/freebsd-13-stable/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 84 for ktype in $PLAIN_TYPES ; do 85 verbose "$tid: sign host ${ktype} cert" 87 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 88 -f $OBJ/cert_host_key_${ktype} || \ 89 fatal "ssh-keygen of cert_host_key_${ktype} failed" 91 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 92 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 93 case $ktype in 94 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;; 99 -n $HOSTS $OBJ/cert_host_key_${ktype} || [all...] |
H A D | cert-userkey.sh | 18 case $ktype in 19 rsa-sha2-*) n="$ktype" ;; 31 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do 32 verbose "$tid: sign user ${ktype} cert" 33 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 34 -f $OBJ/cert_user_key_${ktype} || \ 35 fatal "ssh-keygen of cert_user_key_${ktype} failed" 37 case $ktype in 38 rsa-sha2-*) tflag="-t $ktype" ;; 43 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ [all...] |
/freebsd-13-stable/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 44 int ktype, 61 if (ktype == NID_cmac) { 106 OBJ_nid2sn(ktype)); 116 if (!EVP_DigestInit_ex(ctx, EVP_get_digestbynid(ktype), NULL)) { 118 OBJ_nid2sn(ktype)); 123 OBJ_nid2sn(ktype)); 128 OBJ_nid2sn(ktype)); 133 OBJ_nid2sn(ktype)); 138 OBJ_nid2sn(ktype)); 150 if (ktype 42 make_mac( const rwbuffT * digest, int ktype, const robuffT * key, const robuffT * msg) argument [all...] |
/freebsd-13-stable/sys/compat/linuxkpi/common/include/linux/ |
H A D | kobject.h | 58 const struct kobj_type *ktype; member in struct:kobject 80 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) argument 85 kobj->ktype = ktype; 153 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
|
H A D | sysfs.h | 91 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) 96 ops = kobj->ktype->sysfs_ops;
|
/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-ecdsa.c | 125 char *ktype = NULL; local 139 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 144 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 198 free(ktype);
|
H A D | ssh-ed25519.c | 100 char *ktype = NULL; local 116 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 119 if (strcmp("ssh-ed25519", ktype) != 0) { 165 free(ktype);
|
H A D | ssh-dss.c | 130 char *ktype = NULL; local 142 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 147 if (strcmp("ssh-dss", ktype) != 0) { 202 free(ktype);
|
H A D | ssh-xmss.c | 120 char *ktype = NULL; local 140 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 143 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { 189 free(ktype);
|
H A D | ssh_api.c | 489 int ktype, r; local 506 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 509 if (k->key->type == ktype || 511 sshkey_type_plain(ktype))) {
|
H A D | hostfile.c | 666 char *line = NULL, ktype[128]; local 788 if (l <= 1 || l >= sizeof(ktype) || 791 memcpy(ktype, lineinfo.rawkey, l); 792 ktype[l] = '\0'; 793 lineinfo.keytype = sshkey_type_from_name(ktype); 800 strspn(ktype, "0123456789") == l)
|
H A D | ssh-keygen.c | 449 int r, rlen, ktype; local 486 ktype = KEY_DSA; 488 ktype = KEY_RSA; 494 if ((key = sshkey_new(ktype)) == NULL)
|
H A D | sshkey.c | 2013 char *ktype = NULL, *curve = NULL, *xmss_name = NULL; local 2035 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 2040 type = sshkey_type_from_name(ktype); 2133 key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype); 2246 free(ktype);
|
H A D | sshconnect2.c | 109 int ktype; local 134 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 137 sshkey_type_plain(ktype), NULL))
|
/freebsd-13-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 332 const char *ktype = NULL; local 346 ktype = "Private-Key"; 348 ktype = "Public-Key"; 350 ktype = "DSA-Parameters"; 355 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
|
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 229 ktype, int32_t stype, int32_t
|
/freebsd-13-stable/contrib/apr-util/include/ |
H A D | apr_crypto.h | 162 apr_crypto_key_type ktype; member in struct:apr_crypto_key_rec_t
|
/freebsd-13-stable/sys/compat/linuxkpi/common/src/ |
H A D | linux_compat.c | 199 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { 201 t = kobj->ktype; 238 if (kobj->ktype && kobj->ktype->release) 239 kobj->ktype->release(kobj); 391 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, argument 397 kobject_init(kobj, ktype); 398 kobj->ktype = ktype; [all...] |
/freebsd-13-stable/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 270 const char *ktype = NULL; local 290 ktype = "DH Private-Key"; 292 ktype = "DH Public-Key"; 294 ktype = "DH Parameters"; 297 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
/freebsd-13-stable/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 359 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) argument 372 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { 378 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { 384 if (ktype == EC_KEY_PRINT_PRIVATE) 386 else if (ktype == EC_KEY_PRINT_PUBLIC)
|
/freebsd-13-stable/contrib/bearssl/test/ |
H A D | test_x509.c | 1220 char *ktype, *kusage, *sstatus, *shashes, *stime; local 1222 ktype = get_value(objtype, objdata, linenum, "keytype"); 1231 if (eqstring(ktype, "RSA")) { 1233 } else if (eqstring(ktype, "EC")) { 1238 ktype, linenum);
|
/freebsd-13-stable/contrib/apr-util/crypto/ |
H A D | apr_crypto_commoncrypto.c | 400 switch (rec->ktype) {
|
H A D | apr_crypto_openssl.c | 480 switch (rec->ktype) {
|
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | val_secalgo.c | 918 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument 933 key->keyType = ktype;
|
/freebsd-13-stable/contrib/apr-util/test/ |
H A D | testcrypto.c | 128 rec->ktype = APR_CRYPTO_KTYPE_SECRET; 233 rec->ktype = APR_CRYPTO_KTYPE_PASSPHRASE;
|