/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 154 sp.etype = enctype; 230 ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key); 877 /* It is somewhat unclear where the etype in the following 881 etype, given the keytype in the tgt, or should we look 882 at the etype list here as well? What if the tgt 884 CAST session key. Should the DES3 etype be added to the 885 etype list, even if we don't want a session key with 1097 *krbtgt_etype = ap_req.ticket.enc_part.etype; 1100 ap_req.ticket.enc_part.etype, &tkey); 1104 krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, 1689 krb5_enctype etype; local [all...] |
H A D | 524.c | 246 ticket->etype = 0; 322 ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey);
|
H A D | pkinit.c | 987 if (req->req_body.etype.len > 0) { 988 for (i = 0; i < req->req_body.etype.len; i++) 989 if (krb5_enctype_valid(context, req->req_body.etype.val[i]) == 0) 991 if (req->req_body.etype.len <= i) { 997 enctype = req->req_body.etype.val[i];
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 842 krb5_enctype etype, 849 e = _find_enctype (etype); 852 etype); 871 krb5_enctype etype, 878 e = _find_enctype (etype); 881 etype); 2764 krb5_enctype etype, 2768 e = _find_enctype(etype); 2771 etype); 2786 krb5_enctype *etype) 841 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument 870 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument 2763 krb5_enctype_to_string(krb5_context context, krb5_enctype etype, char **string) argument 2784 krb5_string_to_enctype(krb5_context context, const char *string, krb5_enctype *etype) argument 2800 _krb5_enctype_to_oid(krb5_context context, krb5_enctype etype, heim_oid *oid) argument 2819 _krb5_oid_to_enctype(krb5_context context, const heim_oid *oid, krb5_enctype *etype) argument 2835 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument 2927 krb5_enctype_valid(krb5_context context, krb5_enctype etype) argument 3634 krb5_derive_key(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, const void *constant, size_t constant_len, krb5_keyblock **derived_key) argument 3695 krb5_crypto_init(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_crypto *crypto) argument 3816 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | mk_rep.c | 95 ap.enc_part.etype = auth_context->keyblock->keytype; 105 0 /* ap.enc_part.etype */, &crypto);
|
H A D | auth_context.c | 389 krb5_enctype etype) 396 auth_context->keyblock->keytype = etype; 403 krb5_enctype *etype)
|
H A D | mk_priv.c | 109 s.enc_part.etype = key->keytype;
|
H A D | mit_glue.c | 140 krb5_c_valid_enctype (krb5_enctype etype) argument 142 return krb5_enctype_valid(NULL, etype);
|
H A D | rd_cred.c | 99 if (cred.enc_part.etype == ETYPE_NULL) {
|
H A D | pkinit.c | 945 krb5_enctype etype, 1063 /* XXX compare given etype with key->etype */ 1080 krb5_enctype etype, 1218 etype, 1251 krb5_enctype etype, 1305 ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi, 1312 ctx, etype, hi, nonce, req_buffer, pa, key); 1361 ctx, etype, hi, nonce, req_buffer, pa, key); 939 pk_rd_pa_reply_enckey(krb5_context context, int type, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument 1075 pk_rd_pa_reply_dh(krb5_context context, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, const DHNonce *c_n, const DHNonce *k_n, unsigned nonce, PA_DATA *pa, krb5_keyblock **key) argument 1248 _krb5_pk_rd_pa_reply(krb5_context context, const char *realm, void *c, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument
|
/freebsd-9.3-release/sys/netgraph/ |
H A D | ng_rfc1490.c | 338 u_int16_t etype; local 341 switch_on_etype: etype = ntohs(*((const u_int16_t *)ptr)); 344 switch (etype) {
|
/freebsd-9.3-release/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 142 krb5_find_encryption_class(int etype);
|
H A D | kcrypto.c | 52 krb5_find_encryption_class(int etype) argument 57 if (krb5_encryption_classes[i]->ec_type == etype)
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_lib.c | 284 ASN1_OBJECT **petype, *etype; local 290 etype = OBJ_dup(oid); 291 if (!etype) 294 *petype = etype;
|
/freebsd-9.3-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.c | 65 ASN1_EXP(KRB5_ENCDATA, etype, ASN1_INTEGER, 0),
|
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 63 int kvno, krb5_keyblock *key, krb5_enctype etype, 80 if(etype != 0) 81 (*mkey)->keytab.keyblock.keytype = etype; 83 ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto); 62 hdb_process_master_key(krb5_context context, int kvno, krb5_keyblock *key, krb5_enctype etype, hdb_master_key *mkey) argument
|
/freebsd-9.3-release/sys/net/ |
H A D | ethernet.h | 35 #define ETHER_MAX_FRAME(ifp, etype, hasfcs) \ 38 (((etype) == ETHERTYPE_VLAN) ? ETHER_VLAN_ENCAP_LEN : 0))
|
H A D | if_gre.c | 256 u_int16_t etype = 0; local 434 etype = WCCP_PROTOCOL_TYPE; 436 etype = ETHERTYPE_IP; 442 etype = ETHERTYPE_IPV6; 447 etype = ETHERTYPE_ATALK; 482 gh->gi_ptype = htons(etype);
|
H A D | if_lagg.c | 1494 uint16_t etype; local 1524 etype = ntohs(eh->ether_type); 1534 } else if (etype == ETHERTYPE_VLAN) { 1541 etype = ntohs(vlan->evl_proto); 1545 switch (etype) { 1919 u_short etype; local 1922 etype = ntohs(eh->ether_type); 1925 if ((m->m_flags & M_VLANTAG) == 0 && etype == ETHERTYPE_SLOW) {
|
/freebsd-9.3-release/sys/netgraph/netflow/ |
H A D | ng_netflow.c | 683 uint16_t etype; local 689 etype = ntohs(eh->ether_type); 690 switch (etype) { 716 etype = ntohs(evh->evl_proto); 719 if (etype == ETHERTYPE_IP) { 724 } else if (etype == ETHERTYPE_IPV6) {
|
/freebsd-9.3-release/sys/dev/qlxgbe/ |
H A D | ql_isr.c | 191 uint16_t etype; local 292 etype = ntohs(eh->evl_proto); 294 etype = ntohs(eh->evl_encap_proto); 297 if (etype == ETHERTYPE_IP) { 306 } else if (etype == ETHERTYPE_IPV6) {
|
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | klist.c | 149 ret = krb5_enctype_to_string(context, t.enc_part.etype, &s); 150 printf("Ticket etype: "); 155 printf("unknown(%d)", t.enc_part.etype); 160 if(cred->session.keytype != t.enc_part.etype) {
|
/freebsd-9.3-release/sys/dev/qlxgb/ |
H A D | qla_hw.c | 720 uint16_t etype, opcode, offload = 1; local 732 etype = ntohs(eh->evl_proto); 735 etype = ntohs(eh->evl_encap_proto); 738 switch (etype) { 795 uint16_t etype, opcode, offload = 1; local 807 etype = ntohs(eh->evl_proto); 810 etype = ntohs(eh->evl_encap_proto); 814 switch (etype) {
|
/freebsd-9.3-release/contrib/libpcap/ |
H A D | pcap-usb-linux.c | 461 char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN]; local 491 ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, ×tamp, &etype, 531 if (etype == 'C') 543 uhdr->event_type = etype;
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | isakmp.h | 109 u_int8_t etype; /* Exchange Type */ member in struct:isakmp
|