Searched refs:gss_wrap (Results 1 - 9 of 9) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/ |
H A D | gss_api.h | 47 u32 gss_wrap( 102 u32 (*gss_wrap)( member in struct:gss_api_ops
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_mech_switch.c | 304 gss_wrap(struct gss_ctx *ctx_id, function 310 ->gss_wrap(ctx_id, offset, buf, inpages);
|
H A D | gss_krb5_mech.c | 723 .gss_wrap = gss_wrap_kerberos,
|
H A D | svcauth_gss.c | 1347 if (gss_wrap(gsd->rsci->mechctx, offset, resbuf, inpages))
|
H A D | auth_gss.c | 1364 maj_stat = gss_wrap(ctx->gc_gss_ctx, offset, snd_buf, inpages);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | sasl.c | 457 gss_rc = gss_wrap(&minor_status, context_handle,0,GSS_C_QOP_DEFAULT,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | socks_gssapi.c | 355 * protected with gss_seal()/gss_wrap(). See RFC1961 extract below 378 * required protection level using gss_seal()/gss_wrap() with conf_req 396 gss_major_status = gss_wrap(&gss_minor_status, gss_context, 0, 400 if(check_gss_err(data,gss_major_status,gss_minor_status,"gss_wrap")) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_gss.c | 284 * gss_wrap afpd's session_key. 293 /* gss_wrap the session key with the default machanism. 295 gss_wrap (&status, context, 1, GSS_C_QOP_DEFAULT, &sesskey_buff, NULL, &wrap_buff); 298 LOG(log_error, logtype_uams, "wrap_sessionkey: failed to gss_wrap sessionkey"); 423 username for afpd and gss_wrap the sessionkey */
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | gssapi.c | 512 maj_stat = gss_wrap(&min_stat, gps->gss_context, 1, GSS_C_QOP_DEFAULT,
|
Completed in 238 milliseconds