Searched refs:enctype (Results 1 - 18 of 18) sorted by relevance

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Decp.h36 unsigned enctype; /* Encryption type */ member in struct:ecp_options
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Dkssl_lcl.h78 EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
H A Dkssl.h132 krb5_enctype enctype; member in struct:kssl_ctx_st
167 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
H A Dkssl.c282 krb5_enctype enctype, krb5_keytab_entry *entry)=NULL;
770 krb5_enctype enctype, krb5_keytab_entry *entry)
773 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry));
787 /* Given KRB5 enctype (basically DES or 3DES),
793 kssl_map_enc(krb5_enctype enctype) argument
795 switch (enctype)
993 printf("%s\n\t[et%d:%d]: ", label, keyblk->enctype, keyblk->length);
1113 kssl_ctx->enctype = krb5credsp->session.keytype;
1115 kssl_ctx->enctype = krb5credsp->keyblock.enctype;
768 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
1668 krb5_enctype enctype; local
1977 krb5_enctype enctype; local
[all...]
H A Ds3_clnt.c1534 enc = kssl_map_enc(kssl_ctx->enctype);
H A Ds3_srvr.c1684 enc = kssl_map_enc(kssl_ctx->enctype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl_lcl.h78 EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
H A Dkssl.h138 krb5_enctype enctype; member in struct:kssl_ctx_st
173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
H A Dkssl.c290 krb5_enctype enctype, krb5_keytab_entry *entry)=NULL;
778 krb5_enctype enctype, krb5_keytab_entry *entry)
781 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry));
814 /* Given KRB5 enctype (basically DES or 3DES),
820 kssl_map_enc(krb5_enctype enctype) argument
822 switch (enctype)
1020 printf("%s\n\t[et%d:%d]: ", label, keyblk->enctype, keyblk->length);
1140 kssl_ctx->enctype = krb5credsp->session.keytype;
1142 kssl_ctx->enctype = krb5credsp->keyblock.enctype;
776 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
1695 krb5_enctype enctype; local
2004 krb5_enctype enctype; local
[all...]
H A Dd1_clnt.c794 enc = kssl_map_enc(kssl_ctx->enctype);
H A Ds3_clnt.c1736 enc = kssl_map_enc(kssl_ctx->enctype);
H A Ds3_srvr.c1962 enc = kssl_map_enc(kssl_ctx->enctype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/
H A Dkerberos.c194 static char *kerberos_secrets_fetch_salting_principal(const char *service, int enctype) argument
199 asprintf(&key, "%s/%s/enctype=%d", SECRETS_SALTING_PRINCIPAL, service, enctype);
218 int enctype)
227 if ((salt_princ_s = kerberos_secrets_fetch_salting_principal(unparsed_name, enctype)) == NULL) {
251 int enctype,
279 asprintf(&key, "%s/%s/enctype=%d", SECRETS_SALTING_PRINCIPAL, unparsed_name, enctype);
313 int enctype,
344 /* Set up the enctype an
216 kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype) argument
250 kerberos_secrets_store_salting_principal(const char *service, int enctype, const char *principal) argument
310 get_service_ticket(krb5_context ctx, krb5_ccache ccache, const char *service_principal, int enctype, krb5_data *p_outbuf) argument
406 verify_service_password(krb5_context ctx, int enctype, const char *salting_principal, krb5_data *in_data) argument
499 kerberos_derive_salting_principal_for_enctype(const char *service_principal, krb5_context ctx, krb5_ccache ccache, krb5_enctype enctype, krb5_enctype *enctypes) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dclikrb5.c31 #define KRB5_KEY_TYPE(k) ((k)->enctype)
88 krb5_enctype enctype)
99 krb5_use_enctype(context, &eblock, enctype);
109 krb5_enctype enctype)
119 return krb5_string_to_key_salt(context, enctype, password->data,
130 krb5_enctype enctype)
136 * principal/enctype in a non-obvious way. If it is, try to match
139 salt_princ = kerberos_fetch_salt_princ_for_host_princ(context, host_princ, enctype);
140 ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype);
285 void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype) argument
84 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
105 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
126 create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dkssl.h132 krb5_enctype enctype; member in struct:kssl_ctx_st
167 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dkssl.h138 krb5_enctype enctype; member in struct:kssl_ctx_st
173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dincludes.h1331 int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
1332 int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
1340 krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype);
1341 void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/
H A Dconfigure33127 krb5_enctype enctype; enctype = ENCTYPE_ARCFOUR_HMAC_MD5;
[all...]

Completed in 137 milliseconds