Home
last modified time | relevance | path

Searched refs:kssl_ctx (Results 1 – 15 of 15) sorted by relevance

/external/openssl/ssl/
Dkssl.c1065 kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx, in kssl_cget_tkt() argument
1080 if (!kssl_ctx) in kssl_cget_tkt()
1086 else if (!kssl_ctx->service_host) in kssl_cget_tkt()
1102 kssl_ctx->service_host, in kssl_cget_tkt()
1103 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_cget_tkt()
1108 kssl_ctx->service_host, in kssl_cget_tkt()
1109 (kssl_ctx->service_name)? kssl_ctx->service_name: in kssl_cget_tkt()
1140 kssl_ctx->enctype = krb5credsp->session.keytype; in kssl_cget_tkt()
1142 kssl_ctx->enctype = krb5credsp->keyblock.enctype; in kssl_cget_tkt()
1191 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session)) in kssl_cget_tkt()
[all …]
Dkssl.h153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text);
155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx);
156 void kssl_ctx_show(KSSL_CTX *kssl_ctx);
157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which,
159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp,
161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata,
163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
171 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
Dkssl_lcl.h80 int kssl_keytab_is_available(KSSL_CTX *kssl_ctx);
81 int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
Dssl_sess.c628 if (s->kssl_ctx && !s->kssl_ctx->client_princ && in SSL_set_session()
631 … s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); in SSL_set_session()
632 memcpy(s->kssl_ctx->client_princ,session->krb5_client_princ, in SSL_set_session()
634 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; in SSL_set_session()
Ds3_srvr.c1936 KSSL_CTX *kssl_ctx = s->kssl_ctx; in ssl3_get_client_key_exchange() local
1948 if (!kssl_ctx) kssl_ctx = kssl_ctx_new(); in ssl3_get_client_key_exchange()
1999 if ((krb5rc = kssl_sget_tkt(kssl_ctx, &enc_ticket, &ttimes, in ssl3_get_client_key_exchange()
2016 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator, in ssl3_get_client_key_exchange()
2037 kssl_ctx_show(kssl_ctx); in ssl3_get_client_key_exchange()
2040 enc = kssl_map_enc(kssl_ctx->enctype); in ssl3_get_client_key_exchange()
2046 if (!EVP_DecryptInit_ex(&ciph_ctx,enc,NULL,kssl_ctx->key,iv)) in ssl3_get_client_key_exchange()
2102 if (kssl_ctx->client_princ) in ssl3_get_client_key_exchange()
2104 size_t len = strlen(kssl_ctx->client_princ); in ssl3_get_client_key_exchange()
2108 memcpy(s->session->krb5_client_princ,kssl_ctx->client_princ,len); in ssl3_get_client_key_exchange()
Dd1_clnt.c781 KSSL_CTX *kssl_ctx = s->kssl_ctx; in dtls1_send_client_key_exchange() local
805 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, in dtls1_send_client_key_exchange()
807 enc = kssl_map_enc(kssl_ctx->enctype); in dtls1_send_client_key_exchange()
882 kssl_ctx->key,iv); in dtls1_send_client_key_exchange()
Ds3_clnt.c1929 KSSL_CTX *kssl_ctx = s->kssl_ctx; in ssl3_send_client_key_exchange() local
1953 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, in ssl3_send_client_key_exchange()
1955 enc = kssl_map_enc(kssl_ctx->enctype); in ssl3_send_client_key_exchange()
2032 kssl_ctx->key,iv); in ssl3_send_client_key_exchange()
Dssl_lib.c260 s->kssl_ctx = kssl_ctx_new(); in SSL_new()
525 if (s->kssl_ctx != NULL) in SSL_free()
526 kssl_ctx_free(s->kssl_ctx); in SSL_free()
1266 int nokrb5 = !kssl_tgt_is_available(s->kssl_ctx); in ssl_cipher_list_to_bytes()
Dssltest.c840 if (c_ssl && c_ssl->kssl_ctx) in main()
852 kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER, in main()
Ds3_lib.c2370 if ( !kssl_keytab_is_available(s->kssl_ctx) ) in ssl3_choose_cipher()
Dssl.h982 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */ member
/external/openssl/include/openssl/
Dkssl.h153 krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text);
155 KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx);
156 void kssl_ctx_show(KSSL_CTX *kssl_ctx);
157 krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which,
159 krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp,
161 krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata,
163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
171 krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp,
Dssl.h982 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */ member
/external/openssl/apps/
Ds_server.c1622 if ((con->kssl_ctx = kssl_ctx_new()) != NULL) in sv_body()
1624 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, in sv_body()
1626 kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, in sv_body()
1985 if (con->kssl_ctx->client_princ != NULL) in init_ssl_connection()
1988 con->kssl_ctx->client_princ); in init_ssl_connection()
2071 if ((con->kssl_ctx = kssl_ctx_new()) != NULL) in www_body()
2073 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC); in www_body()
2074 kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB); in www_body()
Ds_client.c741 if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL) in MAIN()
743 kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host); in MAIN()