Searched refs:ktype (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-current/crypto/openssh/regress/
H A Dcert-hostkey.sh88 for ktype in $PLAIN_TYPES ; do
89 verbose "$tid: sign host ${ktype} cert"
91 ${SSHKEYGEN} -q -N '' -t ${ktype} \
92 -f $OBJ/cert_host_key_${ktype} || \
93 fatal "ssh-keygen of cert_host_key_${ktype} failed"
95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
97 case $ktype in
98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;;
103 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
[all...]
H A Dcert-userkey.sh44 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do
45 verbose "$tid: sign user ${ktype} cert"
46 ${SSHKEYGEN} -q -N '' -t ${ktype} \
47 -f $OBJ/cert_user_key_${ktype} || \
48 fatal "ssh-keygen of cert_user_key_${ktype} failed"
50 case $ktype in
51 rsa-sha2-*) tflag="-t $ktype" ;;
56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
57 fatal "couldn't sign cert_user_key_${ktype}"
61 for ktype i
[all...]
/freebsd-current/sys/compat/linuxkpi/common/src/
H A Dlinux_kobject.c119 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) {
121 t = kobj->ktype;
156 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, argument
162 kobject_init(kobj, ktype);
163 kobj->ktype = ktype;
185 if (kobj->ktype && kobj->ktype->release)
186 kobj->ktype
[all...]
H A Dlinux_compat.c692 if (ldev->kobj.ktype == &linux_cdev_static_ktype) {
717 if (ldev->kobj.ktype == &linux_cdev_static_ktype) {
720 MPASS(ldev->kobj.ktype == &linux_cdev_ktype);
2219 ldev->kobj.ktype == &linux_cdev_ktype)
2295 MPASS(ldev->kobj.ktype == &linux_cdev_ktype);
/freebsd-current/contrib/ntp/libntp/
H A Da_md5encrypt.c76 int ktype,
94 if (ktype == NID_cmac) {
137 ctx = get_md_ctx(ktype);
143 OBJ_nid2sn(ktype));
148 OBJ_nid2sn(ktype));
153 OBJ_nid2sn(ktype));
158 OBJ_nid2sn(ktype));
167 if (NID_md5 == ktype) {
170 ctx = get_md_ctx(ktype);
181 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype);
74 make_mac( const rwbuffT * digest, int ktype, const robuffT * key, const robuffT * msg ) argument
[all...]
/freebsd-current/crypto/openssh/
H A Dssh-ed25519-sk.c99 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument
104 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
112 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument
117 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
132 char *ktype = NULL; local
157 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
172 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
247 free(ktype);
H A Dssh-ecdsa.c157 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, argument
163 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1)
200 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, argument
207 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0)
303 char *ktype = NULL; local
317 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
322 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
374 free(ktype);
H A Dssh-ed25519.c103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, argument
121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, argument
211 char *ktype = NULL; local
227 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
230 if (strcmp("ssh-ed25519", ktype) != 0) {
271 free(ktype);
H A Dssh-ecdsa-sk.c128 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument
133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0)
141 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument
147 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype,
247 char *ktype = NULL, *webauthn_origin = NULL; local
270 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
274 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0)
276 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) {
412 free(ktype);
H A Dssh-xmss.c132 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, argument
164 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, argument
283 char *ktype = NULL; local
303 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
306 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) {
347 free(ktype);
H A Dssh-dss.c201 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, argument
238 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, argument
245 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0)
340 char *ktype = NULL; local
352 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
357 if (strcmp("ssh-dss", ktype) != 0) {
412 free(ktype);
H A Dssh_api.c528 int ktype, r; local
545 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
548 if (k->key->type == ktype ||
550 sshkey_type_plain(ktype))) {
H A Dhostfile.c763 char *line = NULL, ktype[128]; local
882 if (l <= 1 || l >= sizeof(ktype) ||
885 memcpy(ktype, lineinfo.rawkey, l);
886 ktype[l] = '\0';
887 lineinfo.keytype = sshkey_type_from_name(ktype);
894 strspn(ktype, "0123456789") == l)
H A Dssh-rsa.c186 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, argument
216 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b, argument
H A Dsshkey.c298 int ktype; local
301 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
303 else if (ktype == KEY_RSA) {
307 } else if (ktype == KEY_RSA_CERT) {
1901 char *ktype = NULL; local
1915 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
1920 type = sshkey_type_from_name(ktype);
1940 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0)
1959 free(ktype);
H A Dsshconnect2.c129 int ktype; local
180 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
186 if (sshkey_type_is_cert(ktype) &&
193 sshkey_type_plain(ktype),
/freebsd-current/sys/compat/linuxkpi/common/include/linux/
H A Dkobject.h61 const struct kobj_type *ktype; member in struct:kobject
97 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) argument
102 kobj->ktype = ktype;
158 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
H A Dsysfs.h94 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL)
99 ops = kobj->ktype->sysfs_ops;
/freebsd-current/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c275 const char *ktype = NULL; local
293 ktype = "Private-Key";
295 ktype = "Public-Key";
297 ktype = "DSA-Parameters";
302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
/freebsd-current/crypto/openssl/crypto/dh/
H A Ddh_ameth.c247 const char *ktype = NULL; local
267 ktype = "DH Private-Key";
269 ktype = "DH Public-Key";
271 ktype = "DH Parameters";
274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
/freebsd-current/crypto/openssl/crypto/ec/
H A Dec_ameth.c283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) argument
296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) {
302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) {
308 if (ktype == EC_KEY_PRINT_PRIVATE)
310 else if (ktype == EC_KEY_PRINT_PUBLIC)
/freebsd-current/crypto/heimdal/lib/kadm5/
H A Dadmin.h229 ktype, int32_t stype, int32_t
/freebsd-current/sys/ofed/drivers/infiniband/core/
H A Dcore_priv.h144 struct kobject *kobj, struct kobj_type *ktype,
/freebsd-current/contrib/bearssl/test/
H A Dtest_x509.c1220 char *ktype, *kusage, *sstatus, *shashes, *stime; local
1222 ktype = get_value(objtype, objdata, linenum, "keytype");
1231 if (eqstring(ktype, "RSA")) {
1233 } else if (eqstring(ktype, "EC")) {
1238 ktype, linenum);
/freebsd-current/contrib/unbound/validator/
H A Dval_secalgo.c1038 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument
1053 key->keyType = ktype;

Completed in 444 milliseconds

12