Searched refs:etype (Results 1 - 25 of 92) sorted by relevance

1234

/freebsd-10.1-release/crypto/heimdal/lib/krb5/
H A Dgenerate_subkey.c41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype
52 krb5_enctype etype,
63 if (etype == ETYPE_NULL)
64 etype = key->keytype; /* use session key etype */
67 ret = krb5_generate_random_keyblock(context, etype, *subkey);
50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
H A Dtest_prf.c58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local
64 ret = krb5_generate_random_keyblock(context, etype, &key);
68 ret = krb5_crypto_prf_length(context, etype, &length);
H A Dtest_crypto.c39 krb5_enctype etype, int iterations)
50 ret = krb5_generate_random_keyblock(context, etype, &key);
54 ret = krb5_enctype_to_string(context, etype, &etype_name);
92 krb5_enctype etype,
104 ret = krb5_enctype_to_string(context, etype, &etype_name);
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dsalt.c39 krb5_enctype etype,
46 e = _krb5_find_enctype (etype);
50 etype);
71 krb5_enctype etype,
78 e = _krb5_find_enctype (etype);
82 etype);
248 krb5_enctype etype,
251 struct _krb5_encryption_type *et = _krb5_find_enctype(etype);
260 etype);
276 kd.key->keytype = etype;
38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument
70 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument
245 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dtest_crypto_wrapping.c42 krb5_enctype etype)
52 ret = krb5_generate_random_keyblock(context, etype, &key);
56 ret = krb5_enctype_to_string(context, etype, &etype_name);
38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
H A Dtest_pkinit_dh2key.c43 krb5_enctype etype,
50 etype,
38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
H A Dget_in_tkt.c40 krb5_enctype etype, krb5_keyblock *key)
212 &a->req_body.etype.len,
213 &a->req_body.etype.val,
277 &preauth->val[i].info.val[j].etype, 1,
300 key_proc, keyseed, a->req_body.etype.val,
301 a->req_body.etype.len, NULL);
307 key_proc, keyseed, a->req_body.etype.val,
308 a->req_body.etype.len, &salt);
388 krb5_enctype etype; variable
470 etype
39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dinit_creds_pw.c84 krb5_enctype etype; member in struct:pa_info_data
676 &a->req_body.etype.len,
677 &a->req_body.etype.val,
724 krb5_enctype etype,
728 paid->etype = etype;
771 for (j = 0; j < asreq->req_body.etype.len; j++) {
773 if (asreq->req_body.etype.val[j] == e.val[i].etype) {
783 ret = set_paid(paid, context, e.val[i].etype,
723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument
1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1259 krb5_enctype etype; local
[all...]
H A Dbuild_ap_req.c63 ap.authenticator.etype = enctype;
/freebsd-10.1-release/contrib/tcpdump/
H A Dprint-symantec.c52 u_int16_t etype; local
56 etype = EXTRACT_16BITS(&sp->ether_type);
58 if (etype <= ETHERMTU)
59 (void)printf("invalid ethertype %u", etype);
62 tok2str(ethertype_values,"Unknown", etype),
63 etype);
65 if (etype <= ETHERMTU)
66 (void)printf("invalid ethertype %u", etype);
68 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
/freebsd-10.1-release/lib/libstand/
H A Dether.c57 sendether(d, pkt, len, dea, etype)
62 int etype;
77 eh->ether_type = htons(etype);
93 readether(d, pkt, len, tleft, etype)
98 u_int16_t *etype;
125 *etype = ntohs(eh->ether_type);
H A Drarp.c164 u_int16_t etype; /* host order */ local
171 n = readether(d, pkt, len, tleft, &etype);
181 if (etype != ETHERTYPE_REVARP) {
184 printf("bad type=0x%x\n", etype);
H A Dnet.h98 u_char *dea, int etype);
100 time_t tleft, u_int16_t *etype);
H A Dudp.c147 u_int16_t etype; /* host order */ local
157 n = readether(d, ip, len + sizeof(*ip) + sizeof(*uh), tleft, &etype);
164 if (etype == ETHERTYPE_ARP) {
173 if (etype != ETHERTYPE_IP) {
176 printf("readudp: not IP. ether_type=%x\n", etype);
H A Darp.c177 u_int16_t etype; /* host order */ local
184 n = readether(d, pkt, len, tleft, &etype);
194 if (etype != ETHERTYPE_ARP) {
197 printf("not arp type=%d\n", etype);
/freebsd-10.1-release/contrib/sendmail/libsm/
H A Dexc.c207 ** etype -- type of exception.
235 sm_exc_vnew_x(etype, ap)
236 const SM_EXC_TYPE_T *etype;
250 SM_REQUIRE_ISA(etype, SmExcTypeMagic);
251 argc = strlen(etype->etype_argformat);
263 exc->exc_type = etype;
277 switch (etype->etype_argformat[i])
292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0');
297 etype->etype_argformat[i]);
311 switch (etype
405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument
635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument
[all...]
/freebsd-10.1-release/crypto/heimdal/kdc/
H A Dstring2key.c105 krb5_enctype etype; local
127 ret = krb5_string_to_enctype(context, keytype_str, &etype);
131 if((etype != ETYPE_DES_CBC_CRC &&
132 etype != ETYPE_DES_CBC_MD4 &&
133 etype != ETYPE_DES_CBC_MD5) &&
136 etype = ETYPE_DES_CBC_CRC;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
/freebsd-10.1-release/crypto/heimdal/kuser/
H A Dkimpersonate.c63 krb5_enctype etype,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
150 krb5_enctype etype; local
155 ret = krb5_string_to_enctype (context, enc_type, &etype);
159 0, etype, &entry);
174 krb5_generate_random_keyblock(context, etype, &cred.session);
192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
/freebsd-10.1-release/sys/net/
H A Dif_atmsubr.c127 u_int16_t etype = 0; /* if using LLC/SNAP */ local
156 etype = ETHERTYPE_IPV6;
158 etype = ETHERTYPE_IP;
204 ATM_LLC_SETTYPE(atmllc, etype);
245 u_int16_t etype = ETHERTYPE_IP; /* default */ local
307 etype = ATM_LLC_TYPE(alc);
311 switch (etype) {
/freebsd-10.1-release/sys/ofed/drivers/net/mlx4/
H A Dutils.c92 uint16_t etype; local
122 etype = ntohs(eh->ether_type);
132 } else if (etype == ETHERTYPE_VLAN) {
139 etype = ntohs(vlan->evl_proto);
143 switch (etype) {
/freebsd-10.1-release/sys/sys/
H A Dktr.h164 * etype is the type of event to plot (state, counter, point)
168 * etype and attribute names must be string constants. This minimizes the
179 #define KTR_EFMT(egroup, ident, etype) \
180 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: "
182 #define KTR_EVENT0(m, egroup, ident, etype, edat) \
183 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat)
184 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \
185 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0))
186 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \
187 CTR4(m, KTR_EFMT(egroup, ident, etype) a
[all...]
/freebsd-10.1-release/usr.bin/brandelf/
H A Dbrandelf.c173 iselftype(int etype) argument
180 if (etype == elftypes[elfwalk].value)
/freebsd-10.1-release/contrib/nvi/ex/
H A Dex_init.c360 enum { ROOTOWN, OWN, WRITER } etype; local
373 etype = rootown ? ROOTOWN : OWN;
379 etype = WRITER;
393 switch (etype) {
412 switch (etype) {
/freebsd-10.1-release/sys/netgraph/
H A Dng_parse.c1325 etype = ng_get_composite_etype(type, index, ctype); local
1345 error = INVOKE(etype, parse)(etype,
1400 etype = ng_get_composite_etype(type, index, ctype); local
1444 if ((error = INVOKE(etype, unparse)
1445 (etype, data, off, cbuf, cbuflen)) != 0) {
1473 const struct ng_parse_type *etype; local
1504 etype = ng_get_composite_etype(type, index, ctype);
1505 func = METHOD(etype, getDefault);
1508 return (*func)(etype, star
1559 const struct ng_parse_type *etype = NULL; local
1598 etype = ng_get_composite_etype(type, index, ctype); local
[all...]
/freebsd-10.1-release/crypto/openssl/crypto/krb5/
H A Dkrb5_asn.h78 * etype[0] INTEGER, -- EncryptionType
84 ASN1_INTEGER *etype; member in struct:krb5_encdata_st

Completed in 286 milliseconds

1234