/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | mandatory_sumtype.c | 35 krb5int_c_mandatory_cksumtype (krb5_context ctx, krb5_enctype etype, argument 41 if (krb5_enctypes_list[i].etype == etype) {
|
H A D | block_size.c | 38 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | encrypt_length.c | 38 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | decrypt.c | 45 if (krb5_enctypes_list[i].etype == key->enctype) 53 (krb5_enctypes_list[i].etype != input->enctype))
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | valid_enctype.c | 37 krb5_c_valid_enctype(krb5_enctype etype) argument 42 if (krb5_enctypes_list[i].etype == etype) 50 valid_enctype(krb5_enctype etype) argument 52 return krb5_c_valid_enctype (etype);
|
H A D | enctype_compare.c | 38 if (krb5_enctypes_list[i].etype == e1) 45 if (krb5_enctypes_list[j].etype == e2)
|
H A D | string_to_enctype.c | 37 *enctypep = krb5_enctypes_list[i].etype;
|
H A D | enctype_to_string.c | 41 if (krb5_enctypes_list[i].etype == enctype) { 60 if (krb5_enctypes_list[i].etype == enctype) {
|
H A D | state.c | 50 if (krb5_enctypes_list[i].etype == key->enctype) 69 if (krb5_enctypes_list[i].etype == key->enctype)
|
H A D | keylengths.c | 49 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | pkcs11slot.c | 19 get_algo(krb5_enctype etype, KRB5_MECH_TO_PKCS *algos) argument 21 switch (etype) { 82 get_key_type(krb5_enctype etype, CK_KEY_TYPE *keyType) argument 84 switch (etype) { 130 tempenctype = krb5_enctypes_list[i].etype; 138 krb5_enctypes_list[i].etype = -1; 162 krb5_enctypes_list[i].etype = -1;
|
H A D | keyed_checksum_types.c | 36 if (krb5_enctypes_list[i1].etype == e1) 40 if (krb5_enctypes_list[i2].etype == e2)
|
H A D | random_to_key.c | 55 if (krb5_enctypes_list[i].etype == enctype)
|
H A D | make_random_key.c | 48 if (krb5_enctypes_list[i].etype == enctype)
|
/illumos-gate/usr/src/cmd/lp/lib/msgs/ |
H A D | _getmessage.c | 54 short etype; local 74 etype = stoh(buf + MESG_TYPE); 75 if (etype < 0 || etype > LAST_MESSAGE) 81 if (etype != rtype) 92 fmt = _lp_msg_fmts[etype]; 164 return(etype);
|
/illumos-gate/usr/src/boot/lib/libstand/ |
H A D | ether.c | 57 sendether(d, pkt, len, dea, etype) 62 int etype; 77 eh->ether_type = htons(etype); 93 readether(d, pkt, len, tleft, etype) 98 u_int16_t *etype; 125 *etype = ntohs(eh->ether_type);
|
H A D | rarp.c | 164 u_int16_t etype; /* host order */ local 171 n = readether(d, pkt, len, tleft, &etype); 181 if (etype != ETHERTYPE_REVARP) { 184 printf("bad type=0x%x\n", etype);
|
H A D | net.h | 98 u_char *dea, int etype); 100 time_t tleft, u_int16_t *etype);
|
H A D | udp.c | 147 u_int16_t etype; /* host order */ local 157 n = readether(d, ip, len + sizeof(*ip) + sizeof(*uh), tleft, &etype); 164 if (etype == ETHERTYPE_ARP) { 173 if (etype != ETHERTYPE_IP) { 176 printf("readudp: not IP. ether_type=%x\n", etype);
|
/illumos-gate/usr/src/cmd/sendmail/libsm/ |
H A D | exc.c | 209 ** etype -- type of exception. 237 sm_exc_vnew_x(etype, ap) 238 const SM_EXC_TYPE_T *etype; 252 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 253 argc = strlen(etype->etype_argformat); 265 exc->exc_type = etype; 279 switch (etype->etype_argformat[i]) 294 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 299 etype->etype_argformat[i]); 313 switch (etype 407 sm_exc_new_x( const SM_EXC_TYPE_T *etype, ...) argument 637 sm_exc_raisenew_x( const SM_EXC_TYPE_T *etype, ...) argument [all...] |
/illumos-gate/usr/src/uts/common/io/bnxe/ |
H A D | bnxe_rr.c | 49 ushort_t etype; local 72 etype = ntohs(((struct ether_header *)pHdr)->ether_type); 74 if (etype == ETHERTYPE_VLAN) 76 etype = ntohs(((struct ether_vlan_header *)pHdr)->ether_type); 84 if (etype == ETHERTYPE_IP)
|
/illumos-gate/usr/src/cmd/cron/ |
H A D | funcs.c | 153 cron_sendmsg(char action, char *login, char *fname, char etype) argument 173 pmsg->etype = etype;
|
H A D | cron.h | 68 char etype; member in struct:message
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_keytab.c | 44 krb5_enctype etype, 57 /* if there's already a key of the correct etype, we're done. 58 if the etype is wrong, free the existing key, and make 62 if (as_key->enctype == etype) 69 if (!krb5_c_valid_enctype(etype)) 75 etype, &kt_ent)) != NULL) 41 krb5_get_as_key_keytab( krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
|
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/mpt_sas/ |
H A D | mptsas_smhba.h | 71 void mptsas_smhba_log_sysevent(mptsas_t *mpt, char *subclass, char *etype,
|