/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | ecp.h | 36 unsigned enctype; /* Encryption type */ member in struct:ecp_options
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | kssl_lcl.h | 79 const EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
|
H A D | kssl.h | 148 krb5_enctype enctype; member in struct:kssl_ctx_st 187 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
H A D | kssl.c | 283 krb5_enctype enctype, 733 krb5_enctype enctype, krb5_keytab_entry *entry) 737 (context, keytab, principal, vno, enctype, entry)); 771 * Given KRB5 enctype (basically DES or 3DES), return closest match openssl 776 const EVP_CIPHER *kssl_map_enc(krb5_enctype enctype) argument 778 switch (enctype) { 998 fprintf(stderr, "%s\n\t[et%d:%d]: ", label, keyblk->enctype, 1116 kssl_ctx->enctype = krb5credsp->session.keytype; 1118 kssl_ctx->enctype = krb5credsp->keyblock.enctype; 731 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 1672 krb5_enctype enctype; local 2020 krb5_enctype enctype; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl_lcl.h | 78 EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
|
H A D | kssl.h | 138 krb5_enctype enctype; member in struct:kssl_ctx_st 173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
H A D | kssl.c | 290 krb5_enctype enctype, krb5_keytab_entry *entry)=NULL; 778 krb5_enctype enctype, krb5_keytab_entry *entry) 781 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry)); 814 /* Given KRB5 enctype (basically DES or 3DES), 820 kssl_map_enc(krb5_enctype enctype) argument 822 switch (enctype) 1020 printf("%s\n\t[et%d:%d]: ", label, keyblk->enctype, keyblk->length); 1140 kssl_ctx->enctype = krb5credsp->session.keytype; 1142 kssl_ctx->enctype = krb5credsp->keyblock.enctype; 776 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 1695 krb5_enctype enctype; local 2004 krb5_enctype enctype; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | kssl_lcl.h | 79 const EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
|
H A D | kssl.h | 148 krb5_enctype enctype; member in struct:kssl_ctx_st 187 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
H A D | kssl.c | 283 krb5_enctype enctype, 733 krb5_enctype enctype, krb5_keytab_entry *entry) 737 (context, keytab, principal, vno, enctype, entry)); 771 * Given KRB5 enctype (basically DES or 3DES), return closest match openssl 776 const EVP_CIPHER *kssl_map_enc(krb5_enctype enctype) argument 778 switch (enctype) { 998 fprintf(stderr, "%s\n\t[et%d:%d]: ", label, keyblk->enctype, 1116 kssl_ctx->enctype = krb5credsp->session.keytype; 1118 kssl_ctx->enctype = krb5credsp->keyblock.enctype; 731 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 1672 krb5_enctype enctype; local 2020 krb5_enctype enctype; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | kssl.h | 138 krb5_enctype enctype; member in struct:kssl_ctx_st 173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | clikrb5.c | 36 #define KRB5_KEY_TYPE(k) ((k)->enctype) 189 krb5_enctype enctype) 200 krb5_use_enctype(context, &eblock, enctype); 210 krb5_enctype enctype) 221 ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key); 233 krb5_enctype enctype) 239 * principal/enctype in a non-obvious way. If it is, try to match 242 salt_princ = kerberos_fetch_salt_princ_for_host_princ(context, host_princ, enctype); 243 ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype); 494 void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype) argument 185 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument 206 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument 229 create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument 899 get_key_from_keytab(krb5_context context, krb5_const_principal server, krb5_enctype enctype, krb5_kvno kvno, krb5_keyblock **out_key) argument 963 smb_krb5_get_keyinfo_from_ap_req(krb5_context context, const krb5_data *inbuf, krb5_kvno *kvno, krb5_enctype *enctype) argument 1000 krb5_enctype enctype; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | remoteconf.h | 93 int enctype; member in struct:isakmpsa
|
H A D | oakley.c | 2261 keylen = alg_oakley_encdef_keylen(iph1->approval->enctype, 2267 iph1->approval->enctype, 2455 newivm->iv->l = alg_oakley_encdef_blocklen(iph1->approval->enctype); 2459 iph1->approval->enctype); 2537 newivm->iv->l = alg_oakley_encdef_blocklen(iph1->approval->enctype); 2541 iph1->approval->enctype); 2598 blen = alg_oakley_encdef_blocklen(iph1->approval->enctype); 2602 iph1->approval->enctype); 2628 new = alg_oakley_encdef_decrypt(iph1->approval->enctype, 2632 "decryption %d failed.\n", iph1->approval->enctype); [all...] |
H A D | ipsec_doi.c | 342 plog(LLV_DEBUG, LOCATION, NULL, "enctype = %s:%s\n", 344 s->enctype), 346 tsap->enctype)); 368 if(tsap->enctype == s->enctype 397 if (sa.enctype != s->enctype) { 399 "rejected enctype: " 405 s->enctype), 407 sa.enctype)); [all...] |
H A D | pfkey.c | 622 keylen_ealg(enctype, encklen) 623 u_int enctype; 628 res = alg_ipsec_encdef_keylen(enctype, encklen); 631 "invalid encryption algorithm %u.\n", enctype);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 282 /* Old format supports only DES! Any other enctype uses new format */ 283 ctx->enctype = ENCTYPE_DES_CBC_RAW; 285 ctx->gk5e = get_gss_krb5_enctype(ctx->enctype); 578 switch (ctx->enctype) { 630 p = simple_get_bytes(p, end, &ctx->enctype, sizeof(ctx->enctype)); 634 if (ctx->enctype == ENCTYPE_DES3_CBC_SHA1) 635 ctx->enctype = ENCTYPE_DES3_CBC_RAW; 636 ctx->gk5e = get_gss_krb5_enctype(ctx->enctype); 638 dprintk("gss_kerberos_mech: unsupported krb5 enctype [all...] |
H A D | gss_krb5_seqnum.c | 83 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) 149 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC)
|
H A D | gss_krb5_seal.c | 211 switch (ctx->enctype) {
|
H A D | gss_krb5_unseal.c | 213 switch (ctx->enctype) {
|
H A D | gss_krb5_wrap.c | 216 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) { 303 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) { 535 switch (kctx->enctype) { 553 switch (kctx->enctype) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | kerberos.c | 277 static char *kerberos_secrets_fetch_salting_principal(const char *service, int enctype) argument 282 asprintf(&key, "%s/%s/enctype=%d", SECRETS_SALTING_PRINCIPAL, service, enctype); 375 int enctype) 389 if ((salt_princ_s = kerberos_secrets_fetch_salting_principal(unparsed_name, enctype)) == NULL) { 414 int enctype, 442 asprintf(&key, "%s/%s/enctype=%d", SECRETS_SALTING_PRINCIPAL, unparsed_name, enctype); 373 kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype) argument 413 kerberos_secrets_store_salting_principal(const char *service, int enctype, const char *principal) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | print-telnet.c | 91 static const char *enctype[] = { variable 190 (void)printf(" %s", STR_OR_ID(c, enctype));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | includes.h | 1131 int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); 1132 int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); 1142 krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype); 1143 void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype); 1167 krb5_enctype *enctype);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/ |
H A D | gss_krb5.h | 98 u32 enctype; member in struct:krb5_ctx 100 const struct gss_krb5_enctype *gk5e; /* enctype-specific info */
|