/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 129 ** authenticator[4] EncryptedData 141 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 193 /* -- Unencrypted authenticator 195 ** authenticator-vno[0] INTEGER,
|
H A D | krb5_asn.c | 105 ASN1_EXP(KRB5_APREQBODY, authenticator, KRB5_ENCDATA, 4),
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/ |
H A D | krb5_asn.h | 129 ** authenticator[4] EncryptedData 141 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 193 /* -- Unencrypted authenticator 195 ** authenticator-vno[0] INTEGER,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | krb5_asn.h | 129 ** authenticator[4] EncryptedData 141 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 193 /* -- Unencrypted authenticator 195 ** authenticator-vno[0] INTEGER,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.h | 129 ** authenticator[4] EncryptedData 141 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 193 /* -- Unencrypted authenticator 195 ** authenticator-vno[0] INTEGER,
|
H A D | krb5_asn.c | 105 ASN1_EXP(KRB5_APREQBODY, authenticator, KRB5_ENCDATA, 4),
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/mac80211/ |
H A D | wpa.c | 82 int authenticator; local 114 authenticator = 1; 115 key = &tx->key->key[authenticator ? ALG_TKIP_TEMP_AUTH_TX_MIC_KEY : 132 int authenticator = 1, wpa_test = 0; local 164 authenticator = 1; 165 key = &rx->key->key[authenticator ? ALG_TKIP_TEMP_AUTH_RX_MIC_KEY :
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/linux/ |
H A D | wanrouter.h | 29 * Added 'authenticator' to 'wan_ppp_conf_t' 174 char authenticator; /* AUTHENTICATOR or not */ member in struct:wan_ppp_conf
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/ssl/ |
H A D | s3_srvr.c | 1578 krb5_data authenticator; local 1608 authenticator.length = i; 1610 if (n < enc_ticket.length + authenticator.length + 6) 1617 authenticator.data = (char *)p; 1618 p+=authenticator.length; 1635 if (n != enc_ticket.length + authenticator.length + 1657 /* Note: no authenticator is not considered an error, 1660 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator,
|
H A D | kssl.c | 815 /* Return true:1 if p "looks like" the start of the real authenticator 886 /* Return pointer to start of real authenticator within authenticator, or 888 ** Decrypted authenticator looks like this: 1029 ** If authenp is non-NULL, also return encrypted authenticator, 1035 ** 20010606 VRS May also return optional authenticator. 1149 ap_req->authenticator, NULL); 1155 ap_req->authenticator, &adp); 1923 ** in_clock_skew() macro. The authenticator client time is checked 1961 /* Decode and decrypt given DER-encoded authenticator, the [all...] |
H A D | s3_clnt.c | 1511 krb5_data authenticator, *authp = NULL; local 1529 if (KRB5SENDAUTH) authp = &authenticator; 1570 ** optional authenticator omitted. 1593 s2n(0,p);/* null authenticator length */
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_srvr.c | 1856 krb5_data authenticator; local 1886 authenticator.length = i; 1888 if (n < (int)(enc_ticket.length + authenticator.length) + 6) 1895 authenticator.data = (char *)p; 1896 p+=authenticator.length; 1913 if (n != (long)(enc_ticket.length + authenticator.length + 1935 /* Note: no authenticator is not considered an error, 1938 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator,
|
H A D | d1_clnt.c | 771 krb5_data authenticator, *authp = NULL; local 789 if (KRB5SENDAUTH) authp = &authenticator; 830 ** optional authenticator omitted. 853 s2n(0,p);/* null authenticator length */
|
H A D | kssl.c | 842 /* Return true:1 if p "looks like" the start of the real authenticator 913 /* Return pointer to start of real authenticator within authenticator, or 915 ** Decrypted authenticator looks like this: 1056 ** If authenp is non-NULL, also return encrypted authenticator, 1062 ** 20010606 VRS May also return optional authenticator. 1176 ap_req->authenticator, NULL); 1182 ap_req->authenticator, &adp); 1950 ** in_clock_skew() macro. The authenticator client time is checked 1988 /* Decode and decrypt given DER-encoded authenticator, the [all...] |
H A D | s3_clnt.c | 1713 krb5_data authenticator, *authp = NULL; local 1731 if (KRB5SENDAUTH) authp = &authenticator; 1772 ** optional authenticator omitted. 1795 s2n(0,p);/* null authenticator length */
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap_ms.c | 849 u_char authResponse[], int authenticator) 877 &response[MS_CHAP2_NTRESP], authenticator); 847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/wl/config/ |
H A D | wl.mk | 943 # in-driver authenticator
|