• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/

Lines Matching refs:kssl_ctx

1054 /*	Given krb5 service (typically "kssl") and hostname in kssl_ctx,
1065 kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx,
1080 if (!kssl_ctx)
1083 "No kssl_ctx defined.\n");
1086 else if (!kssl_ctx->service_host)
1089 "kssl_ctx service_host undefined.\n");
1102 kssl_ctx->service_host,
1103 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC,
1108 kssl_ctx->service_host,
1109 (kssl_ctx->service_name)? kssl_ctx->service_name:
1140 kssl_ctx->enctype = krb5credsp->session.keytype;
1142 kssl_ctx->enctype = krb5credsp->keyblock.enctype;
1191 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session))
1197 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->keyblock))
1207 kssl_ctx_show(kssl_ctx);
1305 /* Given krb5 service name in KSSL_CTX *kssl_ctx (typically "kssl"),
1308 ** to SSL Server in KSSL_CTX *kssl_ctx.
1313 kssl_sget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx,
1331 if (!kssl_ctx)
1334 "No kssl_ctx defined.\n");
1339 printf("in kssl_sget_tkt(%s)\n", kstring(kssl_ctx->service_name));
1374 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC,
1402 /* kssl_ctx->keytab_file == NULL ==> use Kerberos default
1404 if (kssl_ctx->keytab_file)
1406 krb5rc = krb5_kt_resolve(krb5context, kssl_ctx->keytab_file,
1525 else if (kssl_ctx_setprinc(kssl_ctx, KSSL_CLIENT,
1533 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session))
1546 kssl_ctx->enctype = krb5ticket->enc_part.enctype;
1554 kssl_ctx_show(kssl_ctx);
1565 /* Allocate & return a new kssl_ctx struct.
1574 /* Frees a kssl_ctx struct and any allocated memory it holds.
1578 kssl_ctx_free(KSSL_CTX *kssl_ctx)
1580 if (kssl_ctx == NULL) return kssl_ctx;
1582 if (kssl_ctx->key) OPENSSL_cleanse(kssl_ctx->key,
1583 kssl_ctx->length);
1584 if (kssl_ctx->key) kssl_free(kssl_ctx->key);
1585 if (kssl_ctx->client_princ) kssl_free(kssl_ctx->client_princ);
1586 if (kssl_ctx->service_host) kssl_free(kssl_ctx->service_host);
1587 if (kssl_ctx->service_name) kssl_free(kssl_ctx->service_name);
1588 if (kssl_ctx->keytab_file) kssl_free(kssl_ctx->keytab_file);
1590 kssl_free(kssl_ctx);
1597 ** of the kssl_ctx struct.
1600 kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which,
1607 if (kssl_ctx == NULL || entity == NULL) return KSSL_CTX_ERR;
1611 case KSSL_CLIENT: princ = &kssl_ctx->client_princ; break;
1612 case KSSL_SERVER: princ = &kssl_ctx->service_host; break;
1651 /* Set one of the plain (char *) string members of the kssl_ctx struct.
1657 kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text)
1661 if (!kssl_ctx) return KSSL_CTX_ERR;
1665 case KSSL_SERVICE: string = &kssl_ctx->service_name; break;
1666 case KSSL_SERVER: string = &kssl_ctx->service_host; break;
1667 case KSSL_CLIENT: string = &kssl_ctx->client_princ; break;
1668 case KSSL_KEYTAB: string = &kssl_ctx->keytab_file; break;
1688 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx
1689 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL.
1692 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session)
1698 if (!kssl_ctx) return KSSL_CTX_ERR;
1700 if (kssl_ctx->key)
1702 OPENSSL_cleanse(kssl_ctx->key, kssl_ctx->length);
1703 kssl_free(kssl_ctx->key);
1718 kssl_ctx->enctype = enctype;
1719 kssl_ctx->length = length;
1723 kssl_ctx->enctype = ENCTYPE_UNKNOWN;
1724 kssl_ctx->length = 0;
1728 if ((kssl_ctx->key =
1729 (krb5_octet FAR *) kssl_calloc(1, kssl_ctx->length)) == NULL)
1731 kssl_ctx->length = 0;
1735 memcpy(kssl_ctx->key, contents, length);
1741 /* Display contents of kssl_ctx struct
1744 kssl_ctx_show(KSSL_CTX *kssl_ctx)
1748 printf("kssl_ctx: ");
1749 if (kssl_ctx == NULL)
1755 printf("%p\n", (void *)kssl_ctx);
1758 (kssl_ctx->service_name)? kssl_ctx->service_name: "NULL");
1760 (kssl_ctx->client_princ)? kssl_ctx->client_princ: "NULL");
1762 (kssl_ctx->service_host)? kssl_ctx->service_host: "NULL");
1764 (kssl_ctx->keytab_file)? kssl_ctx->keytab_file: "NULL");
1766 kssl_ctx->enctype, kssl_ctx->length);
1768 for (i=0; i < kssl_ctx->length && kssl_ctx->key; i++)
1770 printf("%02x", kssl_ctx->key[i]);
1777 kssl_keytab_is_available(KSSL_CTX *kssl_ctx)
1789 /* kssl_ctx->keytab_file == NULL ==> use Kerberos default
1791 if (kssl_ctx->keytab_file)
1793 krb5rc = krb5_kt_resolve(krb5context, kssl_ctx->keytab_file,
1807 kssl_ctx->service_name ? kssl_ctx->service_name: KRB5SVC,
1832 kssl_tgt_is_available(KSSL_CTX *kssl_ctx)
1842 if (!kssl_ctx)
1845 if (!kssl_ctx->service_host)
1852 kssl_ctx->service_host,
1853 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC,
1872 kssl_ctx_show(kssl_ctx);
1996 /* IN */ KSSL_CTX *kssl_ctx,
2057 enctype = dec_authent->etype->data[0]; /* should = kssl_ctx->enctype */
2079 if (!EVP_CipherInit(&ciph_ctx,enc,kssl_ctx->key,iv,0))