| /src/external/bsd/ppp/dist/pppd/ |
| ecp.h | 49 unsigned enctype; /* Encryption type */ member in struct:ecp_options
|
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| remove.c | 47 krb5_enctype enctype = 0; local 57 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype); 61 enctype = t; 70 if (!principal && !enctype && !opt->kvno_integer) { 73 "principal, enctype or kvno."); 84 entry.keyblock.keytype = enctype;
|
| add.c | 57 krb5_enctype enctype; local 80 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype); 84 enctype = t; 125 ret = krb5_keyblock_init(context, enctype, 137 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt, 140 ret = krb5_string_to_key(context, enctype, opt->password_string, 145 ret = krb5_generate_random_keyblock(context, enctype, &entry.keyblock);
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| stash.c | 48 krb5_enctype enctype; local 57 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype); 110 ret = krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| derived-key-test.c | 41 krb5_enctype enctype; member in struct:testcase 116 for (t = tests; t->enctype != 0; ++t) { 120 key.keytype = t->enctype; 121 krb5_enctype_keysize(context, t->enctype, &key.keyvalue.length); 124 ret = krb5_derive_key(context, &key, t->enctype, t->constant, 132 printf ("derive_key failed (enctype %d)\n", t->enctype);
|
| string-to-key-test.c | 43 krb5_enctype enctype; member in struct:testcase 119 ret = krb5_string_to_key (context, t->enctype, t->password,
|
| pseudo-random-test.c | 41 krb5_enctype enctype; member in struct:testcase 72 for (t = tests; t->enctype != 0; ++t) { 79 key.keytype = t->enctype; 80 krb5_enctype_keysize(context, t->enctype, &key.keyvalue.length); 98 printf ("PRF failed (enctype %d)\n", t->enctype);
|
| test_pknistkdf.c | 48 krb5_enctype enctype; member in struct:testcase 79 ETYPE_AES256_CTS_HMAC_SHA1_96, /* enctype */ 125 ETYPE_AES256_CTS_HMAC_SHA1_96, /* enctype */ 171 ETYPE_AES256_CTS_HMAC_SHA1_96, /* enctype */ 265 printf("enctype: %d\n", (int)c->enctype); 283 c->enctype,
|
| aes-test.c | 57 krb5_enctype enctype; member in struct:__anon874 270 keys[i].enctype, 553 krb5_enctype enctype, 566 e.enctype = enctype; 582 ret = krb5_c_encrypt_length(context, enctype, clear->length, &len); 596 krb5_enctype enctype; member in struct:__anon875 756 kb.keytype = krbencs[i].enctype; 760 ret = krb5_crypto_init(context, &kb, krbencs[i].enctype, &crypto); 799 ret = krb_enc_mit(context, krbencs[i].enctype, &kb [all...] |
| get_cred.c | 1389 krb5_enctype enctype; member in struct:krb5_get_creds_opt_data 1435 krb5_enctype enctype) 1437 opt->enctype = enctype; 1516 if (opt && opt->enctype) { 1517 ret = krb5_enctype_valid(context, opt->enctype); 1539 if (opt && opt->enctype) { 1540 in_creds.session.keytype = opt->enctype;
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| copy_cred_cache.c | 102 krb5_enctype enctype; local 103 ret = krb5_string_to_enctype(heimtools_context, opt->enctype_string, &enctype); 107 ctx.mcreds.session.keytype = enctype;
|
| kdecode_ticket.c | 46 krb5_enctype enctype) 60 ret = krb5_string_to_key (context, enctype, "foo", server, &key); 82 { "enctype", 'e', arg_string, &etype_str, 83 "encryption type to use", "enctype"}, 137 krb5_enctype enctype; local 139 ret = krb5_string_to_enctype(context, etype_str, &enctype); 141 krb5_errx (context, 1, "unrecognized enctype: %s", etype_str); 142 in.session.keytype = enctype;
|
| kgetcred.c | 70 { "enctype", 'e', arg_string, &etype_str, 71 NP_("encryption type to use", ""), "enctype"}, 153 krb5_enctype enctype; local 155 ret = krb5_string_to_enctype(context, etype_str, &enctype); 157 krb5_errx(context, 1, N_("unrecognized enctype: %s", ""), 159 krb5_get_creds_opt_set_enctype(context, opt, enctype);
|
| kinit.c | 481 krb5_enctype *enctype = NULL; local 621 enctype = malloc(etype_str.num_strings * sizeof(*enctype)); 622 if (enctype == NULL) 627 &enctype[i]); 629 errx(1, "unrecognized enctype: %s", etype_str.strings[i]); 631 krb5_get_init_creds_opt_set_etype_list(opt, enctype, 834 if (enctype) 835 free(enctype);
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kstash.c | 51 { "enctype", 'e', arg_string, rk_UNCONST(&enctype_str), "encryption type", 73 krb5_enctype enctype; local 96 ret = krb5_string_to_enctype(context, enctype_str, &enctype); 115 ret = krb5_generate_random_keyblock(context, enctype, &key); 133 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
| digest.c | 66 krb5_enctype enctype; local 73 &enctype,
|
| kerberos5.c | 169 krb5_enctype enctype = (krb5_enctype)ETYPE_NULL; local 185 * client all support, using the local cryptosystem enctype 191 * available with different supported enctype lists. 197 p[i] != (krb5_enctype)ETYPE_NULL && enctype == (krb5_enctype)ETYPE_NULL; 204 for (k = 0; k < len && enctype == (krb5_enctype)ETYPE_NULL; k++) { 217 enctype = p[i]; 227 * Pick the first key from the client's enctype list that is 249 enctype = etypes[i]; 258 if (enctype == (krb5_enctype)ETYPE_NULL) { 261 * exception and no other enctype matches both the client request an [all...] |
| pkinit.c | 201 krb5_enctype enctype) 266 enctype, 1157 krb5_enctype enctype; local 1174 "No valid enctype available from client"); 1177 enctype = req->req_body.etype.val[i]; 1179 enctype = ETYPE_DES3_CBC_SHA1; 1196 ret = krb5_generate_random_keyblock(context, enctype, 1248 ret = generate_dh_keyblock(context, cp, enctype); 1297 ret = krb5_crypto_init(context, &cp->reply_key, enctype, &reply_crypto); 1403 ret = krb5_generate_random_keyblock(context, enctype, [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ |
| test_acquire_cred.c | 179 static int enctype = 0; variable 190 {"enctype", 0, arg_integer, &enctype, "enctype-num", NULL }, 191 {"loops", 0, arg_integer, &num_loops, "enctype-num", NULL }, 192 {"kerberos", 0, arg_flag, &kerberos_flag, "enctype-num", NULL }, 296 if (enctype) { 297 int32_t enctypelist = enctype;
|
| test_context.c | 576 {"limit-enctype",0, arg_string, &limit_enctype_string, "enctype", NULL }, 589 {"session-enctype", 0, arg_string, &session_enctype_string, "enctype", NULL }, 862 errx(1, "gsskrb5_get_subkey wrong enctype"); 875 errx(1, "gsskrb5_get_subkey wrong enctype"); 884 errx(1, "enctype mismatch"); 893 krb5_enctype enctype; local 897 &enctype); 902 if (enctype != keyblock->keytype [all...] |
| /src/usr.bin/mail/ |
| mime_header.c | 101 char enctype; local 111 enctype = *p++; 131 declen = mime_rfc2047_decode(enctype, dstend, dstlen, encword, enclen);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| init_sec_context.c | 502 krb5_enctype enctype; local 598 enctype = ctx->auth_context->keyblock->keytype; 629 enctype, 644 enctype,
|
| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| mkey.c | 163 int16_t enctype; local 182 ret = krb5_ret_int16(sp, &enctype); 185 ret = krb5_enctype_valid(context, enctype); 188 key.keytype = enctype;
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| remoteconf.h | 60 int enctype; member in struct:isakmpsa
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| hxtool.c | 583 const heim_oid *enctype = NULL; local 611 enctype = hx509_crypto_enctype_by_name(opt->encryption_type_string); 612 if (enctype == NULL) 630 ret = hx509_cms_envelope_1(context, flags, cert, p, sz, enctype,
|