/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | secrets.h | 90 uint32 kvno; member in struct:afs_key
|
H A D | includes.h | 1166 krb5_kvno *kvno,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | kerberos_keytab.c | 43 krb5_kvno kvno, const char *princ_s, 77 * Save the entries with kvno - 1. This is what microsoft does 78 * to allow people with existing sessions that have kvno - 1 to still 82 * with the new kvno. 92 DEBUG(10,("smb_krb5_kt_add_entry: ignoring keytab entry principal %s, kvno = %d\n", 99 if (kt_entry.vno == kvno - 1) { 100 DEBUG(5,("smb_krb5_kt_add_entry: Saving previous (kvno %d) entry for principal: %s.\n", 101 kvno - 1, princ_s)); 104 DEBUG(5,("smb_krb5_kt_add_entry: Found old entry for principal: %s (kvno %d) - trying to remove it.\n", 120 DEBUG(5,("smb_krb5_kt_add_entry: removed old entry for principal: %s (kvno 42 smb_krb5_kt_add_entry( krb5_context context, krb5_keytab keytab, krb5_kvno kvno, const char *princ_s, krb5_enctype *enctypes, krb5_data password ) argument 229 krb5_kvno kvno; local 385 krb5_kvno kvno; local 494 krb5_kvno kvno; local [all...] |
H A D | ldap.c | 1410 * @return the kvno for the computer account, or -1 in case of a failure. 1416 uint32 kvno = (uint32)-1; /* -1 indicates a failure */ local 1424 return kvno; 1431 return kvno; 1438 return kvno; 1449 kvno = 0; 1451 if (!ads_pull_uint32(ads, res, "msDS-KeyVersionNumber", &kvno)) { 1455 return kvno; 1459 DEBUG(5,("ads_get_kvno: Looked Up KVNO of: %d\n", kvno)); 1461 return kvno; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/keys/ |
H A D | rxrpc-type.h | 31 u32 kvno; /* key version number */ member in struct:rxkad_key 106 u32 kvno; member in struct:rxrpc_key_data_v1
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/ |
H A D | kuam.c | 157 int lifetime, kvno, kerror; local 182 kvno = (unsigned char) ptr[1]; 212 lifetime, kvno, tkt, t_local.tv_sec))
|
H A D | uams_krb4.c | 422 ct.AuthHandle = ntohl( cr.kvno ); 715 ct.AuthHandle = cr.kvno;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | krb5_asn.h | 78 ** kvno[1] INTEGER OPTIONAL, 85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.h | 78 ** kvno[1] INTEGER OPTIONAL, 85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
|
H A D | krb5_asn.c | 65 ASN1_EXP_OPT(KRB5_ENCDATA, kvno, ASN1_INTEGER, 1),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 79 * kvno[1] INTEGER OPTIONAL, 85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
|
H A D | krb5_asn.c | 66 ASN1_EXP_OPT(KRB5_ENCDATA, kvno, ASN1_INTEGER, 1),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/krb5/ |
H A D | krb5_asn.h | 79 * kvno[1] INTEGER OPTIONAL, 85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
|
H A D | krb5_asn.c | 66 ASN1_EXP_OPT(KRB5_ENCDATA, kvno, ASN1_INTEGER, 1),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | clikrb5.c | 879 if (ap_req->ticket->enc_part.kvno) 880 return ap_req->ticket->enc_part.kvno; 882 if (ap_req->ticket.enc_part.kvno) 883 return *ap_req->ticket.enc_part.kvno; 902 krb5_kvno kvno, 923 DEBUG(10,("get_key_from_keytab: will look for kvno %d, enctype %d and name: %s\n", 924 kvno, enctype, name)); 932 kvno, 965 krb5_kvno *kvno, 977 *kvno 899 get_key_from_keytab(krb5_context context, krb5_const_principal server, krb5_enctype enctype, krb5_kvno kvno, krb5_keyblock **out_key) argument 963 smb_krb5_get_keyinfo_from_ap_req(krb5_context context, const krb5_data *inbuf, krb5_kvno *kvno, krb5_enctype *enctype) argument 999 krb5_kvno kvno; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/rxrpc/ |
H A D | packet.h | 165 __be32 kvno; /* Kerberos key version number */ member in struct:rxkad_response
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-key.c | 105 token->kad->kvno = ntohl(xdr[1]); 115 _debug("KVNO: %u", token->kad->kvno); 658 * 12 4 kvno 711 _debug("KVNO: %u", v1->kvno); 744 token->kad->kvno = v1->kvno; 921 u32 kvno) 947 data.v1.kvno = 0; 1032 toksize += 8 * 4; /* viceid, kvno, key*2, begin, 1129 ENCODE(token->kad->kvno); 918 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) argument [all...] |
H A D | rxkad.c | 802 resp.kvno = htonl(token->kad->kvno); 1008 u32 abort_code, version, kvno, ticket_len, level; local 1022 kvno = ntohl(response.kvno); 1025 ntohl(sp->hdr.serial), version, kvno, ticket_len); 1036 if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5) 1092 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | afs.c | 95 ct->AuthHandle = key.kvno;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | secrets.c | 994 result->kvno = ntohl(result->kvno);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | kssl.c | 1258 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0]; 1439 krb5ticket->enc_part.kvno,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.c | 1281 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0]; 1469 krb5ticket->server, krb5ticket->enc_part.kvno,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | kssl.c | 1258 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0]; 1439 krb5ticket->enc_part.kvno,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/ |
H A D | configure | [all...] |