| /src/sys/lib/libsa/ |
| ip.c | 126 u_int16_t etype; local 130 n = readether(d, ip, len + sizeof(*ip), tleft, &etype); 134 if (etype == ETHERTYPE_ARP) { 145 if (etype != ETHERTYPE_IP) {
|
| rarp.c | 179 u_int16_t etype; /* host order */ local 186 n = readether(d, pkt, len, tleft, &etype); 196 if (etype != ETHERTYPE_REVARP) { 199 printf("bad type=0x%x\n", etype);
|
| arp.c | 194 u_int16_t etype; /* host order */ local 200 n = readether(d, pkt, len, tleft, &etype); 210 if (etype != ETHERTYPE_ARP) { 213 printf("not arp type=%d\n", etype);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_prf.c | 60 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local 66 ret = krb5_generate_random_keyblock(context, etype, &key); 70 ret = krb5_crypto_prf_length(context, etype, &length);
|
| get_in_tkt.c | 44 krb5_enctype etype, krb5_keyblock *key) 210 &a->req_body.etype.len, 211 &a->req_body.etype.val, 273 &preauth->val[i].info.val[j].etype, 1, 295 key_proc, keyseed, a->req_body.etype.val, 296 a->req_body.etype.len, NULL); 302 key_proc, keyseed, a->req_body.etype.val, 303 a->req_body.etype.len, &salt); 383 krb5_enctype etype; variable 465 etype = rep.kdc_rep.enc_part.etype [all...] |
| /src/sys/arch/xen/xen/ |
| xennet_checksum.c | 85 uint16_t etype; local 98 etype = eh->ether_type; 100 if (__predict_false(etype == htons(ETHERTYPE_VLAN))) { 107 etype = ntohs(evl->evl_proto); 110 switch (etype) {
|
| /src/sys/dev/pci/ixgbe/ |
| if_fdir.c | 97 u16 etype; local 102 etype = eh->evl_proto; 105 etype = eh->evl_encap_proto; 109 if (etype != htons(ETHERTYPE_IP)) 139 common.flex_bytes ^= etype;
|
| /src/external/bsd/tcpdump/dist/ |
| print-symantec.c | 48 uint16_t etype; local 52 etype = GET_BE_U_2(sp->ether_type); 54 if (etype <= MAX_ETHERNET_LENGTH_VAL) 55 ND_PRINT("invalid ethertype %u", etype); 58 tok2str(ethertype_values,"Unknown", etype), 59 etype); 61 if (etype <= MAX_ETHERNET_LENGTH_VAL) 62 ND_PRINT("invalid ethertype %u", etype); 64 ND_PRINT("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
|
| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.base/ |
| style.c | 22 enum etype enum 32 enum etype e_field;
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.base/ |
| style.c | 22 enum etype enum 32 enum etype e_field;
|
| /src/sys/net/agr/ |
| if_agrether_hash.c | 79 uint16_t etype; local 88 etype = eh->ether_type; 90 if (etype == htobe16(ETHERTYPE_VLAN)) { 101 etype = vlanhdr->evl_proto; 111 if (etype == htobe16(ETHERTYPE_IP)) { 126 } else if (etype == htobe16(ETHERTYPE_IPV6)) {
|
| /src/usr.sbin/npf/npftest/libnpftest/ |
| npfl2onlytest.c | 28 uint16_t etype; member in struct:test_case 35 .ifname = IFNAME_INT, .etype = ETHERTYPE_IPV6, 40 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 45 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 59 m = mbuf_get_frame(t->src, t->dst, htons(t->etype));
|
| npf_l2rule_test.c | 20 uint16_t etype; member in struct:test_case 28 .ifname = IFNAME_INT, .etype = ETHERTYPE_IPV6, 34 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 41 .ifname = IFNAME_INT, .etype = ETHERTYPE_ATALK, 47 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 53 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 59 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 65 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP, 80 m = mbuf_get_frame(t->src, t->dst, htons(t->etype)); 107 m = mbuf_get_frame(t->src, t->dst, htons(t->etype)); [all...] |
| /src/usr.bin/who/ |
| utmpentry.c | 73 int etype = 1 << USER_PROCESS; variable 202 if (fname == NULL && ((1 << utx->ut_type) & etype) == 0) 216 if ((etype & (1 << USER_PROCESS)) != 0) {
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| isakmp_frag.c | 94 int etype; local 101 etype = hdr->etype; 133 hdr->etype = etype;
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| string2key.c | 107 krb5_enctype etype; local 129 ret = krb5_string_to_enctype(context, keytype_str, &etype); 133 if((etype != (krb5_enctype)ETYPE_DES_CBC_CRC && 134 etype != (krb5_enctype)ETYPE_DES_CBC_MD4 && 135 etype != (krb5_enctype)ETYPE_DES_CBC_MD5) && 138 etype = ETYPE_DES_CBC_CRC; 175 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kcpytkt.c | 76 krb5_enctype etype; local 89 ret = krb5_string_to_enctype(context, etypestr, &etype); 94 etype = 0; 135 in_creds.session.keytype = etype;
|
| kdeltkt.c | 76 krb5_enctype etype; local 88 ret = krb5_string_to_enctype(context, etypestr, &etype); 93 etype = 0; 130 in_creds.session.keytype = etype;
|
| kvno.c | 105 krb5_enctype etype; local 119 ret = krb5_string_to_enctype(context, etype_str, &etype); 123 etype = 0; 174 in_creds.session.keytype = etype; 202 ticket.enc_part.etype,
|
| kimpersonate.c | 65 krb5_enctype etype, 112 ret = krb5_crypto_init(context, skey, etype, &crypto); 156 krb5_enctype etype; local 162 ret = krb5_string_to_enctype(context, enc_type, &etype); 168 ret = krb5_kt_get_entry(context, kt, server_principal, 0, etype, &entry); 201 encode_ticket(context, &entry.keyblock, etype, entry.vno, &cred);
|
| /src/sys/dev/mvme/ |
| memc.c | 541 const char *etype; local 574 etype = "Correctable"; 591 etype = "Uncorrectable"; 593 etype = "Spurious"; 596 device_xname(sc->sc_dev), etype, bm, rdwr, addr);
|
| /src/external/bsd/nvi/dist/ex/ |
| ex_init.c | 350 enum { ROOTOWN, OWN, WRITER } etype; local 363 etype = rootown ? ROOTOWN : OWN; 369 etype = WRITER; 377 switch (etype) { 395 switch (etype) {
|
| /src/sys/net/ |
| if_ieee1394subr.c | 88 uint16_t etype = 0; local 145 etype = htons(ETHERTYPE_IP); 150 etype = htons(ETHERTYPE_ARP); 171 etype = htons(ETHERTYPE_IPV6); 195 h.ibh_type = etype; 224 m0 = ieee1394_fragment(ifp, m0, (2<<hwdst->iha_maxrec) - hdrlen, etype); 251 uint16_t etype) 266 iuh->iuh_etype = etype; 277 ifh->ifh_etype_off = etype; 326 uint16_t etype; local 409 uint16_t etype, off, ftype, size, dgl; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_lib.c | 341 ASN1_OBJECT **petype, *etype; local 348 etype = OBJ_dup(oid); 349 if (etype == NULL) 352 *petype = etype;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_lib.c | 236 ASN1_OBJECT **petype, *etype; local 242 etype = OBJ_dup(oid); 243 if (!etype) 246 *petype = etype;
|