Searched refs:keytype (Results 1 - 25 of 104) sorted by relevance

12345

/freebsd-11-stable/contrib/ntp/libntp/
H A Dauthusekey.c22 int keytype,
32 MD5auth_setkey(keyno, keytype, str, len, NULL);
20 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
H A Dauthreadkeys.c92 u_short keytype; /* stored key type */ member in struct:keydata
143 int keytype; local
195 * Next is keytype. See if that is all right.
219 keytype = keytype_from_text(token, NULL);
220 if (keytype == 0) {
225 } else if (NID_cmac != keytype &&
226 EVP_get_digestbynid(keytype) == NULL) {
230 keytype = 0;
242 keytype = 0;
244 keytype
[all...]
H A Dssl_init.c94 * Used by ntpd authreadkeys(), ntpq and ntpdc keytype()
203 * Used by ntpq and ntpdc keytype()
254 int keytype
260 "%.64s Password: ", keytype_name(keytype));
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dmk_req_ext.c82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
128 ac->keyblock->keytype,
138 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
H A Dgenerate_subkey.c64 etype = key->keytype; /* use session key etype */
H A Dkeyblock.c47 keyblock->keytype = 0;
68 keyblock->keytype = ENCTYPE_NULL;
161 return block->keytype;
201 key->keytype = type;
H A Dsalt-aes.c70 kd.key->keytype = enctype;
71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
80 et->keytype->size, kd.key->keyvalue.data);
H A Dmk_req.c62 if (auth_context && *auth_context && (*auth_context)->keytype)
63 this_cred.session.keytype = (*auth_context)->keytype;
H A Ddeprecated.c67 krb5_keytype keytype,
75 if (keytype != KEYTYPE_DES || context->etypes_des == NULL)
76 return krb5_keytype_to_enctypes (context, keytype, len, val);
117 krb5_keytype keytype,
125 if(keys[i].type == keytype) {
133 "key type %d not supported", keytype);
155 krb5_keytype *keytype)
163 *keytype = keys[i].type;
168 *keytype = strtol(string, &end, 0);
169 if(*end == '\0' && *keytype !
[all...]
H A Dauth_context.c61 p->keytype = ENCTYPE_NULL;
331 auth_context->keytype,
373 krb5_keytype keytype)
375 auth_context->keytype = keytype;
382 krb5_keytype *keytype)
384 *keytype = auth_context->keytype;
399 auth_context->keyblock->keytype = etype;
371 krb5_auth_con_setkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype keytype) argument
380 krb5_auth_con_getkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype *keytype) argument
H A Dsalt.c53 for (st = e->keytype->string_to_key; st && st->type; st++) {
85 for (st = e->keytype->string_to_key; st && st->type; st++) {
199 for(st = et->keytype->string_to_key; st && st->type; st++)
263 keylen = et->keytype->bits / 8;
271 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
276 kd.key->keytype = etype;
H A Dsalt-arcfour.c89 key->keytype = enctype;
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dd2i_pr.c136 int keytype; local
150 keytype = EVP_PKEY_DSA;
152 keytype = EVP_PKEY_EC;
174 keytype = EVP_PKEY_RSA;
176 return d2i_PrivateKey(keytype, a, pp, length);
/freebsd-11-stable/crypto/heimdal/lib/kadm5/
H A Dset_keys.c99 keys[i].key.keytype = key_data[i].key_data_type[0];
183 is_des_key_p(int keytype) argument
185 return keytype == ETYPE_DES_CBC_CRC ||
186 keytype == ETYPE_DES_CBC_MD4 ||
187 keytype == ETYPE_DES_CBC_MD5;
229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) {
235 kblock[i].keytype = keys[i].key.keytype;
238 keys[i].key.keytype,
243 if (is_des_key_p(keys[i].key.keytype))
[all...]
H A Ddefault_keys.c50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str);
53 (int)keys[i].key.keytype);
H A Dkeys.c90 if (keys1[i].key.keytype != keys2[j].key.keytype)
/freebsd-11-stable/crypto/heimdal/admin/
H A Dcopy.c42 if(a->keytype != b->keytype ||
90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str);
98 entry.keyblock.keytype,
106 "already exists for %s, keytype %s, kvno %d",
123 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
H A Dremove.c82 entry.keyblock.keytype = enctype;
/freebsd-11-stable/crypto/openssl/engines/vendor_defns/
H A Dsureware.h97 * out param keytype: 1 if RSA 2 if DSA
101 char *keytype);
114 * out param keytype: 1 if RSA 2 if DSA
117 unsigned long *num, char *keytype);
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dinquire_sec_context_by_oid.c102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum
108 enum keytype keytype,
127 switch(keytype) {
138 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype);
146 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype);
293 is_updated = (acceptor_subkey->keytype !=
294 context_handle->auth_context->keyblock->keytype);
361 switch (key->keytype) {
104 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
H A Dget_mic.c288 krb5_keytype keytype; local
303 krb5_enctype_to_keytype (context, key->keytype, &keytype);
305 switch (keytype) {
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dmisc.c157 if (krb5_enctype_valid(context, h->entry.keys.val[i].key.keytype)
161 h->entry.keys.val[i].key.keytype, key);
165 *enctype = (*key)->key.keytype;
/freebsd-11-stable/crypto/heimdal/kuser/
H A Dkdecode_ticket.c140 in.session.keytype = enctype;
157 out->session.keytype);
/freebsd-11-stable/crypto/openssh/
H A Dhostfile.h92 int keytype; /* Type of key; KEY_UNSPEC for invalid/comment lines */ member in struct:hostkey_foreach_line
/freebsd-11-stable/crypto/openssh/regress/
H A Dkrl.sh58 # Vary the keytype. We use mostly ECDSA since this is fastest by far.
59 keytype=$ECDSA
61 2 | 10 | 510 | 1001) keytype=rsa;;
62 4 | 30 | 520 | 1002) keytype=ed25519;;
64 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \

Completed in 149 milliseconds

12345