/freebsd-current/etc/gss/ |
H A D | Makefile | 2 FILES= mech qop
|
/freebsd-current/include/rpc/ |
H A D | rpcsec_gss.h | 88 const char *qop; /* quality of protection */ member in struct:__anon66 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 147 const char *qop); 153 bool_t rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
|
/freebsd-current/lib/librpcsec_gss/ |
H A D | rpcsec_gss_int.h | 81 caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, 84 caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc,
|
H A D | rpcsec_gss_prot.c | 98 gss_ctx_id_t ctx, gss_qop_t qop, 131 maj_stat = gss_get_mic(&min_stat, ctx, qop, 144 maj_stat = gss_wrap(&min_stat, ctx, TRUE, qop, &databuf, 160 gss_ctx_id_t ctx, gss_qop_t qop, 192 if (maj_stat != GSS_S_COMPLETE || qop_state != qop) { 210 if (maj_stat != GSS_S_COMPLETE || qop_state != qop || 97 xdr_rpc_gss_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument 159 xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument
|
H A D | rpcsec_gss_conf.c | 45 #define _PATH_GSS_QOP "/etc/gss/qop" 65 u_int qop; member in struct:qop_info 269 info->qop = strtoul(name, 0, 0); 330 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 336 if (strcmp(info->name, qop) == 0 338 *num_ret = info->qop; 356 if (info->qop == num && strcmp(info->mech, mech) == 0) {
|
H A D | svc_rpcsec_gss.c | 121 bool_t cl_locked; /* fixed service+qop */ 734 "<mech %.*s, qop %d, svc %d>", 748 gss_qop_t *qop) 791 *qop = qop_state; 964 gss_qop_t qop; local 1099 if (!svc_rpc_gss_validate(client, msg, &qop)) { 1128 client->cl_qop = qop; 1129 client->cl_rawcred.qop = _rpc_gss_num_to_qop( 1130 client->cl_rawcred.mechanism, qop); 1139 * particular service+qop pai 747 svc_rpc_gss_validate(struct svc_rpc_gss_client *client, struct rpc_msg *msg, gss_qop_t *qop) argument [all...] |
H A D | rpcsec_gss.c | 121 const char *mechanism, rpc_gss_service_t service, const char *qop, 138 if (qop) { 139 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) 228 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, const char *qop) argument 239 if (qop) { 240 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) { 120 rpc_gss_seccreate(CLIENT *clnt, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/freebsd-current/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_int.h | 82 gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, 85 gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq);
|
H A D | rpcsec_gss_conf.c | 68 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 71 if (!strcmp(qop, "default")) {
|
H A D | rpcsec_gss_prot.c | 117 gss_ctx_id_t ctx, gss_qop_t qop, 136 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic); 164 maj_stat = gss_wrap_mbuf(&min_stat, ctx, TRUE, qop, 224 gss_ctx_id_t ctx, gss_qop_t qop, 276 if (maj_stat != GSS_S_COMPLETE || qop_state != qop) { 301 if (qop_state != qop || conf_state != TRUE) { 116 xdr_rpc_gss_wrap_data(struct mbuf **argsp, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument 223 xdr_rpc_gss_unwrap_data(struct mbuf **resultsp, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument
|
H A D | svc_rpcsec_gss.c | 141 bool_t cl_locked; /* fixed service+qop */ 1082 "<mech %.*s, qop %d, svc %d>", 1096 gss_qop_t *qop, rpc_gss_proc_t gcproc) 1149 *qop = qop_state; 1334 gss_qop_t qop; local 1482 if (!svc_rpc_gss_validate(client, msg, &qop, gc.gc_proc)) { 1520 client->cl_qop = qop; 1521 client->cl_rawcred.qop = _rpc_gss_num_to_qop( 1522 client->cl_rawcred.mechanism, qop); 1533 * particular service+qop pai 1095 svc_rpc_gss_validate(struct svc_rpc_gss_client *client, struct rpc_msg *msg, gss_qop_t *qop, rpc_gss_proc_t gcproc) argument [all...] |
H A D | rpcsec_gss.c | 311 const char *qop, rpc_gss_options_req_t *options_req, 323 if (qop) { 324 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) 443 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, const char *qop) argument 454 if (qop) { 455 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) { 309 rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/freebsd-current/sys/rpc/ |
H A D | rpcsec_gss.h | 88 const char *qop; /* quality of protection */ member in struct:__anon46 158 const char *qop, rpc_gss_options_req_t *options_req, 161 rpc_gss_service_t service, const char *qop); 167 typedef bool_t rpc_gss_qop_to_num_ftype(const char *qop, const char *mech, 239 rpc_gss_service_t service, const char *qop, 246 clnt_principal, principal, mechanism, service, qop, 253 const char *qop) 259 qop); 303 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret) argument 308 ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mec 237 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 252 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 671 const char *qop) 673 if (digest->request.qop) { 674 krb5_set_error_message(context, EINVAL, "qop already set"); 677 digest->request.qop = malloc(sizeof(*digest->request.qop)); 678 if (digest->request.qop == NULL) { 682 *digest->request.qop = strdup(qop); 683 if (*digest->request.qop == NULL) { 685 free(digest->request.qop); 669 krb5_digest_set_qop(krb5_context context, krb5_digest digest, const char *qop) argument [all...] |
/freebsd-current/lib/libgssapi/ |
H A D | Makefile | 106 MLINKS+= mech.5 qop.5
|
/freebsd-current/lib/libfetch/ |
H A D | http.c | 635 char *qop; member in struct:__anon290 647 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 656 if (b->qop) 657 free(b->qop); 816 } else if (strcasecmp(key, "qop") == 0) { 817 cs->challenges[cs->count]->qop = 1178 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */ 1181 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 1186 DEBUGF("Calc: HA1[%s] Nonce[%s] qop[%s] method[%s] URI[%s]\n", 1232 * [opaque] | [message-qop] | [all...] |
/freebsd-current/tools/regression/rpcsec_gss/ |
H A D | rpctest.c | 263 printf("new security context version=%d, mech=%s, qop=%s:\n", 264 rcred->version, rcred->mechanism, rcred->qop);
|
/freebsd-current/crypto/heimdal/appl/gssmask/ |
H A D | gssmask.c | 610 gss_qop_t qop; local 631 &mic_token, &qop);
|
/freebsd-current/crypto/heimdal/kdc/ |
H A D | digest.c | 690 if (ireq.u.digestRequest.qop == NULL) 769 EVP_DigestUpdate(ctx, *ireq.u.digestRequest.qop, 770 strlen(*ireq.u.digestRequest.qop));
|
/freebsd-current/sys/kgssapi/ |
H A D | gsstest.c | 1016 printf("new security context version=%d, mech=%s, qop=%s:\n", 1017 rcred->version, rcred->mechanism, rcred->qop);
|