Searched refs:etype (Results 1 - 25 of 82) sorted by relevance

1234

/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dgenerate_subkey.c49 krb5_enctype etype,
60 if (etype == ETYPE_NULL)
61 etype = key->keytype; /* use session key etype */
64 ret = krb5_generate_random_keyblock(context, etype, *subkey);
47 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
H A Dtest_prf.c60 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local
66 ret = krb5_generate_random_keyblock(context, etype, &key);
70 ret = krb5_crypto_prf_length(context, etype, &length);
H A Dtest_crypto.c41 krb5_enctype etype, int iterations)
52 ret = krb5_generate_random_keyblock(context, etype, &key);
56 ret = krb5_enctype_to_string(context, etype, &etype_name);
94 krb5_enctype etype,
106 ret = krb5_enctype_to_string(context, etype, &etype_name);
116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
40 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dtest_crypto_wrapping.c44 krb5_enctype etype)
54 ret = krb5_generate_random_keyblock(context, etype, &key);
58 ret = krb5_enctype_to_string(context, etype, &etype_name);
40 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
H A Dtest_pkinit_dh2key.c45 krb5_enctype etype,
52 etype,
40 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
H A Dinit_creds_pw.c608 &a->req_body.etype.len,
609 &a->req_body.etype.val,
654 krb5_enctype etype; member in struct:pa_info_data
670 krb5_enctype etype,
674 paid->etype = etype;
717 for (j = 0; j < asreq->req_body.etype.len; j++) {
719 if (asreq->req_body.etype.val[j] == e.val[i].etype) {
729 ret = set_paid(paid, context, e.val[i].etype,
669 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
872 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument
1007 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1147 krb5_enctype etype; local
[all...]
H A Dbuild_ap_req.c65 ap.authenticator.etype = enctype;
H A Dget_in_tkt.c317 krb5_enctype etype, krb5_keyblock *key)
486 &a->req_body.etype.len,
487 &a->req_body.etype.val,
551 &preauth->val[i].info.val[j].etype, 1,
574 key_proc, keyseed, a->req_body.etype.val,
575 a->req_body.etype.len, NULL);
581 key_proc, keyseed, a->req_body.etype.val,
582 a->req_body.etype.len, &salt);
661 krb5_enctype etype; local
743 etype
316 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-symantec.c52 u_int16_t etype; local
56 etype = EXTRACT_16BITS(&sp->ether_type);
58 if (etype <= ETHERMTU)
59 (void)printf("invalid ethertype %u", etype);
62 tok2str(ethertype_values,"Unknown", etype),
63 etype);
65 if (etype <= ETHERMTU)
66 (void)printf("invalid ethertype %u", etype);
68 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
/freebsd-9.3-release/lib/libstand/
H A Dether.c57 sendether(d, pkt, len, dea, etype)
62 int etype;
77 eh->ether_type = htons(etype);
93 readether(d, pkt, len, tleft, etype)
98 u_int16_t *etype;
125 *etype = ntohs(eh->ether_type);
H A Drarp.c164 u_int16_t etype; /* host order */ local
171 n = readether(d, pkt, len, tleft, &etype);
181 if (etype != ETHERTYPE_REVARP) {
184 printf("bad type=0x%x\n", etype);
H A Dnet.h98 u_char *dea, int etype);
100 time_t tleft, u_int16_t *etype);
H A Dudp.c147 u_int16_t etype; /* host order */ local
157 n = readether(d, ip, len + sizeof(*ip) + sizeof(*uh), tleft, &etype);
164 if (etype == ETHERTYPE_ARP) {
173 if (etype != ETHERTYPE_IP) {
176 printf("readudp: not IP. ether_type=%x\n", etype);
H A Darp.c177 u_int16_t etype; /* host order */ local
184 n = readether(d, pkt, len, tleft, &etype);
194 if (etype != ETHERTYPE_ARP) {
197 printf("not arp type=%d\n", etype);
/freebsd-9.3-release/contrib/sendmail/libsm/
H A Dexc.c207 ** etype -- type of exception.
235 sm_exc_vnew_x(etype, ap)
236 const SM_EXC_TYPE_T *etype;
250 SM_REQUIRE_ISA(etype, SmExcTypeMagic);
251 argc = strlen(etype->etype_argformat);
263 exc->exc_type = etype;
277 switch (etype->etype_argformat[i])
292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0');
297 etype->etype_argformat[i]);
311 switch (etype
405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument
635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dstring2key.c105 krb5_enctype etype; local
127 ret = krb5_string_to_enctype(context, keytype_str, &etype);
141 etype = etypes[0];
142 krb5_enctype_to_string(context, etype, &str);
148 if((etype != ETYPE_DES_CBC_CRC &&
149 etype != ETYPE_DES_CBC_MD4 &&
150 etype != ETYPE_DES_CBC_MD5) &&
153 etype = ETYPE_DES_CBC_CRC;
185 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
H A Dkerberos5.c242 krb5_enctype etype,
267 ret = krb5_crypto_init(context, skey, etype, &crypto);
383 for(i = 0; i < req->req_body.etype.len; i++) {
384 if (!older_enctype(req->req_body.etype.val[i]))
397 ent->etype = key->key.keytype;
466 if (pa.val[j].etype == client->keys.val[i].key.keytype)
537 ent->etype = key->key.keytype;
627 if (pa.val[j].etype == client->keys.val[i].key.keytype)
700 for (i = 0; i < b->etype.len; i++) {
701 ret = krb5_enctype_to_string(context, b->etype
239 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *ckey, const char **e_text, krb5_data *reply) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/kuser/
H A Dkimpersonate.c62 krb5_enctype etype,
107 krb5_crypto_init(context, skey, etype, &crypto);
143 krb5_enctype etype; local
148 ret = krb5_string_to_enctype (context, enc_type, &etype);
152 0, etype, &entry);
167 krb5_generate_random_keyblock(context, etype, &cred.session);
185 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred);
60 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
/freebsd-9.3-release/sys/sys/
H A Dktr.h164 * etype is the type of event to plot (state, counter, point)
168 * etype and attribute names must be string constants. This minimizes the
179 #define KTR_EFMT(egroup, ident, etype) \
180 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: "
182 #define KTR_EVENT0(m, egroup, ident, etype, edat) \
183 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat)
184 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \
185 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0))
186 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \
187 CTR4(m, KTR_EFMT(egroup, ident, etype) a
[all...]
/freebsd-9.3-release/sys/net/
H A Dif_atmsubr.c127 u_int16_t etype = 0; /* if using LLC/SNAP */ local
156 etype = ETHERTYPE_IPV6;
158 etype = ETHERTYPE_IP;
204 ATM_LLC_SETTYPE(atmllc, etype);
245 u_int16_t etype = ETHERTYPE_IP; /* default */ local
307 etype = ATM_LLC_TYPE(alc);
311 switch (etype) {
/freebsd-9.3-release/contrib/nvi/ex/
H A Dex_init.c354 enum { ROOTOWN, OWN, WRITER } etype; local
367 etype = rootown ? ROOTOWN : OWN;
373 etype = WRITER;
381 switch (etype) {
399 switch (etype) {
/freebsd-9.3-release/usr.bin/brandelf/
H A Dbrandelf.c173 iselftype(int etype) argument
180 if (etype == elftypes[elfwalk].value)
/freebsd-9.3-release/crypto/heimdal/kcm/
H A Dacquire.c239 krb5_enctype etype,
265 ret = krb5_string_to_key_salt(context, etype, s->password,
346 krb5_enctype etype,
362 ret = krb5_string_to_key_data_salt(context, etype, pw,
366 "and etype %d: %s",
367 cpn, etype, krb5_get_err_text(context, ret));
394 "and etype %d: %s",
395 cpn, etype, krb5_get_err_text(context, ret));
238 kcm_password_key_proc(krb5_context context, krb5_enctype etype, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
344 update_keytab_entry(krb5_context context, kcm_ccache ccache, krb5_enctype etype, char *cpn, char *spn, char *newpw, krb5_salt salt, unsigned kvno) argument
/freebsd-9.3-release/sys/netgraph/
H A Dng_parse.c1323 etype = ng_get_composite_etype(type, index, ctype); local
1343 error = INVOKE(etype, parse)(etype,
1398 etype = ng_get_composite_etype(type, index, ctype); local
1442 if ((error = INVOKE(etype, unparse)
1443 (etype, data, off, cbuf, cbuflen)) != 0) {
1471 const struct ng_parse_type *etype; local
1502 etype = ng_get_composite_etype(type, index, ctype);
1503 func = METHOD(etype, getDefault);
1506 return (*func)(etype, star
1557 const struct ng_parse_type *etype = NULL; local
1596 etype = ng_get_composite_etype(type, index, ctype); local
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/krb5/
H A Dkrb5_asn.h78 * etype[0] INTEGER, -- EncryptionType
84 ASN1_INTEGER *etype; member in struct:krb5_encdata_st

Completed in 174 milliseconds

1234