Searched refs:ktype (Results 1 - 18 of 18) sorted by relevance

/freebsd-10.0-release/crypto/openssh/regress/
H A Dcert-hostkey.sh27 for ktype in rsa dsa $ecdsa ; do
28 verbose "$tid: sign host ${ktype} cert"
30 ${SSHKEYGEN} -q -N '' -t ${ktype} \
31 -f $OBJ/cert_host_key_${ktype} || \
32 fail "ssh-keygen of cert_host_key_${ktype} failed"
35 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
36 fail "couldn't sign cert_host_key_${ktype}"
38 test "${ktype}" = "ecdsa" && continue
39 cp $OBJ/cert_host_key_${ktype} $OBJ/cert_host_key_${ktype}_v0
[all...]
H A Dcert-userkey.sh20 for ktype in rsa dsa $ecdsa ; do
21 verbose "$tid: sign user ${ktype} cert"
22 ${SSHKEYGEN} -q -N '' -t ${ktype} \
23 -f $OBJ/cert_user_key_${ktype} || \
24 fail "ssh-keygen of cert_user_key_${ktype} failed"
26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} ||
27 fail "couldn't sign cert_user_key_${ktype}"
29 test "${ktype}" = "ecdsa" && continue
30 cp $OBJ/cert_user_key_${ktype} $OBJ/cert_user_key_${ktype}_v0
[all...]
/freebsd-10.0-release/sys/ofed/include/linux/
H A Dkobject.h52 struct kobj_type *ktype; member in struct:kobject
58 kobject_init(struct kobject *kobj, struct kobj_type *ktype) argument
63 kobj->ktype = ktype;
150 int kobject_init_and_add(struct kobject *kobj, struct kobj_type *ktype,
H A Dsysfs.h84 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL)
89 ops = kobj->ktype->sysfs_ops;
H A Dlinux_compat.c112 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) {
114 t = kobj->ktype;
155 if (kobj->ktype && kobj->ktype->release)
156 kobj->ktype->release(kobj);
190 kobject_init_and_add(struct kobject *kobj, struct kobj_type *ktype, argument
196 kobject_init(kobj, ktype);
197 kobj->ktype = ktype;
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dssh-dss.c133 char *ktype; local
136 ktype = buffer_get_cstring(&b, NULL);
137 if (strcmp("ssh-dss", ktype) != 0) {
138 error("ssh_dss_verify: cannot handle type %s", ktype);
140 free(ktype);
143 free(ktype);
H A Dssh-ecdsa.c106 char *ktype; local
118 ktype = buffer_get_string(&b, NULL);
119 if (strcmp(key_ssh_name_plain(key), ktype) != 0) {
120 error("%s: cannot handle type %s", __func__, ktype);
122 free(ktype);
125 free(ktype);
H A Dssh-rsa.c113 char *ktype; local
130 ktype = buffer_get_cstring(&b, NULL);
131 if (strcmp("ssh-rsa", ktype) != 0) {
132 error("ssh_rsa_verify: cannot handle type %s", ktype);
134 free(ktype);
137 free(ktype);
H A Dkey.c1433 char *ktype = NULL, *curve = NULL; local
1445 if ((ktype = buffer_get_cstring_ret(&b, NULL)) == NULL) {
1450 type = key_type_from_name(ktype);
1453 nid = key_ecdsa_nid_from_name(ktype);
1533 error("key_from_blob: cannot handle type %s", ktype);
1544 free(ktype);
H A Dsshconnect2.c122 int ktype; local
147 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC)
150 key_type_plain(ktype), NULL))
H A Dssh-keygen.c396 int magic, rlen, ktype, i1, i2, i3, i4; local
426 ktype = KEY_DSA;
428 ktype = KEY_RSA;
434 key = key_new_private(ktype);
/freebsd-10.0-release/crypto/openssl/crypto/ec/
H A Dec_ameth.c428 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) argument
453 if (ktype > 0)
468 if (ktype == 2)
477 if (ktype > 0)
486 if (ktype == 2)
488 else if (ktype == 1)
/freebsd-10.0-release/crypto/openssl/crypto/krb5/
H A Dkrb5_asn.h172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
H A Dkrb5_asn.c129 ASN1_EXP(KRB5_ENCKEY, ktype, ASN1_INTEGER, 0),
/freebsd-10.0-release/crypto/openssl/crypto/dh/
H A Ddh_ameth.c323 const char *ktype = NULL; local
350 ktype = "PKCS#3 DH Private-Key";
352 ktype = "PKCS#3 DH Public-Key";
354 ktype = "PKCS#3 DH Parameters";
364 if (BIO_printf(bp,"%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
/freebsd-10.0-release/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c441 const char *ktype = NULL; local
456 ktype = "Private-Key";
458 ktype = "Public-Key";
460 ktype = "DSA-Parameters";
479 if (BIO_printf(bp,"%s: (%d bit)\n",ktype, BN_num_bits(x->p))
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dadmin.h229 ktype, int32_t stype, int32_t
/freebsd-10.0-release/contrib/unbound/validator/
H A Dval_secalgo.c646 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument
661 key->keyType = ktype;

Completed in 1800 milliseconds