Searched refs:keytype (Results 1 - 25 of 92) sorted by relevance

1234

/freebsd-9.3-release/contrib/ntp/libntp/
H A Dauthusekey.c22 int keytype,
32 MD5auth_setkey(keyno, keytype, str, len, NULL);
20 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
H A Dauthreadkeys.c92 u_short keytype; /* stored key type */ member in struct:keydata
143 int keytype; local
194 * Next is keytype. See if that is all right.
218 keytype = keytype_from_text(token, NULL);
219 if (keytype == 0) {
223 } else if (EVP_get_digestbynid(keytype) == NULL) {
227 keytype = 0;
238 keytype = 0;
240 keytype = KEY_TYPE_MD5;
262 next->keytype
[all...]
H A Dssl_init.c74 * Used by ntpd authreadkeys(), ntpq and ntpdc keytype()
144 * Used by ntpq and ntpdc keytype()
183 int keytype
189 "%.64s Password: ", keytype_name(keytype));
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dgenerate_subkey.c43 return krb5_generate_subkey_extended(context, key, key->keytype, subkey);
61 etype = key->keytype; /* use session key etype */
H A Dmk_req_ext.c84 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
93 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
94 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
95 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
96 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
130 ac->keyblock->keytype,
141 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
H A Dkeyblock.c41 keyblock->keytype = 0;
53 keyblock->keytype = ENCTYPE_NULL;
94 return block->keytype;
130 key->keytype = type;
H A Dmk_req.c64 if (auth_context && *auth_context && (*auth_context)->keytype)
65 this_cred.session.keytype = (*auth_context)->keytype;
H A Dconvert_creds.c170 krb5_keytype keytype; local
172 keytype = v5_creds->session.keytype;
174 if (keytype != ENCTYPE_DES_CBC_CRC) {
180 template.session.keytype = ENCTYPE_DES_CBC_CRC;
H A Dauth_context.c63 p->keytype = KEYTYPE_NULL;
328 auth_context->keytype,
370 krb5_keytype keytype)
372 auth_context->keytype = keytype;
379 krb5_keytype *keytype)
381 *keytype = auth_context->keytype;
396 auth_context->keyblock->keytype = etype;
368 krb5_auth_con_setkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype keytype) argument
377 krb5_auth_con_getkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype *keytype) argument
/freebsd-9.3-release/crypto/openssl/crypto/asn1/
H A Dd2i_pr.c147 int keytype; local
162 keytype = EVP_PKEY_DSA;
164 keytype = EVP_PKEY_EC;
166 keytype = EVP_PKEY_RSA;
168 return d2i_PrivateKey(keytype, a, pp, length);
/freebsd-9.3-release/contrib/ntp/tests/libntp/
H A Da_md5encrypt.c18 const int keytype = KEY_TYPE_MD5; variable
57 length = MD5authencrypt(keytype, key, packetPtr, packetLength);
59 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, packetPtr, packetLength, length));
70 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, expectedPacket.u32, packetLength, 20));
76 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, invalidPacket.u32, packetLength, 20));
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dset_keys.c99 keys[i].key.keytype = key_data[i].key_data_type[0];
183 is_des_key_p(int keytype) argument
185 return keytype == ETYPE_DES_CBC_CRC ||
186 keytype == ETYPE_DES_CBC_MD4 ||
187 keytype == ETYPE_DES_CBC_MD5;
229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) {
235 kblock[i].keytype = keys[i].key.keytype;
238 keys[i].key.keytype,
243 if (is_des_key_p(keys[i].key.keytype))
[all...]
H A Ddefault_keys.c50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str);
53 (int)keys[i].key.keytype);
H A Dkeys.c91 if (keys1[i].key.keytype != keys2[i].key.keytype)
/freebsd-9.3-release/crypto/openssl/engines/vendor_defns/
H A Dsureware.h97 * out param keytype: 1 if RSA 2 if DSA
101 char *keytype);
114 * out param keytype: 1 if RSA 2 if DSA
117 unsigned long *num, char *keytype);
/freebsd-9.3-release/crypto/heimdal/admin/
H A Dcopy.c42 if(a->keytype != b->keytype ||
88 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str);
96 entry.keyblock.keytype,
104 "already exists for %s, keytype %s, kvno %d",
121 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
H A Dlist.c97 entry.keyblock.keytype, &s);
99 snprintf(buf, sizeof(buf), "unknown (%d)", entry.keyblock.keytype);
H A Dremove.c82 entry.keyblock.keytype = enctype;
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/krb5/
H A Dinquire_sec_context_by_oid.c104 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum
110 enum keytype keytype,
129 switch(keytype) {
140 _gsskrb5_set_status("%d is not a valid subkey type", keytype);
148 _gsskrb5_set_status("have no subkey of type %d", keytype);
255 is_updated = (acceptor_subkey->keytype !=
256 context_handle->auth_context->keyblock->keytype);
319 switch (key->keytype) {
106 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
H A Dwrap.c152 krb5_keytype keytype; local
164 krb5_enctype_to_keytype (context, key->keytype, &keytype);
166 switch (keytype) {
512 krb5_keytype keytype; local
524 krb5_enctype_to_keytype (context, key->keytype, &keytype);
526 switch (keytype) {
H A Dget_mic.c283 krb5_keytype keytype; local
294 krb5_enctype_to_keytype (context, key->keytype, &keytype);
296 switch (keytype) {
H A Dverify_mic.c279 krb5_keytype keytype; local
289 krb5_enctype_to_keytype (context, key->keytype, &keytype);
290 switch (keytype) {
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dstring2key.c56 { "keytype", 'k', arg_string, &keytype_str, "Keytype" },
129 krb5_keytype keytype; local
133 ret = krb5_string_to_keytype(context, keytype_str, &keytype);
136 ret = krb5_keytype_to_enctypes(context, keytype, &num, &etypes);
140 krb5_errx(context, 1, "there are no encryption types for that keytype");
145 krb5_warnx(context, "ambiguous keytype, using %s", keytype_str);
156 "DES is the only valid keytype for AFS and Kerberos 4");
/freebsd-9.3-release/crypto/heimdal/kuser/
H A Dkdecode_ticket.c141 in.session.keytype = enctype;
158 out->session.keytype);
/freebsd-9.3-release/crypto/openssh/regress/
H A Dkrl.sh52 # Vary the keytype. We use mostly ECDSA since this is fastest by far.
53 keytype=$ECDSA
55 2 | 10 | 510 | 1001) keytype=rsa;;
56 4 | 30 | 520 | 1002) keytype=dsa;;
58 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \

Completed in 226 milliseconds

1234