/external/openssl/ssl/ |
D | kssl.c | 1065 kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, in kssl_cget_tkt() argument 1080 if (!kssl_ctx) in kssl_cget_tkt() 1086 else if (!kssl_ctx->service_host) in kssl_cget_tkt() 1102 kssl_ctx->service_host, in kssl_cget_tkt() 1103 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_cget_tkt() 1108 kssl_ctx->service_host, in kssl_cget_tkt() 1109 (kssl_ctx->service_name)? kssl_ctx->service_name: in kssl_cget_tkt() 1140 kssl_ctx->enctype = krb5credsp->session.keytype; in kssl_cget_tkt() 1142 kssl_ctx->enctype = krb5credsp->keyblock.enctype; in kssl_cget_tkt() 1191 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session)) in kssl_cget_tkt() [all …]
|
D | kssl.h | 153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 156 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); 171 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
|
D | kssl_lcl.h | 80 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx); 81 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
|
D | ssl_sess.c | 628 if (s->kssl_ctx && !s->kssl_ctx->client_princ && in SSL_set_session() 631 … s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); in SSL_set_session() 632 memcpy(s->kssl_ctx->client_princ,session->krb5_client_princ, in SSL_set_session() 634 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; in SSL_set_session()
|
D | s3_srvr.c | 1936 KSSL_CTX *kssl_ctx = s->kssl_ctx; in ssl3_get_client_key_exchange() local 1948 if (!kssl_ctx) kssl_ctx = kssl_ctx_new(); in ssl3_get_client_key_exchange() 1999 if ((krb5rc = kssl_sget_tkt(kssl_ctx, &enc_ticket, &ttimes, in ssl3_get_client_key_exchange() 2016 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator, in ssl3_get_client_key_exchange() 2037 kssl_ctx_show(kssl_ctx); in ssl3_get_client_key_exchange() 2040 enc = kssl_map_enc(kssl_ctx->enctype); in ssl3_get_client_key_exchange() 2046 if (!EVP_DecryptInit_ex(&ciph_ctx,enc,NULL,kssl_ctx->key,iv)) in ssl3_get_client_key_exchange() 2102 if (kssl_ctx->client_princ) in ssl3_get_client_key_exchange() 2104 size_t len = strlen(kssl_ctx->client_princ); in ssl3_get_client_key_exchange() 2108 memcpy(s->session->krb5_client_princ,kssl_ctx->client_princ,len); in ssl3_get_client_key_exchange()
|
D | d1_clnt.c | 781 KSSL_CTX *kssl_ctx = s->kssl_ctx; in dtls1_send_client_key_exchange() local 805 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, in dtls1_send_client_key_exchange() 807 enc = kssl_map_enc(kssl_ctx->enctype); in dtls1_send_client_key_exchange() 882 kssl_ctx->key,iv); in dtls1_send_client_key_exchange()
|
D | s3_clnt.c | 1929 KSSL_CTX *kssl_ctx = s->kssl_ctx; in ssl3_send_client_key_exchange() local 1953 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, in ssl3_send_client_key_exchange() 1955 enc = kssl_map_enc(kssl_ctx->enctype); in ssl3_send_client_key_exchange() 2032 kssl_ctx->key,iv); in ssl3_send_client_key_exchange()
|
D | ssl_lib.c | 260 s->kssl_ctx = kssl_ctx_new(); in SSL_new() 525 if (s->kssl_ctx != NULL) in SSL_free() 526 kssl_ctx_free(s->kssl_ctx); in SSL_free() 1266 int nokrb5 = !kssl_tgt_is_available(s->kssl_ctx); in ssl_cipher_list_to_bytes()
|
D | ssltest.c | 840 if (c_ssl && c_ssl->kssl_ctx) in main() 852 kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER, in main()
|
D | s3_lib.c | 2370 if ( !kssl_keytab_is_available(s->kssl_ctx) ) in ssl3_choose_cipher()
|
D | ssl.h | 982 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */ member
|
/external/openssl/include/openssl/ |
D | kssl.h | 153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); 155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); 156 void kssl_ctx_show(KSSL_CTX *kssl_ctx); 157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, 159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, 161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); 171 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
|
D | ssl.h | 982 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */ member
|
/external/openssl/apps/ |
D | s_server.c | 1622 if ((con->kssl_ctx = kssl_ctx_new()) != NULL) in sv_body() 1624 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, in sv_body() 1626 kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, in sv_body() 1985 if (con->kssl_ctx->client_princ != NULL) in init_ssl_connection() 1988 con->kssl_ctx->client_princ); in init_ssl_connection() 2071 if ((con->kssl_ctx = kssl_ctx_new()) != NULL) in www_body() 2073 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC); in www_body() 2074 kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB); in www_body()
|
D | s_client.c | 741 if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL) in MAIN() 743 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host); in MAIN()
|