/freebsd-10.2-release/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 30 for ktype in $PLAIN_TYPES ; do 31 verbose "$tid: sign host ${ktype} cert" 33 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 34 -f $OBJ/cert_host_key_${ktype} || \ 35 fail "ssh-keygen of cert_host_key_${ktype} failed" 38 -n $HOSTS $OBJ/cert_host_key_${ktype} || 39 fail "couldn't sign cert_host_key_${ktype}" 40 type_has_legacy $ktype || continue 41 cp $OBJ/cert_host_key_${ktype} $OBJ/cert_host_key_${ktype}_v0 [all...] |
H A D | cert-userkey.sh | 23 for ktype in $PLAIN_TYPES ; do 24 verbose "$tid: sign user ${ktype} cert" 25 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 26 -f $OBJ/cert_user_key_${ktype} || \ 27 fail "ssh-keygen of cert_user_key_${ktype} failed" 29 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} || 30 fail "couldn't sign cert_user_key_${ktype}" 31 type_has_legacy $ktype || continue 32 cp $OBJ/cert_user_key_${ktype} $OBJ/cert_user_key_${ktype}_v0 [all...] |
/freebsd-10.2-release/sys/ofed/include/linux/ |
H A D | kobject.h | 53 struct kobj_type *ktype; member in struct:kobject 61 kobject_init(struct kobject *kobj, struct kobj_type *ktype) argument 66 kobj->ktype = ktype; 153 int kobject_init_and_add(struct kobject *kobj, struct kobj_type *ktype,
|
H A D | sysfs.h | 85 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) 90 ops = kobj->ktype->sysfs_ops;
|
H A D | linux_compat.c | 114 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { 116 t = kobj->ktype; 157 if (kobj->ktype && kobj->ktype->release) 158 kobj->ktype->release(kobj); 207 kobject_init_and_add(struct kobject *kobj, struct kobj_type *ktype, argument 213 kobject_init(kobj, ktype); 214 kobj->ktype = ktype; [all...] |
/freebsd-10.2-release/crypto/openssh/ |
H A D | ssh-dss.c | 133 char *ktype; local 136 ktype = buffer_get_cstring(&b, NULL); 137 if (strcmp("ssh-dss", ktype) != 0) { 138 error("%s: cannot handle type %s", __func__, ktype); 140 free(ktype); 143 free(ktype);
|
H A D | ssh-ecdsa.c | 112 char *ktype; local 123 ktype = buffer_get_string(&b, NULL); 124 if (strcmp(key_ssh_name_plain(key), ktype) != 0) { 125 error("%s: cannot handle type %s", __func__, ktype); 127 free(ktype); 130 free(ktype);
|
H A D | ssh-ed25519.c | 86 char *ktype; local 99 ktype = buffer_get_cstring(&b, NULL); 100 if (strcmp("ssh-ed25519", ktype) != 0) { 101 error("%s: cannot handle type %s", __func__, ktype); 103 free(ktype); 106 free(ktype);
|
H A D | ssh-rsa.c | 117 char *ktype; local 136 ktype = buffer_get_cstring(&b, NULL); 137 if (strcmp("ssh-rsa", ktype) != 0) { 138 error("%s: cannot handle type %s", __func__, ktype); 140 free(ktype); 143 free(ktype);
|
H A D | key.c | 1531 char *ktype = NULL, *curve = NULL; local 1544 if ((ktype = buffer_get_cstring_ret(&b, NULL)) == NULL) { 1549 type = key_type_from_name(ktype); 1552 nid = key_ecdsa_nid_from_name(ktype); 1652 error("key_from_blob: cannot handle type %s", ktype); 1663 free(ktype);
|
H A D | sshconnect2.c | 120 int ktype; local 145 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC) 148 key_type_plain(ktype), NULL))
|
H A D | ssh-keygen.c | 412 int magic, rlen, ktype, i1, i2, i3, i4; local 442 ktype = KEY_DSA; 444 ktype = KEY_RSA; 450 key = key_new_private(ktype);
|
/freebsd-10.2-release/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 408 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) argument 431 if (ktype > 0) { 444 if (ktype == 2) { 451 if (ktype > 0) { 458 if (ktype == 2) 460 else if (ktype == 1)
|
/freebsd-10.2-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 162 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
H A D | krb5_asn.c | 127 ASN1_EXP(KRB5_ENCKEY, ktype, ASN1_INTEGER, 0),
|
/freebsd-10.2-release/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 315 const char *ktype = NULL; local 341 ktype = "PKCS#3 DH Private-Key"; 343 ktype = "PKCS#3 DH Public-Key"; 345 ktype = "PKCS#3 DH Parameters"; 354 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
/freebsd-10.2-release/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 418 const char *ktype = NULL; local 433 ktype = "Private-Key"; 435 ktype = "Public-Key"; 437 ktype = "DSA-Parameters"; 454 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
|
/freebsd-10.2-release/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 229 ktype, int32_t stype, int32_t
|
/freebsd-10.2-release/contrib/unbound/validator/ |
H A D | val_secalgo.c | 649 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument 664 key->keyType = ktype;
|