/external/chromium_org/third_party/openssl/openssl/ssl/ |
D | kssl.c | 286 krb5_enctype enctype, krb5_keytab_entry *entry)=NULL; 774 krb5_enctype enctype, krb5_keytab_entry *entry) in kssl_krb5_kt_get_entry() argument 777 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry)); in kssl_krb5_kt_get_entry() 816 kssl_map_enc(krb5_enctype enctype) in kssl_map_enc() argument 818 switch (enctype) in kssl_map_enc() 1016 printf("%s\n\t[et%d:%d]: ", label, keyblk->enctype, keyblk->length); in print_krb5_keyblock() 1136 kssl_ctx->enctype = krb5credsp->session.keytype; in kssl_cget_tkt() 1138 kssl_ctx->enctype = krb5credsp->keyblock.enctype; in kssl_cget_tkt() 1276 new5ticket->enc_part.enctype = asn1ticket->encdata->etype->data[0]; in kssl_TKT2tkt() 1466 krb5ticket->enc_part.enctype, &kt_entry)) != 0) { in kssl_sget_tkt() [all …]
|
D | kssl.h | 138 krb5_enctype enctype; member 173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
D | kssl_lcl.h | 78 const EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
|
D | d1_clnt.c | 1074 enc = kssl_map_enc(kssl_ctx->enctype); in dtls1_send_client_key_exchange()
|
/external/openssl/ssl/ |
D | kssl.c | 286 krb5_enctype enctype, krb5_keytab_entry *entry)=NULL; 774 krb5_enctype enctype, krb5_keytab_entry *entry) in kssl_krb5_kt_get_entry() argument 777 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry)); in kssl_krb5_kt_get_entry() 816 kssl_map_enc(krb5_enctype enctype) in kssl_map_enc() argument 818 switch (enctype) in kssl_map_enc() 1016 printf("%s\n\t[et%d:%d]: ", label, keyblk->enctype, keyblk->length); in print_krb5_keyblock() 1136 kssl_ctx->enctype = krb5credsp->session.keytype; in kssl_cget_tkt() 1138 kssl_ctx->enctype = krb5credsp->keyblock.enctype; in kssl_cget_tkt() 1276 new5ticket->enc_part.enctype = asn1ticket->encdata->etype->data[0]; in kssl_TKT2tkt() 1466 krb5ticket->enc_part.enctype, &kt_entry)) != 0) { in kssl_sget_tkt() [all …]
|
D | kssl.h | 138 krb5_enctype enctype; member 173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
D | kssl_lcl.h | 78 const EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
|
D | d1_clnt.c | 1074 enc = kssl_map_enc(kssl_ctx->enctype); in dtls1_send_client_key_exchange()
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
D | kssl.h | 138 krb5_enctype enctype; member 173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
/external/openssl/include/openssl/ |
D | kssl.h | 138 krb5_enctype enctype; member 173 unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn);
|
/external/ppp/pppd/ |
D | ecp.h | 36 unsigned enctype; /* Encryption type */ member
|
/external/tcpdump/ |
D | print-telnet.c | 91 static const char *enctype[] = { variable 190 (void)printf(" %s", STR_OR_ID(c, enctype)); in telnet_parse()
|
/external/ipsec-tools/src/racoon/ |
D | oakley.c | 2792 keylen = alg_oakley_encdef_keylen(iph1->approval->enctype, 2798 iph1->approval->enctype, 2897 if (iph1->approval->enctype > ARRAYLEN(oakley_encdef) 2898 || oakley_encdef[iph1->approval->enctype].weakkey == NULL) { 2901 iph1->approval->enctype); 2904 if ((oakley_encdef[iph1->approval->enctype].weakkey)(iph1->key)) { 3001 newivm->iv->l = alg_oakley_encdef_blocklen(iph1->approval->enctype); 3005 iph1->approval->enctype); 3083 newivm->iv->l = alg_oakley_encdef_blocklen(iph1->approval->enctype); 3087 iph1->approval->enctype); [all …]
|
D | remoteconf.h | 141 int enctype; member
|
D | ipsec_doi.c | 372 s->enctype), 374 tsap->enctype)); 400 if(tsap->enctype == s->enctype && 489 if (sa.enctype != s->enctype) { 497 s->enctype), 499 sa.enctype)); 612 sa->enctype = (u_int16_t)ntohs(d->lorv); 861 if (sa->enctype == OAKLEY_ATTR_ENC_ALG_DES 863 || sa->enctype == OAKLEY_ATTR_ENC_ALG_IDEA 865 || sa->enctype == OAKLEY_ATTR_ENC_ALG_3DES) { [all …]
|
D | handler.c | 1395 if(approval->enctype != p->enctype){ in revalidate_ph1()
|
D | pfkey.c | 705 keylen_ealg(enctype, encklen) in keylen_ealg() argument 706 u_int enctype; in keylen_ealg() 711 res = alg_ipsec_encdef_keylen(enctype, encklen); 714 "invalid encryption algorithm %u.\n", enctype);
|
D | remoteconf.c | 602 alg_oakley_encdef_name(prop->enctype)); in dump_rmconf_single()
|
D | cfparse.y | 2399 new->enctype = types[algclass_isakmp_enc];
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
D | HTMLFormElement.idl | 25 [CustomElementCallbacks] attribute DOMString enctype;
|
D | HTMLFormElement.h | 58 String enctype() const { return m_attributes.encodingType(); } in enctype() function
|
D | HTMLAttributeNames.in | 102 enctype
|
/external/ipsec-tools/ |
D | setup.c | 304 p->enctype = encryption; in add_proposal()
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/benchmark/jquery/ |
D | jquery-1.8.2.min.js | 2 …enctype:!!e.createElement("form").enctype,html5Clone:e.createElement("nav").cloneNode(!0).outerHTM… property
|
/external/chromium_org/third_party/flot/ |
D | jquery.min.js | 2 …enctype:!!i.createElement("form").enctype,html5Clone:i.createElement("nav").cloneNode(!0).outerHTM… property
|