Searched refs:etype (Results 26 - 50 of 82) sorted by relevance

1234

/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dkrb5tgs.c154 sp.etype = enctype;
230 ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key);
877 /* It is somewhat unclear where the etype in the following
881 etype, given the keytype in the tgt, or should we look
882 at the etype list here as well? What if the tgt
884 CAST session key. Should the DES3 etype be added to the
885 etype list, even if we don't want a session key with
1097 *krbtgt_etype = ap_req.ticket.enc_part.etype;
1100 ap_req.ticket.enc_part.etype, &tkey);
1104 krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype,
1689 krb5_enctype etype; local
[all...]
H A D524.c246 ticket->etype = 0;
322 ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey);
H A Dpkinit.c987 if (req->req_body.etype.len > 0) {
988 for (i = 0; i < req->req_body.etype.len; i++)
989 if (krb5_enctype_valid(context, req->req_body.etype.val[i]) == 0)
991 if (req->req_body.etype.len <= i) {
997 enctype = req->req_body.etype.val[i];
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dcrypto.c842 krb5_enctype etype,
849 e = _find_enctype (etype);
852 etype);
871 krb5_enctype etype,
878 e = _find_enctype (etype);
881 etype);
2764 krb5_enctype etype,
2768 e = _find_enctype(etype);
2771 etype);
2786 krb5_enctype *etype)
841 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument
870 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument
2763 krb5_enctype_to_string(krb5_context context, krb5_enctype etype, char **string) argument
2784 krb5_string_to_enctype(krb5_context context, const char *string, krb5_enctype *etype) argument
2800 _krb5_enctype_to_oid(krb5_context context, krb5_enctype etype, heim_oid *oid) argument
2819 _krb5_oid_to_enctype(krb5_context context, const heim_oid *oid, krb5_enctype *etype) argument
2835 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument
2927 krb5_enctype_valid(krb5_context context, krb5_enctype etype) argument
3634 krb5_derive_key(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, const void *constant, size_t constant_len, krb5_keyblock **derived_key) argument
3695 krb5_crypto_init(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_crypto *crypto) argument
3816 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dmk_rep.c95 ap.enc_part.etype = auth_context->keyblock->keytype;
105 0 /* ap.enc_part.etype */, &crypto);
H A Dauth_context.c389 krb5_enctype etype)
396 auth_context->keyblock->keytype = etype;
403 krb5_enctype *etype)
H A Dmk_priv.c109 s.enc_part.etype = key->keytype;
H A Dmit_glue.c140 krb5_c_valid_enctype (krb5_enctype etype) argument
142 return krb5_enctype_valid(NULL, etype);
H A Drd_cred.c99 if (cred.enc_part.etype == ETYPE_NULL) {
H A Dpkinit.c945 krb5_enctype etype,
1063 /* XXX compare given etype with key->etype */
1080 krb5_enctype etype,
1218 etype,
1251 krb5_enctype etype,
1305 ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi,
1312 ctx, etype, hi, nonce, req_buffer, pa, key);
1361 ctx, etype, hi, nonce, req_buffer, pa, key);
939 pk_rd_pa_reply_enckey(krb5_context context, int type, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument
1075 pk_rd_pa_reply_dh(krb5_context context, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, const DHNonce *c_n, const DHNonce *k_n, unsigned nonce, PA_DATA *pa, krb5_keyblock **key) argument
1248 _krb5_pk_rd_pa_reply(krb5_context context, const char *realm, void *c, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument
/freebsd-9.3-release/sys/netgraph/
H A Dng_rfc1490.c338 u_int16_t etype; local
341 switch_on_etype: etype = ntohs(*((const u_int16_t *)ptr));
344 switch (etype) {
/freebsd-9.3-release/sys/kgssapi/krb5/
H A Dkcrypto.h142 krb5_find_encryption_class(int etype);
H A Dkcrypto.c52 krb5_find_encryption_class(int etype) argument
57 if (krb5_encryption_classes[i]->ec_type == etype)
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_lib.c284 ASN1_OBJECT **petype, *etype; local
290 etype = OBJ_dup(oid);
291 if (!etype)
294 *petype = etype;
/freebsd-9.3-release/crypto/openssl/crypto/krb5/
H A Dkrb5_asn.c65 ASN1_EXP(KRB5_ENCDATA, etype, ASN1_INTEGER, 0),
/freebsd-9.3-release/crypto/heimdal/lib/hdb/
H A Dmkey.c63 int kvno, krb5_keyblock *key, krb5_enctype etype,
80 if(etype != 0)
81 (*mkey)->keytab.keyblock.keytype = etype;
83 ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto);
62 hdb_process_master_key(krb5_context context, int kvno, krb5_keyblock *key, krb5_enctype etype, hdb_master_key *mkey) argument
/freebsd-9.3-release/sys/net/
H A Dethernet.h35 #define ETHER_MAX_FRAME(ifp, etype, hasfcs) \
38 (((etype) == ETHERTYPE_VLAN) ? ETHER_VLAN_ENCAP_LEN : 0))
H A Dif_gre.c256 u_int16_t etype = 0; local
434 etype = WCCP_PROTOCOL_TYPE;
436 etype = ETHERTYPE_IP;
442 etype = ETHERTYPE_IPV6;
447 etype = ETHERTYPE_ATALK;
482 gh->gi_ptype = htons(etype);
H A Dif_lagg.c1494 uint16_t etype; local
1524 etype = ntohs(eh->ether_type);
1534 } else if (etype == ETHERTYPE_VLAN) {
1541 etype = ntohs(vlan->evl_proto);
1545 switch (etype) {
1919 u_short etype; local
1922 etype = ntohs(eh->ether_type);
1925 if ((m->m_flags & M_VLANTAG) == 0 && etype == ETHERTYPE_SLOW) {
/freebsd-9.3-release/sys/netgraph/netflow/
H A Dng_netflow.c683 uint16_t etype; local
689 etype = ntohs(eh->ether_type);
690 switch (etype) {
716 etype = ntohs(evh->evl_proto);
719 if (etype == ETHERTYPE_IP) {
724 } else if (etype == ETHERTYPE_IPV6) {
/freebsd-9.3-release/sys/dev/qlxgbe/
H A Dql_isr.c191 uint16_t etype; local
292 etype = ntohs(eh->evl_proto);
294 etype = ntohs(eh->evl_encap_proto);
297 if (etype == ETHERTYPE_IP) {
306 } else if (etype == ETHERTYPE_IPV6) {
/freebsd-9.3-release/crypto/heimdal/kuser/
H A Dklist.c149 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s);
150 printf("Ticket etype: ");
155 printf("unknown(%d)", t.enc_part.etype);
160 if(cred->session.keytype != t.enc_part.etype) {
/freebsd-9.3-release/sys/dev/qlxgb/
H A Dqla_hw.c720 uint16_t etype, opcode, offload = 1; local
732 etype = ntohs(eh->evl_proto);
735 etype = ntohs(eh->evl_encap_proto);
738 switch (etype) {
795 uint16_t etype, opcode, offload = 1; local
807 etype = ntohs(eh->evl_proto);
810 etype = ntohs(eh->evl_encap_proto);
814 switch (etype) {
/freebsd-9.3-release/contrib/libpcap/
H A Dpcap-usb-linux.c461 char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN]; local
491 ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, &timestamp, &etype,
531 if (etype == 'C')
543 uhdr->event_type = etype;
/freebsd-9.3-release/contrib/tcpdump/
H A Disakmp.h109 u_int8_t etype; /* Exchange Type */ member in struct:isakmp

Completed in 288 milliseconds

1234