Searched refs:kvno (Results 1 - 24 of 24) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dsecrets.h90 uint32 kvno; member in struct:afs_key
H A Dincludes.h1166 krb5_kvno *kvno,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dkerberos_keytab.c43 krb5_kvno kvno, const char *princ_s,
77 * Save the entries with kvno - 1. This is what microsoft does
78 * to allow people with existing sessions that have kvno - 1 to still
82 * with the new kvno.
92 DEBUG(10,("smb_krb5_kt_add_entry: ignoring keytab entry principal %s, kvno = %d\n",
99 if (kt_entry.vno == kvno - 1) {
100 DEBUG(5,("smb_krb5_kt_add_entry: Saving previous (kvno %d) entry for principal: %s.\n",
101 kvno - 1, princ_s));
104 DEBUG(5,("smb_krb5_kt_add_entry: Found old entry for principal: %s (kvno %d) - trying to remove it.\n",
120 DEBUG(5,("smb_krb5_kt_add_entry: removed old entry for principal: %s (kvno
42 smb_krb5_kt_add_entry( krb5_context context, krb5_keytab keytab, krb5_kvno kvno, const char *princ_s, krb5_enctype *enctypes, krb5_data password ) argument
229 krb5_kvno kvno; local
385 krb5_kvno kvno; local
494 krb5_kvno kvno; local
[all...]
H A Dldap.c1410 * @return the kvno for the computer account, or -1 in case of a failure.
1416 uint32 kvno = (uint32)-1; /* -1 indicates a failure */ local
1424 return kvno;
1431 return kvno;
1438 return kvno;
1449 kvno = 0;
1451 if (!ads_pull_uint32(ads, res, "msDS-KeyVersionNumber", &kvno)) {
1455 return kvno;
1459 DEBUG(5,("ads_get_kvno: Looked Up KVNO of: %d\n", kvno));
1461 return kvno;
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/keys/
H A Drxrpc-type.h31 u32 kvno; /* key version number */ member in struct:rxkad_key
106 u32 kvno; member in struct:rxrpc_key_data_v1
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/
H A Dkuam.c157 int lifetime, kvno, kerror; local
182 kvno = (unsigned char) ptr[1];
212 lifetime, kvno, tkt, t_local.tv_sec))
H A Duams_krb4.c422 ct.AuthHandle = ntohl( cr.kvno );
715 ct.AuthHandle = cr.kvno;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dkrb5_asn.h78 ** kvno[1] INTEGER OPTIONAL,
85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/
H A Dkrb5_asn.h78 ** kvno[1] INTEGER OPTIONAL,
85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
H A Dkrb5_asn.c65 ASN1_EXP_OPT(KRB5_ENCDATA, kvno, ASN1_INTEGER, 1),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/krb5/
H A Dkrb5_asn.h79 * kvno[1] INTEGER OPTIONAL,
85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
H A Dkrb5_asn.c66 ASN1_EXP_OPT(KRB5_ENCDATA, kvno, ASN1_INTEGER, 1),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/krb5/
H A Dkrb5_asn.h79 * kvno[1] INTEGER OPTIONAL,
85 ASN1_INTEGER *kvno; member in struct:krb5_encdata_st
H A Dkrb5_asn.c66 ASN1_EXP_OPT(KRB5_ENCDATA, kvno, ASN1_INTEGER, 1),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dclikrb5.c879 if (ap_req->ticket->enc_part.kvno)
880 return ap_req->ticket->enc_part.kvno;
882 if (ap_req->ticket.enc_part.kvno)
883 return *ap_req->ticket.enc_part.kvno;
902 krb5_kvno kvno,
923 DEBUG(10,("get_key_from_keytab: will look for kvno %d, enctype %d and name: %s\n",
924 kvno, enctype, name));
932 kvno,
965 krb5_kvno *kvno,
977 *kvno
899 get_key_from_keytab(krb5_context context, krb5_const_principal server, krb5_enctype enctype, krb5_kvno kvno, krb5_keyblock **out_key) argument
963 smb_krb5_get_keyinfo_from_ap_req(krb5_context context, const krb5_data *inbuf, krb5_kvno *kvno, krb5_enctype *enctype) argument
999 krb5_kvno kvno; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/rxrpc/
H A Dpacket.h165 __be32 kvno; /* Kerberos key version number */ member in struct:rxkad_response
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-key.c105 token->kad->kvno = ntohl(xdr[1]);
115 _debug("KVNO: %u", token->kad->kvno);
658 * 12 4 kvno
711 _debug("KVNO: %u", v1->kvno);
744 token->kad->kvno = v1->kvno;
921 u32 kvno)
947 data.v1.kvno = 0;
1032 toksize += 8 * 4; /* viceid, kvno, key*2, begin,
1129 ENCODE(token->kad->kvno);
918 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) argument
[all...]
H A Drxkad.c802 resp.kvno = htonl(token->kad->kvno);
1008 u32 abort_code, version, kvno, ticket_len, level; local
1022 kvno = ntohl(response.kvno);
1025 ntohl(sp->hdr.serial), version, kvno, ticket_len);
1036 if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5)
1092 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Dafs.c95 ct->AuthHandle = key.kvno;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dsecrets.c994 result->kvno = ntohl(result->kvno);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dkssl.c1258 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0];
1439 krb5ticket->enc_part.kvno,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.c1281 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0];
1469 krb5ticket->server, krb5ticket->enc_part.kvno,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dkssl.c1258 new5ticket->enc_part.kvno = asn1ticket->encdata->kvno->data[0];
1439 krb5ticket->enc_part.kvno,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/
H A Dconfigure[all...]

Completed in 427 milliseconds