/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hdb/ |
H A D | hdb-ldap.c | 664 && ent->entry.keys.val[i].key.keytype == ETYPE_ARCFOUR_HMAC_MD5) { 745 ent->entry.keys.val[i].key.keytype == ETYPE_ARCFOUR_HMAC_MD5) 1145 if (ent->entry.keys.val[i].key.keytype == ETYPE_ARCFOUR_HMAC_MD5) { 1167 ent->entry.keys.val[ent->entry.keys.len].key.keytype = ETYPE_ARCFOUR_HMAC_MD5;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | keytab.c | 575 if (enctype && enctype != entry->keyblock.keytype)
|
H A D | krb5.h | 659 krb5_keytype keytype; /* ��requested key type ? */ member in struct:krb5_auth_context_data
|
H A D | acache.c | 207 cred->session.keytype = incred->keyblock.type; 353 cred->keyblock.type = incred->session.keytype;
|
H A D | pkinit.c | 1317 &p1, &p2, session_key->keytype, 1322 if (sk_verify.keytype != session_key->keytype ||
|
H A D | aes-test.c | 756 kb.keytype = krbencs[i].enctype;
|
H A D | init_creds_pw.c | 1623 if (krb5_enctype_valid(context, entry.keyblock.keytype) != 0) 1635 etypes[netypes] = entry.keyblock.keytype;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 128 switch (key->keytype) {
|
/netbsd-current/external/bsd/ntp/dist/ntpq/ |
H A D | ntpq.c | 214 static void keytype (struct parse *, FILE *); 320 { "keytype", keytype, { OPT|NTP_STR, NO, NO, NO }, 525 /* Fixup keytype's help based on available digest names */ 534 if (strcmp("keytype", builtins[icmd].keyword) == 0) { 540 /* This should only "trip" if "keytype" is removed from builtins */ 2595 * keytype - get type of key to use for authenticating requests 2598 keytype( function 2608 fprintf(fp, "keytype is %s with %lu octet digests\n", 2619 fprintf(fp, "keytype i [all...] |
/netbsd-current/external/gpl3/gcc.old/dist/libphobos/src/etc/c/ |
H A D | curl.d | 592 CurlKHType keytype; ///
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/ |
H A D | evp.h | 1343 int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, 1347 int EVP_PKEY_CTX_ctrl_uint64(EVP_PKEY_CTX *ctx, int keytype, int optype,
|
/netbsd-current/external/gpl3/gcc/dist/libphobos/src/etc/c/ |
H A D | curl.d | 599 CurlKHType keytype; ///
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/ |
H A D | gss_krb5.c | 245 key->type = keyblock->keytype;
|
/netbsd-current/external/bsd/openldap/dist/contrib/slapd-modules/smbk5pwd/ |
H A D | smbk5pwd.c | 314 krb5_string_to_key_salt( context, ekey.key.keytype, cred->bv_val,
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | evp_extra_test2.c | 280 static int do_pkey_tofrom_data_select(EVP_PKEY *key, const char *keytype) argument 286 const char *privtag = strcmp(keytype, "RSA") == 0 ? "d" : "priv"; 287 const int use_octstring = strcmp(keytype, "X25519") == 0; 308 if (!TEST_ptr(fromctx = EVP_PKEY_CTX_new_from_name(mainctx, keytype, NULL))
|
/netbsd-current/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | rpc.c | 672 CHECK(krb5_store_uint32(out, new_keys[i].keytype));
|
/netbsd-current/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | protocol.c | 876 ret = krb5_ret_int32(request, &in.session.keytype);
|
/netbsd-current/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_write_set_format_iso9660.c | 4004 enum keytype { enum 4012 enum keytype type, ...)
|
/netbsd-current/external/bsd/ntp/dist/ntpd/ |
H A D | ntp_config.c | 5410 return keywords[prop_index].keytype;
|