/freebsd-9.3-release/contrib/ntp/libntp/ |
H A D | authusekey.c | 22 int keytype, 32 MD5auth_setkey(keyno, keytype, str, len, NULL); 20 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
|
H A D | authreadkeys.c | 92 u_short keytype; /* stored key type */ member in struct:keydata 143 int keytype; local 194 * Next is keytype. See if that is all right. 218 keytype = keytype_from_text(token, NULL); 219 if (keytype == 0) { 223 } else if (EVP_get_digestbynid(keytype) == NULL) { 227 keytype = 0; 238 keytype = 0; 240 keytype = KEY_TYPE_MD5; 262 next->keytype [all...] |
H A D | ssl_init.c | 74 * Used by ntpd authreadkeys(), ntpq and ntpdc keytype() 144 * Used by ntpq and ntpdc keytype() 183 int keytype 189 "%.64s Password: ", keytype_name(keytype));
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | generate_subkey.c | 43 return krb5_generate_subkey_extended(context, key, key->keytype, subkey); 61 etype = key->keytype; /* use session key etype */
|
H A D | mk_req_ext.c | 84 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { 93 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || 94 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || 95 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || 96 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { 130 ac->keyblock->keytype, 141 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
|
H A D | keyblock.c | 41 keyblock->keytype = 0; 53 keyblock->keytype = ENCTYPE_NULL; 94 return block->keytype; 130 key->keytype = type;
|
H A D | mk_req.c | 64 if (auth_context && *auth_context && (*auth_context)->keytype) 65 this_cred.session.keytype = (*auth_context)->keytype;
|
H A D | convert_creds.c | 170 krb5_keytype keytype; local 172 keytype = v5_creds->session.keytype; 174 if (keytype != ENCTYPE_DES_CBC_CRC) { 180 template.session.keytype = ENCTYPE_DES_CBC_CRC;
|
H A D | auth_context.c | 63 p->keytype = KEYTYPE_NULL; 328 auth_context->keytype, 370 krb5_keytype keytype) 372 auth_context->keytype = keytype; 379 krb5_keytype *keytype) 381 *keytype = auth_context->keytype; 396 auth_context->keyblock->keytype = etype; 368 krb5_auth_con_setkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype keytype) argument 377 krb5_auth_con_getkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype *keytype) argument
|
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 147 int keytype; local 162 keytype = EVP_PKEY_DSA; 164 keytype = EVP_PKEY_EC; 166 keytype = EVP_PKEY_RSA; 168 return d2i_PrivateKey(keytype, a, pp, length);
|
/freebsd-9.3-release/contrib/ntp/tests/libntp/ |
H A D | a_md5encrypt.c | 18 const int keytype = KEY_TYPE_MD5; variable 57 length = MD5authencrypt(keytype, key, packetPtr, packetLength); 59 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, packetPtr, packetLength, length)); 70 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, expectedPacket.u32, packetLength, 20)); 76 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, invalidPacket.u32, packetLength, 20));
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 99 keys[i].key.keytype = key_data[i].key_data_type[0]; 183 is_des_key_p(int keytype) argument 185 return keytype == ETYPE_DES_CBC_CRC || 186 keytype == ETYPE_DES_CBC_MD4 || 187 keytype == ETYPE_DES_CBC_MD5; 229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { 235 kblock[i].keytype = keys[i].key.keytype; 238 keys[i].key.keytype, 243 if (is_des_key_p(keys[i].key.keytype)) [all...] |
H A D | default_keys.c | 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 53 (int)keys[i].key.keytype);
|
H A D | keys.c | 91 if (keys1[i].key.keytype != keys2[i].key.keytype)
|
/freebsd-9.3-release/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 97 * out param keytype: 1 if RSA 2 if DSA 101 char *keytype); 114 * out param keytype: 1 if RSA 2 if DSA 117 unsigned long *num, char *keytype);
|
/freebsd-9.3-release/crypto/heimdal/admin/ |
H A D | copy.c | 42 if(a->keytype != b->keytype || 88 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); 96 entry.keyblock.keytype, 104 "already exists for %s, keytype %s, kvno %d", 121 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
|
H A D | list.c | 97 entry.keyblock.keytype, &s); 99 snprintf(buf, sizeof(buf), "unknown (%d)", entry.keyblock.keytype);
|
H A D | remove.c | 82 entry.keyblock.keytype = enctype;
|
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | inquire_sec_context_by_oid.c | 104 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 110 enum keytype keytype, 129 switch(keytype) { 140 _gsskrb5_set_status("%d is not a valid subkey type", keytype); 148 _gsskrb5_set_status("have no subkey of type %d", keytype); 255 is_updated = (acceptor_subkey->keytype != 256 context_handle->auth_context->keyblock->keytype); 319 switch (key->keytype) { 106 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
|
H A D | wrap.c | 152 krb5_keytype keytype; local 164 krb5_enctype_to_keytype (context, key->keytype, &keytype); 166 switch (keytype) { 512 krb5_keytype keytype; local 524 krb5_enctype_to_keytype (context, key->keytype, &keytype); 526 switch (keytype) {
|
H A D | get_mic.c | 283 krb5_keytype keytype; local 294 krb5_enctype_to_keytype (context, key->keytype, &keytype); 296 switch (keytype) {
|
H A D | verify_mic.c | 279 krb5_keytype keytype; local 289 krb5_enctype_to_keytype (context, key->keytype, &keytype); 290 switch (keytype) {
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | string2key.c | 56 { "keytype", 'k', arg_string, &keytype_str, "Keytype" }, 129 krb5_keytype keytype; local 133 ret = krb5_string_to_keytype(context, keytype_str, &keytype); 136 ret = krb5_keytype_to_enctypes(context, keytype, &num, &etypes); 140 krb5_errx(context, 1, "there are no encryption types for that keytype"); 145 krb5_warnx(context, "ambiguous keytype, using %s", keytype_str); 156 "DES is the only valid keytype for AFS and Kerberos 4");
|
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | kdecode_ticket.c | 141 in.session.keytype = enctype; 158 out->session.keytype);
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | krl.sh | 52 # Vary the keytype. We use mostly ECDSA since this is fastest by far. 53 keytype=$ECDSA 55 2 | 10 | 510 | 1001) keytype=rsa;; 56 4 | 30 | 520 | 1002) keytype=dsa;; 58 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
|