/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | generate_subkey.c | 41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 52 krb5_enctype etype, 63 if (etype == ETYPE_NULL) 64 etype = key->keytype; /* use session key etype */ 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | test_prf.c | 58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 64 ret = krb5_generate_random_keyblock(context, etype, &key); 68 ret = krb5_crypto_prf_length(context, etype, &length);
|
H A D | test_crypto.c | 39 krb5_enctype etype, int iterations) 50 ret = krb5_generate_random_keyblock(context, etype, &key); 54 ret = krb5_enctype_to_string(context, etype, &etype_name); 92 krb5_enctype etype, 104 ret = krb5_enctype_to_string(context, etype, &etype_name); 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | test_rfc3961.c | 39 krb5_enctype etype, int iterations) 50 ret = krb5_generate_random_keyblock(context, etype, &key); 54 ret = krb5_enctype_to_string(context, etype, &etype_name); 92 krb5_enctype etype, 104 ret = krb5_enctype_to_string(context, etype, &etype_name); 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | salt.c | 39 krb5_enctype etype, 46 e = _krb5_find_enctype (etype); 50 etype); 71 krb5_enctype etype, 78 e = _krb5_find_enctype (etype); 82 etype); 248 krb5_enctype etype, 252 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); 261 etype); 277 kd.key->keytype = etype; 38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument 70 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument 245 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | test_crypto_wrapping.c | 42 krb5_enctype etype) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
|
H A D | test_pkinit_dh2key.c | 43 krb5_enctype etype, 50 etype, 38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
|
H A D | get_in_tkt.c | 40 krb5_enctype etype, krb5_keyblock *key) 212 &a->req_body.etype.len, 213 &a->req_body.etype.val, 277 &preauth->val[i].info.val[j].etype, 1, 300 key_proc, keyseed, a->req_body.etype.val, 301 a->req_body.etype.len, NULL); 307 key_proc, keyseed, a->req_body.etype.val, 308 a->req_body.etype.len, &salt); 388 krb5_enctype etype; variable 470 etype 39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | build_ap_req.c | 60 ap.authenticator.etype = enctype;
|
/macosx-10.10.1/tcpdump-61/tcpdump/ |
H A D | print-symantec.c | 52 u_int16_t etype; local 56 etype = EXTRACT_16BITS(&sp->ether_type); 58 if (etype <= ETHERMTU) 59 (void)printf("invalid ethertype %u", etype); 62 tok2str(ethertype_values,"Unknown", etype), 63 etype); 65 if (etype <= ETHERMTU) 66 (void)printf("invalid ethertype %u", etype); 68 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
|
/macosx-10.10.1/tcl-105/tcl_ext/tkimg/tkimg/compat/libpng/contrib/visupng/ |
H A D | cexcept.h | 196 #define define_exception_type(etype) \ 200 volatile struct { etype etmp; } v; \ 206 /* avoid warnings about a duplicate volatile qualifier in case etype */
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/doctools2toc/ |
H A D | structure.tcl | 156 foreach {etype edata} $element break 157 #struct::list assign $element etype edata 159 switch -exact -- $etype { 212 return -code error $ourprefix[format $ouretag $etype] 231 foreach {etype edata} $element break 232 #struct::list assign $element etype edata 235 switch -exact -- $etype { 254 lappend result [list $etype $element] 263 foreach {etype edata} $element break 264 #struct::list assign $element etype edat [all...] |
H A D | export_text.tcl | 89 foreach {etype edata} $element break 92 switch -exact -- $etype {
|
H A D | export_wiki.tcl | 92 foreach {etype edata} $element break 94 switch -exact -- $etype {
|
H A D | export_json.tcl | 110 foreach {etype edata} $element break 112 switch -exact -- $etype { 129 lappend result [JsonObject $etype $edata]
|
H A D | export_doctoc.tcl | 133 foreach {etype edata} $element break 134 if {$etype eq "division"} { continue } 144 foreach {etype edata} $element break 146 switch -exact -- $etype {
|
H A D | export_nroff.tcl | 102 foreach {etype edata} $element break 104 switch -exact -- $etype {
|
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | string2key.c | 105 krb5_enctype etype; local 127 ret = krb5_string_to_enctype(context, keytype_str, &etype); 131 if((etype != ETYPE_DES_CBC_CRC && 132 etype != ETYPE_DES_CBC_MD4 && 133 etype != ETYPE_DES_CBC_MD5) && 136 etype = ETYPE_DES_CBC_CRC; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
H A D | misc.c | 186 krb5_enctype etype) 190 ret = krb5_enctype_valid(context, etype); 198 if (entry->entry.etypes->val[n] == (unsigned int)etype) 203 ret = hdb_enctype2key(context, &entry->entry, etype, &key); 217 krb5_enctype *etype) 231 *etype = p[n]; 242 *etype = etypes[n]; 184 entry_check_enctype(krb5_context context, const hdb_entry_ex *entry, krb5_enctype etype) argument 211 _kdc_get_preferred_enctype(krb5_context context, krb5_kdc_configuration *config, const hdb_entry_ex *entry, const char *name, krb5_enctype *etypes, unsigned num_etypes, krb5_enctype *etype) argument
|
/macosx-10.10.1/shell_cmds-179/who/ |
H A D | utmpentry.h | 63 extern int etype;
|
/macosx-10.10.1/Heimdal-398.1.2/kuser/ |
H A D | kimpersonate.c | 63 krb5_enctype etype, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 150 krb5_enctype etype; local 155 ret = krb5_string_to_enctype (context, enc_type, &etype); 159 0, etype, &entry); 174 krb5_generate_random_keyblock(context, etype, &cred.session); 192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
H A D | kcpytkt.c | 71 krb5_enctype etype; local 84 ret = krb5_string_to_enctype(context, etypestr, &etype); 89 etype = 0; 130 in_creds.session.keytype = etype;
|
H A D | kdeltkt.c | 71 krb5_enctype etype; local 83 ret = krb5_string_to_enctype(context, etypestr, &etype); 88 etype = 0; 125 in_creds.session.keytype = etype;
|
H A D | kvno.c | 103 krb5_enctype etype; local 117 ret = krb5_string_to_enctype(context, etype_str, &etype); 121 etype = 0; 172 in_creds.session.keytype = etype; 200 ticket.enc_part.etype,
|
/macosx-10.10.1/ruby-106/ruby/ |
H A D | error.c | 416 const char *etype; local 419 etype = "nil"; 422 etype = "Fixnum"; 425 etype = "Symbol"; 428 etype = "true"; 431 etype = "false"; 434 etype = rb_obj_classname(x); 436 return etype; 485 const char *etype; local 489 etype 536 rb_exc_new(VALUE etype, const char *ptr, long len) argument 542 rb_exc_new2(VALUE etype, const char *s) argument 548 rb_exc_new3(VALUE etype, VALUE str) argument [all...] |