/minix/crypto/external/bsd/heimdal/dist/lib/com_err/ |
H A D | error.c | 81 struct error_table et; member 90 struct et_list *et, **end; in initialize_error_table_r() local 92 for (end = list, et = *list; et; end = &et->next, et = et->next) in initialize_error_table_r() 98 et = &f->etl; in initialize_error_table_r() 99 et->table = &f->et; in initialize_error_table_r() 102 et->table->base = base; in initialize_error_table_r() 103 et->next = NULL; in initialize_error_table_r() 104 *end = et; in initialize_error_table_r() 111 while(et){ in free_error_table() 112 struct et_list *p = et; in free_error_table() [all …]
|
H A D | com_err.c | 164 struct et_list *et; in add_to_error_table() local 166 for (et = _et_list; et; et = et->next) { in add_to_error_table() 167 if (et->table->base == new_table->table->base) in add_to_error_table()
|
H A D | parse.y | 71 header : id et 72 | et 81 et : ET STRING
|
/minix/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | crypto.c | 954 struct _krb5_encryption_type *et = crypto->et; in encrypt_internal_special() local 996 struct _krb5_encryption_type *et = crypto->et; in decrypt_internal_derived() local 1075 struct _krb5_encryption_type *et = crypto->et; in decrypt_internal() local 1140 struct _krb5_encryption_type *et = crypto->et; in decrypt_internal_special() local 1422 struct _krb5_encryption_type *et = crypto->et; in krb5_decrypt_iov_ivec() local 1637 struct _krb5_encryption_type *et = crypto->et; in krb5_verify_checksum_iov() local 1878 (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize, in _krb5_derive_key() 2290 struct _krb5_encryption_type *et = crypto->et; in wrapped_length() local 2305 struct _krb5_encryption_type *et = crypto->et; in wrapped_length_dervied() local 2414 et->name, (int)et->keytype->size); in krb5_random_to_key() [all …]
|
H A D | salt-aes.c | 50 struct _krb5_encryption_type *et; in AES_string_to_key() local 62 et = _krb5_find_enctype(enctype); in AES_string_to_key() 63 if (et == NULL) in AES_string_to_key() 73 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in AES_string_to_key() 82 et->keytype->size, kd.key->keyvalue.data); in AES_string_to_key() 84 _krb5_free_key_data(context, &kd, et); in AES_string_to_key() 90 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); in AES_string_to_key() 93 _krb5_free_key_data(context, &kd, et); in AES_string_to_key()
|
H A D | crypto-aes.c | 96 struct _krb5_checksum_type *ct = crypto->et->checksum; in AES_PRF() 114 if (result.checksum.length < crypto->et->blocksize) in AES_PRF() 119 crypto->et->type, "prf", 3, &derived); in AES_PRF() 123 ret = krb5_data_alloc(out, crypto->et->blocksize); in AES_PRF() 128 const EVP_CIPHER *c = (*crypto->et->keytype->evp)(); in AES_PRF() 134 crypto->et->blocksize); in AES_PRF()
|
H A D | salt.c | 193 struct _krb5_encryption_type *et =_krb5_find_enctype(enctype); in krb5_string_to_key_data_salt_opaque() local 195 if(et == NULL) { in krb5_string_to_key_data_salt_opaque() 201 for(st = et->keytype->string_to_key; st && st->type; st++) in krb5_string_to_key_data_salt_opaque() 253 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); in krb5_string_to_key_derived() local 259 if(et == NULL) { in krb5_string_to_key_derived() 265 keylen = et->keytype->bits / 8; in krb5_string_to_key_derived() 273 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in krb5_string_to_key_derived() 296 et, in krb5_string_to_key_derived() 301 _krb5_free_key_data(context, &kd, et); in krb5_string_to_key_derived() 305 _krb5_free_key_data(context, &kd, et); in krb5_string_to_key_derived()
|
H A D | crypto-pk.c | 49 struct _krb5_encryption_type *et = _krb5_find_enctype(type); in _krb5_pk_octetstring2key() local 57 if(et == NULL) { in _krb5_pk_octetstring2key() 63 keylen = (et->keytype->bits + 7) / 8; in _krb5_pk_octetstring2key() 212 struct _krb5_encryption_type *et; in _krb5_pk_kdf() local 243 et = _krb5_find_enctype(enctype); in _krb5_pk_kdf() 244 if(et == NULL) { in _krb5_pk_kdf() 250 keylen = (et->keytype->bits + 7) / 8; in _krb5_pk_kdf()
|
H A D | Makefile.am | 363 krb5_err.et \ 364 krb_err.et \ 365 heim_err.et \ 366 k524_err.et \ 376 krb5_err.h: krb5_err.et 378 krb_err.h: krb_err.et 380 heim_err.h: heim_err.et 382 k524_err.h: k524_err.et
|
H A D | NTMakefile | 307 $(OBJ)\krb5_err.c $(OBJ)\krb5_err.h: krb5_err.et 309 $(BINDIR)\compile_et.exe $(SRCDIR)\krb5_err.et 312 $(OBJ)\krb_err.c $(OBJ)\krb_err.h: krb_err.et 314 $(BINDIR)\compile_et.exe $(SRCDIR)\krb_err.et 317 $(OBJ)\heim_err.c $(OBJ)\heim_err.h: heim_err.et 319 $(BINDIR)\compile_et.exe $(SRCDIR)\heim_err.et 322 $(OBJ)\k524_err.c $(OBJ)\k524_err.h: k524_err.et 324 $(BINDIR)\compile_et.exe $(SRCDIR)\k524_err.et
|
H A D | crypto.h | 48 struct _krb5_encryption_type *et; member 54 #define CRYPTO_ETYPE(C) ((C)->et->type)
|
/minix/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | krb5tgs.c | 487 et->endtime = *et->starttime + old_life; in check_tgs_flags() 489 et->endtime = min(*et->renew_till, et->endtime); in check_tgs_flags() 758 memset(&et, 0, sizeof(et)); in tgs_make_reply() 824 life = et.endtime - *et.starttime; in tgs_make_reply() 829 et.endtime = *et.starttime + life; in tgs_make_reply() 851 *et.starttime = min(*et.starttime, *et.renew_till); in tgs_make_reply() 852 et.endtime = min(et.endtime, *et.renew_till); in tgs_make_reply() 855 *et.starttime = min(*et.starttime, et.endtime); in tgs_make_reply() 857 if(*et.starttime == et.endtime){ in tgs_make_reply() 861 if(et.renew_till && et.endtime == *et.renew_till){ in tgs_make_reply() [all …]
|
H A D | kerberos5.c | 994 EncTicketPart et; in _kdc_as_rep() local 1106 memset(&et, 0, sizeof(et)); in _kdc_as_rep() 1592 et.endtime = t; in _kdc_as_rep() 1614 *et.renew_till = t; in _kdc_as_rep() 1623 ALLOC(et.caddr); in _kdc_as_rep() 1677 if (et.starttime) { in _kdc_as_rep() 1688 if(et.caddr){ in _kdc_as_rep() 1704 &et); in _kdc_as_rep() 1816 _kdc_log_timestamp(context, config, "AS-REQ", et.authtime, et.starttime, in _kdc_as_rep() 1817 et.endtime, et.renew_till); in _kdc_as_rep() [all …]
|
/minix/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kimpersonate.c | 72 EncTicketPart et; in encode_ticket() local 82 et.flags = cred->flags.b; in encode_ticket() 83 et.key = cred->session; in encode_ticket() 84 et.crealm = cred->client->realm; in encode_ticket() 90 et.transited.tr_type = DOMAIN_X500_COMPRESS; in encode_ticket() 91 et.transited.contents = empty_string; in encode_ticket() 93 et.authtime = cred->times.authtime; in encode_ticket() 94 et.starttime = NULL; in encode_ticket() 95 et.endtime = cred->times.endtime; in encode_ticket() 96 et.renew_till = NULL; in encode_ticket() [all …]
|
/minix/external/mit/lua/dist/src/ |
H A D | ltm.h | 52 #define gfasttm(g,et,e) ((et) == NULL ? NULL : \ argument 53 ((et)->flags & (1u<<(e))) ? NULL : luaT_gettm(et, e, (g)->tmname[e])) 55 #define fasttm(l,et,e) gfasttm(G(l), et, e) argument
|
/minix/crypto/external/bsd/heimdal/ |
H A D | Makefile.rules.inc | 3 SRCS+= ${HEIMSRCS:N*.et:N*.in:N*.asn1} 5 .for et_src in ${HEIMSRCS:M*.et} 6 CLEANFILES+= ${et_src:.et=.c} ${et_src:.et=.h} 7 DPSRCS+= ${et_src:.et=.c} ${et_src:.et=.h} 8 COMPILE_ET_INCS+= ${et_src:.et=.h} 9 OBJS+= ${et_src:.et=.o} 11 ${et_src:.et=.c} ${et_src:.et=.h}: ${et_src} ${TOOL_COMPILE_ET}
|
/minix/usr.bin/who/ |
H A D | who.c | 108 int et = 0; in main() local 118 et = -1; in main() 122 et |= (1 << BOOT_TIME); in main() 125 et |= (1 << DEAD_PROCESS); in main() 131 et |= (1 << LOGIN_PROCESS); in main() 137 et |= (1 << INIT_PROCESS); in main() 143 et |= (1 << RUN_LVL); in main() 152 et |= (1 << NEW_TIME); in main() 168 if (et != 0) in main() 169 etype = et; in main()
|
/minix/external/bsd/tcpdump/dist/ |
H A D | print-llc.c | 377 register u_short et; in snap_print() local 384 et = EXTRACT_16BITS(p + 3); in snap_print() 400 tok2str(tok, "Unknown", et), in snap_print() 401 et)); in snap_print() 416 ret = ethertype_print(ndo, et, p, length, caplen); in snap_print() 422 if (et == ETHERTYPE_ATALK) { in snap_print() 431 ret = ethertype_print(ndo, et, p, length, caplen); in snap_print() 438 switch (et) { in snap_print() 461 switch (et) { in snap_print()
|
/minix/external/bsd/libc++/dist/libcxx/test/std/utilities/memory/pointer.traits/pointer.traits.functions/ |
H A D | pointer_to.pass.cpp | 34 nat, element_type>::type& et) in pointer_to() 35 {return A(&et);} in pointer_to()
|
/minix/external/bsd/libc++/dist/libcxx/test/utilities/memory/pointer.traits/pointer.traits.functions/ |
H A D | pointer_to.pass.cpp | 34 nat, element_type>::type& et) in pointer_to() 35 {return A(&et);} in pointer_to()
|
/minix/minix/llvm/passes/magic/support/ |
H A D | SmartType.cpp | 17 SmartType::SmartType(const SmartType& et) { in SmartType() argument 18 cloneFrom(et); in SmartType() 41 SmartType& SmartType::operator=(const SmartType& et) { in operator =() argument 42 if (this != &et) { in operator =() 43 cloneFrom(et); in operator =() 48 void SmartType::cloneFrom(const SmartType& et) { in cloneFrom() argument 49 init(et.type, &et.aEDIType, et.useExceptions, false); in cloneFrom() 50 if(et.hasExplicitContainedEDITypes) { in cloneFrom() 57 isInconsistent = et.isInconsistent; in cloneFrom() 58 rawTypeRepresentation = et.rawTypeRepresentation; in cloneFrom() [all …]
|
/minix/crypto/external/bsd/heimdal/dist/cf/ |
H A D | check-compile-et.m4 | 15 cat > conftest_et.et <<'EOF' 24 if ${COMPILE_ET} conftest_et.et >/dev/null 2>&1; then 25 dnl XXX Some systems have <et/com_err.h>. 27 if test -d "/usr/include/et"; then 28 CPPFLAGS="-I/usr/include/et ${CPPFLAGS}"
|
/minix/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
H A D | Makefile.am | 45 ntlm_err.et 50 ntlm_err.h: ntlm_err.et
|
/minix/lib/libc/citrus/ |
H A D | citrus_stdenc_template.h | 66 struct _citrus_stdenc_traits * __restrict et) in _FUNCNAME() 86 et->et_state_size = sizeof(_ENCODING_STATE); in _FUNCNAME() 87 et->et_mb_cur_max = _ENCODING_MB_CUR_MAX(_CE_TO_EI(ce)); in _FUNCNAME()
|
/minix/minix/llvm/passes/include/magic/support/ |
H A D | SmartType.h | 40 SmartType(const SmartType& et); 45 SmartType& operator=(const SmartType& et); 46 void cloneFrom(const SmartType& et);
|