HomeSort by: relevance | last modified time | path
    Searched defs:etype (Results 1 - 25 of 90) sorted by relevancy

1 2 3 4

  /src/sys/lib/libsa/
ip.c 126 u_int16_t etype; local
130 n = readether(d, ip, len + sizeof(*ip), tleft, &etype);
134 if (etype == ETHERTYPE_ARP) {
145 if (etype != ETHERTYPE_IP) {
rarp.c 179 u_int16_t etype; /* host order */ local
186 n = readether(d, pkt, len, tleft, &etype);
196 if (etype != ETHERTYPE_REVARP) {
199 printf("bad type=0x%x\n", etype);
arp.c 194 u_int16_t etype; /* host order */ local
200 n = readether(d, pkt, len, tleft, &etype);
210 if (etype != ETHERTYPE_ARP) {
213 printf("not arp type=%d\n", etype);
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
test_prf.c 60 krb5_enctype etype = ETYPE_AES256_CTS_HMAC_SHA1_96; local
66 ret = krb5_generate_random_keyblock(context, etype, &key);
70 ret = krb5_crypto_prf_length(context, etype, &length);
get_in_tkt.c 44 krb5_enctype etype, krb5_keyblock *key)
210 &a->req_body.etype.len,
211 &a->req_body.etype.val,
273 &preauth->val[i].info.val[j].etype, 1,
295 key_proc, keyseed, a->req_body.etype.val,
296 a->req_body.etype.len, NULL);
302 key_proc, keyseed, a->req_body.etype.val,
303 a->req_body.etype.len, &salt);
383 krb5_enctype etype; variable
465 etype = rep.kdc_rep.enc_part.etype
    [all...]
  /src/sys/arch/xen/xen/
xennet_checksum.c 85 uint16_t etype; local
98 etype = eh->ether_type;
100 if (__predict_false(etype == htons(ETHERTYPE_VLAN))) {
107 etype = ntohs(evl->evl_proto);
110 switch (etype) {
  /src/sys/dev/pci/ixgbe/
if_fdir.c 97 u16 etype; local
102 etype = eh->evl_proto;
105 etype = eh->evl_encap_proto;
109 if (etype != htons(ETHERTYPE_IP))
139 common.flex_bytes ^= etype;
  /src/external/bsd/tcpdump/dist/
print-symantec.c 48 uint16_t etype; local
52 etype = GET_BE_U_2(sp->ether_type);
54 if (etype <= MAX_ETHERNET_LENGTH_VAL)
55 ND_PRINT("invalid ethertype %u", etype);
58 tok2str(ethertype_values,"Unknown", etype),
59 etype);
61 if (etype <= MAX_ETHERNET_LENGTH_VAL)
62 ND_PRINT("invalid ethertype %u", etype);
64 ND_PRINT("%s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", etype));
  /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.base/
style.c 22 enum etype enum
32 enum etype e_field;
  /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.base/
style.c 22 enum etype enum
32 enum etype e_field;
  /src/sys/net/agr/
if_agrether_hash.c 79 uint16_t etype; local
88 etype = eh->ether_type;
90 if (etype == htobe16(ETHERTYPE_VLAN)) {
101 etype = vlanhdr->evl_proto;
111 if (etype == htobe16(ETHERTYPE_IP)) {
126 } else if (etype == htobe16(ETHERTYPE_IPV6)) {
  /src/usr.sbin/npf/npftest/libnpftest/
npfl2onlytest.c 28 uint16_t etype; member in struct:test_case
35 .ifname = IFNAME_INT, .etype = ETHERTYPE_IPV6,
40 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
45 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
59 m = mbuf_get_frame(t->src, t->dst, htons(t->etype));
npf_l2rule_test.c 20 uint16_t etype; member in struct:test_case
28 .ifname = IFNAME_INT, .etype = ETHERTYPE_IPV6,
34 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
41 .ifname = IFNAME_INT, .etype = ETHERTYPE_ATALK,
47 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
53 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
59 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
65 .ifname = IFNAME_INT, .etype = ETHERTYPE_IP,
80 m = mbuf_get_frame(t->src, t->dst, htons(t->etype));
107 m = mbuf_get_frame(t->src, t->dst, htons(t->etype));
    [all...]
  /src/usr.bin/who/
utmpentry.c 73 int etype = 1 << USER_PROCESS; variable
202 if (fname == NULL && ((1 << utx->ut_type) & etype) == 0)
216 if ((etype & (1 << USER_PROCESS)) != 0) {
  /src/crypto/dist/ipsec-tools/src/racoon/
isakmp_frag.c 94 int etype; local
101 etype = hdr->etype;
133 hdr->etype = etype;
  /src/crypto/external/bsd/heimdal/dist/kdc/
string2key.c 107 krb5_enctype etype; local
129 ret = krb5_string_to_enctype(context, keytype_str, &etype);
133 if((etype != (krb5_enctype)ETYPE_DES_CBC_CRC &&
134 etype != (krb5_enctype)ETYPE_DES_CBC_MD4 &&
135 etype != (krb5_enctype)ETYPE_DES_CBC_MD5) &&
138 etype = ETYPE_DES_CBC_CRC;
175 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
  /src/crypto/external/bsd/heimdal/dist/kuser/
kcpytkt.c 76 krb5_enctype etype; local
89 ret = krb5_string_to_enctype(context, etypestr, &etype);
94 etype = 0;
135 in_creds.session.keytype = etype;
kdeltkt.c 76 krb5_enctype etype; local
88 ret = krb5_string_to_enctype(context, etypestr, &etype);
93 etype = 0;
130 in_creds.session.keytype = etype;
kvno.c 105 krb5_enctype etype; local
119 ret = krb5_string_to_enctype(context, etype_str, &etype);
123 etype = 0;
174 in_creds.session.keytype = etype;
202 ticket.enc_part.etype,
kimpersonate.c 65 krb5_enctype etype,
112 ret = krb5_crypto_init(context, skey, etype, &crypto);
156 krb5_enctype etype; local
162 ret = krb5_string_to_enctype(context, enc_type, &etype);
168 ret = krb5_kt_get_entry(context, kt, server_principal, 0, etype, &entry);
201 encode_ticket(context, &entry.keyblock, etype, entry.vno, &cred);
  /src/sys/dev/mvme/
memc.c 541 const char *etype; local
574 etype = "Correctable";
591 etype = "Uncorrectable";
593 etype = "Spurious";
596 device_xname(sc->sc_dev), etype, bm, rdwr, addr);
  /src/external/bsd/nvi/dist/ex/
ex_init.c 350 enum { ROOTOWN, OWN, WRITER } etype; local
363 etype = rootown ? ROOTOWN : OWN;
369 etype = WRITER;
377 switch (etype) {
395 switch (etype) {
  /src/sys/net/
if_ieee1394subr.c 88 uint16_t etype = 0; local
145 etype = htons(ETHERTYPE_IP);
150 etype = htons(ETHERTYPE_ARP);
171 etype = htons(ETHERTYPE_IPV6);
195 h.ibh_type = etype;
224 m0 = ieee1394_fragment(ifp, m0, (2<<hwdst->iha_maxrec) - hdrlen, etype);
251 uint16_t etype)
266 iuh->iuh_etype = etype;
277 ifh->ifh_etype_off = etype;
326 uint16_t etype; local
409 uint16_t etype, off, ftype, size, dgl; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_lib.c 341 ASN1_OBJECT **petype, *etype; local
348 etype = OBJ_dup(oid);
349 if (etype == NULL)
352 *petype = etype;
  /src/crypto/external/bsd/openssl.old/dist/crypto/cms/
cms_lib.c 236 ASN1_OBJECT **petype, *etype; local
242 etype = OBJ_dup(oid);
243 if (!etype)
246 *petype = etype;

Completed in 45 milliseconds

1 2 3 4