/macosx-10.10/ntp-92/libntp/ |
H A D | authusekey.c | 21 int keytype, 33 MD5auth_setkey(keyno, keytype, str, (int)strlen((const char *)str)); 19 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
|
H A D | authreadkeys.c | 76 int keytype; local 124 * Next is keytype. See if that is all right. 139 keytype = keytype_from_text(token, NULL); 140 if (keytype == 0) { 145 if (EVP_get_digestbynid(keytype) == NULL) { 161 keytype = KEY_TYPE_MD5; 178 MD5auth_setkey(keyno, keytype, (u_char *)token, len); 199 MD5auth_setkey(keyno, keytype, keystr, jlim / 2);
|
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkey.h | 103 #define OSSL_PKEY_BN(keytype, name) \ 108 static VALUE ossl_##keytype##_get_##name(VALUE self) \ 114 bn = pkey->pkey.keytype->name; \ 123 static VALUE ossl_##keytype##_set_##name(VALUE self, VALUE bignum) \ 130 BN_clear_free(pkey->pkey.keytype->name); \ 131 pkey->pkey.keytype->name = NULL; \ 136 if (pkey->pkey.keytype->name == NULL) \ 137 pkey->pkey.keytype->name = BN_new(); \ 138 if (pkey->pkey.keytype->name == NULL) \ 140 if (BN_copy(pkey->pkey.keytype [all...] |
H A D | ossl_pkcs12.c | 53 * PKCS12.create(pass, name, key, cert [, ca, [, key_pbe [, cert_pbe [, key_iter [, mac_iter [, keytype]]]]]]) 67 * * +keytype+ - An integer representing an MSIE specific extension. 76 VALUE pass, name, pkey, cert, ca, key_nid, cert_nid, key_iter, mac_iter, keytype; local 85 rb_scan_args(argc, argv, "46", &pass, &name, &pkey, &cert, &ca, &key_nid, &cert_nid, &key_iter, &mac_iter, &keytype); 104 if (!NIL_P(keytype)) 105 ktype = NUM2INT(keytype);
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | mk_req_ext.c | 83 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { 92 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || 93 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || 94 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || 95 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { 129 ac->keyblock->keytype, 139 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
|
H A D | generate_subkey.c | 64 etype = key->keytype; /* use session key etype */
|
H A D | keyblock.c | 47 keyblock->keytype = 0; 68 keyblock->keytype = KRB5_ENCTYPE_NULL; 161 return block->keytype; 201 key->keytype = type;
|
H A D | salt-aes.c | 70 kd.key->keytype = enctype; 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 80 et->keytype->size, kd.key->keyvalue.data);
|
H A D | mk_req.c | 62 if (auth_context && *auth_context && (*auth_context)->keytype) 63 this_cred.session.keytype = (*auth_context)->keytype;
|
H A D | deprecated.c | 67 krb5_keytype keytype, 75 if (keytype != KEYTYPE_DES || context->etypes_des == NULL) 76 return krb5_keytype_to_enctypes (context, keytype, len, val); 117 krb5_keytype keytype, 125 if(keys[i].type == keytype) { 133 "key type %d not supported", keytype); 155 krb5_keytype *keytype) 163 *keytype = keys[i].type; 168 *keytype = strtol(string, &end, 0); 169 if(*end == '\0' && *keytype ! [all...] |
H A D | salt.c | 53 for (st = e->keytype->string_to_key; st && st->type; st++) { 85 for (st = e->keytype->string_to_key; st && st->type; st++) { 199 for(st = et->keytype->string_to_key; st && st->type; st++) 264 keylen = et->keytype->bits / 8; 272 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 277 kd.key->keytype = etype;
|
H A D | auth_context.c | 61 p->keytype = KRB5_ENCTYPE_NULL; 353 (krb5_enctype)auth_context->keytype, 395 krb5_keytype keytype) 397 auth_context->keytype = keytype; 404 krb5_keytype *keytype) 406 *keytype = auth_context->keytype; 421 auth_context->keyblock->keytype = etype; 393 krb5_auth_con_setkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype keytype) argument 402 krb5_auth_con_getkeytype(krb5_context context, krb5_auth_context auth_context, krb5_keytype *keytype) argument
|
H A D | crypto.c | 92 *keysize = et->keytype->size; 105 *keybits = et->keytype->bits; 119 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); 122 key->keytype = type; 123 if(et->keytype->random_key) 124 (*et->keytype->random_key)(context, key); 136 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); 141 key->key->keytype); 144 kt = et->keytype; 396 (crypto->key.key->keytype 719 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument 2766 krb5_enctype_to_keytype(krb5_context context, krb5_enctype etype, krb5_keytype *keytype) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | d2i_pr.c | 143 int keytype; local 155 keytype = EVP_PKEY_DSA; 157 keytype = EVP_PKEY_EC; 158 else keytype = EVP_PKEY_RSA; 160 return d2i_PrivateKey(keytype, a, pp, length);
|
/macosx-10.10/OpenSSL098-52/src/engines/vendor_defns/ |
H A D | sureware.h | 96 * out param keytype: 1 if RSA 2 if DSA 98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype); 111 * out param keytype: 1 if RSA 2 if DSA 114 char *keytype);
|
/macosx-10.10/WebCore-7600.1.25/html/ |
H A D | HTMLKeygenElement.idl | 36 [Reflect] attribute DOMString keytype;
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | set_keys.c | 86 k->key.keytype = kd[kd_offset].key_data_type[0]; 319 is_des_key_p(int keytype) argument 321 return keytype == ETYPE_DES_CBC_CRC || 322 keytype == ETYPE_DES_CBC_MD4 || 323 keytype == ETYPE_DES_CBC_MD5; 368 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { 374 kblock[i].keytype = keys[i].key.keytype; 377 keys[i].key.keytype, 382 if (is_des_key_p(keys[i].key.keytype)) [all...] |
H A D | default_keys.c | 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 53 (int)keys[i].key.keytype);
|
H A D | keys.c | 92 if (keys1[i].key.keytype != keys2[j].key.keytype)
|
/macosx-10.10/Heimdal-398.1.2/admin/ |
H A D | copy.c | 42 if(a->keytype != b->keytype || 109 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); 119 krb5_warnx(context, "skipping %s, keytype %s, kvno %d", 130 entry.keyblock.keytype, 138 "already exists for %s, keytype %s, kvno %d", 155 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
|
H A D | remove.c | 82 entry.keyblock.keytype = enctype;
|
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | kdecode_ticket.c | 140 in.session.keytype = enctype; 157 out->session.keytype);
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | inquire_sec_context_by_oid.c | 102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 108 enum keytype keytype, 127 switch(keytype) { 142 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); 296 is_updated = (acceptor_subkey->keytype != 297 context_handle->auth_context->keyblock->keytype); 364 switch (key->keytype) { 104 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
|
/macosx-10.10/OpenSSH-189/openssh/regress/ |
H A D | krl.sh | 56 # Vary the keytype. We use mostly ECDSA since this is fastest by far. 57 keytype=$ECDSA 59 2 | 10 | 510 | 1001) keytype=rsa;; 60 4 | 30 | 520 | 1002) keytype=dsa;; 62 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
|
/macosx-10.10/Heimdal-398.1.2/lib/kafs/ |
H A D | afskrb5.c | 166 in_creds.session.keytype = ETYPE_DES_CBC_CRC; 169 invalid = krb5_enctype_valid(d->context, in_creds.session.keytype); 171 krb5_enctype_enable(d->context, in_creds.session.keytype); 175 in_creds.session.keytype = ETYPE_DES_CBC_MD5; 180 krb5_enctype_disable(d->context, in_creds.session.keytype);
|