HomeSort by: relevance | last modified time | path
    Searched defs:enctype (Results 1 - 25 of 30) sorted by relevancy

1 2

  /src/external/bsd/ppp/dist/pppd/
ecp.h 49 unsigned enctype; /* Encryption type */ member in struct:ecp_options
  /src/crypto/external/bsd/heimdal/dist/admin/
remove.c 47 krb5_enctype enctype = 0; local
57 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype);
61 enctype = t;
70 if (!principal && !enctype && !opt->kvno_integer) {
73 "principal, enctype or kvno.");
84 entry.keyblock.keytype = enctype;
add.c 57 krb5_enctype enctype; local
80 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype);
84 enctype = t;
125 ret = krb5_keyblock_init(context, enctype,
137 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
140 ret = krb5_string_to_key(context, enctype, opt->password_string,
145 ret = krb5_generate_random_keyblock(context, enctype, &entry.keyblock);
  /src/crypto/external/bsd/heimdal/dist/kadmin/
stash.c 48 krb5_enctype enctype; local
57 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype);
110 ret = krb5_string_to_key_salt(context, enctype, buf, salt, &key);
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
derived-key-test.c 41 krb5_enctype enctype; member in struct:testcase
116 for (t = tests; t->enctype != 0; ++t) {
120 key.keytype = t->enctype;
121 krb5_enctype_keysize(context, t->enctype, &key.keyvalue.length);
124 ret = krb5_derive_key(context, &key, t->enctype, t->constant,
132 printf ("derive_key failed (enctype %d)\n", t->enctype);
string-to-key-test.c 43 krb5_enctype enctype; member in struct:testcase
119 ret = krb5_string_to_key (context, t->enctype, t->password,
pseudo-random-test.c 41 krb5_enctype enctype; member in struct:testcase
72 for (t = tests; t->enctype != 0; ++t) {
79 key.keytype = t->enctype;
80 krb5_enctype_keysize(context, t->enctype, &key.keyvalue.length);
98 printf ("PRF failed (enctype %d)\n", t->enctype);
test_pknistkdf.c 48 krb5_enctype enctype; member in struct:testcase
79 ETYPE_AES256_CTS_HMAC_SHA1_96, /* enctype */
125 ETYPE_AES256_CTS_HMAC_SHA1_96, /* enctype */
171 ETYPE_AES256_CTS_HMAC_SHA1_96, /* enctype */
265 printf("enctype: %d\n", (int)c->enctype);
283 c->enctype,
aes-test.c 57 krb5_enctype enctype; member in struct:__anon874
270 keys[i].enctype,
553 krb5_enctype enctype,
566 e.enctype = enctype;
582 ret = krb5_c_encrypt_length(context, enctype, clear->length, &len);
596 krb5_enctype enctype; member in struct:__anon875
756 kb.keytype = krbencs[i].enctype;
760 ret = krb5_crypto_init(context, &kb, krbencs[i].enctype, &crypto);
799 ret = krb_enc_mit(context, krbencs[i].enctype, &kb
    [all...]
get_cred.c 1389 krb5_enctype enctype; member in struct:krb5_get_creds_opt_data
1435 krb5_enctype enctype)
1437 opt->enctype = enctype;
1516 if (opt && opt->enctype) {
1517 ret = krb5_enctype_valid(context, opt->enctype);
1539 if (opt && opt->enctype) {
1540 in_creds.session.keytype = opt->enctype;
  /src/crypto/external/bsd/heimdal/dist/kuser/
copy_cred_cache.c 102 krb5_enctype enctype; local
103 ret = krb5_string_to_enctype(heimtools_context, opt->enctype_string, &enctype);
107 ctx.mcreds.session.keytype = enctype;
kdecode_ticket.c 46 krb5_enctype enctype)
60 ret = krb5_string_to_key (context, enctype, "foo", server, &key);
82 { "enctype", 'e', arg_string, &etype_str,
83 "encryption type to use", "enctype"},
137 krb5_enctype enctype; local
139 ret = krb5_string_to_enctype(context, etype_str, &enctype);
141 krb5_errx (context, 1, "unrecognized enctype: %s", etype_str);
142 in.session.keytype = enctype;
kgetcred.c 70 { "enctype", 'e', arg_string, &etype_str,
71 NP_("encryption type to use", ""), "enctype"},
153 krb5_enctype enctype; local
155 ret = krb5_string_to_enctype(context, etype_str, &enctype);
157 krb5_errx(context, 1, N_("unrecognized enctype: %s", ""),
159 krb5_get_creds_opt_set_enctype(context, opt, enctype);
kinit.c 481 krb5_enctype *enctype = NULL; local
621 enctype = malloc(etype_str.num_strings * sizeof(*enctype));
622 if (enctype == NULL)
627 &enctype[i]);
629 errx(1, "unrecognized enctype: %s", etype_str.strings[i]);
631 krb5_get_init_creds_opt_set_etype_list(opt, enctype,
834 if (enctype)
835 free(enctype);
  /src/crypto/external/bsd/heimdal/dist/kdc/
kstash.c 51 { "enctype", 'e', arg_string, rk_UNCONST(&enctype_str), "encryption type",
73 krb5_enctype enctype; local
96 ret = krb5_string_to_enctype(context, enctype_str, &enctype);
115 ret = krb5_generate_random_keyblock(context, enctype, &key);
133 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
digest.c 66 krb5_enctype enctype; local
73 &enctype,
kerberos5.c 169 krb5_enctype enctype = (krb5_enctype)ETYPE_NULL; local
185 * client all support, using the local cryptosystem enctype
191 * available with different supported enctype lists.
197 p[i] != (krb5_enctype)ETYPE_NULL && enctype == (krb5_enctype)ETYPE_NULL;
204 for (k = 0; k < len && enctype == (krb5_enctype)ETYPE_NULL; k++) {
217 enctype = p[i];
227 * Pick the first key from the client's enctype list that is
249 enctype = etypes[i];
258 if (enctype == (krb5_enctype)ETYPE_NULL) {
261 * exception and no other enctype matches both the client request an
    [all...]
pkinit.c 201 krb5_enctype enctype)
266 enctype,
1157 krb5_enctype enctype; local
1174 "No valid enctype available from client");
1177 enctype = req->req_body.etype.val[i];
1179 enctype = ETYPE_DES3_CBC_SHA1;
1196 ret = krb5_generate_random_keyblock(context, enctype,
1248 ret = generate_dh_keyblock(context, cp, enctype);
1297 ret = krb5_crypto_init(context, &cp->reply_key, enctype, &reply_crypto);
1403 ret = krb5_generate_random_keyblock(context, enctype,
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/
test_acquire_cred.c 179 static int enctype = 0; variable
190 {"enctype", 0, arg_integer, &enctype, "enctype-num", NULL },
191 {"loops", 0, arg_integer, &num_loops, "enctype-num", NULL },
192 {"kerberos", 0, arg_flag, &kerberos_flag, "enctype-num", NULL },
296 if (enctype) {
297 int32_t enctypelist = enctype;
test_context.c 576 {"limit-enctype",0, arg_string, &limit_enctype_string, "enctype", NULL },
589 {"session-enctype", 0, arg_string, &session_enctype_string, "enctype", NULL },
862 errx(1, "gsskrb5_get_subkey wrong enctype");
875 errx(1, "gsskrb5_get_subkey wrong enctype");
884 errx(1, "enctype mismatch");
893 krb5_enctype enctype; local
897 &enctype);
902 if (enctype != keyblock->keytype
    [all...]
  /src/usr.bin/mail/
mime_header.c 101 char enctype; local
111 enctype = *p++;
131 declen = mime_rfc2047_decode(enctype, dstend, dstlen, encword, enclen);
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
init_sec_context.c 502 krb5_enctype enctype; local
598 enctype = ctx->auth_context->keyblock->keytype;
629 enctype,
644 enctype,
  /src/crypto/external/bsd/heimdal/dist/lib/hdb/
mkey.c 163 int16_t enctype; local
182 ret = krb5_ret_int16(sp, &enctype);
185 ret = krb5_enctype_valid(context, enctype);
188 key.keytype = enctype;
  /src/crypto/dist/ipsec-tools/src/racoon/
remoteconf.h 60 int enctype; member in struct:isakmpsa
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
hxtool.c 583 const heim_oid *enctype = NULL; local
611 enctype = hx509_crypto_enctype_by_name(opt->encryption_type_string);
612 if (enctype == NULL)
630 ret = hx509_cms_envelope_1(context, flags, cert, p, sz, enctype,

Completed in 53 milliseconds

1 2