/freebsd-10.1-release/crypto/heimdal/lib/krb5/ |
H A D | generate_subkey.c | 41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 52 krb5_enctype etype, 63 if (etype == ETYPE_NULL) 64 etype = key->keytype; /* use session key etype */ 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | test_prf.c | 58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 64 ret = krb5_generate_random_keyblock(context, etype, &key); 68 ret = krb5_crypto_prf_length(context, etype, &length);
|
H A D | test_crypto.c | 39 krb5_enctype etype, int iterations) 50 ret = krb5_generate_random_keyblock(context, etype, &key); 54 ret = krb5_enctype_to_string(context, etype, &etype_name); 92 krb5_enctype etype, 104 ret = krb5_enctype_to_string(context, etype, &etype_name); 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | salt.c | 39 krb5_enctype etype, 46 e = _krb5_find_enctype (etype); 50 etype); 71 krb5_enctype etype, 78 e = _krb5_find_enctype (etype); 82 etype); 248 krb5_enctype etype, 251 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); 260 etype); 276 kd.key->keytype = etype; 38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument 70 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument 245 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | test_crypto_wrapping.c | 42 krb5_enctype etype) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
|
H A D | test_pkinit_dh2key.c | 43 krb5_enctype etype, 50 etype, 38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
|
H A D | get_in_tkt.c | 40 krb5_enctype etype, krb5_keyblock *key) 212 &a->req_body.etype.len, 213 &a->req_body.etype.val, 277 &preauth->val[i].info.val[j].etype, 1, 300 key_proc, keyseed, a->req_body.etype.val, 301 a->req_body.etype.len, NULL); 307 key_proc, keyseed, a->req_body.etype.val, 308 a->req_body.etype.len, &salt); 388 krb5_enctype etype; variable 470 etype 39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | init_creds_pw.c | 84 krb5_enctype etype; member in struct:pa_info_data 676 &a->req_body.etype.len, 677 &a->req_body.etype.val, 724 krb5_enctype etype, 728 paid->etype = etype; 771 for (j = 0; j < asreq->req_body.etype.len; j++) { 773 if (asreq->req_body.etype.val[j] == e.val[i].etype) { 783 ret = set_paid(paid, context, e.val[i].etype, 723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument 926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument 1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1259 krb5_enctype etype; local [all...] |
H A D | build_ap_req.c | 63 ap.authenticator.etype = enctype;
|
/freebsd-10.1-release/contrib/tcpdump/ |
H A D | print-symantec.c | 52 u_int16_t etype; local 56 etype = EXTRACT_16BITS(&sp->ether_type); 58 if (etype <= ETHERMTU) 59 (void)printf("invalid ethertype %u", etype); 62 tok2str(ethertype_values,"Unknown", etype), 63 etype); 65 if (etype <= ETHERMTU) 66 (void)printf("invalid ethertype %u", etype); 68 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
|
/freebsd-10.1-release/lib/libstand/ |
H A D | ether.c | 57 sendether(d, pkt, len, dea, etype) 62 int etype; 77 eh->ether_type = htons(etype); 93 readether(d, pkt, len, tleft, etype) 98 u_int16_t *etype; 125 *etype = ntohs(eh->ether_type);
|
H A D | rarp.c | 164 u_int16_t etype; /* host order */ local 171 n = readether(d, pkt, len, tleft, &etype); 181 if (etype != ETHERTYPE_REVARP) { 184 printf("bad type=0x%x\n", etype);
|
H A D | net.h | 98 u_char *dea, int etype); 100 time_t tleft, u_int16_t *etype);
|
H A D | udp.c | 147 u_int16_t etype; /* host order */ local 157 n = readether(d, ip, len + sizeof(*ip) + sizeof(*uh), tleft, &etype); 164 if (etype == ETHERTYPE_ARP) { 173 if (etype != ETHERTYPE_IP) { 176 printf("readudp: not IP. ether_type=%x\n", etype);
|
H A D | arp.c | 177 u_int16_t etype; /* host order */ local 184 n = readether(d, pkt, len, tleft, &etype); 194 if (etype != ETHERTYPE_ARP) { 197 printf("not arp type=%d\n", etype);
|
/freebsd-10.1-release/contrib/sendmail/libsm/ |
H A D | exc.c | 207 ** etype -- type of exception. 235 sm_exc_vnew_x(etype, ap) 236 const SM_EXC_TYPE_T *etype; 250 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 251 argc = strlen(etype->etype_argformat); 263 exc->exc_type = etype; 277 switch (etype->etype_argformat[i]) 292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 297 etype->etype_argformat[i]); 311 switch (etype 405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument 635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument [all...] |
/freebsd-10.1-release/crypto/heimdal/kdc/ |
H A D | string2key.c | 105 krb5_enctype etype; local 127 ret = krb5_string_to_enctype(context, keytype_str, &etype); 131 if((etype != ETYPE_DES_CBC_CRC && 132 etype != ETYPE_DES_CBC_MD4 && 133 etype != ETYPE_DES_CBC_MD5) && 136 etype = ETYPE_DES_CBC_CRC; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
/freebsd-10.1-release/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 63 krb5_enctype etype, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 150 krb5_enctype etype; local 155 ret = krb5_string_to_enctype (context, enc_type, &etype); 159 0, etype, &entry); 174 krb5_generate_random_keyblock(context, etype, &cred.session); 192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-10.1-release/sys/net/ |
H A D | if_atmsubr.c | 127 u_int16_t etype = 0; /* if using LLC/SNAP */ local 156 etype = ETHERTYPE_IPV6; 158 etype = ETHERTYPE_IP; 204 ATM_LLC_SETTYPE(atmllc, etype); 245 u_int16_t etype = ETHERTYPE_IP; /* default */ local 307 etype = ATM_LLC_TYPE(alc); 311 switch (etype) {
|
/freebsd-10.1-release/sys/ofed/drivers/net/mlx4/ |
H A D | utils.c | 92 uint16_t etype; local 122 etype = ntohs(eh->ether_type); 132 } else if (etype == ETHERTYPE_VLAN) { 139 etype = ntohs(vlan->evl_proto); 143 switch (etype) {
|
/freebsd-10.1-release/sys/sys/ |
H A D | ktr.h | 164 * etype is the type of event to plot (state, counter, point) 168 * etype and attribute names must be string constants. This minimizes the 179 #define KTR_EFMT(egroup, ident, etype) \ 180 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: " 182 #define KTR_EVENT0(m, egroup, ident, etype, edat) \ 183 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat) 184 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \ 185 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0)) 186 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \ 187 CTR4(m, KTR_EFMT(egroup, ident, etype) a [all...] |
/freebsd-10.1-release/usr.bin/brandelf/ |
H A D | brandelf.c | 173 iselftype(int etype) argument 180 if (etype == elftypes[elfwalk].value)
|
/freebsd-10.1-release/contrib/nvi/ex/ |
H A D | ex_init.c | 360 enum { ROOTOWN, OWN, WRITER } etype; local 373 etype = rootown ? ROOTOWN : OWN; 379 etype = WRITER; 393 switch (etype) { 412 switch (etype) {
|
/freebsd-10.1-release/sys/netgraph/ |
H A D | ng_parse.c | 1325 etype = ng_get_composite_etype(type, index, ctype); local 1345 error = INVOKE(etype, parse)(etype, 1400 etype = ng_get_composite_etype(type, index, ctype); local 1444 if ((error = INVOKE(etype, unparse) 1445 (etype, data, off, cbuf, cbuflen)) != 0) { 1473 const struct ng_parse_type *etype; local 1504 etype = ng_get_composite_etype(type, index, ctype); 1505 func = METHOD(etype, getDefault); 1508 return (*func)(etype, star 1559 const struct ng_parse_type *etype = NULL; local 1598 etype = ng_get_composite_etype(type, index, ctype); local [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 78 * etype[0] INTEGER, -- EncryptionType 84 ASN1_INTEGER *etype; member in struct:krb5_encdata_st
|