/minix/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | mk_req_ext.c | 84 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { in _krb5_mk_req_internal() 93 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || in _krb5_mk_req_internal() 94 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || in _krb5_mk_req_internal() 95 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || in _krb5_mk_req_internal() 96 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { in _krb5_mk_req_internal() 130 ac->keyblock->keytype, in _krb5_mk_req_internal() 140 ret = krb5_build_ap_req (context, ac->keyblock->keytype, in _krb5_mk_req_internal()
|
H A D | deprecated.c | 74 krb5_keytype keytype, in krb5_keytype_to_enctypes_default() argument 82 if (keytype != KEYTYPE_DES || context->etypes_des == NULL) in krb5_keytype_to_enctypes_default() 83 return krb5_keytype_to_enctypes (context, keytype, len, val); in krb5_keytype_to_enctypes_default() 124 krb5_keytype keytype, in krb5_keytype_to_string() argument 132 if(keys[i].type == keytype) { in krb5_keytype_to_string() 140 "key type %d not supported", keytype); in krb5_keytype_to_string() 162 krb5_keytype *keytype) in krb5_string_to_keytype() argument 170 *keytype = keys[i].type; in krb5_string_to_keytype() 175 *keytype = strtol(string, &end, 0); in krb5_string_to_keytype() 176 if(*end == '\0' && *keytype != 0) { in krb5_string_to_keytype() [all …]
|
H A D | keyblock.c | 49 keyblock->keytype = 0; in krb5_keyblock_zero() 70 keyblock->keytype = ENCTYPE_NULL; in krb5_free_keyblock_contents() 163 return block->keytype; in krb5_keyblock_get_enctype() 203 key->keytype = type; in krb5_keyblock_init()
|
H A D | salt-aes.c | 72 kd.key->keytype = enctype; in AES_string_to_key() 73 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in AES_string_to_key() 82 et->keytype->size, kd.key->keyvalue.data); in AES_string_to_key()
|
H A D | mk_req.c | 64 if (auth_context && *auth_context && (*auth_context)->keytype) in krb5_mk_req_exact() 65 this_cred.session.keytype = (*auth_context)->keytype; in krb5_mk_req_exact()
|
H A D | auth_context.c | 63 p->keytype = ENCTYPE_NULL; in krb5_auth_con_init() 333 auth_context->keytype, in krb5_auth_con_generatelocalsubkey() 375 krb5_keytype keytype) in krb5_auth_con_setkeytype() argument 377 auth_context->keytype = keytype; in krb5_auth_con_setkeytype() 384 krb5_keytype *keytype) in krb5_auth_con_getkeytype() argument 386 *keytype = auth_context->keytype; in krb5_auth_con_getkeytype() 401 auth_context->keyblock->keytype = etype;
|
H A D | salt.c | 55 for (st = e->keytype->string_to_key; st && st->type; st++) { in krb5_salttype_to_string() 87 for (st = e->keytype->string_to_key; st && st->type; st++) { in krb5_string_to_salttype() 201 for(st = et->keytype->string_to_key; st && st->type; st++) in krb5_string_to_key_data_salt_opaque() 265 keylen = et->keytype->bits / 8; in krb5_string_to_key_derived() 273 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in krb5_string_to_key_derived() 278 kd.key->keytype = etype; in krb5_string_to_key_derived()
|
H A D | crypto.c | 123 key->keytype = type; in krb5_generate_random_keyblock() 124 if(et->keytype->random_key) in krb5_generate_random_keyblock() 145 kt = et->keytype; in _key_schedule() 698 krb5_keytype *keytype) in krb5_enctype_to_keytype() argument 704 *keytype = e->keytype->type; /* XXX */ in krb5_enctype_to_keytype() 2039 etype = key->keytype; in krb5_crypto_init() 2420 key->keytype = type; in krb5_random_to_key() 2598 krb5_keytype keytype, in krb5_keytype_to_enctypes() argument 2608 if (_krb5_etypes[i]->keytype->type == keytype in krb5_keytype_to_enctypes() 2626 if (_krb5_etypes[i]->keytype->type == keytype in krb5_keytype_to_enctypes() [all …]
|
H A D | generate_subkey.c | 66 etype = key->keytype; /* use session key etype */ in krb5_generate_subkey_extended()
|
/minix/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | set_keys.c | 101 keys[i].key.keytype = key_data[i].key_data_type[0]; in _kadm5_set_keys2() 185 is_des_key_p(int keytype) in is_des_key_p() argument 187 return keytype == ETYPE_DES_CBC_CRC || in is_des_key_p() 188 keytype == ETYPE_DES_CBC_MD4 || in is_des_key_p() 189 keytype == ETYPE_DES_CBC_MD5; in is_des_key_p() 231 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { in _kadm5_set_keys_randomly() 237 kblock[i].keytype = keys[i].key.keytype; in _kadm5_set_keys_randomly() 240 keys[i].key.keytype, in _kadm5_set_keys_randomly() 245 if (is_des_key_p(keys[i].key.keytype)) in _kadm5_set_keys_randomly()
|
H A D | default_keys.c | 52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); in print_keys() 55 (int)keys[i].key.keytype); in print_keys()
|
H A D | keys.c | 92 if (keys1[i].key.keytype != keys2[j].key.keytype) in _kadm5_exists_keys()
|
/minix/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | d2i_pr.c | 131 int keytype; in d2i_AutoPrivateKey() local 144 keytype = EVP_PKEY_DSA; in d2i_AutoPrivateKey() 146 keytype = EVP_PKEY_EC; in d2i_AutoPrivateKey() 165 keytype = EVP_PKEY_RSA; in d2i_AutoPrivateKey() 167 return d2i_PrivateKey(keytype, a, pp, length); in d2i_AutoPrivateKey()
|
/minix/crypto/external/bsd/heimdal/dist/admin/ |
H A D | copy.c | 44 if(a->keytype != b->keytype || in compare_keyblock() 92 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); in kt_copy() 100 entry.keyblock.keytype, in kt_copy()
|
/minix/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | misc.c | 160 if (krb5_enctype_valid(context, h->entry.keys.val[i].key.keytype) != 0 && in _kdc_get_preferred_key() 161 !_kdc_is_weak_exception(h->entry.principal, h->entry.keys.val[i].key.keytype)) in _kdc_get_preferred_key() 164 h->entry.keys.val[i].key.keytype, key); in _kdc_get_preferred_key() 168 *enctype = (*key)->key.keytype; in _kdc_get_preferred_key()
|
/minix/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | inquire_sec_context_by_oid.c | 104 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 110 enum keytype keytype, in inquire_sec_context_get_subkey() argument 129 switch(keytype) { in inquire_sec_context_get_subkey() 140 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); in inquire_sec_context_get_subkey() 148 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); in inquire_sec_context_get_subkey() 295 is_updated = (acceptor_subkey->keytype != in inquire_sec_context_has_updated_spnego() 296 context_handle->auth_context->keyblock->keytype); in inquire_sec_context_has_updated_spnego() 363 switch (key->keytype) { in export_lucid_sec_context_v1()
|
H A D | wrap.c | 152 krb5_keytype keytype; in _gsskrb5_wrap_size_limit() local 169 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_wrap_size_limit() 171 switch (keytype) { in _gsskrb5_wrap_size_limit() 543 krb5_keytype keytype; in _gsskrb5_wrap() local 563 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_wrap() 565 switch (keytype) { in _gsskrb5_wrap()
|
H A D | get_mic.c | 290 krb5_keytype keytype; in _gsskrb5_get_mic() local 305 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_get_mic() 307 switch (keytype) { in _gsskrb5_get_mic()
|
H A D | verify_mic.c | 295 krb5_keytype keytype; in _gsskrb5_verify_mic_internal() local 310 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_verify_mic_internal() 311 switch (keytype) { in _gsskrb5_verify_mic_internal()
|
H A D | unwrap.c | 397 krb5_keytype keytype; in _gsskrb5_unwrap() local 419 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_unwrap() 423 switch (keytype) { in _gsskrb5_unwrap()
|
/minix/crypto/external/bsd/openssl/dist/engines/vendor_defns/ |
H A D | sureware.h | 101 char *keytype); 117 unsigned long *num, char *keytype);
|
/minix/crypto/external/bsd/openssl/dist/doc/crypto/ |
H A D | PKCS12_create.pod | 12 int nid_key, int nid_cert, int iter, int mac_iter, int keytype); 26 B<keytype> is the type of key. 30 The parameters B<nid_key>, B<nid_cert>, B<iter>, B<mac_iter> and B<keytype> 41 B<keytype> adds a flag to the store private key. This is a non standard extension
|
/minix/crypto/external/bsd/heimdal/dist/lib/kafs/ |
H A D | afskrb5.c | 168 in_creds.session.keytype = ETYPE_DES_CBC_CRC; in get_cred() 171 invalid = krb5_enctype_valid(d->context, in_creds.session.keytype); in get_cred() 173 krb5_enctype_enable(d->context, in_creds.session.keytype); in get_cred() 177 in_creds.session.keytype = ETYPE_DES_CBC_MD5; in get_cred() 182 krb5_enctype_disable(d->context, in_creds.session.keytype); in get_cred()
|
/minix/crypto/external/bsd/heimdal/dist/lib/hdb/ |
H A D | mkey.c | 81 (*mkey)->keytab.keyblock.keytype = etype; in hdb_process_master_key() 181 key.keytype = enctype; in read_master_mit() 233 if(key.keytype == ETYPE_DES_CBC_CRC || key.keytype == ETYPE_DES_CBC_MD5) in read_master_encryptionkey() 234 key.keytype = ETYPE_DES_CFB64_NONE; in read_master_encryptionkey() 275 key.keytype = ETYPE_DES_PCBC_NONE; in read_master_krb4() 441 ret = krb5_enctype_keysize(context, k->key.keytype, &keysize); in hdb_unseal_key_mkey()
|
/minix/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kdecode_ticket.c | 142 in.session.keytype = enctype; in main() 159 out->session.keytype); in main()
|