/freebsd-9.3-release/etc/gss/ |
H A D | Makefile | 3 FILES= mech qop
|
/freebsd-9.3-release/include/rpc/ |
H A D | rpcsec_gss.h | 88 const char *qop; /* quality of protection */ member in struct:__anon4989 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 147 const char *qop); 153 bool_t rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
|
/freebsd-9.3-release/lib/librpcsec_gss/ |
H A D | rpcsec_gss_int.h | 80 caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, 83 caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc,
|
H A D | rpcsec_gss_prot.c | 97 gss_ctx_id_t ctx, gss_qop_t qop, 130 maj_stat = gss_get_mic(&min_stat, ctx, qop, 143 maj_stat = gss_wrap(&min_stat, ctx, TRUE, qop, &databuf, 159 gss_ctx_id_t ctx, gss_qop_t qop, 191 if (maj_stat != GSS_S_COMPLETE || qop_state != qop) { 209 if (maj_stat != GSS_S_COMPLETE || qop_state != qop || 96 xdr_rpc_gss_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument 158 xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument
|
H A D | rpcsec_gss_conf.c | 45 #define _PATH_GSS_QOP "/etc/gss/qop" 65 u_int qop; member in struct:qop_info 269 info->qop = strtoul(name, 0, 0); 330 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 336 if (strcmp(info->name, qop) == 0 338 *num_ret = info->qop; 356 if (info->qop == num && strcmp(info->mech, mech) == 0) {
|
H A D | svc_rpcsec_gss.c | 121 bool_t cl_locked; /* fixed service+qop */ 739 "<mech %.*s, qop %d, svc %d>", 753 gss_qop_t *qop) 796 *qop = qop_state; 966 gss_qop_t qop; local 1101 if (!svc_rpc_gss_validate(client, msg, &qop)) { 1130 client->cl_qop = qop; 1131 client->cl_rawcred.qop = _rpc_gss_num_to_qop( 1132 client->cl_rawcred.mechanism, qop); 1141 * particular service+qop pai 752 svc_rpc_gss_validate(struct svc_rpc_gss_client *client, struct rpc_msg *msg, gss_qop_t *qop) argument [all...] |
H A D | rpcsec_gss.c | 121 const char *mechanism, rpc_gss_service_t service, const char *qop, 138 if (qop) { 139 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) 228 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, const char *qop) argument 239 if (qop) { 240 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) { 120 rpc_gss_seccreate(CLIENT *clnt, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/freebsd-9.3-release/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_int.h | 81 gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, 84 gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq);
|
H A D | rpcsec_gss_conf.c | 69 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 72 if (!strcmp(qop, "default")) {
|
H A D | rpcsec_gss_prot.c | 118 gss_ctx_id_t ctx, gss_qop_t qop, 137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic); 165 maj_stat = gss_wrap_mbuf(&min_stat, ctx, TRUE, qop, 225 gss_ctx_id_t ctx, gss_qop_t qop, 277 if (maj_stat != GSS_S_COMPLETE || qop_state != qop) { 302 if (qop_state != qop || conf_state != TRUE) { 117 xdr_rpc_gss_wrap_data(struct mbuf **argsp, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument 224 xdr_rpc_gss_unwrap_data(struct mbuf **resultsp, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument
|
H A D | svc_rpcsec_gss.c | 142 bool_t cl_locked; /* fixed service+qop */ 973 "<mech %.*s, qop %d, svc %d>", 987 gss_qop_t *qop, rpc_gss_proc_t gcproc) 1040 *qop = qop_state; 1225 gss_qop_t qop; local 1370 if (!svc_rpc_gss_validate(client, msg, &qop, gc.gc_proc)) { 1408 client->cl_qop = qop; 1409 client->cl_rawcred.qop = _rpc_gss_num_to_qop( 1410 client->cl_rawcred.mechanism, qop); 1421 * particular service+qop pai 986 svc_rpc_gss_validate(struct svc_rpc_gss_client *client, struct rpc_msg *msg, gss_qop_t *qop, rpc_gss_proc_t gcproc) argument [all...] |
H A D | rpcsec_gss.c | 308 const char *mechanism, rpc_gss_service_t service, const char *qop, 320 if (qop) { 321 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) 416 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, const char *qop) argument 427 if (qop) { 428 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) { 307 rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/freebsd-9.3-release/sys/rpc/ |
H A D | rpcsec_gss.h | 88 const char *qop; /* quality of protection */ member in struct:__anon10366 157 rpc_gss_service_t service, const char *qop, 161 rpc_gss_service_t service, const char *qop); 167 typedef bool_t rpc_gss_qop_to_num_ftype(const char *qop, const char *mech, 233 const char *mechanism, rpc_gss_service_t service, const char *qop, 240 principal, mechanism, service, qop, options_req, 247 const char *qop) 253 qop); 297 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret) argument 302 ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mec 232 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 246 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 659 const char *qop) 661 if (digest->request.qop) { 662 krb5_set_error_string(context, "qop already set"); 665 digest->request.qop = malloc(sizeof(*digest->request.qop)); 666 if (digest->request.qop == NULL) { 670 *digest->request.qop = strdup(qop); 671 if (*digest->request.qop == NULL) { 673 free(digest->request.qop); 657 krb5_digest_set_qop(krb5_context context, krb5_digest digest, const char *qop) argument [all...] |
/freebsd-9.3-release/lib/libgssapi/ |
H A D | Makefile | 106 MLINKS+= mech.5 qop.5
|
/freebsd-9.3-release/lib/libfetch/ |
H A D | http.c | 631 char *qop; member in struct:__anon5216 643 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 652 if (b->qop) 653 free(b->qop); 812 else if (!strcasecmp(key, "qop")) 813 cs->challenges[cs->count]->qop = 1178 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */ 1181 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 1186 "Calc: HA1[%s] Nonce[%s] qop[%s] method[%s] URI[%s]\n", 1231 * [opaque] | [message-qop] | [all...] |
/freebsd-9.3-release/tools/regression/rpcsec_gss/ |
H A D | rpctest.c | 265 printf("new security context version=%d, mech=%s, qop=%s:\n", 266 rcred->version, rcred->mechanism, rcred->qop);
|
/freebsd-9.3-release/crypto/heimdal/appl/gssmask/ |
H A D | gssmask.c | 610 gss_qop_t qop; local 631 &mic_token, &qop);
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | digest.c | 680 if (ireq.u.digestRequest.qop == NULL) 754 MD5_Update(&ctx, *ireq.u.digestRequest.qop, 755 strlen(*ireq.u.digestRequest.qop));
|
/freebsd-9.3-release/sys/kgssapi/ |
H A D | gsstest.c | 1017 printf("new security context version=%d, mech=%s, qop=%s:\n", 1018 rcred->version, rcred->mechanism, rcred->qop);
|