (data->ctx->auth_context->keyblock != NULL 307 && data->ctx->auth_context->keyblock->enctype == 18) { 390 switch (k_cred->keyblock.enctype) { 499 krb5_keyblock *keyblock; local 621 &keyblock); 624 code = krb5_k_create_key(context, keyblock, &ctx->subkey); 625 krb5_free_keyblock(context, keyblock); 840 &ctx->subkey->keyblock); 854 ap_rep_data->subkey->enctype != ctx->subkey->keyblock [all...] |
H A D | util_cksum.c | 165 conf_len = kg_confounder_size(context, enc->keyblock.enctype); 235 code = krb5_c_crypto_length(context, key->keyblock.enctype, KRB5_CRYPTO_TYPE_CHECKSUM, &k5_checksumlen);
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 313 krb5_keyblock *keyblock) 322 arg.keyblock = keyblock; 325 if(princ == NULL || keyblock == NULL) 533 kvno, krb5_keyblock *keyblock, 311 kadm5_setv4key_principal(void *server_handle, krb5_principal princ, krb5_keyblock *keyblock) argument 530 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb_default.c | 207 new_entry.key = keylist->keyblock; 247 list.keyblock = *key; 595 &((*mkey_list_node)->keyblock), 607 * latest version of cur_mkey should be copied to mkey_list_head->keyblock 614 mkey_list_head->keyblock = cur_mkey; 624 * mkey_list_head->keyblock hasn't been set so just free mkey_list_head
|