/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | generate_subkey.c | 49 krb5_enctype etype, 60 if (etype == ETYPE_NULL) 61 etype = key->keytype; /* use session key etype */ 64 ret = krb5_generate_random_keyblock(context, etype, *subkey); 47 krb5_generate_subkey_extended(krb5_context context, const krb5_keyblock *key, krb5_enctype etype, krb5_keyblock **subkey) argument
|
H A D | test_prf.c | 60 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 66 ret = krb5_generate_random_keyblock(context, etype, &key); 70 ret = krb5_crypto_prf_length(context, etype, &length);
|
H A D | test_crypto.c | 41 krb5_enctype etype, int iterations) 52 ret = krb5_generate_random_keyblock(context, etype, &key); 56 ret = krb5_enctype_to_string(context, etype, &etype_name); 94 krb5_enctype etype, 106 ret = krb5_enctype_to_string(context, etype, &etype_name); 116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 40 time_encryption(krb5_context context, size_t size, krb5_enctype etype, int iterations) argument 93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | test_crypto_wrapping.c | 44 krb5_enctype etype) 54 ret = krb5_generate_random_keyblock(context, etype, &key); 58 ret = krb5_enctype_to_string(context, etype, &etype_name); 40 test_wrapping(krb5_context context, size_t min_size, size_t max_size, size_t step, krb5_enctype etype) argument
|
H A D | test_pkinit_dh2key.c | 45 krb5_enctype etype, 52 etype, 40 test_dh2key(int i, krb5_context context, const heim_octet_string *dh, const heim_octet_string *c_n, const heim_octet_string *k_n, krb5_enctype etype, const heim_octet_string *result) argument
|
H A D | init_creds_pw.c | 608 &a->req_body.etype.len, 609 &a->req_body.etype.val, 654 krb5_enctype etype; member in struct:pa_info_data 670 krb5_enctype etype, 674 paid->etype = etype; 717 for (j = 0; j < asreq->req_body.etype.len; j++) { 719 if (asreq->req_body.etype.val[j] == e.val[i].etype) { 729 ret = set_paid(paid, context, e.val[i].etype, 669 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument 872 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument 1007 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1147 krb5_enctype etype; local [all...] |
H A D | build_ap_req.c | 65 ap.authenticator.etype = enctype;
|
H A D | get_in_tkt.c | 317 krb5_enctype etype, krb5_keyblock *key) 486 &a->req_body.etype.len, 487 &a->req_body.etype.val, 551 &preauth->val[i].info.val[j].etype, 1, 574 key_proc, keyseed, a->req_body.etype.val, 575 a->req_body.etype.len, NULL); 581 key_proc, keyseed, a->req_body.etype.val, 582 a->req_body.etype.len, &salt); 661 krb5_enctype etype; local 743 etype 316 make_pa_enc_timestamp(krb5_context context, PA_DATA *pa, krb5_enctype etype, krb5_keyblock *key) argument [all...] |
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-symantec.c | 52 u_int16_t etype; local 56 etype = EXTRACT_16BITS(&sp->ether_type); 58 if (etype <= ETHERMTU) 59 (void)printf("invalid ethertype %u", etype); 62 tok2str(ethertype_values,"Unknown", etype), 63 etype); 65 if (etype <= ETHERMTU) 66 (void)printf("invalid ethertype %u", etype); 68 (void)printf("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
|
/freebsd-9.3-release/lib/libstand/ |
H A D | ether.c | 57 sendether(d, pkt, len, dea, etype) 62 int etype; 77 eh->ether_type = htons(etype); 93 readether(d, pkt, len, tleft, etype) 98 u_int16_t *etype; 125 *etype = ntohs(eh->ether_type);
|
H A D | rarp.c | 164 u_int16_t etype; /* host order */ local 171 n = readether(d, pkt, len, tleft, &etype); 181 if (etype != ETHERTYPE_REVARP) { 184 printf("bad type=0x%x\n", etype);
|
H A D | net.h | 98 u_char *dea, int etype); 100 time_t tleft, u_int16_t *etype);
|
H A D | udp.c | 147 u_int16_t etype; /* host order */ local 157 n = readether(d, ip, len + sizeof(*ip) + sizeof(*uh), tleft, &etype); 164 if (etype == ETHERTYPE_ARP) { 173 if (etype != ETHERTYPE_IP) { 176 printf("readudp: not IP. ether_type=%x\n", etype);
|
H A D | arp.c | 177 u_int16_t etype; /* host order */ local 184 n = readether(d, pkt, len, tleft, &etype); 194 if (etype != ETHERTYPE_ARP) { 197 printf("not arp type=%d\n", etype);
|
/freebsd-9.3-release/contrib/sendmail/libsm/ |
H A D | exc.c | 207 ** etype -- type of exception. 235 sm_exc_vnew_x(etype, ap) 236 const SM_EXC_TYPE_T *etype; 250 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 251 argc = strlen(etype->etype_argformat); 263 exc->exc_type = etype; 277 switch (etype->etype_argformat[i]) 292 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 297 etype->etype_argformat[i]); 311 switch (etype 405 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument 635 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | string2key.c | 105 krb5_enctype etype; local 127 ret = krb5_string_to_enctype(context, keytype_str, &etype); 141 etype = etypes[0]; 142 krb5_enctype_to_string(context, etype, &str); 148 if((etype != ETYPE_DES_CBC_CRC && 149 etype != ETYPE_DES_CBC_MD4 && 150 etype != ETYPE_DES_CBC_MD5) && 153 etype = ETYPE_DES_CBC_CRC; 185 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
H A D | kerberos5.c | 242 krb5_enctype etype, 267 ret = krb5_crypto_init(context, skey, etype, &crypto); 383 for(i = 0; i < req->req_body.etype.len; i++) { 384 if (!older_enctype(req->req_body.etype.val[i])) 397 ent->etype = key->key.keytype; 466 if (pa.val[j].etype == client->keys.val[i].key.keytype) 537 ent->etype = key->key.keytype; 627 if (pa.val[j].etype == client->keys.val[i].key.keytype) 700 for (i = 0; i < b->etype.len; i++) { 701 ret = krb5_enctype_to_string(context, b->etype 239 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *ckey, const char **e_text, krb5_data *reply) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 62 krb5_enctype etype, 107 krb5_crypto_init(context, skey, etype, &crypto); 143 krb5_enctype etype; local 148 ret = krb5_string_to_enctype (context, enc_type, &etype); 152 0, etype, &entry); 167 krb5_generate_random_keyblock(context, etype, &cred.session); 185 encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred); 60 encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) argument
|
/freebsd-9.3-release/sys/sys/ |
H A D | ktr.h | 164 * etype is the type of event to plot (state, counter, point) 168 * etype and attribute names must be string constants. This minimizes the 179 #define KTR_EFMT(egroup, ident, etype) \ 180 "KTRGRAPH group:\"" egroup "\", id:\"%s\", " etype ", attributes: " 182 #define KTR_EVENT0(m, egroup, ident, etype, edat) \ 183 CTR2(m, KTR_EFMT(egroup, ident, etype) "none", ident, edat) 184 #define KTR_EVENT1(m, egroup, ident, etype, edat, a0, v0) \ 185 CTR3(m, KTR_EFMT(egroup, ident, etype) a0, ident, edat, (v0)) 186 #define KTR_EVENT2(m, egroup, ident, etype, edat, a0, v0, a1, v1) \ 187 CTR4(m, KTR_EFMT(egroup, ident, etype) a [all...] |
/freebsd-9.3-release/sys/net/ |
H A D | if_atmsubr.c | 127 u_int16_t etype = 0; /* if using LLC/SNAP */ local 156 etype = ETHERTYPE_IPV6; 158 etype = ETHERTYPE_IP; 204 ATM_LLC_SETTYPE(atmllc, etype); 245 u_int16_t etype = ETHERTYPE_IP; /* default */ local 307 etype = ATM_LLC_TYPE(alc); 311 switch (etype) {
|
/freebsd-9.3-release/contrib/nvi/ex/ |
H A D | ex_init.c | 354 enum { ROOTOWN, OWN, WRITER } etype; local 367 etype = rootown ? ROOTOWN : OWN; 373 etype = WRITER; 381 switch (etype) { 399 switch (etype) {
|
/freebsd-9.3-release/usr.bin/brandelf/ |
H A D | brandelf.c | 173 iselftype(int etype) argument 180 if (etype == elftypes[elfwalk].value)
|
/freebsd-9.3-release/crypto/heimdal/kcm/ |
H A D | acquire.c | 239 krb5_enctype etype, 265 ret = krb5_string_to_key_salt(context, etype, s->password, 346 krb5_enctype etype, 362 ret = krb5_string_to_key_data_salt(context, etype, pw, 366 "and etype %d: %s", 367 cpn, etype, krb5_get_err_text(context, ret)); 394 "and etype %d: %s", 395 cpn, etype, krb5_get_err_text(context, ret)); 238 kcm_password_key_proc(krb5_context context, krb5_enctype etype, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument 344 update_keytab_entry(krb5_context context, kcm_ccache ccache, krb5_enctype etype, char *cpn, char *spn, char *newpw, krb5_salt salt, unsigned kvno) argument
|
/freebsd-9.3-release/sys/netgraph/ |
H A D | ng_parse.c | 1323 etype = ng_get_composite_etype(type, index, ctype); local 1343 error = INVOKE(etype, parse)(etype, 1398 etype = ng_get_composite_etype(type, index, ctype); local 1442 if ((error = INVOKE(etype, unparse) 1443 (etype, data, off, cbuf, cbuflen)) != 0) { 1471 const struct ng_parse_type *etype; local 1502 etype = ng_get_composite_etype(type, index, ctype); 1503 func = METHOD(etype, getDefault); 1506 return (*func)(etype, star 1557 const struct ng_parse_type *etype = NULL; local 1596 etype = ng_get_composite_etype(type, index, ctype); local [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 78 * etype[0] INTEGER, -- EncryptionType 84 ASN1_INTEGER *etype; member in struct:krb5_encdata_st
|