/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | generate_subkey.c | 43 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 54 krb5_enctype etype, 65 if (etype == ETYPE_NULL) 66 etype = key->keytype; /* use session key etype */ 69 ret = krb5_generate_random_keyblock(context, etype, *subkey); 52 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | test_prf.c | 60 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 66 ret = krb5_generate_random_keyblock(context, etype, &key); 70 ret = krb5_crypto_prf_length(context, etype, &length);
|
H A D | test_crypto.c | 41 krb5_enctype etype, int iterations) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 94 krb5_enctype etype, 106 ret = krb5_enctype_to_string(context, etype, &etype_name); 116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 40 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | test_rfc3961.c | 41 krb5_enctype etype, int iterations) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 94 krb5_enctype etype, 106 ret = krb5_enctype_to_string(context, etype, &etype_name); 116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 40 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | salt.c | 41 krb5_enctype etype, 48 e = _krb5_find_enctype (etype); 52 etype); 73 krb5_enctype etype, 80 e = _krb5_find_enctype (etype); 84 etype); 250 krb5_enctype etype, 253 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); 262 etype); 278 kd.key->keytype = etype; 40 krb5_salttype_to_string(krb5_context context, krb5_enctype etype, krb5_salttype stype, char **string) argument 72 krb5_string_to_salttype(krb5_context context, krb5_enctype etype, const char *string, krb5_salttype *salttype) argument 247 krb5_string_to_key_derived(krb5_context context, const void *str, size_t len, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
H A D | test_crypto_wrapping.c | 44 krb5_enctype etype) 54 ret = krb5_generate_random_keyblock(context, etype, &key); 58 ret = krb5_enctype_to_string(context, etype, &etype_name); 40 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/ |
H A D | print-symantec.c | 57 u_int16_t etype; local 61 etype = EXTRACT_16BITS(&sp->ether_type); 63 if (etype <= ETHERMTU) 64 (void)printf("invalid ethertype %u", etype); 67 tok2str(ethertype_values,"Unknown", etype), 68 etype); 70 if (etype <= ETHERMTU) 71 (void)printf("invalid ethertype %u", etype); 73 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
|
/netbsd-6-1-5-RELEASE/sys/lib/libsa/ |
H A D | ether.c | 61 sendether(struct iodesc *d, void *pkt, size_t len, u_char *dea, int etype) argument 76 eh->ether_type = htons(etype); 93 u_int16_t *etype) 120 *etype = ntohs(eh->ether_type); 92 readether(struct iodesc *d, void *pkt, size_t len, saseconds_t tleft, u_int16_t *etype) argument
|
H A D | ip.c | 127 u_int16_t etype; local 131 n = readether(d, ip, len + sizeof(*ip), tleft, &etype); 135 if (etype == ETHERTYPE_ARP) { 144 if (etype != ETHERTYPE_IP) { 147 printf("readip: not IP. ether_type=%x\n", etype);
|
H A D | rarp.c | 179 u_int16_t etype; /* host order */ local 186 n = readether(d, pkt, len, tleft, &etype); 196 if (etype != ETHERTYPE_REVARP) { 199 printf("bad type=0x%x\n", etype);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | string2key.c | 105 krb5_enctype etype; local 127 ret = krb5_string_to_enctype(context, keytype_str, &etype); 131 if((etype != ETYPE_DES_CBC_CRC && 132 etype != ETYPE_DES_CBC_MD4 && 133 etype != ETYPE_DES_CBC_MD5) && 136 etype = ETYPE_DES_CBC_CRC; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/objc.dg/gnu-encoding/ |
H A D | struct-layout-encoding-1_generate.c | 171 enum ETYPE etype : 8; member in struct:entry 173 unsigned char etype; 326 switch (e[0].etype) 333 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY) 337 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY) 385 if (e[0].etype == ETYPE_ARRAY) 628 switch (e[0].etype) 649 if (e[0].etype [all...] |
/netbsd-6-1-5-RELEASE/sys/net/agr/ |
H A D | if_agrether_hash.c | 79 uint16_t etype; local 89 etype = eh->ether_type; 91 if (etype == htobe16(ETHERTYPE_VLAN)) { 102 etype = vlanhdr->evl_proto; 112 if (etype == htobe16(ETHERTYPE_IP)) { 127 } else if (etype == htobe16(ETHERTYPE_IPV6)) {
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/compat/ |
H A D | struct-layout-1_generate.c | 395 enum ETYPE etype : 8; member in struct:entry 397 unsigned char etype; 613 switch (e[0].etype) 620 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY) 624 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY) 679 if (e[0].etype == ETYPE_ARRAY) 697 if (e[0].etype == ETYPE_ARRAY 880 switch (e[0].etype) [all...] |
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.dg/compat/ |
H A D | struct-layout-1_generate.c | 379 enum ETYPE etype : 8; member in struct:entry 381 unsigned char etype; 597 switch (e[0].etype) 604 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY) 608 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY) 663 if (e[0].etype == ETYPE_ARRAY) 681 if (e[0].etype == ETYPE_ARRAY 859 switch (e[0].etype) [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/who/ |
H A D | utmpentry.h | 61 extern int etype;
|
/netbsd-6-1-5-RELEASE/sys/uvm/ |
H A D | uvm.h | 135 * vm_map_entry etype bits: 143 #define UVM_ET_ISOBJ(E) (((E)->etype & UVM_ET_OBJ) != 0) 144 #define UVM_ET_ISSUBMAP(E) (((E)->etype & UVM_ET_SUBMAP) != 0) 145 #define UVM_ET_ISCOPYONWRITE(E) (((E)->etype & UVM_ET_COPYONWRITE) != 0) 146 #define UVM_ET_ISNEEDSCOPY(E) (((E)->etype & UVM_ET_NEEDSCOPY) != 0)
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/compat/ |
H A D | struct-layout-1_generate.c | 734 enum ETYPE etype : 8; member in struct:entry 736 unsigned char etype; 869 switch (e[0].etype) 876 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY) 880 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY) 935 if (e[0].etype == ETYPE_ARRAY) 953 if (e[0].etype == ETYPE_ARRAY 1228 switch (e[0].etype) [all...] |
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.dg/compat/ |
H A D | struct-layout-1_generate.c | 643 enum ETYPE etype : 8; member in struct:entry 645 unsigned char etype; 775 switch (e[0].etype) 782 if (e[0].etype == ETYPE_STRUCT || e[0].etype == ETYPE_STRUCT_ARRAY) 786 if (e[0].etype == ETYPE_STRUCT_ARRAY || e[0].etype == ETYPE_UNION_ARRAY) 841 if (e[0].etype == ETYPE_ARRAY) 859 if (e[0].etype == ETYPE_ARRAY 1098 switch (e[0].etype) [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kimpersonate.c | 63 krb5_enctype etype, 108 ret = krb5_crypto_init(context, skey, etype, &crypto); 150 krb5_enctype etype; local 155 ret = krb5_string_to_enctype (context, enc_type, &etype); 159 0, etype, &entry); 174 krb5_generate_random_keyblock(context, etype, &cred.session); 192 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred); 61 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
H A D | kcpytkt.c | 73 krb5_enctype etype; local 86 ret = krb5_string_to_enctype(context, etypestr, &etype); 91 etype = 0; 132 in_creds.session.keytype = etype;
|
H A D | kdeltkt.c | 73 krb5_enctype etype; local 85 ret = krb5_string_to_enctype(context, etypestr, &etype); 90 etype = 0; 127 in_creds.session.keytype = etype;
|
/netbsd-6-1-5-RELEASE/sys/net/ |
H A D | if_atmsubr.c | 94 uint16_t etype = 0; /* if using LLC/SNAP */ local 153 etype = ETHERTYPE_IP; 155 etype = ETHERTYPE_IPV6; 209 ATM_LLC_SETTYPE(atmllc, etype); 230 uint16_t etype = ETHERTYPE_IP; /* default */ local 273 etype = ATM_LLC_TYPE(alc); 277 switch (etype) {
|
H A D | if_fddisubr.c | 209 uint16_t etype; local 286 etype = htons(ETHERTYPE_IP); 296 etype = htons(ETHERTYPE_IPV6); 316 etype = htons(ETHERTYPE_REVARP); 322 etype = htons(ETHERTYPE_ARP); 330 etype = htons(ETHERTYPE_IPX); 372 etype = 0; 374 etype = htons(ETHERTYPE_ATALK); 408 etype = 0; 431 etype 585 uint16_t etype; local [all...] |
/netbsd-6-1-5-RELEASE/sys/arch/xen/xen/ |
H A D | xennet_checksum.c | 103 uint16_t etype; local 111 etype = eh->ether_type; 112 if (etype == htobe16(ETHERTYPE_VLAN)) { 114 } else if (etype == htobe16(ETHERTYPE_IP)) {
|