Searched refs:etype (Results 1 - 25 of 108) sorted by relevance

12345

/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dgenerate_subkey.c43 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype
54 krb5_enctype etype,
65 if (etype == ETYPE_NULL)
66 etype = key->keytype; /* use session key etype */
69 ret = krb5_generate_random_keyblock(context, etype, *subkey);
52 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
H A Dtest_prf.c60 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local
66 ret = krb5_generate_random_keyblock(context, etype, &key);
70 ret = krb5_crypto_prf_length(context, etype, &length);
H A Dtest_crypto.c41 krb5_enctype etype, int iterations)
52 ret = krb5_generate_random_keyblock(context, etype, &key);
56 ret = krb5_enctype_to_string(context, etype, &etype_name);
94 krb5_enctype etype,
106 ret = krb5_enctype_to_string(context, etype, &etype_name);
116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
40 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dtest_rfc3961.c41 krb5_enctype etype, int iterations)
52 ret = krb5_generate_random_keyblock(context, etype, &key);
56 ret = krb5_enctype_to_string(context, etype, &etype_name);
94 krb5_enctype etype,
106 ret = krb5_enctype_to_string(context, etype, &etype_name);
116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
40 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument
93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dsalt.c41 krb5_enctype etype,
48 e = _krb5_find_enctype (etype);
52 etype);
73 krb5_enctype etype,
80 e = _krb5_find_enctype (etype);
84 etype);
250 krb5_enctype etype,
253 struct _krb5_encryption_type *et = _krb5_find_enctype(etype);
262 etype);
278 kd.key->keytype = etype;
40 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument
72 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument
247 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument
[all...]
H A Dtest_crypto_wrapping.c44 krb5_enctype etype)
54 ret = krb5_generate_random_keyblock(context, etype, &key);
58 ret = krb5_enctype_to_string(context, etype, &etype_name);
40 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/
H A Dprint-symantec.c57 u_int16_t etype; local
61 etype = EXTRACT_16BITS(&sp->ether_type);
63 if (etype <= ETHERMTU)
64 (void)printf("invalid ethertype %u", etype);
67 tok2str(ethertype_values,"Unknown", etype),
68 etype);
70 if (etype <= ETHERMTU)
71 (void)printf("invalid ethertype %u", etype);
73 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
/netbsd-6-1-5-RELEASE/sys/lib/libsa/
H A Dether.c61 sendether(struct iodesc *d, void *pkt, size_t len, u_char *dea, int etype) argument
76 eh->ether_type = htons(etype);
93 u_int16_t *etype)
120 *etype = ntohs(eh->ether_type);
92 readether(struct iodesc *d, void *pkt, size_t len, saseconds_t tleft, u_int16_t *etype) argument
H A Dip.c127 u_int16_t etype; local
131 n = readether(d, ip, len + sizeof(*ip), tleft, &etype);
135 if (etype == ETHERTYPE_ARP) {
144 if (etype != ETHERTYPE_IP) {
147 printf("readip: not IP. ether_type=%x\n", etype);
H A Drarp.c179 u_int16_t etype; /* host order */ local
186 n = readether(d, pkt, len, tleft, &etype);
196 if (etype != ETHERTYPE_REVARP) {
199 printf("bad type=0x%x\n", etype);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Dstring2key.c105 krb5_enctype etype; local
127 ret = krb5_string_to_enctype(context, keytype_str, &etype);
131 if((etype != ETYPE_DES_CBC_CRC &&
132 etype != ETYPE_DES_CBC_MD4 &&
133 etype != ETYPE_DES_CBC_MD5) &&
136 etype = ETYPE_DES_CBC_CRC;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/objc.dg/gnu-encoding/
H A Dstruct-layout-encoding-1_generate.c171 enum ETYPE etype : 8; member in struct:entry
173 unsigned char etype;
326 switch (e[0].etype)
333 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY)
337 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY)
385 if (e[0].etype == ETYPE_ARRAY)
628 switch (e[0].etype)
649 if (e[0].etype
[all...]
/netbsd-6-1-5-RELEASE/sys/net/agr/
H A Dif_agrether_hash.c79 uint16_t etype; local
89 etype = eh->ether_type;
91 if (etype == htobe16(ETHERTYPE_VLAN)) {
102 etype = vlanhdr->evl_proto;
112 if (etype == htobe16(ETHERTYPE_IP)) {
127 } else if (etype == htobe16(ETHERTYPE_IPV6)) {
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/compat/
H A Dstruct-layout-1_generate.c395 enum ETYPE etype : 8; member in struct:entry
397 unsigned char etype;
613 switch (e[0].etype)
620 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY)
624 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY)
679 if (e[0].etype == ETYPE_ARRAY)
697 if (e[0].etype == ETYPE_ARRAY
880 switch (e[0].etype)
[all...]
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.dg/compat/
H A Dstruct-layout-1_generate.c379 enum ETYPE etype : 8; member in struct:entry
381 unsigned char etype;
597 switch (e[0].etype)
604 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY)
608 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY)
663 if (e[0].etype == ETYPE_ARRAY)
681 if (e[0].etype == ETYPE_ARRAY
859 switch (e[0].etype)
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/who/
H A Dutmpentry.h61 extern int etype;
/netbsd-6-1-5-RELEASE/sys/uvm/
H A Duvm.h135 * vm_map_entry etype bits:
143 #define UVM_ET_ISOBJ(E) (((E)->etype & UVM_ET_OBJ) != 0)
144 #define UVM_ET_ISSUBMAP(E) (((E)->etype & UVM_ET_SUBMAP) != 0)
145 #define UVM_ET_ISCOPYONWRITE(E) (((E)->etype & UVM_ET_COPYONWRITE) != 0)
146 #define UVM_ET_ISNEEDSCOPY(E) (((E)->etype & UVM_ET_NEEDSCOPY) != 0)
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/compat/
H A Dstruct-layout-1_generate.c734 enum ETYPE etype : 8; member in struct:entry
736 unsigned char etype;
869 switch (e[0].etype)
876 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY)
880 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY)
935 if (e[0].etype == ETYPE_ARRAY)
953 if (e[0].etype == ETYPE_ARRAY
1228 switch (e[0].etype)
[all...]
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.dg/compat/
H A Dstruct-layout-1_generate.c643 enum ETYPE etype : 8; member in struct:entry
645 unsigned char etype;
775 switch (e[0].etype)
782 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY)
786 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY)
841 if (e[0].etype == ETYPE_ARRAY)
859 if (e[0].etype == ETYPE_ARRAY
1098 switch (e[0].etype)
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/
H A Dkimpersonate.c63 krb5_enctype etype,
108 ret = krb5_crypto_init(context, skey, etype, &crypto);
150 krb5_enctype etype; local
155 ret = krb5_string_to_enctype (context, enc_type, &etype);
159 0, etype, &entry);
174 krb5_generate_random_keyblock(context, etype, &cred.session);
192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred);
61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
H A Dkcpytkt.c73 krb5_enctype etype; local
86 ret = krb5_string_to_enctype(context, etypestr, &etype);
91 etype = 0;
132 in_creds.session.keytype = etype;
H A Dkdeltkt.c73 krb5_enctype etype; local
85 ret = krb5_string_to_enctype(context, etypestr, &etype);
90 etype = 0;
127 in_creds.session.keytype = etype;
/netbsd-6-1-5-RELEASE/sys/net/
H A Dif_atmsubr.c94 uint16_t etype = 0; /* if using LLC/SNAP */ local
153 etype = ETHERTYPE_IP;
155 etype = ETHERTYPE_IPV6;
209 ATM_LLC_SETTYPE(atmllc, etype);
230 uint16_t etype = ETHERTYPE_IP; /* default */ local
273 etype = ATM_LLC_TYPE(alc);
277 switch (etype) {
H A Dif_fddisubr.c209 uint16_t etype; local
286 etype = htons(ETHERTYPE_IP);
296 etype = htons(ETHERTYPE_IPV6);
316 etype = htons(ETHERTYPE_REVARP);
322 etype = htons(ETHERTYPE_ARP);
330 etype = htons(ETHERTYPE_IPX);
372 etype = 0;
374 etype = htons(ETHERTYPE_ATALK);
408 etype = 0;
431 etype
585 uint16_t etype; local
[all...]
/netbsd-6-1-5-RELEASE/sys/arch/xen/xen/
H A Dxennet_checksum.c103 uint16_t etype; local
111 etype = eh->ether_type;
112 if (etype == htobe16(ETHERTYPE_VLAN)) {
114 } else if (etype == htobe16(ETHERTYPE_IP)) {

Completed in 150 milliseconds

12345