Searched refs:etype (Results 1 - 25 of 107) sorted by relevance

12345

/freebsd-current/crypto/heimdal/lib/krb5/
H A Dgenerate_subkey.c41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype
52 krb5_enctype etype,
63 if (etype == ETYPE_NULL)
64 etype = key->keytype; /* use session key etype */
67 ret = krb5_generate_random_keyblock(context, etype, *subkey);
50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
H A Dtest_prf.c58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local
64 ret = krb5_generate_random_keyblock(context, etype, &key);
68 ret = krb5_crypto_prf_length(context, etype, &length);
H A Dtest_crypto.c39 krb5_enctype etype, int iterations)
50 ret = krb5_generate_random_keyblock(context, etype, &key);
54 ret = krb5_enctype_to_string(context, etype, &etype_name);
92 krb5_enctype etype,
104 ret = krb5_enctype_to_string(context, etype, &etype_name);
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dsalt.c39 krb5_enctype etype,
48 e = _krb5_find_enctype (etype);
52 etype);
73 krb5_enctype etype,
82 e = _krb5_find_enctype (etype);
86 etype);
253 krb5_enctype etype,
256 struct _krb5_encryption_type *et = _krb5_find_enctype(etype);
265 etype);
281 kd.key->keytype = etype;
38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument
72 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument
250 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dtest_crypto_wrapping.c42 krb5_enctype etype)
52 ret = krb5_generate_random_keyblock(context, etype, &key);
56 ret = krb5_enctype_to_string(context, etype, &etype_name);
38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
H A Dtest_pkinit_dh2key.c43 krb5_enctype etype,
50 etype,
38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
H A Dget_in_tkt.c40 krb5_enctype etype, krb5_keyblock *key)
212 &a->req_body.etype.len,
213 &a->req_body.etype.val,
277 &preauth->val[i].info.val[j].etype, 1,
300 key_proc, keyseed, a->req_body.etype.val,
301 a->req_body.etype.len, NULL);
307 key_proc, keyseed, a->req_body.etype.val,
308 a->req_body.etype.len, &salt);
388 krb5_enctype etype; variable
470 etype
39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dinit_creds_pw.c84 krb5_enctype etype; member in struct:pa_info_data
676 &a->req_body.etype.len,
677 &a->req_body.etype.val,
724 krb5_enctype etype,
728 paid->etype = etype;
771 for (j = 0; j < asreq->req_body.etype.len; j++) {
773 if (asreq->req_body.etype.val[j] == e.val[i].etype) {
783 ret = set_paid(paid, context, e.val[i].etype,
723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument
1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1259 krb5_enctype etype; local
[all...]
H A Dbuild_ap_req.c63 ap.authenticator.etype = enctype;
/freebsd-current/contrib/tcpdump/
H A Dprint-symantec.c45 uint16_t etype; local
49 etype = GET_BE_U_2(sp->ether_type);
51 if (etype <= MAX_ETHERNET_LENGTH_VAL)
52 ND_PRINT("invalid ethertype %u", etype);
55 tok2str(ethertype_values,"Unknown", etype),
56 etype);
58 if (etype <= MAX_ETHERNET_LENGTH_VAL)
59 ND_PRINT("invalid ethertype %u", etype);
61 ND_PRINT("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
/freebsd-current/tests/sys/cddl/zfs/tests/zinject/
H A Dzinject_001_pos.ksh72 typeset etype=$1
82 inject_fault $etype $object $errno
84 trigger_inject $etype $object $otype
98 typeset etype="data"
117 test_zinject_unit $etype $object \
H A Dzinject_003_pos.ksh68 typeset etype=$1
78 inject_fault $etype $object $errno 1
95 typeset etype="dnode"
112 test_zinject_unit $etype $object \
H A Dzinject_002_pos.ksh73 typeset etype=$1
83 inject_fault $etype $object $errno
85 trigger_inject $etype $object $otype
99 typeset etype="dnode"
116 test_zinject_unit $etype $object \
H A Dzinject_004_pos.ksh73 typeset etype="device"
88 trigger_inject $etype $basedir/testfile.$maxnumber "file"
97 trigger_inject $etype $basedir/testdir.$maxnumber "dir"
H A Dzinject.kshlib106 function check_ereport #timestamp, etype
183 function trigger_inject #etype, object, objtype
185 typeset etype=$1
189 if [[ $etype == "bplist" ]] ; then
/freebsd-current/contrib/sendmail/libsm/
H A Dexc.c207 ** etype -- type of exception.
235 sm_exc_vnew_x(etype, ap)
236 const SM_EXC_TYPE_T *etype;
250 SM_REQUIRE_ISA(etype, SmExcTypeMagic);
251 argc = strlen(etype->etype_argformat);
263 exc->exc_type = etype;
277 switch (etype->etype_argformat[i])
292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0');
297 etype->etype_argformat[i]);
311 switch (etype
405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument
635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument
[all...]
/freebsd-current/stand/libsa/
H A Dether.c52 sendether(struct iodesc *d, void *pkt, size_t len, uint8_t *dea, int etype) argument
67 eh->ether_type = htons(etype);
79 * the broadcast address. Save the Ether type in etype.
85 uint16_t *etype)
118 *etype = ntohs(eh->ether_type);
84 readether(struct iodesc *d, void **pkt, void **payload, time_t tleft, uint16_t *etype) argument
H A Drarp.c147 uint16_t etype; /* host order */ local
154 n = readether(d, &ptr, (void **)&ap, tleft, &etype);
165 if (etype != ETHERTYPE_REVARP) {
168 printf("bad type=0x%x\n", etype);
/freebsd-current/sys/dev/ixgbe/
H A Dif_fdir.c91 u16 etype; local
96 etype = eh->evl_proto;
99 etype = eh->evl_encap_proto;
103 if (etype != htons(ETHERTYPE_IP))
133 common.flex_bytes ^= etype;
/freebsd-current/crypto/heimdal/kdc/
H A Dstring2key.c105 krb5_enctype etype; local
127 ret = krb5_string_to_enctype(context, keytype_str, &etype);
131 if((etype != ETYPE_DES_CBC_CRC &&
132 etype != ETYPE_DES_CBC_MD4 &&
133 etype != ETYPE_DES_CBC_MD5) &&
136 etype = ETYPE_DES_CBC_CRC;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
/freebsd-current/sys/kern/
H A Duipc_mbufhash.c77 uint32_t p, int off, const uint16_t etype)
96 switch (etype) {
164 uint16_t etype; local
170 etype = ntohs(eh->ether_type);
179 } else if (etype == ETHERTYPE_VLAN) {
186 etype = ntohs(vlan->evl_proto);
189 return (m_tcpip_hash(flags, m, p, off, etype));
198 uint16_t etype; local
204 etype = ntohs(ibh->ib_protocol);
208 return (m_tcpip_hash(flags, m, p, off, etype));
76 m_tcpip_hash(const uint32_t flags, const struct mbuf *m, uint32_t p, int off, const uint16_t etype) argument
[all...]
/freebsd-current/sys/netgraph/
H A Dng_checksum.h83 u_int16_t etype; member in struct:ng_checksum_vlan_header
/freebsd-current/crypto/heimdal/kuser/
H A Dkimpersonate.c63 krb5_enctype etype,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
150 krb5_enctype etype; local
155 ret = krb5_string_to_enctype (context, enc_type, &etype);
159 0, etype, &entry);
174 krb5_generate_random_keyblock(context, etype, &cred.session);
192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
/freebsd-current/sys/dev/virtio/network/
H A Dvirtio_net.h411 virtio_net_tx_offload_ctx(struct mbuf *m, int *etype, int *proto, int *start) argument
421 *etype = ntohs(evh->evl_proto);
426 *etype = ntohs(evh->evl_encap_proto);
432 switch (*etype) {
508 int flags, etype, csum_start, proto, error; local
512 error = virtio_net_tx_offload_ctx(m, &etype, &proto, &csum_start);
516 if ((etype == ETHERTYPE_IP && (flags & (CSUM_TCP | CSUM_UDP))) ||
517 (etype == ETHERTYPE_IPV6 &&
541 error = virtio_net_tx_offload_tso(ifp, m, etype, csum_start,
/freebsd-current/sys/sys/
H A Dktr.h123 * etype is the type of event to plot (state, counter, point)
127 * etype and attribute names must be string constants. This minimizes the
138 #define KTR_EFMT(egroup, ident, etype) \
139 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: "
141 #define KTR_EVENT0(m, egroup, ident, etype, edat) \
142 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat)
143 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \
144 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0))
145 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \
146 CTR4(m, KTR_EFMT(egroup, ident, etype) a
[all...]

Completed in 197 milliseconds

12345