/freebsd-current/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 88 for ktype in $PLAIN_TYPES ; do 89 verbose "$tid: sign host ${ktype} cert" 91 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 92 -f $OBJ/cert_host_key_${ktype} || \ 93 fatal "ssh-keygen of cert_host_key_${ktype} failed" 95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 97 case $ktype in 98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;; 103 -n $HOSTS $OBJ/cert_host_key_${ktype} || [all...] |
H A D | cert-userkey.sh | 44 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do 45 verbose "$tid: sign user ${ktype} cert" 46 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 47 -f $OBJ/cert_user_key_${ktype} || \ 48 fatal "ssh-keygen of cert_user_key_${ktype} failed" 50 case $ktype in 51 rsa-sha2-*) tflag="-t $ktype" ;; 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 57 fatal "couldn't sign cert_user_key_${ktype}" 61 for ktype i [all...] |
/freebsd-current/sys/compat/linuxkpi/common/src/ |
H A D | linux_kobject.c | 119 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { 121 t = kobj->ktype; 156 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, argument 162 kobject_init(kobj, ktype); 163 kobj->ktype = ktype; 185 if (kobj->ktype && kobj->ktype->release) 186 kobj->ktype [all...] |
H A D | linux_compat.c | 692 if (ldev->kobj.ktype == &linux_cdev_static_ktype) { 717 if (ldev->kobj.ktype == &linux_cdev_static_ktype) { 720 MPASS(ldev->kobj.ktype == &linux_cdev_ktype); 2219 ldev->kobj.ktype == &linux_cdev_ktype) 2295 MPASS(ldev->kobj.ktype == &linux_cdev_ktype);
|
/freebsd-current/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 76 int ktype, 94 if (ktype == NID_cmac) { 137 ctx = get_md_ctx(ktype); 143 OBJ_nid2sn(ktype)); 148 OBJ_nid2sn(ktype)); 153 OBJ_nid2sn(ktype)); 158 OBJ_nid2sn(ktype)); 167 if (NID_md5 == ktype) { 170 ctx = get_md_ctx(ktype); 181 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype); 74 make_mac( const rwbuffT * digest, int ktype, const robuffT * key, const robuffT * msg ) argument [all...] |
/freebsd-current/crypto/openssh/ |
H A D | ssh-ed25519-sk.c | 99 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument 104 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 112 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument 117 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 132 char *ktype = NULL; local 157 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 172 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 247 free(ktype);
|
H A D | ssh-ecdsa.c | 157 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, argument 163 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) 200 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, argument 207 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) 303 char *ktype = NULL; local 317 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 322 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 374 free(ktype);
|
H A D | ssh-ed25519.c | 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, argument 121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, argument 211 char *ktype = NULL; local 227 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 230 if (strcmp("ssh-ed25519", ktype) != 0) { 271 free(ktype);
|
H A D | ssh-ecdsa-sk.c | 128 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument 133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) 141 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument 147 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, 247 char *ktype = NULL, *webauthn_origin = NULL; local 270 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 274 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) 276 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { 412 free(ktype);
|
H A D | ssh-xmss.c | 132 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, argument 164 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, argument 283 char *ktype = NULL; local 303 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 306 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { 347 free(ktype);
|
H A D | ssh-dss.c | 201 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, argument 238 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, argument 245 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0) 340 char *ktype = NULL; local 352 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 357 if (strcmp("ssh-dss", ktype) != 0) { 412 free(ktype);
|
H A D | ssh_api.c | 528 int ktype, r; local 545 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 548 if (k->key->type == ktype || 550 sshkey_type_plain(ktype))) {
|
H A D | hostfile.c | 763 char *line = NULL, ktype[128]; local 882 if (l <= 1 || l >= sizeof(ktype) || 885 memcpy(ktype, lineinfo.rawkey, l); 886 ktype[l] = '\0'; 887 lineinfo.keytype = sshkey_type_from_name(ktype); 894 strspn(ktype, "0123456789") == l)
|
H A D | ssh-rsa.c | 186 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, argument 216 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b, argument
|
H A D | sshkey.c | 298 int ktype; local 301 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) 303 else if (ktype == KEY_RSA) { 307 } else if (ktype == KEY_RSA_CERT) { 1901 char *ktype = NULL; local 1915 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 1920 type = sshkey_type_from_name(ktype); 1940 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0) 1959 free(ktype);
|
H A D | sshconnect2.c | 129 int ktype; local 180 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 186 if (sshkey_type_is_cert(ktype) && 193 sshkey_type_plain(ktype),
|
/freebsd-current/sys/compat/linuxkpi/common/include/linux/ |
H A D | kobject.h | 61 const struct kobj_type *ktype; member in struct:kobject 97 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) argument 102 kobj->ktype = ktype; 158 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
|
H A D | sysfs.h | 94 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) 99 ops = kobj->ktype->sysfs_ops;
|
/freebsd-current/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 275 const char *ktype = NULL; local 293 ktype = "Private-Key"; 295 ktype = "Public-Key"; 297 ktype = "DSA-Parameters"; 302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
|
/freebsd-current/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 247 const char *ktype = NULL; local 267 ktype = "DH Private-Key"; 269 ktype = "DH Public-Key"; 271 ktype = "DH Parameters"; 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
|
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) argument 296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { 302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { 308 if (ktype == EC_KEY_PRINT_PRIVATE) 310 else if (ktype == EC_KEY_PRINT_PUBLIC)
|
/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 229 ktype, int32_t stype, int32_t
|
/freebsd-current/sys/ofed/drivers/infiniband/core/ |
H A D | core_priv.h | 144 struct kobject *kobj, struct kobj_type *ktype,
|
/freebsd-current/contrib/bearssl/test/ |
H A D | test_x509.c | 1220 char *ktype, *kusage, *sstatus, *shashes, *stime; local 1222 ktype = get_value(objtype, objdata, linenum, "keytype"); 1231 if (eqstring(ktype, "RSA")) { 1233 } else if (eqstring(ktype, "EC")) { 1238 ktype, linenum);
|
/freebsd-current/contrib/unbound/validator/ |
H A D | val_secalgo.c | 1038 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument 1053 key->keyType = ktype;
|