/titanic_41/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_find.c | 223 uint32_t client_key; in smb_com_search() local 271 &client_key); in smb_com_search() 273 client_key = 0; in smb_com_search() 278 client_key, sattr, name); in smb_com_search() 292 client_key = 0; in smb_com_search() 304 &resume_char, &index, &odid, &client_key) != 0) { in smb_com_search() 346 resume_char, name83, index, odid, client_key, in smb_com_search() 407 uint32_t client_key; in smb_com_find() local 442 client_key = 0; in smb_com_find() 450 &resume_char, &index, &odid, &client_key) != 0) { in smb_com_find() [all …]
|
/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 129 krb5_key_data *client_key, 139 krb5_key_data *client_key, 151 krb5_key_data *client_key, 163 krb5_key_data *client_key, 193 krb5_key_data *client_key, 1103 krb5_key_data *client_key, krb5_keyblock *encrypting_key, in return_padata() argument 1175 client_key, encrypting_key, send_pa, in return_padata() 1252 krb5_key_data * client_key; in verify_enc_timestamp() local 1275 -1, 0, &client_key))) in verify_enc_timestamp() 1279 client_key, &key, NULL))) in verify_enc_timestamp() [all …]
|
H A D | do_as_req.c | 75 krb5_key_data *server_key, *client_key; in process_as_req() local 367 client_key = (krb5_key_data *) NULL; in process_as_req() 374 0, &client_key)) in process_as_req() 377 if (!(client_key)) { in process_as_req() 386 client_key, &encrypting_key, in process_as_req() 425 &reply, client_key, &encrypting_key, &pa_context); in process_as_req() 439 reply.enc_part.kvno = client_key->key_data_kvno; in process_as_req()
|
H A D | kdc_util.c | 1454 krb5_key_data *client_key, krb5_data *salt) in get_salt_from_key() argument 1462 if (client_key->key_data_ver == 1) in get_salt_from_key() 1465 switch (client_key->key_data_type[1]) { in get_salt_from_key() 1489 salt->length = client_key->key_data_length[1]; in get_salt_from_key() 1492 memcpy(salt->data, client_key->key_data_contents[1], salt->length); in get_salt_from_key()
|
H A D | kdc_util.h | 170 krb5_key_data *client_key, krb5_keyblock *encrypting_key,
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encode_kdc.c | 49 int using_subkey, const krb5_keyblock *client_key, in krb5_encode_kdc_rep() argument 98 retval = krb5_encrypt_helper(context, client_key, usage, scratch, in krb5_encode_kdc_rep()
|
/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 705 unsigned char *client_key = NULL, *kdc_hostname = NULL; local 805 &client_key, &client_key_len)) != 0) { 810 retval = pkinit_octetstring2key(context, etype, client_key, 911 if (client_key != NULL) 912 free(client_key);
|
H A D | pkinit_srv.c | 67 struct _krb5_key_data * client_key, 673 struct _krb5_key_data * client_key, in pkinit_server_return_padata() argument
|
H A D | pkinit_crypto_openssl.c | 2280 unsigned char **client_key, in client_process_dh() argument 2302 if ((*client_key = (unsigned char *) in client_process_dh() 2313 DH_compute_key(*client_key, server_pub_key, cryptoctx->dh); in client_process_dh() 2317 print_buffer(*client_key, *client_key_len); in client_process_dh() 2331 if (*client_key != NULL) in client_process_dh() 2332 free(*client_key); in client_process_dh() 2333 *client_key = NULL; in client_process_dh()
|