/dports/net/rclone/rclone-1.57.0/vendor/github.com/jcmturner/gokrb5/v8/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 35 type MICToken struct { struct 56 func (mt *MICToken) Marshal() ([]byte, error) { argument 71 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 85 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 101 func (mt *MICToken) getMICChecksumHeader() []byte { argument 113 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 129 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 162 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 163 token := MICToken{
|
/dports/net/rclone/rclone-1.57.0/vendor/github.com/jcmturner/gokrb5/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 35 type MICToken struct { struct 56 func (mt *MICToken) Marshal() ([]byte, error) { argument 71 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 85 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 101 func (mt *MICToken) getMICChecksumHeader() []byte { argument 113 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 129 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 162 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 163 token := MICToken{
|
H A D | gssapi.go | 110 …MIC() MICToken // apply integrity check, receiv… 111 …VerifyMIC(mt MICToken) (bool, error) // validate integrity check toke… argument
|
/dports/security/vault/vault-1.8.2/vendor/github.com/jcmturner/gokrb5/v8/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
/dports/security/vault/vault-1.8.2/vendor/github.com/jcmturner/gokrb5/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
H A D | gssapi.go | 110 …MIC() MICToken // apply integrity check, receiv… 111 …VerifyMIC(mt MICToken) (bool, error) // validate integrity check toke… argument
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/jcmturner/gokrb5/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 35 type MICToken struct { struct 56 func (mt *MICToken) Marshal() ([]byte, error) { argument 71 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 85 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 101 func (mt *MICToken) getMICChecksumHeader() []byte { argument 113 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 129 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 162 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 163 token := MICToken{
|
H A D | gssapi.go | 110 …MIC() MICToken // apply integrity check, receiv… 111 …VerifyMIC(mt MICToken) (bool, error) // validate integrity check toke… argument
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/jcmturner/gokrb5/v8/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 35 type MICToken struct { struct 56 func (mt *MICToken) Marshal() ([]byte, error) { argument 71 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 85 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 101 func (mt *MICToken) getMICChecksumHeader() []byte { argument 113 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 129 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 162 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 163 token := MICToken{
|
/dports/net/goreplay/goreplay-1.2.0/vendor/gopkg.in/jcmturner/gokrb5.v7/gokrb5-7.5.0/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
H A D | gssapi.go | 110 …MIC() MICToken // apply integrity check, receiv… 111 …VerifyMIC(mt MICToken) (bool, error) // validate integrity check toke… argument
|
/dports/net/goreplay/goreplay-1.2.0/vendor/gopkg.in/jcmturner/gokrb5.v7/gokrb5-7.5.0/v8/gssapi/ |
H A D | MICToken_test.go | 24 func getMICChallengeReference() *MICToken { 26 return &MICToken{ 40 func getMICResponseReference() *MICToken { 42 return &MICToken{ 59 var mt MICToken 68 var mt MICToken 80 var mt MICToken 89 var mt MICToken 101 var mt MICToken 112 var mt MICToken [all …]
|
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
/dports/devel/git-lfs/git-lfs-3.0.2/vendor/github.com/jcmturner/gokrb5/v8/gssapi/ |
H A D | MICToken.go | 35 type MICToken struct { struct 56 func (mt *MICToken) Marshal() ([]byte, error) { argument 71 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 85 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 101 func (mt *MICToken) getMICChecksumHeader() []byte { argument 113 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 129 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 162 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 163 token := MICToken{
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/jcmturner/gokrb5/v8/gssapi/ |
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-kerberos/vendor/github.com/jcmturner/gokrb5/v8/gssapi/ |
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
/dports/net/goreplay/goreplay-1.2.0/vendor/gopkg.in/jcmturner/gokrb5.v7/gssapi/ |
H A D | MICToken.go | 60 type MICToken struct { struct 81 func (mt *MICToken) Marshal() ([]byte, error) { argument 96 func (mt *MICToken) SetChecksum(key types.EncryptionKey, keyUsage uint32) error { argument 113 func (mt *MICToken) checksum(key types.EncryptionKey, keyUsage uint32) ([]byte, error) { argument 129 func (mt *MICToken) getMICChecksumHeader() []byte { argument 141 func (mt *MICToken) Verify(key types.EncryptionKey, keyUsage uint32) (bool, error) { argument 157 func (mt *MICToken) Unmarshal(b []byte, expectFromAcceptor bool) error { argument 190 func NewInitiatorMICToken(payload []byte, key types.EncryptionKey) (*MICToken, error) { 191 token := MICToken{
|
H A D | gssapi.go | 110 …MIC() MICToken // apply integrity check, receiv… 111 …VerifyMIC(mt MICToken) (bool, error) // validate integrity check toke… argument
|