/macosx-10.10/Heimdal-398.1.2/lib/com_err/ |
H A D | error.c | 83 struct error_table et; member in struct:foobar 92 struct et_list *et, **end; local 94 for (end = list, et = *list; et; end = &et->next, et = et->next) 95 if (et->table->msgs == messages) 100 et = &f->etl; 101 et 111 free_error_table(struct et_list *et) argument [all...] |
H A D | com_err.c | 162 struct et_list *et; local 164 for (et = _et_list; et; et = et->next) { 165 if (et->table->base == new_table->table->base)
|
H A D | parse.y | 69 header : id et 70 | et 79 et : ET STRING label
|
H A D | lex.l | 59 et { return ET; }
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | salt-aes.c | 48 struct _krb5_encryption_type *et; local 60 et = _krb5_find_enctype(enctype); 61 if (et == NULL) 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 80 et->keytype->size, kd.key->keyvalue.data); 82 _krb5_free_key_data(context, &kd, et); 88 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 91 _krb5_free_key_data(context, &kd, et);
|
H A D | crypto.c | 88 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 89 if(et == NULL) { 92 *keysize = et->keytype->size; 101 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 102 if(et == NULL) { 105 *keybits = et->keytype->bits; 115 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 116 if(et == NULL) { 119 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); 123 if(et 136 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); local 850 const struct _krb5_encryption_type *et = crypto->et; local 918 const struct _krb5_encryption_type *et = crypto->et; local 982 struct _krb5_encryption_type *et = crypto->et; local 1024 struct _krb5_encryption_type *et = crypto->et; local 1105 struct _krb5_encryption_type *et = crypto->et; local 1172 struct _krb5_encryption_type *et = crypto->et; local 1262 const struct _krb5_encryption_type *et = crypto->et; local 1456 struct _krb5_encryption_type *et = crypto->et; local 1673 struct _krb5_encryption_type *et = crypto->et; local 1881 _krb5_derive_key(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument 1979 struct _krb5_encryption_type *et; local 2093 free_key_schedule(krb5_context context, struct _krb5_key_data *key, struct _krb5_encryption_type *et) argument 2104 _krb5_free_key_data(krb5_context context, struct _krb5_key_data *key, struct _krb5_encryption_type *et) argument 2115 free_key_usage(krb5_context context, struct _krb5_key_usage *ku, struct _krb5_encryption_type *et) argument 2251 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2278 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2331 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2342 struct _krb5_encryption_type *et = crypto->et; local 2357 struct _krb5_encryption_type *et = crypto->et; local 2393 struct _krb5_encryption_type *et = crypto->et; local 2407 struct _krb5_encryption_type *et = crypto->et; local 2454 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 2488 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 2507 struct _krb5_encryption_type *et = crypto->et; local 2790 struct encryption_type *et = crypto->et; local 2804 struct encryption_type *et = crypto->et; local [all...] |
H A D | crypto-aes.c | 156 struct _krb5_checksum_type *ct = crypto->et->checksum; 175 if (result.checksum.length < crypto->et->blocksize) 180 crypto->et->type, "prf", 3, &derived); 184 prfsize = (result.checksum.length / crypto->et->blocksize) * crypto->et->blocksize; 185 heim_assert(prfsize == crypto->et->prf_length, "prfsize not same ?"); 187 ret = krb5_data_alloc(out, crypto->et->blocksize); 192 CCAlgorithm alg = (CCAlgorithm)crypto->et->keytype->evp; 200 crypto->et->keytype->size, 382 struct _krb5_checksum_type *ct = crypto->et [all...] |
H A D | salt.c | 191 struct _krb5_encryption_type *et =_krb5_find_enctype(enctype); local 193 if(et == NULL) { 199 for(st = et->keytype->string_to_key; st && st->type; st++) 252 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); local 258 if(et == NULL) { 264 keylen = et->keytype->bits / 8; 272 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 295 et, 300 _krb5_free_key_data(context, &kd, et); 304 _krb5_free_key_data(context, &kd, et); [all...] |
H A D | crypto-des3.c | 63 struct _krb5_checksum_type *ct = crypto->et->checksum; 82 if (result.checksum.length < crypto->et->blocksize) 87 crypto->et->type, "prf", 3, &derived); 91 prfsize = (result.checksum.length / crypto->et->blocksize) * crypto->et->blocksize; 92 heim_assert(prfsize == crypto->et->prf_length, "prfsize not same ?"); 99 const EVP_CIPHER *c = (*crypto->et->keytype->evp)();
|
H A D | crypto-pk.c | 47 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 55 if(et == NULL) { 61 keylen = (et->keytype->bits + 7) / 8; 212 struct _krb5_encryption_type *et; local 245 et = _krb5_find_enctype(enctype); 246 if(et == NULL) { 252 keylen = (et->keytype->bits + 7) / 8;
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | sort.c | 96 struct entrything *et; local 128 if ( (et = (struct entrything *) LDAP_MALLOC( count * 136 et[i].et_cmp_fn = cmp; 137 et[i].et_msg = e; 142 et[i].et_vals = ldap_explode_dn( dn, 1 ); 145 et[i].et_vals = ldap_get_values( ld, e, attr ); 151 qsort( et, count, sizeof(struct entrything), et_cmp ); 155 *ep = et[i].et_msg; 158 LDAP_VFREE( et[i].et_vals ); 163 LDAP_FREE( (char *) et ); [all...] |
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | kimpersonate.c | 72 EncTicketPart et; local 82 et.flags = cred->flags.b; 83 et.key = cred->session; 84 et.crealm = cred->client->realm; 85 copy_PrincipalName(&cred->client->name, &et.cname); 90 et.transited.tr_type = DOMAIN_X500_COMPRESS; 91 et.transited.contents = empty_string; 93 et.authtime = cred->times.authtime; 94 et.starttime = NULL; 95 et [all...] |
/macosx-10.10/MITKerberosShim-66/Kerberos/ |
H A D | com_err.h | 103 errcode_t add_error_table (const struct error_table *et); 104 errcode_t remove_error_table (const struct error_table *et);
|
/macosx-10.10/MITKerberosShim-66/include/ |
H A D | mit-com_err.h | 88 errcode_t add_error_table (const struct error_table *et); 89 errcode_t remove_error_table (const struct error_table *et);
|
/macosx-10.10/MITKerberosShim-66/mit-include/ |
H A D | com_err.h | 88 errcode_t add_error_table (const struct error_table *et); 89 errcode_t remove_error_table (const struct error_table *et);
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | krb5tgs.c | 378 KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) 394 et->flags.invalid = 0; 407 et->flags.forwardable = 1; 415 et->flags.forwarded = 1; 416 et->caddr = b->addresses; 419 et->flags.forwarded = 1; 427 et->flags.proxiable = 1; 435 et->flags.proxy = 1; 436 et->caddr = b->addresses; 439 et 376 check_tgs_flags(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) argument 595 verify_flags(krb5_context context, krb5_kdc_configuration *config, const EncTicketPart *et, const char *pstr) argument 616 fix_transited_encoding(krb5_context context, krb5_kdc_configuration *config, krb5_boolean check_policy, const TransitedEncoding *tr, EncTicketPart *et, const char *client_realm, const char *server_realm, const char *tgt_realm) argument 748 EncTicketPart et; local [all...] |
H A D | kerberos5.c | 371 pkp, &r->et); 1166 KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek, 1180 ASN1_MALLOC_ENCODE(EncTicketPart, buf, buf_size, et, &len, ret); 1225 finished.crealm = et->crealm; 1226 finished.cname = et->cname; 1731 ret = _krb5_pac_sign(r->context, p, r->et.authtime, 1743 ret = _kdc_tkt_add_if_relevant_ad(r->context, &r->et, 2110 r->et.flags.pre_authent = 1; 2261 r->et.flags.initial = 1; 2263 r->et 1162 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, kdc_request_t r, uint32_t nonce, KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, int rk_is_subkey, const char **e_text, krb5_data *reply) argument [all...] |
/macosx-10.10/shell_cmds-179/who/ |
H A D | who.c | 119 int et = 0; local 129 et = -1; 137 et |= (1 << BOOT_TIME); 140 et |= (1 << DEAD_PROCESS); 146 et |= (1 << LOGIN_PROCESS); 152 et |= (1 << INIT_PROCESS); 158 et |= (1 << RUN_LVL); 167 et |= (1 << NEW_TIME); 185 if (et != 0) 186 etype = et; [all...] |
/macosx-10.10/tcsh-65/tcsh/nls/ |
H A D | Makefile | 3 SUBDIRS= C et finnish french german greek italian ja pl russian \
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_transform/lib/ |
H A D | SecEncryptTransform.cpp | 56 EncryptTransform* et = (EncryptTransform*) CoreFoundationHolder::ObjectFromCFType(etRef); local 57 if (et->InitializeObject(keyRef, error))
|
/macosx-10.10/vim-55/runtime/ftplugin/ |
H A D | rst.vim | 14 let b:undo_ftplugin = "setl com< cms< et< fo<"
|
H A D | yaml.vim | 14 let b:undo_ftplugin = "setl com< cms< et< fo<"
|
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | print-llc.c | 383 register u_short et; local 388 et = EXTRACT_16BITS(p + 3); 404 tok2str(tok, "Unknown", et), 405 et); 420 ret = ethertype_print(gndo, et, p, length, caplen); 426 if (et == ETHERTYPE_ATALK) { 435 ret = ethertype_print(gndo, et, p, length, caplen); 442 switch (et) { 463 switch (et) {
|
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | NTMakefile | 46 $(OBJ)\ntlm_err.c $(OBJ)\ntlm_err.h: ntlm_err.et 48 $(BINDIR)\compile_et.exe $(SRCDIR)\ntlm_err.et
|
/macosx-10.10/apache-793/httpd/docs/conf/extra/ |
H A D | httpd-languages.conf.in | 36 # English (en) - Esperanto (eo) - Estonian (et) - French (fr) - German (de) 52 AddLanguage et .et 78 LanguagePriority en ca cs da de el eo es et fr he hr it ja ko ltz nl nn no pl pt pt-BR ru sv tr zh-CN zh-TW
|