/freebsd-11-stable/crypto/heimdal/kuser/ |
H A D | klist.c | 160 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s); 161 printf(N_("Ticket etype: ", "")); 166 printf(N_("unknown-enctype(%d)", ""), t.enc_part.etype); 171 if(cred->session.keytype != t.enc_part.etype) {
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | mit_glue.c | 140 krb5_c_valid_enctype (krb5_enctype etype) argument 142 return !krb5_enctype_valid(NULL, etype);
|
H A D | get_cred.c | 160 ALLOC_SEQ(&t->req_body.etype, 1); 161 if(t->req_body.etype.val == NULL) { 167 t->req_body.etype.val[0] = in_creds->session.keytype; 171 &t->req_body.etype.len, 172 &t->req_body.etype.val,
|
H A D | rd_cred.c | 99 if (cred.enc_part.etype == ETYPE_NULL) {
|
H A D | scache.c | 113 "etype INTEGER NOT NULL," \ 124 #define SQL_ICRED "INSERT INTO credentials (cid, kvno, etype, cred, created_at) VALUES (?,?,?,?,?)" 728 krb5_enctype etype = 0; local 739 etype = t.enc_part.etype; 745 sqlite3_bind_int(s->icred, 3, etype);
|
H A D | rd_req.c | 803 ap_req->ticket.enc_part.etype, 983 ap_req.ticket.enc_part.etype, 988 if (entry.keyblock.keytype != ap_req.ticket.enc_part.etype) {
|
H A D | pkinit.c | 1159 krb5_enctype etype, 1287 /* XXX compare given etype with key->etype */ 1304 krb5_enctype etype, 1511 etype, 1544 krb5_enctype etype, 1636 ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi, 1643 ctx, etype, hi, nonce, req_buffer, pa, key); 1695 ctx, etype, hi, nonce, req_buffer, pa, key); 1153 pk_rd_pa_reply_enckey(krb5_context context, int type, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument 1299 pk_rd_pa_reply_dh(krb5_context context, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, const DHNonce *c_n, const DHNonce *k_n, unsigned nonce, PA_DATA *pa, krb5_keyblock **key) argument 1541 _krb5_pk_rd_pa_reply(krb5_context context, const char *realm, void *c, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument
|
H A D | get_for_creds.c | 410 cred.enc_part.etype = ENCTYPE_NULL;
|
H A D | context.c | 931 * set `etype' to a malloced list of the default enctypes 935 default_etypes(krb5_context context, krb5_enctype **etype) argument 938 return copy_enctypes(context, p, etype);
|
/freebsd-11-stable/sys/dev/qlxgb/ |
H A D | qla_hw.c | 720 uint16_t etype, opcode, offload = 1; local 730 etype = ntohs(eh->evl_proto); 733 etype = ntohs(eh->evl_encap_proto); 736 switch (etype) { 842 uint16_t etype, opcode, offload = 1; local 854 etype = ntohs(eh->evl_proto); 857 etype = ntohs(eh->evl_encap_proto); 861 switch (etype) {
|
/freebsd-11-stable/contrib/libpcap/ |
H A D | pcap-usb-linux.c | 835 char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN]; local 865 ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, ×tamp, &etype, 904 if (etype == 'C') 916 uhdr->event_type = etype;
|
H A D | pcap-dos.c | 870 static WORD etype; variable 880 etype = ep->ether_type; 896 *type = etype;
|
/freebsd-11-stable/sys/dev/ena/ |
H A D | ena_datapath.c | 680 uint16_t etype; local 713 etype = ntohs(eh->evl_proto); 716 etype = ntohs(eh->evl_encap_proto); 735 switch (etype) {
|
/freebsd-11-stable/sys/netpfil/ipfw/ |
H A D | ip_fw2.c | 1403 uint16_t etype; /* Host order stored ether type */ local 1472 etype = ntohs(args->eh->ether_type); 1474 etype = 0; 1478 (etype == 0 || etype == ETHERTYPE_IPV6) && ip->ip_v == 6) { 1662 (etype == 0 || etype == ETHERTYPE_IP) && ip->ip_v == 4) { 1898 match = (etype >= p[0] && 1899 etype <= p[1]);
|
/freebsd-11-stable/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 266 int etype; local 284 etype = ETYPE_DES_CBC_CRC; 290 etype = ETYPE_DES3_CBC_SHA1; 294 etype = keydata->kk_type; 297 ec = krb5_find_encryption_class(etype); 305 switch (etype) {
|
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/ |
H A D | dbuf.h | 319 bp_embedded_type_t etype, enum zio_compress comp,
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | pkinit.c | 1257 if (req->req_body.etype.len > 0) { 1258 for (i = 0; i < req->req_body.etype.len; i++) 1259 if (krb5_enctype_valid(context, req->req_body.etype.val[i]) == 0) 1261 if (req->req_body.etype.len <= i) { 1267 enctype = req->req_body.etype.val[i];
|
/freebsd-11-stable/contrib/gcc/ |
H A D | fold-const.c | 4248 tree etype = TREE_TYPE (exp); 4255 && TREE_CODE (etype) == POINTER_TYPE 4256 && TREE_CODE (TREE_TYPE (etype)) == FUNCTION_TYPE) 4274 fold_convert (etype, high)); 4278 fold_convert (etype, low)); 4282 fold_convert (etype, low)); 4286 if (! TYPE_UNSIGNED (etype)) 4288 etype = lang_hooks.types.unsigned_type (etype); 4289 high = fold_convert (etype, hig 4222 tree etype = TREE_TYPE (exp); local 7320 tree etype, rpart, ipart; local 7344 tree etype, elem, elements; local [all...] |
/freebsd-11-stable/sys/dev/qlxgbe/ |
H A D | ql_hw.c | 2284 uint16_t etype, opcode, offload = 1; local 2294 etype = ntohs(eh->evl_proto); 2297 etype = ntohs(eh->evl_encap_proto); 2302 switch (etype) { 2408 uint16_t etype, opcode, offload = 1; local 2424 etype = ntohs(eh->evl_proto); 2427 etype = ntohs(eh->evl_encap_proto); 2431 switch (etype) { 4287 uint16_t etype; local 4299 etype [all...] |
/freebsd-11-stable/sys/dev/vxge/include/ |
H A D | vxgehal-ll.h | 4890 * @etype: ethertype to be added for this vpath into the list 4900 u64 etype); 4906 * @etype: Buffer to return Ethertype 4915 u64 *etype); 4921 * @etype: Buffer to return Ethwrtype 4930 u64 *etype); 4936 * @etype: ethertype to be added for this vpath into the list 4946 u64 etype);
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | kssl.c | 905 unsigned char *kssl_skip_confound(krb5_enctype etype, unsigned char *a) argument 912 conlen = (etype) ? 8 : 0; 1258 new5ticket->enc_part.enctype = asn1ticket->encdata->etype->data[0]; 2077 enctype = dec_authent->etype->data[0]; /* should = kssl_ctx->enctype */
|
/freebsd-11-stable/sys/dev/ocs_fc/ |
H A D | sli4.c | 5434 * @param etype CQ event type. 5444 sli_cq_parse(sli4_t *sli4, sli4_queue_t *cq, uint8_t *cqe, sli4_qentry_e *etype, argument 5449 if (!sli4 || !cq || !cqe || !etype) { 5450 ocs_log_err(NULL, "bad parameters sli4=%p cq=%p cqe=%p etype=%p q_id=%p\n", 5451 sli4, cq, cqe, etype, q_id); 5459 *etype = SLI_QENTRY_ASYNC; 5461 *etype = SLI_QENTRY_MQ; 5466 rc = sli_fc_cqe_parse(sli4, cq, cqe, etype, q_id); 8020 * @param etype CQ event type. 8026 sli_fc_cqe_parse(sli4_t *sli4, sli4_queue_t *cq, uint8_t *cqe, sli4_qentry_e *etype, argument [all...] |
/freebsd-11-stable/sys/dev/ixgbe/ |
H A D | ix_txrx.c | 716 u16 etype; local 753 etype = ntohs(eh->evl_proto); 756 etype = ntohs(eh->evl_encap_proto); 778 switch (etype) {
|
/freebsd-11-stable/sys/dev/virtio/network/ |
H A D | if_vtnet.c | 1999 int *etype, int *proto, int *start) 2010 *etype = ntohs(evh->evl_proto); 2013 *etype = ntohs(evh->evl_encap_proto); 2017 switch (*etype) { 2097 int flags, etype, csum_start, proto, error; local 2102 error = vtnet_txq_offload_ctx(txq, m, &etype, &proto, &csum_start); 2106 if ((etype == ETHERTYPE_IP && flags & VTNET_CSUM_OFFLOAD) || 2107 (etype == ETHERTYPE_IPV6 && flags & VTNET_CSUM_OFFLOAD_IPV6)) { 2129 error = vtnet_txq_offload_tso(txq, m, etype, csum_start, hdr); 1998 vtnet_txq_offload_ctx(struct vtnet_txq *txq, struct mbuf *m, int *etype, int *proto, int *start) argument
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | addrtoname.c | 888 u_short etype = htons(eproto_db[i].p); local 890 memcpy((char *)&protoid[3], (char *)&etype, 2);
|