/freebsd-11-stable/sys/netgraph/ |
H A D | ng_parse.c | 1327 etype = ng_get_composite_etype(type, index, ctype); local 1347 error = INVOKE(etype, parse)(etype, 1402 etype = ng_get_composite_etype(type, index, ctype); local 1446 if ((error = INVOKE(etype, unparse) 1447 (etype, data, off, cbuf, cbuflen)) != 0) { 1475 const struct ng_parse_type *etype; local 1506 etype = ng_get_composite_etype(type, index, ctype); 1507 func = METHOD(etype, getDefault); 1510 return (*func)(etype, star 1561 const struct ng_parse_type *etype = NULL; local 1600 etype = ng_get_composite_etype(type, index, ctype); local [all...] |
H A D | ng_checksum.c | 577 uint16_t etype; local 589 etype = ntohs(eh->ether_type); 592 switch (etype) 600 etype = ntohs(vh->etype); 609 if (etype == ETHERTYPE_IP && 617 if (etype == ETHERTYPE_IPV6 &&
|
H A D | ng_rfc1490.c | 338 u_int16_t etype; local 341 switch_on_etype: etype = ntohs(*((const u_int16_t *)ptr)); 344 switch (etype) {
|
H A D | ng_patch.c | 588 uint16_t etype; local 595 etype = ntohs(eh->ether_type); 598 switch (etype) 606 etype = ntohs(vh->etype);
|
/freebsd-11-stable/contrib/elftoolchain/brandelf/ |
H A D | brandelf.c | 275 iselftype(int etype) argument 282 if (etype == elftypes[elfwalk].value)
|
/freebsd-11-stable/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 78 * etype[0] INTEGER, -- EncryptionType 84 ASN1_INTEGER *etype; member in struct:krb5_encdata_st
|
H A D | krb5_asn.c | 65 ASN1_EXP(KRB5_ENCDATA, etype, ASN1_INTEGER, 0),
|
/freebsd-11-stable/stand/libsa/ |
H A D | net.h | 108 u_char *dea, int etype);
|
H A D | ip.c | 189 uint16_t etype; /* host order */ local 201 n = readether(d, (void **)&ptr, (void **)&ip, tleft, &etype); 210 if (etype == ETHERTYPE_ARP) { 221 if (etype != ETHERTYPE_IP) { 224 printf("readip: not IP. ether_type=%x\n", etype);
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 91 _kdc_is_weak_exception(krb5_principal principal, krb5_enctype etype) argument 95 (etype == ETYPE_DES_CBC_CRC 96 || etype == ETYPE_DES_CBC_MD4 97 || etype == ETYPE_DES_CBC_MD5)) 325 krb5_enctype etype, 352 ret = krb5_crypto_init(context, skey, etype, &crypto); 476 ent->etype = key->key.keytype; 567 ent->etype = key->key.keytype; 688 for (i = 0; i < b->etype.len; i++) { 689 ret = krb5_enctype_to_string(context, b->etype 322 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *reply_key, int rk_is_subkey, const char **e_text, krb5_data *reply) argument [all...] |
H A D | krb5tgs.c | 155 sp.etype = enctype; 229 ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key); 980 /* It is somewhat unclear where the etype in the following 984 etype, given the keytype in the tgt, or should we look 985 at the etype list here as well? What if the tgt 987 CAST session key. Should the DES3 etype be added to the 988 etype list, even if we don't want a session key with 1237 *krbtgt_etype = ap_req.ticket.enc_part.etype; 1240 ap_req.ticket.enc_part.etype, &tkey); 1244 krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, 1681 krb5_enctype etype; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 55 * Converts etype to a user readable string and sets as a side effect 57 * KRB5_PROG_ETYPE_NOSUPP in not the conversion of the etype failed in 58 * which case the error code of the etype convesion is returned. 62 unsupported_enctype(krb5_context context, krb5_enctype etype) argument 67 ret = krb5_enctype_to_string(context, etype, &name); 656 krb5_enctype etype, 660 e = _krb5_find_enctype(etype); 664 etype); 679 krb5_enctype *etype) 684 *etype 655 krb5_enctype_to_string(krb5_context context, krb5_enctype etype, char **string) argument 677 krb5_string_to_enctype(krb5_context context, const char *string, krb5_enctype *etype) argument 694 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument 717 krb5_enctype_valid(krb5_context context, krb5_enctype etype) argument 749 krb5_cksumtype_to_enctype(krb5_context context, krb5_cksumtype ctype, krb5_enctype *etype) argument 1949 krb5_derive_key(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, const void *constant, size_t constant_len, krb5_keyblock **derived_key) argument 2025 krb5_crypto_init(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_crypto *crypto) argument [all...] |
H A D | mk_rep.c | 91 ap.enc_part.etype = auth_context->keyblock->keytype; 101 0 /* ap.enc_part.etype */, &crypto);
|
H A D | auth_context.c | 392 krb5_enctype etype) 399 auth_context->keyblock->keytype = etype; 406 krb5_enctype *etype)
|
H A D | mk_priv.c | 106 s.enc_part.etype = key->keytype;
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_lib.c | 285 ASN1_OBJECT **petype, *etype; local 291 etype = OBJ_dup(oid); 292 if (!etype) 295 *petype = etype;
|
/freebsd-11-stable/sbin/ipfw/ |
H A D | tables.c | 1521 char *comma, *e, *etype, *n, *p; local 1552 etype = NULL; 1565 etype = "tag"; 1570 etype = "pipe"; 1575 etype = "divert"; 1580 etype = "skipto"; 1585 etype = "netgraph"; 1590 etype = "fib"; 1595 etype = "nat"; 1600 etype [all...] |
/freebsd-11-stable/sys/kgssapi/krb5/ |
H A D | kcrypto.c | 58 krb5_find_encryption_class(int etype) argument 63 if (krb5_encryption_classes[i]->ec_type == etype)
|
H A D | kcrypto.h | 143 krb5_find_encryption_class(int etype);
|
/freebsd-11-stable/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 61 int kvno, krb5_keyblock *key, krb5_enctype etype, 78 if(etype != 0) 79 (*mkey)->keytab.keyblock.keytype = etype; 81 ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto); 60 hdb_process_master_key(krb5_context context, int kvno, krb5_keyblock *key, krb5_enctype etype, hdb_master_key *mkey) argument
|
/freebsd-11-stable/sys/net/ |
H A D | ethernet.h | 35 #define ETHER_MAX_FRAME(ifp, etype, hasfcs) \ 38 (((etype) == ETHERTYPE_VLAN) ? ETHER_VLAN_ENCAP_LEN : 0))
|
/freebsd-11-stable/sys/netgraph/netflow/ |
H A D | ng_netflow.c | 696 uint16_t etype; local 702 etype = ntohs(eh->ether_type); 703 switch (etype) { 730 etype = ntohs(evh->evl_proto); 733 if (etype == ETHERTYPE_IP) { 738 } else if (etype == ETHERTYPE_IPV6) {
|
/freebsd-11-stable/sys/dev/ixl/ |
H A D | ixl_txrx.c | 704 u16 etype; local 724 etype = ntohs(eh->evl_proto); 727 etype = ntohs(eh->evl_encap_proto); 731 switch (etype) { 804 u16 etype; local 825 etype = eh->evl_proto; 828 etype = eh->evl_encap_proto; 831 switch (ntohs(etype)) { 864 __func__, ntohs(etype));
|
/freebsd-11-stable/sys/dev/qlxgbe/ |
H A D | ql_isr.c | 218 uint16_t etype; local 319 etype = ntohs(eh->evl_proto); 321 etype = ntohs(eh->evl_encap_proto); 324 if (etype == ETHERTYPE_IP) { 336 } else if (etype == ETHERTYPE_IPV6) {
|
/freebsd-11-stable/sys/dev/bhnd/bcma/ |
H A D | bcma_erom.c | 67 static int erom_seek_next(struct bcma_erom *erom, uint8_t etype); 237 * @param etype One of BCMA_EROM_ENTRY_TYPE_CORE, 244 erom_seek_next(struct bcma_erom *erom, uint8_t etype) argument 260 if (BCMA_EROM_GET_ATTR(entry, ENTRY_TYPE) == etype)
|