/titanic_44/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_template.c | 43 static int __encrypt(const char *remotename, des_block deskeys[], int no_keys); 44 static int __decrypt(const char *remotename, 142 static int __encrypt(const char *remotename, des_block deskeys[], int no_keys) in __encrypt() argument 158 if (!dh_getpublickey(remotename, KEYLEN, 0, pk, sizeof (pk))) in __encrypt() 161 if (key_encryptsession_pk_g(remotename, pk, in __encrypt() 172 static int __decrypt(const char *remotename, in __decrypt() argument 185 use_cache ? "using" : "not using", remotename); in __decrypt() 194 __getpublickey_flush_g(remotename, KEYLEN, ALGTYPE); in __decrypt() 197 if (!__getpublickey_cached_g(remotename, KEYLEN, in __decrypt() 206 if (key_decryptsession_pk_g(remotename, pk, in __decrypt()
|
/titanic_44/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, in __getpublickey_cached_g() 46 return (getpublickey(remotename, pkey)); in __getpublickey_cached_g() 52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, in getpublickey_g() 55 return (getpublickey(remotename, pkey)); in getpublickey_g() 61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_encryptsession_pk_g() argument 71 if (key_encryptsession_pk(remotename, &npk, &deskeys[i])) in key_encryptsession_pk_g() 80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_decryptsession_pk_g() argument 90 if (key_decryptsession_pk(remotename, &npk, &deskeys[i])) in key_decryptsession_pk_g()
|
/titanic_44/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 289 key_encryptsession_pk(const char *remotename, netobj *remotekey, in key_encryptsession_pk() argument 295 arg.remotename = (char *)remotename; in key_encryptsession_pk() 311 const char *remotename, in key_encryptsession_pk_g() argument 329 if (key_encryptsession_pk(remotename, &npk, &deskey[i])) in key_encryptsession_pk_g() 334 arg.remotename = (char *)remotename; in key_encryptsession_pk_g() 359 key_decryptsession_pk(const char *remotename, netobj *remotekey, in key_decryptsession_pk() argument 365 arg.remotename = (char *)remotename; in key_decryptsession_pk() 381 const char *remotename, in key_decryptsession_pk_g() argument 399 if (key_decryptsession_pk(remotename, in key_decryptsession_pk_g() 405 arg.remotename = (char *)remotename; in key_decryptsession_pk_g() [all …]
|
H A D | key_prot.c | 100 if (!xdr_netnamestr(xdrs, &objp->remotename)) in xdr_cryptkeyarg() 108 if (!xdr_netnamestr(xdrs, &objp->remotename)) in xdr_cryptkeyarg2() 118 if (!xdr_netnamestr(xdrs, &objp->remotename)) in xdr_cryptkeyarg3()
|
/titanic_44/usr/src/uts/common/rpc/sec/ |
H A D | key_call.c | 96 key_encryptsession(char *remotename, des_block *deskey, cred_t *cr) in key_encryptsession() argument 102 RPCLOG(8, "key_encryptsession(%s, ", remotename); in key_encryptsession() 106 arg.remotename = remotename; in key_encryptsession() 111 RPCLOG(1, "%s): ", remotename); in key_encryptsession() 119 RPCLOG(1, "%s): ", remotename); in key_encryptsession() 128 key_decryptsession(char *remotename, des_block *deskey) in key_decryptsession() argument 134 RPCLOG(8, "key_decryptsession(%s, ", remotename); in key_decryptsession() 138 arg.remotename = remotename; in key_decryptsession() 142 RPCLOG(1, "key_decryptsession(%s): ", remotename); in key_decryptsession() 149 RPCLOG(1, "key_decryptsession(%s): ", remotename); in key_decryptsession()
|
H A D | key_prot.c | 71 if (!xdr_netnamestr(xdrs, &objp->remotename)) in xdr_cryptkeyarg() 81 if (!xdr_netnamestr(xdrs, &objp->remotename)) in xdr_cryptkeyarg2()
|
/titanic_44/usr/src/uts/common/rpc/ |
H A D | key_prot.x | 116 netnamestr remotename; member 124 netnamestr remotename; member 133 netnamestr remotename; member
|
/titanic_44/usr/src/cmd/keyserv/ |
H A D | keyserv.c | 649 arg->remotename, arg->deskey.key.high, 653 res->status = pk_encrypt(uid, arg->remotename, &(arg->remotekey), 677 arg->remotename, arg->deskey.key.high, 681 res->status = pk_decrypt(uid, arg->remotename, &(arg->remotekey), 787 arg->remotename, arg->deskey.key.high, 791 res->status = pk_encrypt(uid, arg->remotename, NULL, 814 arg->remotename, arg->deskey.key.high, 818 res->status = pk_decrypt(uid, arg->remotename, NULL, 918 arg->deskey.deskeyarray_len, arg->remotename)); in __key_encrypt_3_svc() 938 arg->deskey.deskeyarray_len, arg->remotename)); in __key_decrypt_3_svc() [all …]
|
H A D | setkey.c | 1588 if (!getpublickey_g(arg->remotename, in pk_crypt3()
|
/titanic_44/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | dh_gssapi.h | 74 int (*key_encryptsessions)(const char *remotename, 88 int (*key_decryptsessions)(const char *remotename,
|
/titanic_44/usr/src/lib/libbc/inc/include/rpc/ |
H A D | key_prot.h | 74 netnamestr remotename; member
|
/titanic_44/usr/src/cmd/cmd-inet/etc/ppp/ |
H A D | myisp.tmpl | 46 remotename myisp # name of the ISP; for pap-secrets
|
H A D | chap-secrets | 36 # a peer name, and the "remotename <name>" option should then be used.
|
H A D | pap-secrets | 35 # authenticator name, so the "remotename <name>" option should be used.
|
/titanic_44/usr/src/lib/libnsl/common/ |
H A D | llib-lnsl | 580 int key_encryptsession_pk(const char *remotename, netobj *remotekey, 582 int key_decryptsession_pk(const char *remotename, netobj *remotekey, 585 int key_encryptsession(const char *remotename, des_block *deskey); 586 int key_decryptsession(const char *remotename, des_block *deskey);
|
/titanic_44/usr/src/cmd/sendmail/src/ |
H A D | headers.c | 2157 name = remotename(name, mci->mci_mailer, flags, &status, e);
|
H A D | sendmail.h | 348 extern char *remotename __P((char *, MAILER *, int, int *, ENVELOPE *));
|
H A D | parseaddr.c | 2632 remotename(name, m, flags, pstat, e) in remotename() function
|
H A D | main.c | 4397 p = remotename(q, m, tryflags, &rcode, CurEnv);
|
H A D | deliver.c | 1393 rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
|