| /src/distrib/syspkg/sets/base/base-locale-et/ |
| Makefile | 3 PKGBASE=base-locale-et
|
| /src/crypto/external/bsd/heimdal/dist/lib/com_err/ |
| error.c | 81 struct error_table et; member in struct:foobar 90 struct et_list *et, **end; local 92 for (end = list, et = *list; et; end = &et->next, et = et->next) 93 if (et->table->msgs == messages) 98 et = &f->etl; 99 et->table = &f->et [all...] |
| com_err.c | 164 struct et_list *et; local 166 for (et = _et_list; et; et = et->next) { 167 if (et->table->base == new_table->table->base)
|
| lex.l | 61 et { return ET; } 62 error_table { return ET; }
|
| parse.y | 61 %token ET INDEX PREFIX EC ID END 71 header : id et 72 | et 81 et : ET STRING label 87 | ET STRING STRING
|
| /src/share/man/man4/man4.atari/ |
| Makefile | 4 MAN= et.4 floppy.4 intro.4 ms.4 rtc.4
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| salt-aes-sha1.c | 50 struct _krb5_encryption_type *et; local 62 et = _krb5_find_enctype(enctype); 63 if (et == NULL) 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 81 et->keytype->size, kd.key->keyvalue.data); 83 _krb5_free_key_data(context, &kd, et); 89 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 92 _krb5_free_key_data(context, &kd, et);
|
| salt-aes-sha2.c | 50 struct _krb5_encryption_type *et = NULL; local 71 et = _krb5_find_enctype(enctype); 72 if (et == NULL) { 84 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 90 enctypesz = strlen(et->name) + 1; 96 memcpy(saltp.data, et->name, enctypesz); 108 et->keytype->size, kd.key->keyvalue.data); 116 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 126 _krb5_free_key_data(context, &kd, et);
|
| crypto.c | 89 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 90 if(et == NULL) { 93 *keysize = et->keytype->size; 102 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 103 if(et == NULL) { 106 *keybits = et->keytype->bits; 116 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 117 if(et == NULL) { 120 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); 124 if(et->keytype->random_key 137 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); local 819 const struct _krb5_encryption_type *et = crypto->et; local 883 const struct _krb5_encryption_type *et = crypto->et; local 961 const struct _krb5_encryption_type *et = crypto->et; local 1021 struct _krb5_encryption_type *et = crypto->et; local 1061 struct _krb5_encryption_type *et = crypto->et; local 1139 struct _krb5_encryption_type *et = crypto->et; local 1221 struct _krb5_encryption_type *et = crypto->et; local 1283 struct _krb5_encryption_type *et = crypto->et; local 1516 const struct _krb5_encryption_type *et = crypto->et; local 1685 struct _krb5_encryption_type *et = crypto->et; local 1900 struct _krb5_encryption_type *et = crypto->et; local 2314 struct _krb5_encryption_type *et; local 2570 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2597 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2650 struct _krb5_encryption_type *et = _krb5_find_enctype(enctype); local 2670 struct _krb5_encryption_type *et; local 2682 struct _krb5_encryption_type *et = crypto->et; local 2697 struct _krb5_encryption_type *et = crypto->et; local 2733 struct _krb5_encryption_type *et = crypto->et; local 2747 struct _krb5_encryption_type *et = crypto->et; local 2794 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 2828 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 2847 struct _krb5_encryption_type *et = crypto->et; local [all...] |
| crypto-aes-sha1.c | 96 struct _krb5_checksum_type *ct = crypto->et->checksum; 114 if (result.checksum.length < crypto->et->blocksize) 119 crypto->et->type, "prf", 3, &derived); 123 ret = krb5_data_alloc(out, crypto->et->blocksize); 128 const EVP_CIPHER *c = (*crypto->et->keytype->evp)(); 139 crypto->et->blocksize);
|
| salt.c | 191 struct _krb5_encryption_type *et =_krb5_find_enctype(enctype); local 193 if(et == NULL) { 199 for(st = et->keytype->string_to_key; st && st->type; st++) 251 struct _krb5_encryption_type *et = _krb5_find_enctype(etype); local 257 if(et == NULL) { 263 keylen = et->keytype->bits / 8; 268 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 290 et, 295 _krb5_free_key_data(context, &kd, et); 299 _krb5_free_key_data(context, &kd, et); [all...] |
| crypto-pk.c | 49 struct _krb5_encryption_type *et = _krb5_find_enctype(type); local 57 if(et == NULL) { 63 keylen = (et->keytype->bits + 7) / 8; 209 struct _krb5_encryption_type *et; local 240 et = _krb5_find_enctype(enctype); 241 if(et == NULL) { 247 keylen = (et->keytype->bits + 7) / 8;
|
| /src/sys/dev/raidframe/ |
| rf_etimer.h | 39 struct timeval et; member in struct:RF_Etimer_s 51 getmicrouptime(&(_t_).et); \ 56 RF_TIMEVAL_DIFF(&(_t_).st, &(_t_).et, &(_t_).diff) \
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| eapol_test.py | 76 et = eapol_test(ifname) 78 et.request("AP_SCAN 0") 80 et.request("SET fast_reauth 0") 82 et.request("SET fast_reauth 1") 83 id = et.add_network() 87 et.set_network(id, item, conf[item]) 89 et.set_network(id, "key_mgmt", "IEEE8021X") 90 et.set_network(id, "eapol_flags", "0") 91 et.set_network(id, "eap", "TLS") 92 et.set_network_quoted(id, "identity", "user" [all...] |
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| sort.c | 101 struct entrything *et; local 133 if ( (et = (struct entrything *) LDAP_MALLOC( count * 141 et[i].et_cmp_fn = cmp; 142 et[i].et_msg = e; 147 et[i].et_vals = ldap_explode_dn( dn, 1 ); 150 et[i].et_vals = ldap_get_values( ld, e, attr ); 156 qsort( et, count, sizeof(struct entrything), et_cmp ); 160 *ep = et[i].et_msg; 163 LDAP_VFREE( et[i].et_vals ); 168 LDAP_FREE( (char *) et ); [all...] |
| /src/external/mit/lua/dist/src/ |
| ltm.h | 69 #define gfasttm(g,et,e) ((et) == NULL ? NULL : \ 70 ((et)->flags & (1u<<(e))) ? NULL : luaT_gettm(et, e, (g)->tmname[e])) 72 #define fasttm(l,et,e) gfasttm(G(l), et, e)
|
| /src/usr.sbin/sysinst/arch/cats/ |
| msg.md.fr | 52 (taille et Offset en %s) :
|
| /src/usr.sbin/sysinst/arch/zaurus/ |
| msg.md.fr | 52 (taille et Offset en %s) :
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| krb5tgs.c | 399 EncTicketPart *et) 415 et->flags.invalid = 0; 428 et->flags.forwardable = 1; 436 et->flags.forwarded = 1; 437 et->caddr = b->addresses; 440 et->flags.forwarded = 1; 448 et->flags.proxiable = 1; 456 et->flags.proxy = 1; 457 et->caddr = b->addresses; 460 et->flags.proxy = 1 789 EncTicketPart et; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kimpersonate.c | 74 EncTicketPart et; local 84 et.flags = cred->flags.b; 85 et.key = cred->session; 86 et.crealm = cred->client->realm; 87 ret = copy_PrincipalName(&cred->client->name, &et.cname); 94 et.transited.tr_type = DOMAIN_X500_COMPRESS; 95 et.transited.contents = empty_string; 97 et.authtime = cred->times.authtime; 98 et.starttime = NULL; 99 et.endtime = cred->times.endtime [all...] |
| /src/usr.bin/who/ |
| who.c | 108 int et = 0; local 118 et = -1; 122 et |= (1 << BOOT_TIME); 125 et |= (1 << DEAD_PROCESS); 131 et |= (1 << LOGIN_PROCESS); 137 et |= (1 << INIT_PROCESS); 143 et |= (1 << RUN_LVL); 152 et |= (1 << NEW_TIME); 168 if (et != 0) 169 etype = et; [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-llc.c | 431 u_short et; local 439 et = GET_BE_U_2(p + 3); 451 tok2str(oui_to_struct_tok(orgcode), "Unknown", et), 452 et, length - 5); 467 ret = ethertype_print(ndo, et, p, length, caplen, src, dst); 473 if (et == ETHERTYPE_ATALK) { 482 ret = ethertype_print(ndo, et, p, length, caplen, src, dst); 489 switch (et) { 512 switch (et) { 598 tok2str(ethertype_values, "Unknown", et), [all...] |
| /src/sys/rump/librump/rumpvfs/ |
| rumpfs.c | 227 * the host FS. ET phones home only from the root node of rumpfs. 248 ettype_to_vtype(enum rump_etfs_type et) 252 switch (et) { 269 panic("invalid et type: %d", et); 307 struct etfs *et; local 312 LIST_FOREACH(et, &etfs_list, et_entries) { 313 if ((keylen == et->et_keylen || et->et_prefixkey || forceprefix) 314 && strncmp(key, et->et_key, et->et_keylen) == 0) 331 struct etfs *et; local 429 struct etfs *et; local 648 struct etfs *et; local 682 struct etfs *et; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
| NTMakefile | 46 $(OBJ)\ntlm_err.c $(OBJ)\ntlm_err.h: ntlm_err.et 48 $(BINDIR)\compile_et.exe $(SRCDIR)\ntlm_err.et
|
| /src/crypto/external/bsd/heimdal/lib/libheimntlm/ |
| Makefile | 21 HEIMSRCS= ntlm_err.et ntlm.c
|