Home
last modified time | relevance | path

Searched refs:ktype (Results 1 – 25 of 32) sorted by relevance

12

/titanic_44/usr/src/lib/libcryptoutil/common/
H A Dmechkeytype.c36 pkcs11_mech2keytype(CK_MECHANISM_TYPE mech_type, CK_KEY_TYPE *ktype) in pkcs11_mech2keytype() argument
67 *ktype = CKK_RSA; in pkcs11_mech2keytype()
75 *ktype = CKK_DSA; in pkcs11_mech2keytype()
80 *ktype = CKK_DH; in pkcs11_mech2keytype()
89 *ktype = CKK_EC; in pkcs11_mech2keytype()
97 *ktype = CKK_X9_42_DH; in pkcs11_mech2keytype()
102 *ktype = CKK_KEA; in pkcs11_mech2keytype()
168 *ktype = CKK_GENERIC_SECRET; in pkcs11_mech2keytype()
179 *ktype = CKK_RC2; in pkcs11_mech2keytype()
186 *ktype = CKK_RC4; in pkcs11_mech2keytype()
[all …]
H A Dcryptoutil.h200 CK_KEY_TYPE *ktype);
/titanic_44/usr/src/cmd/ssh/libssh/common/
H A Dssh-dss.c129 char *ktype; in ssh_dss_verify() local
132 ktype = buffer_get_string(&b, NULL); in ssh_dss_verify()
133 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify()
134 error("ssh_dss_verify: cannot handle type %s", ktype); in ssh_dss_verify()
136 xfree(ktype); in ssh_dss_verify()
139 xfree(ktype); in ssh_dss_verify()
H A Dssh-rsa.c117 char *ktype; in ssh_rsa_verify() local
133 ktype = buffer_get_string(&b, NULL); in ssh_rsa_verify()
134 if (strcmp("ssh-rsa", ktype) != 0) { in ssh_rsa_verify()
135 error("ssh_rsa_verify: cannot handle type %s", ktype); in ssh_rsa_verify()
137 xfree(ktype); in ssh_rsa_verify()
140 xfree(ktype); in ssh_rsa_verify()
H A Dkey.c686 char *ktype; in key_from_blob() local
695 if ((ktype = buffer_get_string_ret(&b, NULL)) == NULL) { in key_from_blob()
700 type = key_type_from_name(ktype); in key_from_blob()
735 error("key_from_blob: cannot handle type %s", ktype); in key_from_blob()
742 if (ktype != NULL) in key_from_blob()
743 xfree(ktype); in key_from_blob()
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dget_in_tkt.c288 if (is_in_keytype(request->ktype, request->nktypes, in decrypt_as_reply()
570 request.ktype = 0; in krb5_get_in_tkt()
585 request.ktype = malloc (sizeof(get_in_tkt_enctypes)); in krb5_get_in_tkt()
586 if (request.ktype == NULL) { in krb5_get_in_tkt()
590 memcpy(request.ktype, get_in_tkt_enctypes, sizeof(get_in_tkt_enctypes)); in krb5_get_in_tkt()
591 for (request.nktypes = 0;request.ktype[request.nktypes];request.nktypes++); in krb5_get_in_tkt()
595 if (ktypes[req] == request.ktype[next]) { in krb5_get_in_tkt()
600 if (ktypes[req] == request.ktype[i]) { in krb5_get_in_tkt()
606 t = request.ktype[next]; in krb5_get_in_tkt()
607 request.ktype[next] = request.ktype[i]; in krb5_get_in_tkt()
[all …]
H A Dsend_tgs.c222 tgsreq.ktype = (krb5_enctype *)ktypes; in krb5_send_tgs2()
226 if ((retval = krb5_get_tgs_ktypes(context, sname, &(tgsreq.ktype)))) in krb5_send_tgs2()
228 for(tgsreq.nktypes = 0; tgsreq.ktype[tgsreq.nktypes]; tgsreq.nktypes++); in krb5_send_tgs2()
331 krb5_xfree(tgsreq.ktype); in krb5_send_tgs2()
H A Dpreauth2.c343 grow_ktypes(krb5_enctype **out_ktypes, int *out_nktypes, krb5_enctype ktype) in grow_ktypes() argument
348 if ((*out_ktypes)[i] == ktype) in grow_ktypes()
351 ktypes = malloc((*out_nktypes + 2) * sizeof(ktype)); in grow_ktypes()
355 ktypes[i++] = ktype; in grow_ktypes()
489 grow_ktypes(&request->ktype, &request->nktypes, in krb5_preauth_prepare_request()
644 *etype, request->ktype[0]); in pa_enc_timestamp()
648 *etype ? *etype : request->ktype[0], in pa_enc_timestamp()
1568 if (etype_info[l]->etype == request->ktype[k]) { in krb5_do_preauth()
H A Dpreauth.c176 enctype = request->ktype[0]; in krb5_obtain_padata()
/titanic_44/usr/src/lib/krb5/kdb/
H A Dkdb_default.c52 krb5_dbe_def_search_enctype(kcontext, dbentp, start, ktype, stype, kvno, kdatap) in krb5_dbe_def_search_enctype() argument
56 krb5_int32 ktype;
67 if (kvno == -1 && stype == -1 && ktype == -1)
102 if (ktype > 0) {
103 if ((ret = krb5_c_enctype_compare(kcontext, (krb5_enctype) ktype,
110 if (((ktype <= 0) || similar) &&
H A Dkdb5.h169 krb5_int32 ktype,
H A Dkdb5.c1473 krb5_int32 ktype, in krb5_dbe_find_enctype() argument
1478 return krb5_dbe_search_enctype(kcontext, dbentp, &start, ktype, stype, in krb5_dbe_find_enctype()
1486 krb5_int32 ktype, in krb5_dbe_search_enctype() argument
1509 ktype, in krb5_dbe_search_enctype()
/titanic_44/usr/src/cmd/loadkeys/
H A Ddumpkeys.c76 int ktype; local
84 if (ioctl(kbdfd, KIOCTYPE, &ktype) < 0) {
89 if (ktype == KB_ASCII || ktype < 0)
/titanic_44/usr/src/cmd/cmd-crypto/pktool/
H A Dcommon.c536 Str2KeyType(char *algm, KMF_OID *hashoid, KMF_KEY_ALG *ktype, in Str2KeyType() argument
542 *ktype = KMF_RSA; in Str2KeyType()
551 *ktype = KMF_DSA; in Str2KeyType()
566 *ktype = KMF_RSA; in Str2KeyType()
581 *ktype = KMF_ECDSA; in Str2KeyType()
589 Str2SymKeyType(char *algm, KMF_KEY_ALG *ktype) in Str2SymKeyType() argument
592 *ktype = KMF_AES; in Str2SymKeyType()
594 *ktype = KMF_AES; in Str2SymKeyType()
596 *ktype = KMF_RC4; in Str2SymKeyType()
598 *ktype = KMF_DES; in Str2SymKeyType()
[all …]
/titanic_44/usr/src/lib/krb5/kadm5/
H A Dstr_conv.c299 krb5_enctype ktype; local
352 if (!(kret = krb5_string_to_enctype(kp, &ktype)) &&
355 !krb5_keysalt_is_present(*ksaltp, *nksaltp, ktype, stype))) {
374 (*ksaltp)[(*nksaltp)].ks_enctype = ktype;
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h316 krb5_int32 ktype,
325 krb5_int32 ktype,
446 krb5_int32 ktype,
/titanic_44/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_util.c1432 int nktypes, krb5_enctype *ktype) in select_session_keytype() argument
1437 if (!krb5_c_valid_enctype(ktype[i])) in select_session_keytype()
1440 if (!krb5_is_permitted_enctype(context, ktype[i])) in select_session_keytype()
1443 if (dbentry_supports_enctype(context, server, ktype[i])) in select_session_keytype()
1444 return ktype[i]; in select_session_keytype()
1534 ktypes2str(char *s, size_t len, int nktypes, krb5_enctype *ktype) in ktypes2str() argument
1548 sprintf(stmp, "%s%ld", i ? " " : "", (long)ktype[i]); in ktypes2str()
H A Ddo_as_req.c100 request->nktypes, request->ktype); in process_as_req()
187 request->ktype)) == 0) { in process_as_req()
369 useenctype = request->ktype[i]; in process_as_req()
H A Dkdc_util.h114 ktypes2str(char *s, size_t len, int nktypes, krb5_enctype *ktype);
H A Ddo_tgs_req.c108 request->nktypes, request->ktype); in process_tgs_req()
257 if (request->ktype[i] == etype) { in process_tgs_req()
270 request->ktype)) == 0) { in process_tgs_req()
H A Dkdc_preauth.c614 if (krb5_dbe_find_enctype(context, entry, request->ktype[i], in get_entry_data()
1229 if (request->ktype[i] == enctype) in request_contains_enctype()
1491 if (enctype_requires_etype_info_2(request->ktype[i])) in get_etype_info()
1530 if (enctype_requires_etype_info_2(request->ktype[i])) { in etype_info_as_rep_helper()
1635 if (enctype_requires_etype_info_2(request->ktype[i])) in return_pw_salt()
/titanic_44/usr/src/cmd/lofiadm/
H A Dmain.c846 CK_KEY_TYPE ktype; in getkeyfromuser() local
856 rv = pkcs11_mech2keytype(cipher->type, &ktype); in getkeyfromuser()
882 rv = pkcs11_PasswdToKey(sess, pass, passlen, salt, saltlen, ktype, in getkeyfromuser()
997 CK_KEY_TYPE ktype; /* from selected cipher or CKK_RSA */ in getkeyfromtoken() local
1052 ktype = raw_ktype; in getkeyfromtoken()
1055 ktype = CKK_RSA; in getkeyfromtoken()
1066 key_tmpl[i].pValue = &ktype; in getkeyfromtoken()
1067 key_tmpl[i].ulValueLen = sizeof (ktype); in getkeyfromtoken()
1123 ktype = raw_ktype; in getkeyfromtoken()
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_k_decode.c364 #define integer_convert(fname,ktype)\ argument
365 asn1_error_code fname(asn1buf * buf, ktype * val)\
371 *val = (ktype)n;\
374 #define unsigned_integer_convert(fname,ktype)\ argument
375 asn1_error_code fname(asn1buf * buf, ktype * val)\
381 *val = (ktype)n;\
655 get_lenfield(val->nktypes,val->ktype,8,asn1_decode_sequence_of_enctype); in asn1_decode_kdc_req_body()
/titanic_44/usr/src/cmd/ssh/ssh-keygen/
H A Dssh-keygen.c213 int magic, rlen, ktype, i1, i2, i3, i4; in do_convert_private_ssh2_from_blob() local
243 ktype = KEY_DSA; in do_convert_private_ssh2_from_blob()
245 ktype = KEY_RSA; in do_convert_private_ssh2_from_blob()
251 key = key_new_private(ktype); in do_convert_private_ssh2_from_blob()
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c380 if (val->ktype) { in krb5_free_kdc_req()
381 krb5_xfree(val->ktype); in krb5_free_kdc_req()
382 val->ktype = 0; in krb5_free_kdc_req()

12