/titanic_51/usr/src/cmd/sendmail/libsm/ |
H A D | exc.c | 209 ** etype -- type of exception. 237 sm_exc_vnew_x(etype, ap) in sm_exc_vnew_x() argument 238 const SM_EXC_TYPE_T *etype; in sm_exc_vnew_x() 252 SM_REQUIRE_ISA(etype, SmExcTypeMagic); 253 argc = strlen(etype->etype_argformat); 265 exc->exc_type = etype; 279 switch (etype->etype_argformat[i]) 294 SM_REQUIRE(etype->etype_argformat[i+1] == '\0'); 299 etype->etype_argformat[i]); 313 switch (etype 408 sm_exc_new_x(const SM_EXC_TYPE_T * etype,...) sm_exc_new_x() argument 638 sm_exc_raisenew_x(const SM_EXC_TYPE_T * etype,...) sm_exc_raisenew_x() argument [all...] |
/titanic_51/usr/src/cmd/lp/lib/msgs/ |
H A D | _getmessage.c | 54 short etype; local 74 etype = stoh(buf + MESG_TYPE); 75 if (etype < 0 || etype > LAST_MESSAGE) 81 if (etype != rtype) 92 fmt = _lp_msg_fmts[etype]; 164 return(etype);
|
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | valid_enctype.c | 37 krb5_c_valid_enctype(krb5_enctype etype) in krb5_c_valid_enctype() argument 42 if (krb5_enctypes_list[i].etype == etype) in krb5_c_valid_enctype() 50 valid_enctype(krb5_enctype etype) in valid_enctype() argument 52 return krb5_c_valid_enctype (etype); in valid_enctype()
|
H A D | pkcs11slot.c | 19 get_algo(krb5_enctype etype, KRB5_MECH_TO_PKCS *algos) in get_algo() argument 21 switch (etype) { in get_algo() 82 get_key_type(krb5_enctype etype, CK_KEY_TYPE *keyType) in get_key_type() argument 84 switch (etype) { in get_key_type() 130 tempenctype = krb5_enctypes_list[i].etype; in slot_supports_krb5() 138 krb5_enctypes_list[i].etype = -1; in slot_supports_krb5() 162 krb5_enctypes_list[i].etype = -1; in slot_supports_krb5()
|
H A D | enctype_compare.c | 38 if (krb5_enctypes_list[i].etype == e1) in krb5_c_enctype_compare() 45 if (krb5_enctypes_list[j].etype == e2) in krb5_c_enctype_compare()
|
H A D | enctype_to_string.c | 41 if (krb5_enctypes_list[i].etype == enctype) { in krb5_enctype_to_string() 60 if (krb5_enctypes_list[i].etype == enctype) { in krb5_enctype_to_istring()
|
H A D | state.c | 50 if (krb5_enctypes_list[i].etype == key->enctype) in krb5_c_init_state() 69 if (krb5_enctypes_list[i].etype == key->enctype) in krb5_c_free_state()
|
H A D | keyed_checksum_types.c | 36 if (krb5_enctypes_list[i1].etype == e1) in etype_match() 40 if (krb5_enctypes_list[i2].etype == e2) in etype_match()
|
H A D | string_to_enctype.c | 37 *enctypep = krb5_enctypes_list[i].etype; in krb5_string_to_enctype()
|
/titanic_51/usr/src/uts/common/io/bnxe/ |
H A D | bnxe_rr.c | 49 ushort_t etype; in BnxeRouteTxRing() local 72 etype = ntohs(((struct ether_header *)pHdr)->ether_type); in BnxeRouteTxRing() 74 if (etype == ETHERTYPE_VLAN) in BnxeRouteTxRing() 76 etype = ntohs(((struct ether_vlan_header *)pHdr)->ether_type); in BnxeRouteTxRing() 84 if (etype == ETHERTYPE_IP) in BnxeRouteTxRing()
|
/titanic_51/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | mandatory_sumtype.c | 35 krb5int_c_mandatory_cksumtype (krb5_context ctx, krb5_enctype etype, in krb5int_c_mandatory_cksumtype() argument 41 if (krb5_enctypes_list[i].etype == etype) { in krb5int_c_mandatory_cksumtype()
|
H A D | decrypt.c | 45 if (krb5_enctypes_list[i].etype == key->enctype) in krb5_c_decrypt() 53 (krb5_enctypes_list[i].etype != input->enctype)) in krb5_c_decrypt()
|
/titanic_51/usr/src/boot/lib/libstand/ |
H A D | ether.c | 56 sendether(struct iodesc *d, void *pkt, size_t len, uint8_t *dea, int etype) in sendether() argument 71 eh->ether_type = htons(etype); in sendether() 83 * the broadcast address. Save the Ether type in etype. 89 uint16_t *etype) in readether() argument 122 *etype = ntohs(eh->ether_type); in readether()
|
H A D | rarp.c | 150 uint16_t etype; /* host order */ in rarprecv() local 157 n = readether(d, &ptr, (void **)&ap, tleft, &etype); in rarprecv() 168 if (etype != ETHERTYPE_REVARP) { in rarprecv() 171 printf("bad type=0x%x\n", etype); in rarprecv()
|
H A D | arp.c | 165 u_int16_t etype; /* host order */ in arprecv() local 174 n = readether(d, &ptr, (void **)&ah, tleft, &etype); in arprecv() 185 if (etype != ETHERTYPE_ARP) { in arprecv() 188 printf("not arp type=%d\n", etype); in arprecv()
|
H A D | ip.c | 189 uint16_t etype; /* host order */ in readipv4() local 201 n = readether(d, (void **)&ptr, (void **)&ip, tleft, &etype); in readipv4() 210 if (etype == ETHERTYPE_ARP) { in readipv4() 221 if (etype != ETHERTYPE_IP) { in readipv4() 224 printf("readip: not IP. ether_type=%x\n", etype); in readipv4()
|
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_keytab.c | 44 krb5_enctype etype, in krb5_get_as_key_keytab() argument 57 /* if there's already a key of the correct etype, we're done. in krb5_get_as_key_keytab() 58 if the etype is wrong, free the existing key, and make in krb5_get_as_key_keytab() 62 if (as_key->enctype == etype) in krb5_get_as_key_keytab() 69 if (!krb5_c_valid_enctype(etype)) in krb5_get_as_key_keytab() 75 etype, &kt_ent)) != NULL) in krb5_get_as_key_keytab()
|
H A D | preauth2.c | 59 krb5_enctype *etype, 594 krb5_enctype *etype, in pa_salt() argument 622 krb5_enctype *etype, in pa_enc_timestamp() argument 643 fprintf (stderr, "; *etype=%d request->ktype[0]=%d\n", in pa_enc_timestamp() 644 *etype, request->ktype[0]); in pa_enc_timestamp() 648 *etype ? *etype : request->ktype[0], in pa_enc_timestamp() 766 krb5_enctype *etype, in pa_sam() argument 812 /* etype has either been set by caller or by KRB5_PADATA_ETYPE_INFO */ in pa_sam() 816 if (etype in pa_sam() 1037 pa_sam_2(krb5_context context,krb5_kdc_req * request,krb5_pa_data * in_padata,krb5_pa_data ** out_padata,krb5_data * salt,krb5_data * s2kparams,krb5_enctype * etype,krb5_keyblock * as_key,krb5_prompter_fct prompter,void * prompter_data,krb5_gic_get_as_key_fct gak_fct,void * gak_data) pa_sam_2() argument 1406 krb5_do_preauth_tryagain(krb5_context kcontext,krb5_kdc_req * request,krb5_data * encoded_request_body,krb5_data * encoded_previous_request,krb5_pa_data ** padata,krb5_pa_data *** return_padata,krb5_error * err_reply,krb5_data * salt,krb5_data * s2kparams,krb5_enctype * etype,krb5_keyblock * as_key,krb5_prompter_fct prompter,void * prompter_data,krb5_gic_get_as_key_fct gak_fct,void * gak_data,krb5_preauth_client_rock * get_data_rock,krb5_gic_opt_ext * opte) krb5_do_preauth_tryagain() argument 1475 krb5_do_preauth(krb5_context context,krb5_kdc_req * request,krb5_data * encoded_request_body,krb5_data * encoded_previous_request,krb5_pa_data ** in_padata,krb5_pa_data *** out_padata,krb5_data * salt,krb5_data * s2kparams,krb5_enctype * etype,krb5_keyblock * as_key,krb5_prompter_fct prompter,void * prompter_data,krb5_gic_get_as_key_fct gak_fct,void * gak_data,krb5_preauth_client_rock * get_data_rock,krb5_gic_opt_ext * opte) krb5_do_preauth() argument [all...] |
H A D | rd_req_dec.c | 354 /* no etype check needed */ in krb5_rd_req_decoded_opt() 358 int etype; in krb5_rd_req_decoded_opt() local 361 etype = req->ticket->enc_part.enctype)) || in krb5_rd_req_decoded_opt() 363 etype = req->ticket->enc_part2->session->enctype)) || in krb5_rd_req_decoded_opt() 366 etype = (*auth_context)->authentp->subkey->enctype))) { in krb5_rd_req_decoded_opt() 369 if (krb5_enctype_to_string(etype, enctype_name, sizeof(enctype_name)) == 0) in krb5_rd_req_decoded_opt()
|
/titanic_51/usr/src/uts/common/rpc/ |
H A D | clnt_clts.c | 1250 struct endpnt_type *etype; in endpnt_type_create() local 1256 etype = kmem_alloc(sizeof (struct endpnt_type), KM_SLEEP); in endpnt_type_create() 1257 etype->e_next = NULL; in endpnt_type_create() 1258 etype->e_pcurr = NULL; in endpnt_type_create() 1259 etype->e_itimer = 0; in endpnt_type_create() 1260 etype->e_cnt = 0; in endpnt_type_create() 1262 (void) strncpy(etype->e_protofmly, config->knc_protofmly, KNC_STRSIZE); in endpnt_type_create() 1263 mutex_init(&etype->e_plock, NULL, MUTEX_DEFAULT, NULL); in endpnt_type_create() 1264 mutex_init(&etype->e_ilock, NULL, MUTEX_DEFAULT, NULL); in endpnt_type_create() 1265 etype in endpnt_type_create() 1296 endpnt_type_free(struct endpnt_type * etype) endpnt_type_free() argument [all...] |
/titanic_51/usr/src/cmd/cron/ |
H A D | funcs.c | 153 cron_sendmsg(char action, char *login, char *fname, char etype) in cron_sendmsg() argument 173 pmsg->etype = etype; in cron_sendmsg()
|
H A D | cron.c | 185 short etype; /* what type of event; 0=cron, 1=at */ member 588 switch (next_event->etype) { in main() 1072 e->etype = jobtype; in add_atevent() 1212 e->etype = CRONEVENT; in readcron() 2135 (next_event->etype == CRONEVENT) && in rm_ctevents() 2207 qp = &qt[e->etype]; /* set pointer to queue defs */ in ex() 2209 msg("%c queue max run limit reached", e->etype + 'a'); in ex() 2223 rp->jobtype = e->etype; in ex() 2224 if (e->etype == CRONEVENT) { in ex() 2279 if (next_event->etype in ex() [all...] |
/titanic_51/usr/src/cmd/sgs/libld/common/ |
H A D | ldmain.c | 147 Half etype; in ld_main() local 300 * Call ld_start() with the etype of our output file and the in ld_main() 304 etype = ET_DYN; in ld_main() 306 etype = ET_REL; in ld_main() 308 etype = ET_EXEC; in ld_main() 310 ld_sup_start(ofl, etype, argv[0]); in ld_main()
|
/titanic_51/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | eventlog_svc.c | 390 logr_set_event_typeid(int le_pri, WORD *etype, DWORD *eid) in logr_set_event_typeid() argument 398 *etype = EVENTLOG_ERROR_TYPE; in logr_set_event_typeid() 402 *etype = EVENTLOG_WARNING_TYPE; in logr_set_event_typeid() 408 *etype = EVENTLOG_INFORMATION_TYPE; in logr_set_event_typeid() 412 *etype = EVENTLOG_SUCCESS; in logr_set_event_typeid()
|
/titanic_51/usr/src/uts/common/io/scsi/adapters/pmcs/ |
H A D | pmcs_smhba.c | 234 pmcs_smhba_log_sysevent(pmcs_hw_t *pwp, char *subclass, char *etype, in pmcs_smhba_log_sysevent() argument 261 if (strcmp(etype, SAS_PHY_ONLINE) == 0) { in pmcs_smhba_log_sysevent() 289 if (strcmp(etype, SAS_PHY_ONLINE) == 0) { in pmcs_smhba_log_sysevent() 294 if (nvlist_add_string(attr_list, SAS_EVENT_TYPE, etype) != 0) in pmcs_smhba_log_sysevent()
|