/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.c | 103 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/krb5/ |
H A D | krb5_asn.c | 103 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/ia64/mm/ |
H A D | tlb.c | 104 unsigned long ticket; member in struct:spinaphore 110 ss->ticket = 0; 116 unsigned long t = ia64_fetchadd(1, &ss->ticket, acq), serve;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/octeon/ |
H A D | cvmx-cmd-queue.c | 188 * zero the ticket. 191 ticket[__cvmx_cmd_queue_get_index(queue_id)] = 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | sesssetup.c | 233 DATA_BLOB ticket; local 251 ZERO_STRUCT(ticket); 265 if (!spnego_parse_krb5_wrap(*secblob, &ticket, tok_id)) { 270 ret = ads_verify_ticket(mem_ctx, lp_realm(), 0, &ticket, &client, &pac_data, &ap_rep, &session_key); 272 data_blob_free(&ticket); 316 DEBUG(1,("Failed to verify incoming ticket with error %s!\n", nt_errstr(ret)));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | includes.h | 1174 krb5_ticket **ticket, 1183 DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_sess.c | 232 * ticket == 0 then no ticket information is duplicated, otherwise it is. 234 SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket) argument 328 if (ticket != 0) { 457 * If RFC5077 ticket, use empty session ID (as server). 460 * ClientHello extensions to find the session ticket. 465 * whether a ticket is expected or not. 549 * read past the end of this in order to parse out the session ticket 562 * if the server should issue a new session ticket (to 0 otherwise). 591 case 0: /* No ticket foun [all...] |
H A D | kssl.c | 533 krb5_ticket *ticket) 539 return (p_krb5_decrypt_tkt_part(con, keys, ticket)); 1033 * Return encrypted Kerberos ticket for service @ hostname. 1114 *enc_ticketp = &krb5credsp->ticket; 1250 "Error building ticket server principal.\n"); 1425 "Error converting ASN.1 ticket to krb5_ticket.\n"); 1433 "server principal != ticket principal\n"); 1459 fprintf(stderr, "Decrypted ticket fields:\n"); 1491 "bad ticket from krb5_rd_req.\n"); 1504 "invalid ticket fro 532 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument [all...] |
H A D | ssl_locl.h | 1066 SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_sess.c | 232 * ticket == 0 then no ticket information is duplicated, otherwise it is. 234 SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket) argument 328 if (ticket != 0) { 457 * If RFC5077 ticket, use empty session ID (as server). 460 * ClientHello extensions to find the session ticket. 465 * whether a ticket is expected or not. 549 * read past the end of this in order to parse out the session ticket 562 * if the server should issue a new session ticket (to 0 otherwise). 591 case 0: /* No ticket foun [all...] |
H A D | kssl.c | 533 krb5_ticket *ticket) 539 return (p_krb5_decrypt_tkt_part(con, keys, ticket)); 1033 * Return encrypted Kerberos ticket for service @ hostname. 1114 *enc_ticketp = &krb5credsp->ticket; 1250 "Error building ticket server principal.\n"); 1425 "Error converting ASN.1 ticket to krb5_ticket.\n"); 1433 "server principal != ticket principal\n"); 1459 fprintf(stderr, "Decrypted ticket fields:\n"); 1491 "bad ticket from krb5_rd_req.\n"); 1504 "invalid ticket fro 532 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument [all...] |
H A D | ssl_locl.h | 1066 SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.c | 563 krb5_ticket *ticket) 569 return(p_krb5_decrypt_tkt_part(con,keys,ticket)); 1055 ** Return encrypted Kerberos ticket for service @ hostname. 1138 *enc_ticketp = &krb5credsp->ticket; 1273 "Error building ticket server principal.\n"); 1455 "Error converting ASN.1 ticket to krb5_ticket.\n"); 1464 "server principal != ticket principal\n"); 1488 printf("Decrypted ticket fields:\n"); 1523 "bad ticket from krb5_rd_req.\n"); 1542 "invalid ticket fro 562 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/ |
H A D | configure | [all...] |