Searched refs:keytype (Results 1 - 25 of 123) sorted by relevance

12345

/macosx-10.10/ntp-92/libntp/
H A Dauthusekey.c21 int keytype,
33 MD5auth_setkey(keyno, keytype, str, (int)strlen((const char *)str));
19 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
H A Dauthreadkeys.c76 int keytype; local
124 * Next is keytype. See if that is all right.
139 keytype = keytype_from_text(token, NULL);
140 if (keytype == 0) {
145 if (EVP_get_digestbynid(keytype) == NULL) {
161 keytype = KEY_TYPE_MD5;
178 MD5auth_setkey(keyno, keytype, (u_char *)token, len);
199 MD5auth_setkey(keyno, keytype, keystr, jlim / 2);
/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkey.h103 #define OSSL_PKEY_BN(keytype, name) \
108 static VALUE ossl_##keytype##_get_##name(VALUE self) \
114 bn = pkey->pkey.keytype->name; \
123 static VALUE ossl_##keytype##_set_##name(VALUE self, VALUE bignum) \
130 BN_clear_free(pkey->pkey.keytype->name); \
131 pkey->pkey.keytype->name = NULL; \
136 if (pkey->pkey.keytype->name == NULL) \
137 pkey->pkey.keytype->name = BN_new(); \
138 if (pkey->pkey.keytype->name == NULL) \
140 if (BN_copy(pkey->pkey.keytype
[all...]
H A Dossl_pkcs12.c53 * PKCS12.create(pass, name, key, cert [, ca, [, key_pbe [, cert_pbe [, key_iter [, mac_iter [, keytype]]]]]])
67 * * +keytype+ - An integer representing an MSIE specific extension.
76 VALUE pass, name, pkey, cert, ca, key_nid, cert_nid, key_iter, mac_iter, keytype; local
85 rb_scan_args(argc, argv, "46", &pass, &name, &pkey, &cert, &ca, &key_nid, &cert_nid, &key_iter, &mac_iter, &keytype);
104 if (!NIL_P(keytype))
105 ktype = NUM2INT(keytype);
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dmk_req_ext.c83 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
92 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
93 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
94 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
95 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
129 ac->keyblock->keytype,
139 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
H A Dgenerate_subkey.c64 etype = key->keytype; /* use session key etype */
H A Dkeyblock.c47 keyblock->keytype = 0;
68 keyblock->keytype = KRB5_ENCTYPE_NULL;
161 return block->keytype;
201 key->keytype = type;
H A Dsalt-aes.c70 kd.key->keytype = enctype;
71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
80 et->keytype->size, kd.key->keyvalue.data);
H A Dmk_req.c62 if (auth_context && *auth_context && (*auth_context)->keytype)
63 this_cred.session.keytype = (*auth_context)->keytype;
H A Ddeprecated.c67 krb5_keytype keytype,
75 if (keytype != KEYTYPE_DES || context->etypes_des == NULL)
76 return krb5_keytype_to_enctypes (context, keytype, len, val);
117 krb5_keytype keytype,
125 if(keys[i].type == keytype) {
133 "key type %d not supported", keytype);
155 krb5_keytype *keytype)
163 *keytype = keys[i].type;
168 *keytype = strtol(string, &end, 0);
169 if(*end == '\0' && *keytype !
[all...]
H A Dsalt.c53 for (st = e->keytype->string_to_key; st && st->type; st++) {
85 for (st = e->keytype->string_to_key; st && st->type; st++) {
199 for(st = et->keytype->string_to_key; st && st->type; st++)
264 keylen = et->keytype->bits / 8;
272 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
277 kd.key->keytype = etype;
H A Dauth_context.c61 p->keytype = KRB5_ENCTYPE_NULL;
353 (krb5_enctype)auth_context->keytype,
395 krb5_keytype keytype)
397 auth_context->keytype = keytype;
404 krb5_keytype *keytype)
406 *keytype = auth_context->keytype;
421 auth_context->keyblock->keytype = etype;
393 krb5_auth_con_setkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype keytype) argument
402 krb5_auth_con_getkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype *keytype) argument
H A Dcrypto.c92 *keysize = et->keytype->size;
105 *keybits = et->keytype->bits;
119 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
122 key->keytype = type;
123 if(et->keytype->random_key)
124 (*et->keytype->random_key)(context, key);
136 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype);
141 key->key->keytype);
144 kt = et->keytype;
396 (crypto->key.key->keytype
719 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument
2766 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dd2i_pr.c143 int keytype; local
155 keytype = EVP_PKEY_DSA;
157 keytype = EVP_PKEY_EC;
158 else keytype = EVP_PKEY_RSA;
160 return d2i_PrivateKey(keytype, a, pp, length);
/macosx-10.10/OpenSSL098-52/src/engines/vendor_defns/
H A Dsureware.h96 * out param keytype: 1 if RSA 2 if DSA
98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
111 * out param keytype: 1 if RSA 2 if DSA
114 char *keytype);
/macosx-10.10/WebCore-7600.1.25/html/
H A DHTMLKeygenElement.idl36 [Reflect] attribute DOMString keytype;
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dset_keys.c86 k->key.keytype = kd[kd_offset].key_data_type[0];
319 is_des_key_p(int keytype) argument
321 return keytype == ETYPE_DES_CBC_CRC ||
322 keytype == ETYPE_DES_CBC_MD4 ||
323 keytype == ETYPE_DES_CBC_MD5;
368 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) {
374 kblock[i].keytype = keys[i].key.keytype;
377 keys[i].key.keytype,
382 if (is_des_key_p(keys[i].key.keytype))
[all...]
H A Ddefault_keys.c50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str);
53 (int)keys[i].key.keytype);
H A Dkeys.c92 if (keys1[i].key.keytype != keys2[j].key.keytype)
/macosx-10.10/Heimdal-398.1.2/admin/
H A Dcopy.c42 if(a->keytype != b->keytype ||
109 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str);
119 krb5_warnx(context, "skipping %s, keytype %s, kvno %d",
130 entry.keyblock.keytype,
138 "already exists for %s, keytype %s, kvno %d",
155 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
H A Dremove.c82 entry.keyblock.keytype = enctype;
/macosx-10.10/Heimdal-398.1.2/kuser/
H A Dkdecode_ticket.c140 in.session.keytype = enctype;
157 out->session.keytype);
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dinquire_sec_context_by_oid.c102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum
108 enum keytype keytype,
127 switch(keytype) {
142 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype);
296 is_updated = (acceptor_subkey->keytype !=
297 context_handle->auth_context->keyblock->keytype);
364 switch (key->keytype) {
104 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
/macosx-10.10/OpenSSH-189/openssh/regress/
H A Dkrl.sh56 # Vary the keytype. We use mostly ECDSA since this is fastest by far.
57 keytype=$ECDSA
59 2 | 10 | 510 | 1001) keytype=rsa;;
60 4 | 30 | 520 | 1002) keytype=dsa;;
62 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
/macosx-10.10/Heimdal-398.1.2/lib/kafs/
H A Dafskrb5.c166 in_creds.session.keytype = ETYPE_DES_CBC_CRC;
169 invalid = krb5_enctype_valid(d->context, in_creds.session.keytype);
171 krb5_enctype_enable(d->context, in_creds.session.keytype);
175 in_creds.session.keytype = ETYPE_DES_CBC_MD5;
180 krb5_enctype_disable(d->context, in_creds.session.keytype);

Completed in 166 milliseconds

12345