/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | kssl_lcl.h | 81 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 82 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
H A D | kssl.h | 163 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 165 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 166 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 167 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 170 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 172 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 174 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); 184 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
|
H A D | kssl.c | 1032 /*- Given krb5 service (typically "kssl") and hostname in kssl_ctx, 1042 krb5_error_code kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, argument 1063 if (!kssl_ctx) { 1064 kssl_err_set(kssl_err, SSL_R_KRB5_S_INIT, "No kssl_ctx defined.\n"); 1066 } else if (!kssl_ctx->service_host) { 1068 "kssl_ctx service_host undefined.\n"); 1080 kssl_ctx->service_host, 1081 (kssl_ctx->service_name) ? 1082 kssl_ctx->service_name : KRB5SVC, 1087 kssl_ctx 1286 kssl_sget_tkt( KSSL_CTX *kssl_ctx, krb5_data *indata, krb5_ticket_times *ttimes, KSSL_ERR *kssl_err) argument 1541 kssl_ctx_free(KSSL_CTX *kssl_ctx) argument 1568 kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, krb5_data *realm, krb5_data *entity, int nentities) argument 1625 kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text) argument 1669 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument 1715 kssl_ctx_show(KSSL_CTX *kssl_ctx) argument 1743 kssl_keytab_is_available(KSSL_CTX *kssl_ctx) argument 1802 kssl_tgt_is_available(KSSL_CTX *kssl_ctx) argument 2003 kssl_check_authent( KSSL_CTX *kssl_ctx, krb5_data *authentp, krb5_timestamp *atimep, KSSL_ERR *kssl_err) argument [all...] |
H A D | ssl_sess.c | 918 if (s->kssl_ctx && !s->kssl_ctx->client_princ && 920 s->kssl_ctx->client_princ = 922 memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, 924 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0';
|
H A D | s3_srvr.c | 2407 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 2419 if (!kssl_ctx) 2420 kssl_ctx = kssl_ctx_new(); 2467 if ((krb5rc = kssl_sget_tkt(kssl_ctx, &enc_ticket, &ttimes, 2483 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator, 2500 kssl_ctx_show(kssl_ctx); 2503 enc = kssl_map_enc(kssl_ctx->enctype); 2509 if (!EVP_DecryptInit_ex(&ciph_ctx, enc, NULL, kssl_ctx->key, iv)) { 2569 if (kssl_ctx [all...] |
H A D | s3_clnt.c | 2562 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 2586 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, &kssl_err); 2587 enc = kssl_map_enc(kssl_ctx->enctype); 2655 * kssl_ctx->length); 2660 EVP_EncryptInit_ex(&ciph_ctx, enc, NULL, kssl_ctx->key, iv);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | kssl.h | 153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 156 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); 171 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.h | 153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 156 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); 171 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
|
H A D | kssl_lcl.h | 80 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 81 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
H A D | kssl.c | 1054 /* Given krb5 service (typically "kssl") and hostname in kssl_ctx, 1065 kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, argument 1080 if (!kssl_ctx) 1083 "No kssl_ctx defined.\n"); 1086 else if (!kssl_ctx->service_host) 1089 "kssl_ctx service_host undefined.\n"); 1102 kssl_ctx->service_host, 1103 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, 1108 kssl_ctx 1313 kssl_sget_tkt( KSSL_CTX *kssl_ctx, krb5_data *indata, krb5_ticket_times *ttimes, KSSL_ERR *kssl_err ) argument 1578 kssl_ctx_free(KSSL_CTX *kssl_ctx) argument 1600 kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, krb5_data *realm, krb5_data *entity, int nentities) argument 1657 kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text) argument 1692 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument 1744 kssl_ctx_show(KSSL_CTX *kssl_ctx) argument 1777 kssl_keytab_is_available(KSSL_CTX *kssl_ctx) argument 1832 kssl_tgt_is_available(KSSL_CTX *kssl_ctx) argument 1995 kssl_check_authent( KSSL_CTX *kssl_ctx, krb5_data *authentp, krb5_timestamp *atimep, KSSL_ERR *kssl_err ) argument [all...] |
H A D | ssl_sess.c | 580 if (s->kssl_ctx && !s->kssl_ctx->client_princ && 583 s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); 584 memcpy(s->kssl_ctx->client_princ,session->krb5_client_princ, 586 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0';
|
H A D | s3_srvr.c | 1858 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 1870 if (!kssl_ctx) kssl_ctx = kssl_ctx_new(); 1921 if ((krb5rc = kssl_sget_tkt(kssl_ctx, &enc_ticket, &ttimes, 1938 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator, 1959 kssl_ctx_show(kssl_ctx); 1962 enc = kssl_map_enc(kssl_ctx->enctype); 1968 if (!EVP_DecryptInit_ex(&ciph_ctx,enc,NULL,kssl_ctx->key,iv)) 2025 if (kssl_ctx [all...] |
H A D | d1_clnt.c | 768 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 792 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, 794 enc = kssl_map_enc(kssl_ctx->enctype); 863 ** kssl_ctx->length); 869 kssl_ctx->key,iv);
|
H A D | s3_clnt.c | 1710 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 1734 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, 1736 enc = kssl_map_enc(kssl_ctx->enctype); 1807 ** kssl_ctx->length); 1813 kssl_ctx->key,iv);
|
H A D | ssl_lib.c | 258 s->kssl_ctx = kssl_ctx_new(); 502 if (s->kssl_ctx != NULL) 503 kssl_ctx_free(s->kssl_ctx); 1243 int nokrb5 = !kssl_tgt_is_available(s->kssl_ctx);
|
H A D | ssltest.c | 840 if (c_ssl && c_ssl->kssl_ctx) 852 kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | kssl_lcl.h | 81 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 82 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
H A D | kssl.h | 163 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 165 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 166 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 167 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 170 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 172 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 174 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); 184 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
|
H A D | kssl.c | 1032 /*- Given krb5 service (typically "kssl") and hostname in kssl_ctx, 1042 krb5_error_code kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, argument 1063 if (!kssl_ctx) { 1064 kssl_err_set(kssl_err, SSL_R_KRB5_S_INIT, "No kssl_ctx defined.\n"); 1066 } else if (!kssl_ctx->service_host) { 1068 "kssl_ctx service_host undefined.\n"); 1080 kssl_ctx->service_host, 1081 (kssl_ctx->service_name) ? 1082 kssl_ctx->service_name : KRB5SVC, 1087 kssl_ctx 1286 kssl_sget_tkt( KSSL_CTX *kssl_ctx, krb5_data *indata, krb5_ticket_times *ttimes, KSSL_ERR *kssl_err) argument 1541 kssl_ctx_free(KSSL_CTX *kssl_ctx) argument 1568 kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, krb5_data *realm, krb5_data *entity, int nentities) argument 1625 kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text) argument 1669 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument 1715 kssl_ctx_show(KSSL_CTX *kssl_ctx) argument 1743 kssl_keytab_is_available(KSSL_CTX *kssl_ctx) argument 1802 kssl_tgt_is_available(KSSL_CTX *kssl_ctx) argument 2003 kssl_check_authent( KSSL_CTX *kssl_ctx, krb5_data *authentp, krb5_timestamp *atimep, KSSL_ERR *kssl_err) argument [all...] |
H A D | ssl_sess.c | 918 if (s->kssl_ctx && !s->kssl_ctx->client_princ && 920 s->kssl_ctx->client_princ = 922 memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, 924 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0';
|
H A D | s3_srvr.c | 2407 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 2419 if (!kssl_ctx) 2420 kssl_ctx = kssl_ctx_new(); 2467 if ((krb5rc = kssl_sget_tkt(kssl_ctx, &enc_ticket, &ttimes, 2483 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator, 2500 kssl_ctx_show(kssl_ctx); 2503 enc = kssl_map_enc(kssl_ctx->enctype); 2509 if (!EVP_DecryptInit_ex(&ciph_ctx, enc, NULL, kssl_ctx->key, iv)) { 2569 if (kssl_ctx [all...] |
H A D | s3_clnt.c | 2562 KSSL_CTX *kssl_ctx = s->kssl_ctx; local 2586 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, &kssl_err); 2587 enc = kssl_map_enc(kssl_ctx->enctype); 2655 * kssl_ctx->length); 2660 EVP_EncryptInit_ex(&ciph_ctx, enc, NULL, kssl_ctx->key, iv);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_server.c | 1175 if ((con->kssl_ctx = kssl_ctx_new()) != NULL) 1177 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, 1179 kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, 1531 if (con->kssl_ctx->client_princ != NULL) 1534 con->kssl_ctx->client_princ); 1610 if ((con->kssl_ctx = kssl_ctx_new()) != NULL) 1612 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC); 1613 kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB);
|
H A D | s_client.c | 627 if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL) 629 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ssltest.c | 840 if (c_ssl && c_ssl->kssl_ctx) 852 kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER,
|