/titanic_44/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | string_to_key.c | 37 krb5_enctype enctype, 45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, in krb5_c_string_to_key() argument 49 return krb5_c_string_to_key_with_params(context, enctype, string, salt, in krb5_c_string_to_key() 54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, in krb5_c_string_to_key_with_params() argument 65 if (krb5_enctypes_list[i].etype == enctype) in krb5_c_string_to_key_with_params() 77 switch (enctype) { in krb5_c_string_to_key_with_params() 94 key->enctype = enctype; in krb5_c_string_to_key_with_params()
|
H A D | pbkdf2.c | 52 krb5_enctype enctype, in krb5int_pbkdf2_hmac_sha1() argument 75 rv = get_key_type(enctype, &keytype); in krb5int_pbkdf2_hmac_sha1() 88 enctype != ENCTYPE_DES_CBC_CRC && in krb5int_pbkdf2_hmac_sha1() 89 enctype != ENCTYPE_DES_CBC_MD5 && in krb5int_pbkdf2_hmac_sha1() 90 enctype != ENCTYPE_DES_CBC_RAW && in krb5int_pbkdf2_hmac_sha1() 91 enctype != ENCTYPE_DES_HMAC_SHA1 && in krb5int_pbkdf2_hmac_sha1() 92 enctype != ENCTYPE_DES3_CBC_SHA1 && in krb5int_pbkdf2_hmac_sha1() 93 enctype != ENCTYPE_DES3_CBC_RAW) { in krb5int_pbkdf2_hmac_sha1()
|
H A D | old_api_glue.c | 51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) in krb5_encrypt() 64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size, in krb5_encrypt() 86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) in krb5_decrypt() 94 inputd.enctype = eblock->key->enctype; in krb5_decrypt() 178 krb5_enctype enctype) in krb5_use_enctype() argument 180 eblock->crypto_entry = enctype; in krb5_use_enctype() 293 if ((ret = krb5_c_encrypt_length(context, key->enctype, data->length, in krb5_encrypt_data() 298 if ((ret = krb5_c_block_size(context, key->enctype, &blocksize))) in krb5_encrypt_data() 307 enc_data->enctype = key->enctype; in krb5_encrypt_data() 327 if ((ret = krb5_c_block_size(context, key->enctype, &blocksize))) in krb5_decrypt_data()
|
H A D | make_random_key.c | 37 krb5_c_make_random_key(krb5_context context, krb5_enctype enctype, in krb5_c_make_random_key() argument 48 if (krb5_enctypes_list[i].etype == enctype) in krb5_c_make_random_key() 57 enctype); in krb5_c_make_random_key() 80 random_key->enctype = enctype; in krb5_c_make_random_key()
|
H A D | enctype_to_string.c | 36 krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen) in krb5_enctype_to_string() argument 41 if (krb5_enctypes_list[i].etype == enctype) { in krb5_enctype_to_string() 55 krb5_enctype_to_istring(krb5_enctype enctype, char *buffer, size_t buflen) in krb5_enctype_to_istring() argument 60 if (krb5_enctypes_list[i].etype == enctype) { in krb5_enctype_to_istring()
|
H A D | valid_enctype.c | 61 is_in_keytype(keytype, numkeytypes, enctype) in is_in_keytype() argument 64 krb5_enctype enctype; 68 KRB5_LOG(KRB5_INFO, "is_in_keytype() enctype = %d", enctype); 80 if (keytype[i] == enctype) {
|
H A D | keyed_checksum_types.c | 50 krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, in krb5_c_keyed_checksum_types() argument 58 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) || in krb5_c_keyed_checksum_types() 73 etype_match(krb5_cksumtypes_list[i].keyed_etype, enctype)) || in krb5_c_keyed_checksum_types()
|
/titanic_44/usr/src/lib/krb5/kdb/ |
H A D | keytab.c | 118 krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry) in krb5_ktkdb_get_entry() argument 123 krb5_enctype enctype; 176 xrealm_tgt?enctype:-1, 187 if (enctype > 0) { 188 kerror = krb5_c_enctype_compare(context, enctype, 189 entry->key.enctype, &similar); 202 entry->key.enctype = enctype;
|
H A D | kdb_default.c | 152 krb5_ui_2 enctype; local 187 enctype = key->enctype; 188 if ((fwrite((krb5_pointer) &enctype, 215 krb5_ui_2 enctype; in krb5_db_def_fetch_mkey() local 236 if (fread((krb5_pointer) &enctype, 2, 1, kf) != 1) { in krb5_db_def_fetch_mkey() 241 if (key->enctype == ENCTYPE_UNKNOWN) in krb5_db_def_fetch_mkey() 242 key->enctype = enctype; in krb5_db_def_fetch_mkey() 243 else if (enctype != key->enctype) { in krb5_db_def_fetch_mkey()
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | fwd_tgt.c | 60 krb5_enctype enctype = 0; in krb5_fwd_tgt_creds() local 76 enctype = session_key->enctype; in krb5_fwd_tgt_creds() 96 enctype = out->keyblock.enctype; in krb5_fwd_tgt_creds() 177 creds.keyblock.enctype = enctype; in krb5_fwd_tgt_creds() 187 if (enctype) { in krb5_fwd_tgt_creds() 188 creds.keyblock.enctype = 0; in krb5_fwd_tgt_creds()
|
H A D | get_set_keyblock.c | 35 return (kb->enctype); in krb5_get_key_enctype() 51 krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype) in krb5_set_key_enctype() argument 53 kb->enctype = enctype; in krb5_set_key_enctype()
|
H A D | rd_req_dec.c | 76 krb5_enctype enctype; in krb5_rd_req_decrypt_tkt_part() local 79 enctype = req->ticket->enc_part.enctype; in krb5_rd_req_decrypt_tkt_part() 85 enctype, &ktent))) in krb5_rd_req_decrypt_tkt_part() 95 ktent.key.enctype = enctype; in krb5_rd_req_decrypt_tkt_part() 111 enctype); in krb5_rd_req_decrypt_tkt_part() 361 etype = req->ticket->enc_part.enctype)) || in krb5_rd_req_decoded_opt() 363 etype = req->ticket->enc_part2->session->enctype)) || in krb5_rd_req_decoded_opt() 366 etype = (*auth_context)->authentp->subkey->enctype))) { in krb5_rd_req_decoded_opt() 382 req->ticket->enc_part.enctype) in krb5_rd_req_decoded_opt() 387 if (krb5_enctype_to_string(req->ticket->enc_part.enctype, in krb5_rd_req_decoded_opt() [all …]
|
H A D | init_allocated_keyblock.c | 34 krb5_enctype enctype, in krb5_init_allocated_keyblock() argument 43 kb->enctype = enctype; in krb5_init_allocated_keyblock()
|
H A D | init_keyblock.c | 38 (krb5_context context, krb5_enctype enctype, in krb5_init_keyblock() argument 49 kb->enctype = enctype; in krb5_init_keyblock()
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 77 if (key->enctype == ENCTYPE_ARCFOUR_HMAC) 79 code = krb5_c_block_size(context, key->enctype, &blocksize); 96 code = krb5_c_block_size(context, key->enctype, &blocksize); 114 if (krb5_c_encrypt_length(context, key->enctype, n, &enclen) != 0) 138 code = krb5_c_block_size(context, key->enctype, &blocksize); 185 code = krb5_c_block_size(context, key->enctype, &blocksize); 199 inputd.enctype = ENCTYPE_UNKNOWN; 233 usage_key.enctype = longterm_key->enctype; in kg_arcfour_docrypt() 246 seq_enc_key.enctype = longterm_key->enctype; in kg_arcfour_docrypt()
|
/titanic_44/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kadm5_create.c | 303 krb5_enctype *tmpenc, *enctype = NULL; in add_admin_princ() local 308 ret = krb5_get_permitted_enctypes(context, &enctype); in add_admin_princ() 309 if (ret || *enctype == NULL) { in add_admin_princ() 318 for (tmpenc = enctype, num_ks = 0; *tmpenc; tmpenc++) in add_admin_princ() 325 krb5_free_ktypes(context, enctype); in add_admin_princ() 336 krb5_free_ktypes(context, enctype); in add_admin_princ() 344 keysalt[i].ks_enctype = enctype[i]; in add_admin_princ() 351 krb5_free_ktypes (context, enctype); in add_admin_princ()
|
H A D | kdb5_stash.c | 147 if (!krb5_c_valid_enctype(global_params.enctype)) { 149 if (krb5_enctype_to_string(global_params.enctype, 154 global_params.enctype); 184 global_params.enctype,
|
H A D | kdb5_util.c | 297 if (krb5_string_to_enctype(koptarg, &global_params.enctype)) { 358 if ((global_params.enctype != ENCTYPE_UNKNOWN) && 359 (!krb5_c_valid_enctype(global_params.enctype))) { 362 gettext("while setting up enctype %d"), global_params.enctype); 506 if (global_params.enctype == ENCTYPE_UNKNOWN) { in open_db_and_mkey() 507 global_params.enctype = DEFAULT_KDC_ENCTYPE; in open_db_and_mkey() 508 if (!krb5_c_valid_enctype(global_params.enctype)) in open_db_and_mkey() 511 global_params.enctype); in open_db_and_mkey() 514 retval = krb5_c_string_to_key(util_context, global_params.enctype, in open_db_and_mkey() 526 global_params.enctype, in open_db_and_mkey()
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | combine_keys.c | 90 if (!(enctype_ok(key1->enctype)&&enctype_ok(key2->enctype))) in krb5int_c_combine_keys() 94 if (key1->length != key2->length || key1->enctype != key2->enctype) in krb5int_c_combine_keys() 102 if (krb5_enctypes_list[i].etype == key1->enctype) in krb5int_c_combine_keys() 254 outkey->enctype = key1->enctype; in krb5int_c_combine_keys()
|
H A D | encrypt.c | 132 if ((rv = get_key_type(key->enctype, &keyType)) != CKR_OK) { in init_key_uef() 182 KRB5_LOG(KRB5_INFO, "krb5_c_encrypt start etype = %d", key->enctype); in krb5_c_encrypt() 184 if (krb5_enctypes_list[i].etype == key->enctype) in krb5_c_encrypt() 193 output->enctype = key->enctype; in krb5_c_encrypt()
|
H A D | decrypt.c | 45 if (krb5_enctypes_list[i].etype == key->enctype) in krb5_c_decrypt() 52 if ((input->enctype != ENCTYPE_UNKNOWN) && in krb5_c_decrypt() 53 (krb5_enctypes_list[i].etype != input->enctype)) in krb5_c_decrypt()
|
/titanic_44/usr/src/cmd/krb5/kadmin/cli/ |
H A D | keytab.c | 60 static char *etype_string(krb5_enctype enctype); 61 static char *etype_istring(krb5_enctype enctype); 400 etype_string(keys[i].enctype), keytab_str); in add_principal() 567 static char *etype_string(enctype) in etype_string() argument 568 krb5_enctype enctype; in etype_string() 573 if ((ret = krb5_enctype_to_string(enctype, buf, sizeof(buf)))) 574 sprintf(buf, "etype %d", enctype); 580 static char *etype_istring(krb5_enctype enctype) { in etype_istring() argument 584 if ((ret = krb5_enctype_to_istring(enctype, buf, sizeof(buf)))) in etype_istring() 585 sprintf(buf, "unknown", enctype); in etype_istring()
|
/titanic_44/usr/src/cmd/krb5/kadmin/ktutil/ |
H A D | ktutil.c | 204 char *enctype = NULL; local 218 enctype = argv[++i]; 231 if (argc != 8 || !(princ && kvno && enctype) || (use_pass+use_key != 1)) { 237 retval = ktutil_add(kcontext, &ktlist, princ, kvno, enctype, use_pass); 320 lp->entry->key.enctype, buf, 256))) { 323 lp->entry->key.enctype);
|
H A D | ktutil_funcs.c | 112 krb5_enctype enctype; local 132 retval = krb5_string_to_enctype(enctype_str, &enctype); 182 retval = krb5_c_string_to_key(context, enctype, &password, 207 lp->entry->key.enctype = enctype; 424 entry->key.enctype = ENCTYPE_DES_CBC_CRC; 487 if ((lp->entry->key.enctype != ENCTYPE_DES_CBC_CRC) && 488 (lp->entry->key.enctype != ENCTYPE_DES_CBC_MD5) && 489 (lp->entry->key.enctype != ENCTYPE_DES_CBC_MD4) && 490 (lp->entry->key.enctype != ENCTYPE_DES_CBC_RAW))
|
/titanic_44/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksetpw.c | 41 krb5_enctype enctype, krb5_kvno kvno, const char *pw); 330 const krb5_principal sprinc, krb5_enctype enctype, krb5_kvno kvno, in kt_add_entry() argument 339 if ((code = krb5_enctype_to_string(enctype, buf, sizeof (buf)))) { in kt_add_entry() 341 enctype); in kt_add_entry() 356 gettext("Could not compute salt for %s"), enctype); in kt_add_entry() 360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key); in kt_add_entry() 364 enctype); in kt_add_entry()
|