/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | generate_subkey.c | 41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 52 krb5_enctype etype, 63 if (etype == ETYPE_NULL) 64 etype = key->keytype; /* use session key etype */ 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | test_prf.c | 58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 64 ret = krb5_generate_random_keyblock(context, etype, &key); 68 ret = krb5_crypto_prf_length(context, etype, &length);
|
H A D | test_crypto.c | 39 krb5_enctype etype, int iterations) 50 ret = krb5_generate_random_keyblock(context, etype, &key); 54 ret = krb5_enctype_to_string(context, etype, &etype_name); 92 krb5_enctype etype, 104 ret = krb5_enctype_to_string(context, etype, &etype_name); 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | salt.c | 39 krb5_enctype etype, 48 e = _krb5_find_enctype (etype); 52 etype); 73 krb5_enctype etype, 82 e = _krb5_find_enctype (etype); 86 etype); 253 krb5_enctype etype, 256 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); 265 etype); 281 kd.key->keytype = etype; 38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument 72 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument 250 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | test_crypto_wrapping.c | 42 krb5_enctype etype) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
|
H A D | test_pkinit_dh2key.c | 43 krb5_enctype etype, 50 etype, 38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
|
H A D | get_in_tkt.c | 40 krb5_enctype etype, krb5_keyblock *key) 212 &a->req_body.etype.len, 213 &a->req_body.etype.val, 277 &preauth->val[i].info.val[j].etype, 1, 300 key_proc, keyseed, a->req_body.etype.val, 301 a->req_body.etype.len, NULL); 307 key_proc, keyseed, a->req_body.etype.val, 308 a->req_body.etype.len, &salt); 388 krb5_enctype etype; variable 470 etype 39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | init_creds_pw.c | 84 krb5_enctype etype; member in struct:pa_info_data 676 &a->req_body.etype.len, 677 &a->req_body.etype.val, 724 krb5_enctype etype, 728 paid->etype = etype; 771 for (j = 0; j < asreq->req_body.etype.len; j++) { 773 if (asreq->req_body.etype.val[j] == e.val[i].etype) { 783 ret = set_paid(paid, context, e.val[i].etype, 723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument 926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument 1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1259 krb5_enctype etype; local [all...] |
H A D | build_ap_req.c | 63 ap.authenticator.etype = enctype;
|
/freebsd-current/contrib/tcpdump/ |
H A D | print-symantec.c | 45 uint16_t etype; local 49 etype = GET_BE_U_2(sp->ether_type); 51 if (etype <= MAX_ETHERNET_LENGTH_VAL) 52 ND_PRINT("invalid ethertype %u", etype); 55 tok2str(ethertype_values,"Unknown", etype), 56 etype); 58 if (etype <= MAX_ETHERNET_LENGTH_VAL) 59 ND_PRINT("invalid ethertype %u", etype); 61 ND_PRINT("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
|
/freebsd-current/tests/sys/cddl/zfs/tests/zinject/ |
H A D | zinject_001_pos.ksh | 72 typeset etype=$1 82 inject_fault $etype $object $errno 84 trigger_inject $etype $object $otype 98 typeset etype="data" 117 test_zinject_unit $etype $object \
|
H A D | zinject_003_pos.ksh | 68 typeset etype=$1 78 inject_fault $etype $object $errno 1 95 typeset etype="dnode" 112 test_zinject_unit $etype $object \
|
H A D | zinject_002_pos.ksh | 73 typeset etype=$1 83 inject_fault $etype $object $errno 85 trigger_inject $etype $object $otype 99 typeset etype="dnode" 116 test_zinject_unit $etype $object \
|
H A D | zinject_004_pos.ksh | 73 typeset etype="device" 88 trigger_inject $etype $basedir/testfile.$maxnumber "file" 97 trigger_inject $etype $basedir/testdir.$maxnumber "dir"
|
H A D | zinject.kshlib | 106 function check_ereport #timestamp, etype 183 function trigger_inject #etype, object, objtype 185 typeset etype=$1 189 if [[ $etype == "bplist" ]] ; then
|
/freebsd-current/contrib/sendmail/libsm/ |
H A D | exc.c | 207 ** etype -- type of exception. 235 sm_exc_vnew_x(etype, ap) 236 const SM_EXC_TYPE_T *etype; 250 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 251 argc = strlen(etype->etype_argformat); 263 exc->exc_type = etype; 277 switch (etype->etype_argformat[i]) 292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 297 etype->etype_argformat[i]); 311 switch (etype 405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument 635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument [all...] |
/freebsd-current/stand/libsa/ |
H A D | ether.c | 52 sendether(struct iodesc *d, void *pkt, size_t len, uint8_t *dea, int etype) argument 67 eh->ether_type = htons(etype); 79 * the broadcast address. Save the Ether type in etype. 85 uint16_t *etype) 118 *etype = ntohs(eh->ether_type); 84 readether(struct iodesc *d, void **pkt, void **payload, time_t tleft, uint16_t *etype) argument
|
H A D | rarp.c | 147 uint16_t etype; /* host order */ local 154 n = readether(d, &ptr, (void **)&ap, tleft, &etype); 165 if (etype != ETHERTYPE_REVARP) { 168 printf("bad type=0x%x\n", etype);
|
/freebsd-current/sys/dev/ixgbe/ |
H A D | if_fdir.c | 91 u16 etype; local 96 etype = eh->evl_proto; 99 etype = eh->evl_encap_proto; 103 if (etype != htons(ETHERTYPE_IP)) 133 common.flex_bytes ^= etype;
|
/freebsd-current/crypto/heimdal/kdc/ |
H A D | string2key.c | 105 krb5_enctype etype; local 127 ret = krb5_string_to_enctype(context, keytype_str, &etype); 131 if((etype != ETYPE_DES_CBC_CRC && 132 etype != ETYPE_DES_CBC_MD4 && 133 etype != ETYPE_DES_CBC_MD5) && 136 etype = ETYPE_DES_CBC_CRC; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
/freebsd-current/sys/kern/ |
H A D | uipc_mbufhash.c | 77 uint32_t p, int off, const uint16_t etype) 96 switch (etype) { 164 uint16_t etype; local 170 etype = ntohs(eh->ether_type); 179 } else if (etype == ETHERTYPE_VLAN) { 186 etype = ntohs(vlan->evl_proto); 189 return (m_tcpip_hash(flags, m, p, off, etype)); 198 uint16_t etype; local 204 etype = ntohs(ibh->ib_protocol); 208 return (m_tcpip_hash(flags, m, p, off, etype)); 76 m_tcpip_hash(const uint32_t flags, const struct mbuf *m, uint32_t p, int off, const uint16_t etype) argument [all...] |
/freebsd-current/sys/netgraph/ |
H A D | ng_checksum.h | 83 u_int16_t etype; member in struct:ng_checksum_vlan_header
|
/freebsd-current/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 63 krb5_enctype etype, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 150 krb5_enctype etype; local 155 ret = krb5_string_to_enctype (context, enc_type, &etype); 159 0, etype, &entry); 174 krb5_generate_random_keyblock(context, etype, &cred.session); 192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-current/sys/dev/virtio/network/ |
H A D | virtio_net.h | 411 virtio_net_tx_offload_ctx(struct mbuf *m, int *etype, int *proto, int *start) argument 421 *etype = ntohs(evh->evl_proto); 426 *etype = ntohs(evh->evl_encap_proto); 432 switch (*etype) { 508 int flags, etype, csum_start, proto, error; local 512 error = virtio_net_tx_offload_ctx(m, &etype, &proto, &csum_start); 516 if ((etype == ETHERTYPE_IP && (flags & (CSUM_TCP | CSUM_UDP))) || 517 (etype == ETHERTYPE_IPV6 && 541 error = virtio_net_tx_offload_tso(ifp, m, etype, csum_start,
|
/freebsd-current/sys/sys/ |
H A D | ktr.h | 123 * etype is the type of event to plot (state, counter, point) 127 * etype and attribute names must be string constants. This minimizes the 138 #define KTR_EFMT(egroup, ident, etype) \ 139 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: " 141 #define KTR_EVENT0(m, egroup, ident, etype, edat) \ 142 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat) 143 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \ 144 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0)) 145 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \ 146 CTR4(m, KTR_EFMT(egroup, ident, etype) a [all...] |