Searched refs:et (Results 1 - 25 of 299) sorted by relevance

1234567891011>>

/netbsd-current/distrib/syspkg/sets/base/base-locale-et/
H A DMakefile3 PKGBASE=base-locale-et
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/com_err/
H A Derror.c81 struct error_table et; member in struct:foobar
90 struct et_list *et, **end; local
92 for (end = list, et = *list; et; end = &et->next, et = et->next)
93 if (et->table->msgs == messages)
98 et = &f->etl;
99 et
109 free_error_table(struct et_list *et) argument
[all...]
H A Dcom_err.c164 struct et_list *et; local
166 for (et = _et_list; et; et = et->next) {
167 if (et->table->base == new_table->table->base)
H A Dlex.l61 et { return ET; }
H A Dparse.y71 header : id et
72 | et
81 et : ET STRING label
/netbsd-current/external/gpl3/gdb.old/dist/gas/testsuite/gas/nios2/
H A Detbt-r2.d6 # Test the et, bt registers
11 0+0000 <[^>]*> c4183660 add et,bt,r6
12 0+0004 <[^>]*> c4183660 add et,bt,r6
H A Detbt.d4 # Test the et, bt registers
9 0+0000 <[^>]*> c9b1883a add et,bt,r6
10 0+0004 <[^>]*> c9b1883a add et,bt,r6
H A Detbt.s4 add et, bt, r6
/netbsd-current/share/man/man4/man4.atari/
H A DMakefile4 MAN= et.4 floppy.4 intro.4 ms.4 rtc.4
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dsalt-aes-sha1.c50 struct _krb5_encryption_type *et; local
62 et = _krb5_find_enctype(enctype);
63 if (et == NULL)
71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
81 et->keytype->size, kd.key->keyvalue.data);
83 _krb5_free_key_data(context, &kd, et);
89 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos"));
92 _krb5_free_key_data(context, &kd, et);
H A Dsalt-aes-sha2.c50 struct _krb5_encryption_type *et = NULL; local
71 et = _krb5_find_enctype(enctype);
72 if (et == NULL) {
84 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
90 enctypesz = strlen(et->name) + 1;
96 memcpy(saltp.data, et->name, enctypesz);
108 et->keytype->size, kd.key->keyvalue.data);
116 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos"));
126 _krb5_free_key_data(context, &kd, et);
H A Dcrypto.c89 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local
90 if(et == NULL) {
93 *keysize = et->keytype->size;
102 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local
103 if(et == NULL) {
106 *keybits = et->keytype->bits;
116 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local
117 if(et == NULL) {
120 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
124 if(et
137 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); local
819 const struct _krb5_encryption_type *et = crypto->et; local
883 const struct _krb5_encryption_type *et = crypto->et; local
961 const struct _krb5_encryption_type *et = crypto->et; local
1021 struct _krb5_encryption_type *et = crypto->et; local
1061 struct _krb5_encryption_type *et = crypto->et; local
1139 struct _krb5_encryption_type *et = crypto->et; local
1221 struct _krb5_encryption_type *et = crypto->et; local
1283 struct _krb5_encryption_type *et = crypto->et; local
1444 iov_pad_validate(const struct _krb5_encryption_type *et, krb5_crypto_iov *data, int num_data, krb5_crypto_iov **ppiv) argument
1516 const struct _krb5_encryption_type *et = crypto->et; local
1685 struct _krb5_encryption_type *et = crypto->et; local
1900 struct _krb5_encryption_type *et = crypto->et; local
2134 derive_key_rfc3961(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument
2206 derive_key_sp800_hmac(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument
2256 _krb5_derive_key(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument
2314 struct _krb5_encryption_type *et; local
2417 free_key_schedule(krb5_context context, struct _krb5_key_data *key, struct _krb5_encryption_type *et) argument
2428 _krb5_free_key_data(krb5_context context, struct _krb5_key_data *key, struct _krb5_encryption_type *et) argument
2439 free_key_usage(krb5_context context, struct _krb5_key_usage *ku, struct _krb5_encryption_type *et) argument
2570 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local
2597 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local
2650 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local
2670 struct _krb5_encryption_type *et; local
2682 struct _krb5_encryption_type *et = crypto->et; local
2697 struct _krb5_encryption_type *et = crypto->et; local
2733 struct _krb5_encryption_type *et = crypto->et; local
2747 struct _krb5_encryption_type *et = crypto->et; local
2794 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local
2828 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local
2847 struct _krb5_encryption_type *et = crypto->et; local
[all...]
H A Dcrypto-aes-sha1.c96 struct _krb5_checksum_type *ct = crypto->et->checksum;
114 if (result.checksum.length < crypto->et->blocksize)
119 crypto->et->type, "prf", 3, &derived);
123 ret = krb5_data_alloc(out, crypto->et->blocksize);
128 const EVP_CIPHER *c = (*crypto->et->keytype->evp)();
139 crypto->et->blocksize);
/netbsd-current/sys/dev/raidframe/
H A Drf_etimer.h39 struct timeval et; member in struct:RF_Etimer_s
51 getmicrouptime(&(_t_).et); \
56 RF_TIMEVAL_DIFF(&(_t_).st, &(_t_).et, &(_t_).diff) \
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/
H A Deapol_test.py76 et = eapol_test(ifname)
78 et.request("AP_SCAN 0")
80 et.request("SET fast_reauth 0")
82 et.request("SET fast_reauth 1")
83 id = et.add_network()
84 et.set_network(id, "key_mgmt", "IEEE8021X")
85 et.set_network(id, "eapol_flags", "0")
86 et.set_network(id, "eap", "TLS")
87 et.set_network_quoted(id, "identity", "user")
88 et
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/dupsigs/
H A Dtests.sh55 et=$((now - start))
56 echo_i "............... $et ............"
58 $DIG axfr signing.test -p ${PORT} @10.53.0.1 >dig.out.at$et
59 awk '$4 == "RRSIG" { print $11 }' dig.out.at$et | sort | uniq -c | cat_i
60 lines=$(awk '$4 == "RRSIG" { print}' dig.out.at$et | wc -l)
61 if [ ${et} -ne 0 -a ${lines} -ne 1008 ]; then
/netbsd-current/external/bsd/openldap/dist/libraries/libldap/
H A Dsort.c101 struct entrything *et; local
133 if ( (et = (struct entrything *) LDAP_MALLOC( count *
141 et[i].et_cmp_fn = cmp;
142 et[i].et_msg = e;
147 et[i].et_vals = ldap_explode_dn( dn, 1 );
150 et[i].et_vals = ldap_get_values( ld, e, attr );
156 qsort( et, count, sizeof(struct entrything), et_cmp );
160 *ep = et[i].et_msg;
163 LDAP_VFREE( et[i].et_vals );
168 LDAP_FREE( (char *) et );
[all...]
/netbsd-current/external/mit/lua/dist/src/
H A Dltm.h69 #define gfasttm(g,et,e) ((et) == NULL ? NULL : \
70 ((et)->flags & (1u<<(e))) ? NULL : luaT_gettm(et, e, (g)->tmname[e]))
72 #define fasttm(l,et,e) gfasttm(G(l), et, e)
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/
H A Dkrb5tgs.c399 EncTicketPart *et)
415 et->flags.invalid = 0;
428 et->flags.forwardable = 1;
436 et->flags.forwarded = 1;
437 et->caddr = b->addresses;
440 et->flags.forwarded = 1;
448 et->flags.proxiable = 1;
456 et->flags.proxy = 1;
457 et->caddr = b->addresses;
460 et
394 check_tgs_flags(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, EncTicketPart *et) argument
627 verify_flags(krb5_context context, krb5_kdc_configuration *config, const EncTicketPart *et, const char *pstr) argument
648 fix_transited_encoding(krb5_context context, krb5_kdc_configuration *config, krb5_boolean check_policy, const TransitedEncoding *tr, EncTicketPart *et, const char *client_realm, const char *server_realm, const char *tgt_realm) argument
789 EncTicketPart et; local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/kuser/
H A Dkimpersonate.c74 EncTicketPart et; local
84 et.flags = cred->flags.b;
85 et.key = cred->session;
86 et.crealm = cred->client->realm;
87 ret = copy_PrincipalName(&cred->client->name, &et.cname);
94 et.transited.tr_type = DOMAIN_X500_COMPRESS;
95 et.transited.contents = empty_string;
97 et.authtime = cred->times.authtime;
98 et.starttime = NULL;
99 et
[all...]
/netbsd-current/usr.bin/who/
H A Dwho.c108 int et = 0; local
118 et = -1;
122 et |= (1 << BOOT_TIME);
125 et |= (1 << DEAD_PROCESS);
131 et |= (1 << LOGIN_PROCESS);
137 et |= (1 << INIT_PROCESS);
143 et |= (1 << RUN_LVL);
152 et |= (1 << NEW_TIME);
168 if (et != 0)
169 etype = et;
[all...]
/netbsd-current/external/bsd/tcpdump/dist/
H A Dprint-llc.c433 u_short et; local
441 et = GET_BE_U_2(p + 3);
453 tok2str(oui_to_struct_tok(orgcode), "Unknown", et),
454 et, length - 5);
469 ret = ethertype_print(ndo, et, p, length, caplen, src, dst);
475 if (et == ETHERTYPE_ATALK) {
484 ret = ethertype_print(ndo, et, p, length, caplen, src, dst);
491 switch (et) {
514 switch (et) {
600 tok2str(ethertype_values, "Unknown", et),
[all...]
/netbsd-current/sys/rump/librump/rumpvfs/
H A Drumpfs.c248 ettype_to_vtype(enum rump_etfs_type et) argument
252 switch (et) {
269 panic("invalid et type: %d", et);
307 struct etfs *et; local
312 LIST_FOREACH(et, &etfs_list, et_entries) {
313 if ((keylen == et->et_keylen || et->et_prefixkey || forceprefix)
314 && strncmp(key, et->et_key, et
331 struct etfs *et; local
429 struct etfs *et; local
510 makeprivate(enum vtype vt, mode_t mode, dev_t rdev, off_t size, bool et) argument
648 struct etfs *et; local
682 struct etfs *et; local
[all...]
/netbsd-current/external/gpl3/binutils.old/dist/gold/
H A Dtarget.cc74 int et = ehdr.get_e_type(); local
77 if (et == elfcpp::ET_REL
78 || (et == elfcpp::ET_EXEC && input_file->just_symbols()))
85 else if (et == elfcpp::ET_DYN)
95 name.c_str(), et); local
/netbsd-current/external/gpl3/binutils/dist/gold/
H A Dtarget.cc74 int et = ehdr.get_e_type(); local
77 if (et == elfcpp::ET_REL
78 || (et == elfcpp::ET_EXEC && input_file->just_symbols()))
85 else if (et == elfcpp::ET_DYN)
95 name.c_str(), et); local

Completed in 612 milliseconds

1234567891011>>