Searched refs:etype (Results 1 - 25 of 99) sorted by relevance

1234

/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dgenerate_subkey.c41 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype
52 krb5_enctype etype,
63 if (etype == ETYPE_NULL)
64 etype = key->keytype; /* use session key etype */
67 ret = krb5_generate_random_keyblock(context, etype, *subkey);
50 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
H A Dtest_prf.c58 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local
64 ret = krb5_generate_random_keyblock(context, etype, &key);
68 ret = krb5_crypto_prf_length(context, etype, &length);
H A Dtest_crypto.c39 krb5_enctype etype, int iterations)
50 ret = krb5_generate_random_keyblock(context, etype, &key);
54 ret = krb5_enctype_to_string(context, etype, &etype_name);
92 krb5_enctype etype,
104 ret = krb5_enctype_to_string(context, etype, &etype_name);
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dtest_rfc3961.c39 krb5_enctype etype, int iterations)
50 ret = krb5_generate_random_keyblock(context, etype, &key);
54 ret = krb5_enctype_to_string(context, etype, &etype_name);
92 krb5_enctype etype,
104 ret = krb5_enctype_to_string(context, etype, &etype_name);
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
38 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dsalt.c39 krb5_enctype etype,
46 e = _krb5_find_enctype (etype);
50 etype);
71 krb5_enctype etype,
78 e = _krb5_find_enctype (etype);
82 etype);
248 krb5_enctype etype,
252 struct _krb5_encryption_type *et = _krb5_find_enctype(etype);
261 etype);
277 kd.key->keytype = etype;
38 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument
70 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument
245 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dtest_crypto_wrapping.c42 krb5_enctype etype)
52 ret = krb5_generate_random_keyblock(context, etype, &key);
56 ret = krb5_enctype_to_string(context, etype, &etype_name);
38 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
H A Dtest_pkinit_dh2key.c43 krb5_enctype etype,
50 etype,
38 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
H A Dget_in_tkt.c40 krb5_enctype etype, krb5_keyblock *key)
212 &a->req_body.etype.len,
213 &a->req_body.etype.val,
277 &preauth->val[i].info.val[j].etype, 1,
300 key_proc, keyseed, a->req_body.etype.val,
301 a->req_body.etype.len, NULL);
307 key_proc, keyseed, a->req_body.etype.val,
308 a->req_body.etype.len, &salt);
388 krb5_enctype etype; variable
470 etype
39 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dbuild_ap_req.c60 ap.authenticator.etype = enctype;
/macosx-10.9.5/tcpdump-56/tcpdump/
H A Dprint-symantec.c52 u_int16_t etype; local
56 etype = EXTRACT_16BITS(&sp->ether_type);
58 if (etype <= ETHERMTU)
59 (void)printf("invalid ethertype %u", etype);
62 tok2str(ethertype_values,"Unknown", etype),
63 etype);
65 if (etype <= ETHERMTU)
66 (void)printf("invalid ethertype %u", etype);
68 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
/macosx-10.9.5/tcl-102/tcl_ext/tkimg/tkimg/compat/libpng/contrib/visupng/
H A Dcexcept.h196 #define define_exception_type(etype) \
200 volatile struct { etype etmp; } v; \
206 /* avoid warnings about a duplicate volatile qualifier in case etype */
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/doctools2toc/
H A Dstructure.tcl156 foreach {etype edata} $element break
157 #struct::list assign $element etype edata
159 switch -exact -- $etype {
212 return -code error $ourprefix[format $ouretag $etype]
231 foreach {etype edata} $element break
232 #struct::list assign $element etype edata
235 switch -exact -- $etype {
254 lappend result [list $etype $element]
263 foreach {etype edata} $element break
264 #struct::list assign $element etype edat
[all...]
H A Dexport_text.tcl89 foreach {etype edata} $element break
92 switch -exact -- $etype {
H A Dexport_wiki.tcl92 foreach {etype edata} $element break
94 switch -exact -- $etype {
H A Dexport_json.tcl110 foreach {etype edata} $element break
112 switch -exact -- $etype {
129 lappend result [JsonObject $etype $edata]
H A Dexport_doctoc.tcl133 foreach {etype edata} $element break
134 if {$etype eq "division"} { continue }
144 foreach {etype edata} $element break
146 switch -exact -- $etype {
H A Dexport_nroff.tcl102 foreach {etype edata} $element break
104 switch -exact -- $etype {
/macosx-10.9.5/Heimdal-323.92.1/kdc/
H A Dstring2key.c105 krb5_enctype etype; local
127 ret = krb5_string_to_enctype(context, keytype_str, &etype);
131 if((etype != ETYPE_DES_CBC_CRC &&
132 etype != ETYPE_DES_CBC_MD4 &&
133 etype != ETYPE_DES_CBC_MD5) &&
136 etype = ETYPE_DES_CBC_CRC;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
/macosx-10.9.5/shell_cmds-175/who/
H A Dutmpentry.h63 extern int etype;
/macosx-10.9.5/Heimdal-323.92.1/kuser/
H A Dkimpersonate.c63 krb5_enctype etype,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
150 krb5_enctype etype; local
155 ret = krb5_string_to_enctype (context, enc_type, &etype);
159 0, etype, &entry);
174 krb5_generate_random_keyblock(context, etype, &cred.session);
192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
H A Dkcpytkt.c71 krb5_enctype etype; local
84 ret = krb5_string_to_enctype(context, etypestr, &etype);
89 etype = 0;
130 in_creds.session.keytype = etype;
H A Dkdeltkt.c71 krb5_enctype etype; local
83 ret = krb5_string_to_enctype(context, etypestr, &etype);
88 etype = 0;
125 in_creds.session.keytype = etype;
H A Dkvno.c103 krb5_enctype etype; local
117 ret = krb5_string_to_enctype(context, etype_str, &etype);
121 etype = 0;
172 in_creds.session.keytype = etype;
200 ticket.enc_part.etype,
/macosx-10.9.5/CPANInternal-140/URI/URI/
H A D_ldap.pm115 my $etype = $ext[$i] = lc($ext[$i]);
116 if ($etype =~ /^!?bindname$/) {
/macosx-10.9.5/ruby-104/ruby/
H A Derror.c416 const char *etype; local
419 etype = "nil";
422 etype = "Fixnum";
425 etype = "Symbol";
428 etype = "true";
431 etype = "false";
434 etype = rb_obj_classname(x);
436 return etype;
485 const char *etype; local
489 etype
536 rb_exc_new(VALUE etype, const char *ptr, long len) argument
542 rb_exc_new2(VALUE etype, const char *s) argument
548 rb_exc_new3(VALUE etype, VALUE str) argument
[all...]

Completed in 346 milliseconds

1234