/freebsd-10.3-release/contrib/ntp/libntp/ |
H A D | authusekey.c | 22 int keytype, 32 MD5auth_setkey(keyno, keytype, str, len, NULL); 20 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
|
H A D | authreadkeys.c | 92 u_short keytype; /* stored key type */ member in struct:keydata 143 int keytype; local 195 * Next is keytype. See if that is all right. 219 keytype = keytype_from_text(token, NULL); 220 if (keytype == 0) { 224 } else if (NID_cmac != keytype && 225 EVP_get_digestbynid(keytype) == NULL) { 229 keytype = 0; 240 keytype = 0; 242 keytype [all...] |
H A D | ssl_init.c | 94 * Used by ntpd authreadkeys(), ntpq and ntpdc keytype() 198 * Used by ntpq and ntpdc keytype() 247 int keytype 253 "%.64s Password: ", keytype_name(keytype));
|
/freebsd-10.3-release/crypto/heimdal/lib/krb5/ |
H A D | mk_req_ext.c | 82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { 91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || 92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || 93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || 94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { 128 ac->keyblock->keytype, 138 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
|
H A D | generate_subkey.c | 64 etype = key->keytype; /* use session key etype */
|
H A D | keyblock.c | 47 keyblock->keytype = 0; 68 keyblock->keytype = ENCTYPE_NULL; 161 return block->keytype; 201 key->keytype = type;
|
H A D | salt-aes.c | 70 kd.key->keytype = enctype; 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 80 et->keytype->size, kd.key->keyvalue.data);
|
H A D | mk_req.c | 62 if (auth_context && *auth_context && (*auth_context)->keytype) 63 this_cred.session.keytype = (*auth_context)->keytype;
|
H A D | deprecated.c | 67 krb5_keytype keytype, 75 if (keytype != KEYTYPE_DES || context->etypes_des == NULL) 76 return krb5_keytype_to_enctypes (context, keytype, len, val); 117 krb5_keytype keytype, 125 if(keys[i].type == keytype) { 133 "key type %d not supported", keytype); 155 krb5_keytype *keytype) 163 *keytype = keys[i].type; 168 *keytype = strtol(string, &end, 0); 169 if(*end == '\0' && *keytype ! [all...] |
H A D | auth_context.c | 61 p->keytype = ENCTYPE_NULL; 331 auth_context->keytype, 373 krb5_keytype keytype) 375 auth_context->keytype = keytype; 382 krb5_keytype *keytype) 384 *keytype = auth_context->keytype; 399 auth_context->keyblock->keytype = etype; 371 krb5_auth_con_setkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype keytype) argument 380 krb5_auth_con_getkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype *keytype) argument
|
H A D | salt.c | 53 for (st = e->keytype->string_to_key; st && st->type; st++) { 85 for (st = e->keytype->string_to_key; st && st->type; st++) { 199 for(st = et->keytype->string_to_key; st && st->type; st++) 263 keylen = et->keytype->bits / 8; 271 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 276 kd.key->keytype = etype;
|
H A D | salt-arcfour.c | 89 key->keytype = enctype;
|
/freebsd-10.3-release/contrib/ntp/tests/libntp/ |
H A D | a_md5encrypt.c | 18 const int keytype = KEY_TYPE_MD5; variable 57 length = MD5authencrypt(keytype, key, packetPtr, packetLength); 59 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, packetPtr, packetLength, length)); 70 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, expectedPacket.u32, packetLength, 20)); 76 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, invalidPacket.u32, packetLength, 20));
|
/freebsd-10.3-release/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 134 int keytype; local 148 keytype = EVP_PKEY_DSA; 150 keytype = EVP_PKEY_EC; 172 keytype = EVP_PKEY_RSA; 174 return d2i_PrivateKey(keytype, a, pp, length);
|
/freebsd-10.3-release/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 99 keys[i].key.keytype = key_data[i].key_data_type[0]; 183 is_des_key_p(int keytype) argument 185 return keytype == ETYPE_DES_CBC_CRC || 186 keytype == ETYPE_DES_CBC_MD4 || 187 keytype == ETYPE_DES_CBC_MD5; 229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { 235 kblock[i].keytype = keys[i].key.keytype; 238 keys[i].key.keytype, 243 if (is_des_key_p(keys[i].key.keytype)) [all...] |
H A D | default_keys.c | 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 53 (int)keys[i].key.keytype);
|
H A D | keys.c | 90 if (keys1[i].key.keytype != keys2[j].key.keytype)
|
/freebsd-10.3-release/crypto/heimdal/admin/ |
H A D | copy.c | 42 if(a->keytype != b->keytype || 90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); 98 entry.keyblock.keytype, 106 "already exists for %s, keytype %s, kvno %d", 123 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
|
H A D | remove.c | 82 entry.keyblock.keytype = enctype;
|
/freebsd-10.3-release/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 97 * out param keytype: 1 if RSA 2 if DSA 101 char *keytype); 114 * out param keytype: 1 if RSA 2 if DSA 117 unsigned long *num, char *keytype);
|
/freebsd-10.3-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | inquire_sec_context_by_oid.c | 102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 108 enum keytype keytype, 127 switch(keytype) { 138 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); 146 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); 293 is_updated = (acceptor_subkey->keytype != 294 context_handle->auth_context->keyblock->keytype); 361 switch (key->keytype) { 104 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
|
H A D | get_mic.c | 288 krb5_keytype keytype; local 303 krb5_enctype_to_keytype (context, key->keytype, &keytype); 305 switch (keytype) {
|
/freebsd-10.3-release/crypto/heimdal/kdc/ |
H A D | misc.c | 157 if (krb5_enctype_valid(context, h->entry.keys.val[i].key.keytype) 161 h->entry.keys.val[i].key.keytype, key); 165 *enctype = (*key)->key.keytype;
|
/freebsd-10.3-release/crypto/heimdal/kuser/ |
H A D | kdecode_ticket.c | 140 in.session.keytype = enctype; 157 out->session.keytype);
|
/freebsd-10.3-release/crypto/openssh/ |
H A D | hostfile.h | 92 int keytype; /* Type of key; KEY_UNSPEC for invalid/comment lines */ member in struct:hostkey_foreach_line
|