/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | kssl.h | 141 } KSSL_CTX; typedef in typeref:struct:kssl_ctx_st 153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 154 KSSL_CTX *kssl_ctx_new(void); 155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 156 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ct [all...] |
H A D | ssl.h | 954 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.h | 141 } KSSL_CTX; typedef in typeref:struct:kssl_ctx_st 153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 154 KSSL_CTX *kssl_ctx_new(void); 155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 156 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ct [all...] |
H A D | kssl_lcl.h | 80 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 81 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
H A D | kssl.c | 1065 kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, 1305 /* Given krb5 service name in KSSL_CTX *kssl_ctx (typically "kssl"), 1308 ** to SSL Server in KSSL_CTX *kssl_ctx. 1313 kssl_sget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, 1567 KSSL_CTX * 1570 return ((KSSL_CTX *) kssl_calloc(1, sizeof(KSSL_CTX))); 1577 KSSL_CTX * 1578 kssl_ctx_free(KSSL_CTX *kssl_ctx) 1591 return (KSSL_CTX *) NUL [all...] |
H A D | d1_clnt.c | 768 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
H A D | s3_clnt.c | 1710 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
H A D | s3_srvr.c | 1858 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
H A D | ssl.h | 954 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | kssl.h | 151 } KSSL_CTX; typedef in typeref:struct:kssl_ctx_st 163 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 164 KSSL_CTX *kssl_ctx_new(void); 165 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 166 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 167 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 170 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 172 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 174 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ct [all...] |
H A D | kssl_lcl.h | 81 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 82 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
H A D | kssl.c | 1042 krb5_error_code kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, 1279 * Given krb5 service name in KSSL_CTX *kssl_ctx (typically "kssl"), 1282 * to SSL Server in KSSL_CTX *kssl_ctx. 1286 krb5_error_code kssl_sget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, 1533 KSSL_CTX *kssl_ctx_new(void) 1535 return ((KSSL_CTX *)kssl_calloc(1, sizeof(KSSL_CTX))); 1541 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx) 1560 return (KSSL_CTX *)NUL [all...] |
H A D | s3_srvr.c | 2407 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
H A D | ssl.h | 1558 KSSL_CTX *kssl_ctx;
|
H A D | s3_clnt.c | 2562 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | kssl.h | 151 } KSSL_CTX; typedef in typeref:struct:kssl_ctx_st 163 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 164 KSSL_CTX *kssl_ctx_new(void); 165 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 166 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 167 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 170 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 172 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 174 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ct [all...] |
H A D | kssl_lcl.h | 81 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 82 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
H A D | kssl.c | 1042 krb5_error_code kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, 1279 * Given krb5 service name in KSSL_CTX *kssl_ctx (typically "kssl"), 1282 * to SSL Server in KSSL_CTX *kssl_ctx. 1286 krb5_error_code kssl_sget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, 1533 KSSL_CTX *kssl_ctx_new(void) 1535 return ((KSSL_CTX *)kssl_calloc(1, sizeof(KSSL_CTX))); 1541 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx) 1560 return (KSSL_CTX *)NUL [all...] |
H A D | s3_srvr.c | 2407 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
H A D | ssl.h | 1558 KSSL_CTX *kssl_ctx;
|
H A D | s3_clnt.c | 2562 KSSL_CTX *kssl_ctx = s->kssl_ctx;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_server.c | 2168 KSSL_CTX *kctx; 2778 KSSL_CTX *kctx; 3180 KSSL_CTX *kctx;
|
H A D | s_client.c | 666 KSSL_CTX *kctx;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_server.c | 2168 KSSL_CTX *kctx; 2778 KSSL_CTX *kctx; 3180 KSSL_CTX *kctx;
|
H A D | s_client.c | 666 KSSL_CTX *kctx;
|