/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | generate_subkey.c | 41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 52 krb5_enctype etype, 63 if (etype == ETYPE_NULL) 64 etype = key->keytype; /* use session key etype */ 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | test_prf.c | 58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 64 ret = krb5_generate_random_keyblock(context, etype, &key); 68 ret = krb5_crypto_prf_length(context, etype, &length);
|
H A D | test_crypto.c | 39 krb5_enctype etype, int iterations) 50 ret = krb5_generate_random_keyblock(context, etype, &key); 54 ret = krb5_enctype_to_string(context, etype, &etype_name); 92 krb5_enctype etype, 104 ret = krb5_enctype_to_string(context, etype, &etype_name); 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | salt.c | 39 krb5_enctype etype, 46 e = _krb5_find_enctype (etype); 50 etype); 71 krb5_enctype etype, 78 e = _krb5_find_enctype (etype); 82 etype); 248 krb5_enctype etype, 251 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); 260 etype); 276 kd.key->keytype = etype; 38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument 70 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument 245 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | test_crypto_wrapping.c | 42 krb5_enctype etype) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
|
H A D | test_pkinit_dh2key.c | 43 krb5_enctype etype, 50 etype, 38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
|
H A D | get_in_tkt.c | 40 krb5_enctype etype, krb5_keyblock *key) 212 &a->req_body.etype.len, 213 &a->req_body.etype.val, 277 &preauth->val[i].info.val[j].etype, 1, 300 key_proc, keyseed, a->req_body.etype.val, 301 a->req_body.etype.len, NULL); 307 key_proc, keyseed, a->req_body.etype.val, 308 a->req_body.etype.len, &salt); 388 krb5_enctype etype; variable 470 etype 39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | init_creds_pw.c | 84 krb5_enctype etype; member in struct:pa_info_data 676 &a->req_body.etype.len, 677 &a->req_body.etype.val, 724 krb5_enctype etype, 728 paid->etype = etype; 771 for (j = 0; j < asreq->req_body.etype.len; j++) { 773 if (asreq->req_body.etype.val[j] == e.val[i].etype) { 783 ret = set_paid(paid, context, e.val[i].etype, 723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument 926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument 1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1259 krb5_enctype etype; local [all...] |
H A D | build_ap_req.c | 63 ap.authenticator.etype = enctype;
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-symantec.c | 46 uint16_t etype; local 50 etype = EXTRACT_16BITS(&sp->ether_type); 52 if (etype <= ETHERMTU) 53 ND_PRINT((ndo, "invalid ethertype %u", etype)); 56 tok2str(ethertype_values,"Unknown", etype), 57 etype)); 59 if (etype <= ETHERMTU) 60 ND_PRINT((ndo, "invalid ethertype %u", etype)); 62 ND_PRINT((ndo, "%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype)));
|
/freebsd-11-stable/contrib/sendmail/libsm/ |
H A D | exc.c | 207 ** etype -- type of exception. 235 sm_exc_vnew_x(etype, ap) 236 const SM_EXC_TYPE_T *etype; 250 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 251 argc = strlen(etype->etype_argformat); 263 exc->exc_type = etype; 277 switch (etype->etype_argformat[i]) 292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 297 etype->etype_argformat[i]); 311 switch (etype 405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument 635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument [all...] |
/freebsd-11-stable/stand/libsa/ |
H A D | ether.c | 57 sendether(struct iodesc *d, void *pkt, size_t len, uint8_t *dea, int etype) argument 72 eh->ether_type = htons(etype); 84 * the broadcast address. Save the Ether type in etype. 90 uint16_t *etype) 123 *etype = ntohs(eh->ether_type); 89 readether(struct iodesc *d, void **pkt, void **payload, time_t tleft, uint16_t *etype) argument
|
H A D | rarp.c | 152 uint16_t etype; /* host order */ local 159 n = readether(d, &ptr, (void **)&ap, tleft, &etype); 170 if (etype != ETHERTYPE_REVARP) { 173 printf("bad type=0x%x\n", etype);
|
H A D | arp.c | 167 uint16_t etype; /* host order */ local 176 n = readether(d, &ptr, (void **)&ah, tleft, &etype); 187 if (etype != ETHERTYPE_ARP) { 190 printf("not arp type=%d\n", etype);
|
/freebsd-11-stable/sys/dev/ixgbe/ |
H A D | if_fdir.c | 91 u16 etype; local 96 etype = eh->evl_proto; 99 etype = eh->evl_encap_proto; 103 if (etype != htons(ETHERTYPE_IP)) 133 common.flex_bytes ^= etype;
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | string2key.c | 105 krb5_enctype etype; local 127 ret = krb5_string_to_enctype(context, keytype_str, &etype); 131 if((etype != ETYPE_DES_CBC_CRC && 132 etype != ETYPE_DES_CBC_MD4 && 133 etype != ETYPE_DES_CBC_MD5) && 136 etype = ETYPE_DES_CBC_CRC; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
/freebsd-11-stable/sys/netgraph/ |
H A D | ng_checksum.h | 85 u_int16_t etype; member in struct:ng_checksum_vlan_header
|
H A D | ng_patch.h | 127 u_int16_t etype; member in struct:ng_patch_vlan_header
|
/freebsd-11-stable/sys/kern/ |
H A D | uipc_mbufhash.c | 91 uint16_t etype; local 98 etype = ntohs(eh->ether_type); 107 } else if (etype == ETHERTYPE_VLAN) { 114 etype = ntohs(vlan->evl_proto); 117 switch (etype) {
|
/freebsd-11-stable/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 63 krb5_enctype etype, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 150 krb5_enctype etype; local 155 ret = krb5_string_to_enctype (context, enc_type, &etype); 159 0, etype, &entry); 174 krb5_generate_random_keyblock(context, etype, &cred.session); 192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-11-stable/sys/sys/ |
H A D | ktr.h | 115 * etype is the type of event to plot (state, counter, point) 119 * etype and attribute names must be string constants. This minimizes the 130 #define KTR_EFMT(egroup, ident, etype) \ 131 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: " 133 #define KTR_EVENT0(m, egroup, ident, etype, edat) \ 134 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat) 135 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \ 136 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0)) 137 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \ 138 CTR4(m, KTR_EFMT(egroup, ident, etype) a [all...] |
/freebsd-11-stable/sys/net/ |
H A D | if_atmsubr.c | 128 u_int16_t etype = 0; /* if using LLC/SNAP */ local 157 etype = ETHERTYPE_IPV6; 159 etype = ETHERTYPE_IP; 205 ATM_LLC_SETTYPE(atmllc, etype); 246 u_int16_t etype = ETHERTYPE_IP; /* default */ local 308 etype = ATM_LLC_TYPE(alc); 312 switch (etype) {
|
H A D | if_ethersubr.c | 153 uint16_t etype; local 168 etype = htons(ETHERTYPE_IP); 171 etype = htons(ETHERTYPE_IPV6); 180 etype = htons(ETHERTYPE_REVARP); 185 etype = htons(ETHERTYPE_ARP); 196 memcpy(&eh->ether_type, &etype, sizeof(eh->ether_type)); 214 uint16_t etype; local 236 etype = htons(ETHERTYPE_IP); 237 memcpy(&eh->ether_type, &etype, sizeof(etype)); 500 u_short etype; local [all...] |
/freebsd-11-stable/usr.bin/brandelf/ |
H A D | brandelf.c | 175 iselftype(int etype) argument 182 if (etype == elftypes[elfwalk].value)
|
/freebsd-11-stable/contrib/nvi/ex/ |
H A D | ex_init.c | 360 enum { ROOTOWN, OWN, WRITER } etype; local 373 etype = rootown ? ROOTOWN : OWN; 379 etype = WRITER; 393 switch (etype) { 412 switch (etype) {
|