Searched refs:ktype (Results 1 - 25 of 27) sorted by relevance

12

/freebsd-13-stable/crypto/openssh/regress/
H A Dcert-hostkey.sh84 for ktype in $PLAIN_TYPES ; do
85 verbose "$tid: sign host ${ktype} cert"
87 ${SSHKEYGEN} -q -N '' -t ${ktype} \
88 -f $OBJ/cert_host_key_${ktype} || \
89 fatal "ssh-keygen of cert_host_key_${ktype} failed"
91 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
92 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
93 case $ktype in
94 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;;
99 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
[all...]
H A Dcert-userkey.sh18 case $ktype in
19 rsa-sha2-*) n="$ktype" ;;
31 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do
32 verbose "$tid: sign user ${ktype} cert"
33 ${SSHKEYGEN} -q -N '' -t ${ktype} \
34 -f $OBJ/cert_user_key_${ktype} || \
35 fatal "ssh-keygen of cert_user_key_${ktype} failed"
37 case $ktype in
38 rsa-sha2-*) tflag="-t $ktype" ;;
43 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
[all...]
/freebsd-13-stable/contrib/ntp/libntp/
H A Da_md5encrypt.c44 int ktype,
61 if (ktype == NID_cmac) {
106 OBJ_nid2sn(ktype));
116 if (!EVP_DigestInit_ex(ctx, EVP_get_digestbynid(ktype), NULL)) {
118 OBJ_nid2sn(ktype));
123 OBJ_nid2sn(ktype));
128 OBJ_nid2sn(ktype));
133 OBJ_nid2sn(ktype));
138 OBJ_nid2sn(ktype));
150 if (ktype
42 make_mac( const rwbuffT * digest, int ktype, const robuffT * key, const robuffT * msg) argument
[all...]
/freebsd-13-stable/sys/compat/linuxkpi/common/include/linux/
H A Dkobject.h58 const struct kobj_type *ktype; member in struct:kobject
80 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) argument
85 kobj->ktype = ktype;
153 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
H A Dsysfs.h91 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL)
96 ops = kobj->ktype->sysfs_ops;
/freebsd-13-stable/crypto/openssh/
H A Dssh-ecdsa.c125 char *ktype = NULL; local
139 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
144 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
198 free(ktype);
H A Dssh-ed25519.c100 char *ktype = NULL; local
116 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
119 if (strcmp("ssh-ed25519", ktype) != 0) {
165 free(ktype);
H A Dssh-dss.c130 char *ktype = NULL; local
142 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
147 if (strcmp("ssh-dss", ktype) != 0) {
202 free(ktype);
H A Dssh-xmss.c120 char *ktype = NULL; local
140 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
143 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) {
189 free(ktype);
H A Dssh_api.c489 int ktype, r; local
506 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
509 if (k->key->type == ktype ||
511 sshkey_type_plain(ktype))) {
H A Dhostfile.c666 char *line = NULL, ktype[128]; local
788 if (l <= 1 || l >= sizeof(ktype) ||
791 memcpy(ktype, lineinfo.rawkey, l);
792 ktype[l] = '\0';
793 lineinfo.keytype = sshkey_type_from_name(ktype);
800 strspn(ktype, "0123456789") == l)
H A Dssh-keygen.c449 int r, rlen, ktype; local
486 ktype = KEY_DSA;
488 ktype = KEY_RSA;
494 if ((key = sshkey_new(ktype)) == NULL)
H A Dsshkey.c2013 char *ktype = NULL, *curve = NULL, *xmss_name = NULL; local
2035 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
2040 type = sshkey_type_from_name(ktype);
2133 key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype);
2246 free(ktype);
H A Dsshconnect2.c109 int ktype; local
134 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
137 sshkey_type_plain(ktype), NULL))
/freebsd-13-stable/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c332 const char *ktype = NULL; local
346 ktype = "Private-Key";
348 ktype = "Public-Key";
350 ktype = "DSA-Parameters";
355 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
/freebsd-13-stable/crypto/heimdal/lib/kadm5/
H A Dadmin.h229 ktype, int32_t stype, int32_t
/freebsd-13-stable/contrib/apr-util/include/
H A Dapr_crypto.h162 apr_crypto_key_type ktype; member in struct:apr_crypto_key_rec_t
/freebsd-13-stable/sys/compat/linuxkpi/common/src/
H A Dlinux_compat.c199 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) {
201 t = kobj->ktype;
238 if (kobj->ktype && kobj->ktype->release)
239 kobj->ktype->release(kobj);
391 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, argument
397 kobject_init(kobj, ktype);
398 kobj->ktype = ktype;
[all...]
/freebsd-13-stable/crypto/openssl/crypto/dh/
H A Ddh_ameth.c270 const char *ktype = NULL; local
290 ktype = "DH Private-Key";
292 ktype = "DH Public-Key";
294 ktype = "DH Parameters";
297 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
/freebsd-13-stable/crypto/openssl/crypto/ec/
H A Dec_ameth.c359 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) argument
372 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) {
378 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) {
384 if (ktype == EC_KEY_PRINT_PRIVATE)
386 else if (ktype == EC_KEY_PRINT_PUBLIC)
/freebsd-13-stable/contrib/bearssl/test/
H A Dtest_x509.c1220 char *ktype, *kusage, *sstatus, *shashes, *stime; local
1222 ktype = get_value(objtype, objdata, linenum, "keytype");
1231 if (eqstring(ktype, "RSA")) {
1233 } else if (eqstring(ktype, "EC")) {
1238 ktype, linenum);
/freebsd-13-stable/contrib/apr-util/crypto/
H A Dapr_crypto_commoncrypto.c400 switch (rec->ktype) {
H A Dapr_crypto_openssl.c480 switch (rec->ktype) {
/freebsd-13-stable/contrib/unbound/validator/
H A Dval_secalgo.c918 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument
933 key->keyType = ktype;
/freebsd-13-stable/contrib/apr-util/test/
H A Dtestcrypto.c128 rec->ktype = APR_CRYPTO_KTYPE_SECRET;
233 rec->ktype = APR_CRYPTO_KTYPE_PASSPHRASE;

Completed in 379 milliseconds

12