/netbsd-current/distrib/syspkg/sets/base/base-locale-et/ |
H A D | Makefile | 3 PKGBASE=base-locale-et
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/com_err/ |
H A D | error.c | 81 struct error_table et; member in struct:foobar 90 struct et_list *et, **end; local 92 for (end = list, et = *list; et; end = &et->next, et = et->next) 93 if (et->table->msgs == messages) 98 et = &f->etl; 99 et 109 free_error_table(struct et_list *et) argument [all...] |
H A D | com_err.c | 164 struct et_list *et; local 166 for (et = _et_list; et; et = et->next) { 167 if (et->table->base == new_table->table->base)
|
H A D | lex.l | 61 et { return ET; }
|
H A D | parse.y | 71 header : id et 72 | et 81 et : ET STRING label
|
/netbsd-current/external/gpl3/gdb.old/dist/gas/testsuite/gas/nios2/ |
H A D | etbt-r2.d | 6 # Test the et, bt registers 11 0+0000 <[^>]*> c4183660 add et,bt,r6 12 0+0004 <[^>]*> c4183660 add et,bt,r6
|
H A D | etbt.d | 4 # Test the et, bt registers 9 0+0000 <[^>]*> c9b1883a add et,bt,r6 10 0+0004 <[^>]*> c9b1883a add et,bt,r6
|
H A D | etbt.s | 4 add et, bt, r6
|
/netbsd-current/share/man/man4/man4.atari/ |
H A D | Makefile | 4 MAN= et.4 floppy.4 intro.4 ms.4 rtc.4
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | salt-aes-sha1.c | 50 struct _krb5_encryption_type *et; local 62 et = _krb5_find_enctype(enctype); 63 if (et == NULL) 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 81 et->keytype->size, kd.key->keyvalue.data); 83 _krb5_free_key_data(context, &kd, et); 89 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 92 _krb5_free_key_data(context, &kd, et);
|
H A D | salt-aes-sha2.c | 50 struct _krb5_encryption_type *et = NULL; local 71 et = _krb5_find_enctype(enctype); 72 if (et == NULL) { 84 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 90 enctypesz = strlen(et->name) + 1; 96 memcpy(saltp.data, et->name, enctypesz); 108 et->keytype->size, kd.key->keyvalue.data); 116 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 126 _krb5_free_key_data(context, &kd, et);
|
H A D | crypto.c | 89 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 90 if(et == NULL) { 93 *keysize = et->keytype->size; 102 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 103 if(et == NULL) { 106 *keybits = et->keytype->bits; 116 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 117 if(et == NULL) { 120 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); 124 if(et 137 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); local 819 const struct _krb5_encryption_type *et = crypto->et; local 883 const struct _krb5_encryption_type *et = crypto->et; local 961 const struct _krb5_encryption_type *et = crypto->et; local 1021 struct _krb5_encryption_type *et = crypto->et; local 1061 struct _krb5_encryption_type *et = crypto->et; local 1139 struct _krb5_encryption_type *et = crypto->et; local 1221 struct _krb5_encryption_type *et = crypto->et; local 1283 struct _krb5_encryption_type *et = crypto->et; local 1444 iov_pad_validate(const struct _krb5_encryption_type *et, krb5_crypto_iov *data, int num_data, krb5_crypto_iov **ppiv) argument 1516 const struct _krb5_encryption_type *et = crypto->et; local 1685 struct _krb5_encryption_type *et = crypto->et; local 1900 struct _krb5_encryption_type *et = crypto->et; local 2134 derive_key_rfc3961(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument 2206 derive_key_sp800_hmac(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument 2256 _krb5_derive_key(krb5_context context, struct _krb5_encryption_type *et, struct _krb5_key_data *key, const void *constant, size_t len) argument 2314 struct _krb5_encryption_type *et; local 2417 free_key_schedule(krb5_context context, struct _krb5_key_data *key, struct _krb5_encryption_type *et) argument 2428 _krb5_free_key_data(krb5_context context, struct _krb5_key_data *key, struct _krb5_encryption_type *et) argument 2439 free_key_usage(krb5_context context, struct _krb5_key_usage *ku, struct _krb5_encryption_type *et) argument 2570 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2597 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2650 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2670 struct _krb5_encryption_type *et; local 2682 struct _krb5_encryption_type *et = crypto->et; local 2697 struct _krb5_encryption_type *et = crypto->et; local 2733 struct _krb5_encryption_type *et = crypto->et; local 2747 struct _krb5_encryption_type *et = crypto->et; local 2794 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 2828 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 2847 struct _krb5_encryption_type *et = crypto->et; local [all...] |
H A D | crypto-aes-sha1.c | 96 struct _krb5_checksum_type *ct = crypto->et->checksum; 114 if (result.checksum.length < crypto->et->blocksize) 119 crypto->et->type, "prf", 3, &derived); 123 ret = krb5_data_alloc(out, crypto->et->blocksize); 128 const EVP_CIPHER *c = (*crypto->et->keytype->evp)(); 139 crypto->et->blocksize);
|
/netbsd-current/sys/dev/raidframe/ |
H A D | rf_etimer.h | 39 struct timeval et; member in struct:RF_Etimer_s 51 getmicrouptime(&(_t_).et); \ 56 RF_TIMEVAL_DIFF(&(_t_).st, &(_t_).et, &(_t_).diff) \
|
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | eapol_test.py | 76 et = eapol_test(ifname) 78 et.request("AP_SCAN 0") 80 et.request("SET fast_reauth 0") 82 et.request("SET fast_reauth 1") 83 id = et.add_network() 84 et.set_network(id, "key_mgmt", "IEEE8021X") 85 et.set_network(id, "eapol_flags", "0") 86 et.set_network(id, "eap", "TLS") 87 et.set_network_quoted(id, "identity", "user") 88 et [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/dupsigs/ |
H A D | tests.sh | 55 et=$((now - start)) 56 echo_i "............... $et ............" 58 $DIG axfr signing.test -p ${PORT} @10.53.0.1 >dig.out.at$et 59 awk '$4 == "RRSIG" { print $11 }' dig.out.at$et | sort | uniq -c | cat_i 60 lines=$(awk '$4 == "RRSIG" { print}' dig.out.at$et | wc -l) 61 if [ ${et} -ne 0 -a ${lines} -ne 1008 ]; then
|
/netbsd-current/external/bsd/openldap/dist/libraries/libldap/ |
H A D | sort.c | 101 struct entrything *et; local 133 if ( (et = (struct entrything *) LDAP_MALLOC( count * 141 et[i].et_cmp_fn = cmp; 142 et[i].et_msg = e; 147 et[i].et_vals = ldap_explode_dn( dn, 1 ); 150 et[i].et_vals = ldap_get_values( ld, e, attr ); 156 qsort( et, count, sizeof(struct entrything), et_cmp ); 160 *ep = et[i].et_msg; 163 LDAP_VFREE( et[i].et_vals ); 168 LDAP_FREE( (char *) et ); [all...] |
/netbsd-current/external/mit/lua/dist/src/ |
H A D | ltm.h | 69 #define gfasttm(g,et,e) ((et) == NULL ? NULL : \ 70 ((et)->flags & (1u<<(e))) ? NULL : luaT_gettm(et, e, (g)->tmname[e])) 72 #define fasttm(l,et,e) gfasttm(G(l), et, e)
|
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | krb5tgs.c | 399 EncTicketPart *et) 415 et->flags.invalid = 0; 428 et->flags.forwardable = 1; 436 et->flags.forwarded = 1; 437 et->caddr = b->addresses; 440 et->flags.forwarded = 1; 448 et->flags.proxiable = 1; 456 et->flags.proxy = 1; 457 et->caddr = b->addresses; 460 et 394 check_tgs_flags(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, EncTicketPart *et) argument 627 verify_flags(krb5_context context, krb5_kdc_configuration *config, const EncTicketPart *et, const char *pstr) argument 648 fix_transited_encoding(krb5_context context, krb5_kdc_configuration *config, krb5_boolean check_policy, const TransitedEncoding *tr, EncTicketPart *et, const char *client_realm, const char *server_realm, const char *tgt_realm) argument 789 EncTicketPart et; local [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kimpersonate.c | 74 EncTicketPart et; local 84 et.flags = cred->flags.b; 85 et.key = cred->session; 86 et.crealm = cred->client->realm; 87 ret = copy_PrincipalName(&cred->client->name, &et.cname); 94 et.transited.tr_type = DOMAIN_X500_COMPRESS; 95 et.transited.contents = empty_string; 97 et.authtime = cred->times.authtime; 98 et.starttime = NULL; 99 et [all...] |
/netbsd-current/usr.bin/who/ |
H A D | who.c | 108 int et = 0; local 118 et = -1; 122 et |= (1 << BOOT_TIME); 125 et |= (1 << DEAD_PROCESS); 131 et |= (1 << LOGIN_PROCESS); 137 et |= (1 << INIT_PROCESS); 143 et |= (1 << RUN_LVL); 152 et |= (1 << NEW_TIME); 168 if (et != 0) 169 etype = et; [all...] |
/netbsd-current/external/bsd/tcpdump/dist/ |
H A D | print-llc.c | 433 u_short et; local 441 et = GET_BE_U_2(p + 3); 453 tok2str(oui_to_struct_tok(orgcode), "Unknown", et), 454 et, length - 5); 469 ret = ethertype_print(ndo, et, p, length, caplen, src, dst); 475 if (et == ETHERTYPE_ATALK) { 484 ret = ethertype_print(ndo, et, p, length, caplen, src, dst); 491 switch (et) { 514 switch (et) { 600 tok2str(ethertype_values, "Unknown", et), [all...] |
/netbsd-current/sys/rump/librump/rumpvfs/ |
H A D | rumpfs.c | 248 ettype_to_vtype(enum rump_etfs_type et) argument 252 switch (et) { 269 panic("invalid et type: %d", et); 307 struct etfs *et; local 312 LIST_FOREACH(et, &etfs_list, et_entries) { 313 if ((keylen == et->et_keylen || et->et_prefixkey || forceprefix) 314 && strncmp(key, et->et_key, et 331 struct etfs *et; local 429 struct etfs *et; local 510 makeprivate(enum vtype vt, mode_t mode, dev_t rdev, off_t size, bool et) argument 648 struct etfs *et; local 682 struct etfs *et; local [all...] |
/netbsd-current/external/gpl3/binutils.old/dist/gold/ |
H A D | target.cc | 74 int et = ehdr.get_e_type(); local 77 if (et == elfcpp::ET_REL 78 || (et == elfcpp::ET_EXEC && input_file->just_symbols())) 85 else if (et == elfcpp::ET_DYN) 95 name.c_str(), et); local
|
/netbsd-current/external/gpl3/binutils/dist/gold/ |
H A D | target.cc | 74 int et = ehdr.get_e_type(); local 77 if (et == elfcpp::ET_REL 78 || (et == elfcpp::ET_EXEC && input_file->just_symbols())) 85 else if (et == elfcpp::ET_DYN) 95 name.c_str(), et); local
|