/titanic_44/usr/src/lib/libcryptoutil/common/ |
H A D | mechkeytype.c | 36 pkcs11_mech2keytype(CK_MECHANISM_TYPE mech_type, CK_KEY_TYPE *ktype) in pkcs11_mech2keytype() argument 67 *ktype = CKK_RSA; in pkcs11_mech2keytype() 75 *ktype = CKK_DSA; in pkcs11_mech2keytype() 80 *ktype = CKK_DH; in pkcs11_mech2keytype() 89 *ktype = CKK_EC; in pkcs11_mech2keytype() 97 *ktype = CKK_X9_42_DH; in pkcs11_mech2keytype() 102 *ktype = CKK_KEA; in pkcs11_mech2keytype() 168 *ktype = CKK_GENERIC_SECRET; in pkcs11_mech2keytype() 179 *ktype = CKK_RC2; in pkcs11_mech2keytype() 186 *ktype = CKK_RC4; in pkcs11_mech2keytype() [all …]
|
H A D | cryptoutil.h | 200 CK_KEY_TYPE *ktype);
|
/titanic_44/usr/src/cmd/ssh/libssh/common/ |
H A D | ssh-dss.c | 129 char *ktype; in ssh_dss_verify() local 132 ktype = buffer_get_string(&b, NULL); in ssh_dss_verify() 133 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify() 134 error("ssh_dss_verify: cannot handle type %s", ktype); in ssh_dss_verify() 136 xfree(ktype); in ssh_dss_verify() 139 xfree(ktype); in ssh_dss_verify()
|
H A D | ssh-rsa.c | 117 char *ktype; in ssh_rsa_verify() local 133 ktype = buffer_get_string(&b, NULL); in ssh_rsa_verify() 134 if (strcmp("ssh-rsa", ktype) != 0) { in ssh_rsa_verify() 135 error("ssh_rsa_verify: cannot handle type %s", ktype); in ssh_rsa_verify() 137 xfree(ktype); in ssh_rsa_verify() 140 xfree(ktype); in ssh_rsa_verify()
|
H A D | key.c | 686 char *ktype; in key_from_blob() local 695 if ((ktype = buffer_get_string_ret(&b, NULL)) == NULL) { in key_from_blob() 700 type = key_type_from_name(ktype); in key_from_blob() 735 error("key_from_blob: cannot handle type %s", ktype); in key_from_blob() 742 if (ktype != NULL) in key_from_blob() 743 xfree(ktype); in key_from_blob()
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_in_tkt.c | 288 if (is_in_keytype(request->ktype, request->nktypes, in decrypt_as_reply() 570 request.ktype = 0; in krb5_get_in_tkt() 585 request.ktype = malloc (sizeof(get_in_tkt_enctypes)); in krb5_get_in_tkt() 586 if (request.ktype == NULL) { in krb5_get_in_tkt() 590 memcpy(request.ktype, get_in_tkt_enctypes, sizeof(get_in_tkt_enctypes)); in krb5_get_in_tkt() 591 for (request.nktypes = 0;request.ktype[request.nktypes];request.nktypes++); in krb5_get_in_tkt() 595 if (ktypes[req] == request.ktype[next]) { in krb5_get_in_tkt() 600 if (ktypes[req] == request.ktype[i]) { in krb5_get_in_tkt() 606 t = request.ktype[next]; in krb5_get_in_tkt() 607 request.ktype[next] = request.ktype[i]; in krb5_get_in_tkt() [all …]
|
H A D | send_tgs.c | 222 tgsreq.ktype = (krb5_enctype *)ktypes; in krb5_send_tgs2() 226 if ((retval = krb5_get_tgs_ktypes(context, sname, &(tgsreq.ktype)))) in krb5_send_tgs2() 228 for(tgsreq.nktypes = 0; tgsreq.ktype[tgsreq.nktypes]; tgsreq.nktypes++); in krb5_send_tgs2() 331 krb5_xfree(tgsreq.ktype); in krb5_send_tgs2()
|
H A D | preauth2.c | 343 grow_ktypes(krb5_enctype **out_ktypes, int *out_nktypes, krb5_enctype ktype) in grow_ktypes() argument 348 if ((*out_ktypes)[i] == ktype) in grow_ktypes() 351 ktypes = malloc((*out_nktypes + 2) * sizeof(ktype)); in grow_ktypes() 355 ktypes[i++] = ktype; in grow_ktypes() 489 grow_ktypes(&request->ktype, &request->nktypes, in krb5_preauth_prepare_request() 644 *etype, request->ktype[0]); in pa_enc_timestamp() 648 *etype ? *etype : request->ktype[0], in pa_enc_timestamp() 1568 if (etype_info[l]->etype == request->ktype[k]) { in krb5_do_preauth()
|
H A D | preauth.c | 176 enctype = request->ktype[0]; in krb5_obtain_padata()
|
/titanic_44/usr/src/lib/krb5/kdb/ |
H A D | kdb_default.c | 52 krb5_dbe_def_search_enctype(kcontext, dbentp, start, ktype, stype, kvno, kdatap) in krb5_dbe_def_search_enctype() argument 56 krb5_int32 ktype; 67 if (kvno == -1 && stype == -1 && ktype == -1) 102 if (ktype > 0) { 103 if ((ret = krb5_c_enctype_compare(kcontext, (krb5_enctype) ktype, 110 if (((ktype <= 0) || similar) &&
|
H A D | kdb5.h | 169 krb5_int32 ktype,
|
H A D | kdb5.c | 1473 krb5_int32 ktype, in krb5_dbe_find_enctype() argument 1478 return krb5_dbe_search_enctype(kcontext, dbentp, &start, ktype, stype, in krb5_dbe_find_enctype() 1486 krb5_int32 ktype, in krb5_dbe_search_enctype() argument 1509 ktype, in krb5_dbe_search_enctype()
|
/titanic_44/usr/src/cmd/loadkeys/ |
H A D | dumpkeys.c | 76 int ktype; local 84 if (ioctl(kbdfd, KIOCTYPE, &ktype) < 0) { 89 if (ktype == KB_ASCII || ktype < 0)
|
/titanic_44/usr/src/cmd/cmd-crypto/pktool/ |
H A D | common.c | 536 Str2KeyType(char *algm, KMF_OID *hashoid, KMF_KEY_ALG *ktype, in Str2KeyType() argument 542 *ktype = KMF_RSA; in Str2KeyType() 551 *ktype = KMF_DSA; in Str2KeyType() 566 *ktype = KMF_RSA; in Str2KeyType() 581 *ktype = KMF_ECDSA; in Str2KeyType() 589 Str2SymKeyType(char *algm, KMF_KEY_ALG *ktype) in Str2SymKeyType() argument 592 *ktype = KMF_AES; in Str2SymKeyType() 594 *ktype = KMF_AES; in Str2SymKeyType() 596 *ktype = KMF_RC4; in Str2SymKeyType() 598 *ktype = KMF_DES; in Str2SymKeyType() [all …]
|
/titanic_44/usr/src/lib/krb5/kadm5/ |
H A D | str_conv.c | 299 krb5_enctype ktype; local 352 if (!(kret = krb5_string_to_enctype(kp, &ktype)) && 355 !krb5_keysalt_is_present(*ksaltp, *nksaltp, ktype, stype))) { 374 (*ksaltp)[(*nksaltp)].ks_enctype = ktype;
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 316 krb5_int32 ktype, 325 krb5_int32 ktype, 446 krb5_int32 ktype,
|
/titanic_44/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 1432 int nktypes, krb5_enctype *ktype) in select_session_keytype() argument 1437 if (!krb5_c_valid_enctype(ktype[i])) in select_session_keytype() 1440 if (!krb5_is_permitted_enctype(context, ktype[i])) in select_session_keytype() 1443 if (dbentry_supports_enctype(context, server, ktype[i])) in select_session_keytype() 1444 return ktype[i]; in select_session_keytype() 1534 ktypes2str(char *s, size_t len, int nktypes, krb5_enctype *ktype) in ktypes2str() argument 1548 sprintf(stmp, "%s%ld", i ? " " : "", (long)ktype[i]); in ktypes2str()
|
H A D | do_as_req.c | 100 request->nktypes, request->ktype); in process_as_req() 187 request->ktype)) == 0) { in process_as_req() 369 useenctype = request->ktype[i]; in process_as_req()
|
H A D | kdc_util.h | 114 ktypes2str(char *s, size_t len, int nktypes, krb5_enctype *ktype);
|
H A D | do_tgs_req.c | 108 request->nktypes, request->ktype); in process_tgs_req() 257 if (request->ktype[i] == etype) { in process_tgs_req() 270 request->ktype)) == 0) { in process_tgs_req()
|
H A D | kdc_preauth.c | 614 if (krb5_dbe_find_enctype(context, entry, request->ktype[i], in get_entry_data() 1229 if (request->ktype[i] == enctype) in request_contains_enctype() 1491 if (enctype_requires_etype_info_2(request->ktype[i])) in get_etype_info() 1530 if (enctype_requires_etype_info_2(request->ktype[i])) { in etype_info_as_rep_helper() 1635 if (enctype_requires_etype_info_2(request->ktype[i])) in return_pw_salt()
|
/titanic_44/usr/src/cmd/lofiadm/ |
H A D | main.c | 846 CK_KEY_TYPE ktype; in getkeyfromuser() local 856 rv = pkcs11_mech2keytype(cipher->type, &ktype); in getkeyfromuser() 882 rv = pkcs11_PasswdToKey(sess, pass, passlen, salt, saltlen, ktype, in getkeyfromuser() 997 CK_KEY_TYPE ktype; /* from selected cipher or CKK_RSA */ in getkeyfromtoken() local 1052 ktype = raw_ktype; in getkeyfromtoken() 1055 ktype = CKK_RSA; in getkeyfromtoken() 1066 key_tmpl[i].pValue = &ktype; in getkeyfromtoken() 1067 key_tmpl[i].ulValueLen = sizeof (ktype); in getkeyfromtoken() 1123 ktype = raw_ktype; in getkeyfromtoken()
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_decode.c | 364 #define integer_convert(fname,ktype)\ argument 365 asn1_error_code fname(asn1buf * buf, ktype * val)\ 371 *val = (ktype)n;\ 374 #define unsigned_integer_convert(fname,ktype)\ argument 375 asn1_error_code fname(asn1buf * buf, ktype * val)\ 381 *val = (ktype)n;\ 655 get_lenfield(val->nktypes,val->ktype,8,asn1_decode_sequence_of_enctype); in asn1_decode_kdc_req_body()
|
/titanic_44/usr/src/cmd/ssh/ssh-keygen/ |
H A D | ssh-keygen.c | 213 int magic, rlen, ktype, i1, i2, i3, i4; in do_convert_private_ssh2_from_blob() local 243 ktype = KEY_DSA; in do_convert_private_ssh2_from_blob() 245 ktype = KEY_RSA; in do_convert_private_ssh2_from_blob() 251 key = key_new_private(ktype); in do_convert_private_ssh2_from_blob()
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 380 if (val->ktype) { in krb5_free_kdc_req() 381 krb5_xfree(val->ktype); in krb5_free_kdc_req() 382 val->ktype = 0; in krb5_free_kdc_req()
|