/illumos-gate/usr/src/cmd/cmd-inet/common/ |
H A D | kcmd.c | 310 ret_cred->keyblock.enctype, in kcmd() 494 final_enctype = skey->enctype; in init_encrypt() 507 switch (skey->enctype) { in init_encrypt() 643 inputd.enctype = ENCTYPE_UNKNOWN; in desread()
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_srv.c | 697 krb5_enctype enctype = -1; in pkinit_server_return_padata() local 737 enctype = request->ktype[i]; in pkinit_server_return_padata() 738 if (!krb5_c_valid_enctype(enctype)) in pkinit_server_return_padata() 741 pkiDebug("KDC picked etype = %d\n", enctype); in pkinit_server_return_padata() 809 retval = pkinit_octetstring2key(context, enctype, server_key, in pkinit_server_return_padata() 864 retval = krb5_c_make_random_key(context, enctype, encrypting_key); in pkinit_server_return_padata() 893 encrypting_key->enctype, &num_types, &cksum_types); in pkinit_server_return_padata()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 302 creds.keyblock.enctype = ktypes[i]; in kerberos5_send() 355 if (!(ACCEPTED_ENCTYPE(newkey->enctype))) { in kerberos5_send() 356 if (!(ACCEPTED_ENCTYPE(new_creds->keyblock.enctype))) in kerberos5_send()
|
H A D | enc_des.c | 125 dout.enctype = ENCTYPE_UNKNOWN; in ecb_encrypt() 479 stp->str_key.enctype = ENCTYPE_DES_CBC_RAW; in cfb64_stream_key()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | encode_kdc.c | 57 if (!krb5_c_valid_enctype(dec_rep->enc_part.enctype)) in krb5_encode_kdc_rep()
|
H A D | get_creds.c | 98 if (mcreds->keyblock.enctype) { in krb5_get_credentials_core() 105 if (ktypes[i] == mcreds->keyblock.enctype) in krb5_get_credentials_core()
|
H A D | preauth2.c | 450 *eptr = rock->as_reply->enc_part.enctype; in client_data_proc() 664 as_key->enctype, in pa_enc_timestamp() 672 enc_data.enctype, enc_data.kvno, in pa_enc_timestamp() 979 if ((ret = krb5_c_encrypt_length(context, as_key->enctype, in pa_sam() 988 enc_data->enctype = as_key->enctype; in pa_sam() 1302 retval = krb5_c_encrypt_length(context, as_key->enctype, scratch->length, in pa_sam_2()
|
H A D | gc_via_tkt.c | 220 if (in_cred->keyblock.enctype) { in krb5_get_cred_via_tkt() 224 enctypes[0] = in_cred->keyblock.enctype; in krb5_get_cred_via_tkt()
|
H A D | get_in_tkt.c | 274 retval = (*key_proc)(context, as_reply->enc_part.enctype, in decrypt_as_reply() 297 as_reply->enc_part.enctype)) { in decrypt_as_reply() 299 decrypt_key->enctype = as_reply->enc_part.enctype; in decrypt_as_reply() 1418 local_as_reply->enc_part.enctype, in krb5_get_init_creds()
|
H A D | gic_keytab.c | 62 if (as_key->enctype == etype) in krb5_get_as_key_keytab()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/aes/ |
H A D | aes_s2k.c | 94 err = krb5int_pbkdf2_hmac_sha1 (context, &out, iter_count, key->enctype, in krb5int_aes_string_to_key()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | wrap_size_limit.c | 149 while (sz > 0 && krb5_encrypt_size(sz, ctx->enc->enctype) + 16 > req_output_size)
|
H A D | k5unseal.c | 214 if (ctx->enc->enctype == ENCTYPE_ARCFOUR_HMAC) { 245 enc_key->enctype); 276 code = krb5_c_block_size(context, ctx->enc->enctype, &blocksize);
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 391 encrypting_key.enctype = useenctype; in process_as_req() 433 reply.enc_part.enctype = encrypting_key.enctype; in process_as_req()
|
H A D | main.c | 226 rdp->realm_mkey.enctype = (krb5_enctype) rparams->realm_enctype; 228 rdp->realm_mkey.enctype = manual ? def_enctype : ENCTYPE_UNKNOWN; 289 rdp->realm_mkey.enctype, manual,
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_encrypt.c | 98 if ((key->enctype == ENCTYPE_DES_CBC_CRC) && (ivec == 0)) { in krb5_old_encrypt()
|
H A D | old_decrypt.c | 94 if ((key->enctype == ENCTYPE_DES_CBC_CRC) && (ivec == 0)) { in krb5_old_decrypt()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | d3_cbc.c | 46 if ((rv = get_algo(key->enctype, &algos)) != CKR_OK) { in mit_des3_cbc_encrypt()
|
H A D | f_cbc.c | 49 if ((rv = get_algo(key->enctype, &algos)) != CKR_OK) {
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | ser_actx.c | 103 kret = krb5_c_block_size(kcontext, auth_context->keyblock->enctype, in krb5_auth_context_size() 237 auth_context->keyblock->enctype, in krb5_auth_context_externalize()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | make_checksum.c | 83 if (krb5_enctypes_list[e2].etype == key->enctype) in krb5_c_make_checksum()
|
/illumos-gate/usr/src/cmd/krb5/kadmin/cli/ |
H A D | kadmin.c | 1576 char enctype[BUFSIZ], salttype[BUFSIZ]; local 1579 enctype, sizeof(enctype))) 1580 snprintf(enctype, sizeof (enctype), gettext("<Encryption type 0x%x>"), 1582 printf("Key: vno %d, %s, ", key_data->key_data_kvno, enctype);
|
/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | alt_prof.c | 660 params.enctype = params_in->enctype; 663 if (!krb5_string_to_enctype(svalue, ¶ms.enctype)) { 669 params.enctype = DEFAULT_KDC_ENCTYPE;
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 998 (newkey.enctype == histkey.enctype) && in check_pw_reuse() 1724 if (keyblock->enctype != ENCTYPE_DES_CBC_CRC) 1905 keyblocks[i].enctype, in kadm5_setkey_principal_3() 1906 keyblocks[j].enctype, in kadm5_setkey_principal_3() 1954 if (ks_tuple[i].ks_enctype != keyblocks[i].enctype) { in kadm5_setkey_principal_3() 2186 keyblock->enctype = ktype; in kadm5_decrypt_key()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | lucid_context.c | 272 lkey->type = k5key->enctype; in copy_keyblock_to_lucid_key()
|