Searched refs:ktype (Results 1 - 23 of 23) sorted by relevance

/macosx-10.10/OpenSSH-189/openssh/regress/
H A Dcert-hostkey.sh27 for ktype in rsa dsa $ecdsa ; do
28 verbose "$tid: sign host ${ktype} cert"
30 ${SSHKEYGEN} -q -N '' -t ${ktype} \
31 -f $OBJ/cert_host_key_${ktype} || \
32 fail "ssh-keygen of cert_host_key_${ktype} failed"
35 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
36 fail "couldn't sign cert_host_key_${ktype}"
38 test "${ktype}" = "ecdsa" && continue
39 cp $OBJ/cert_host_key_${ktype} $OBJ/cert_host_key_${ktype}_v0
[all...]
H A Dcert-userkey.sh20 for ktype in rsa dsa $ecdsa ; do
21 verbose "$tid: sign user ${ktype} cert"
22 ${SSHKEYGEN} -q -N '' -t ${ktype} \
23 -f $OBJ/cert_user_key_${ktype} || \
24 fail "ssh-keygen of cert_user_key_${ktype} failed"
26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} ||
27 fail "couldn't sign cert_user_key_${ktype}"
29 test "${ktype}" = "ecdsa" && continue
30 cp $OBJ/cert_user_key_${ktype} $OBJ/cert_user_key_${ktype}_v0
[all...]
/macosx-10.10/OpenSSH-189/openssh/
H A Dssh-dss.c138 char *ktype; local
141 ktype = buffer_get_cstring(&b, NULL);
142 if (strcmp("ssh-dss", ktype) != 0) {
143 error("ssh_dss_verify: cannot handle type %s", ktype);
145 xfree(ktype);
148 xfree(ktype);
H A Dssh-ecdsa.c106 char *ktype; local
118 ktype = buffer_get_string(&b, NULL);
119 if (strcmp(key_ssh_name_plain(key), ktype) != 0) {
120 error("%s: cannot handle type %s", __func__, ktype);
122 xfree(ktype);
125 xfree(ktype);
H A Dssh-rsa.c118 char *ktype; local
135 ktype = buffer_get_cstring(&b, NULL);
136 if (strcmp("ssh-rsa", ktype) != 0) {
137 error("ssh_rsa_verify: cannot handle type %s", ktype);
139 xfree(ktype);
142 xfree(ktype);
H A Dkey.c1476 char *ktype = NULL, *curve = NULL; local
1488 if ((ktype = buffer_get_cstring_ret(&b, NULL)) == NULL) {
1493 type = key_type_from_name(ktype);
1496 nid = key_ecdsa_nid_from_name(ktype);
1576 error("key_from_blob: cannot handle type %s", ktype);
1587 if (ktype != NULL)
1588 xfree(ktype);
H A Dsshconnect2.c114 int ktype; local
139 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC)
142 key_type_plain(ktype), NULL))
H A Dssh-keygen.c401 int magic, rlen, ktype, i1, i2, i3, i4; local
431 ktype = KEY_DSA;
433 ktype = KEY_RSA;
439 key = key_new_private(ktype);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecKey.c293 CFStringRef ktype = CFDictionaryGetValue(parameters, kSecAttrKeyType); local
295 require(ktype, errOut);
297 if (CFEqual(ktype, kSecAttrKeyTypeEC)) {
299 } else if (CFEqual(ktype, kSecAttrKeyTypeRSA)) {
606 CFTypeRef ktype = CFDictionaryGetValue(refAttributes, kSecAttrKeyType); local
611 if (CFGetTypeID(ktype) == CFNumberGetTypeID()) {
612 CFNumberGetValue(ktype, kCFNumberSInt32Type, &algorithm);
613 } else if (isString(ktype)) {
614 algorithm = CFStringGetIntValue(ktype);
616 if (!CFEqual(t, ktype)) {
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/krb5/
H A Dkrb5_asn.h172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
H A Dkrb5_asn.c129 ASN1_EXP(KRB5_ENCKEY, ktype, ASN1_INTEGER, 0),
/macosx-10.10/OpenSSL098-52/src/include/openssl/
H A Dkrb5_asn.h172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkcs12.c82 int nkey = 0, ncert = 0, kiter = 0, miter = 0, ktype = 0; local
105 ktype = NUM2INT(keytype);
108 nkey, ncert, kiter, miter, ktype);
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dcommon_glue.c147 * @ktype is the enctype to get a key for, or -1 to get the first one
157 int32_t ktype, int32_t stype,
167 if (ktype != entry->key_data[i].key_data_kvno)
170 keyblock->keytype = ktype;
155 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, int32_t ktype, int32_t stype, int32_t kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
H A Dkadm5-protos.h302 int32_t ktype, int32_t stype,
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecKey.cpp372 CFStringRef ktype = (CFStringRef) CFDictionaryGetValue(parameters, kSecAttrKeyType); local
373 if (ktype == NULL)
378 if (CFEqual(ktype, kSecAttrKeyTypeRSA)) {
381 } else if(CFEqual(ktype, kSecAttrKeyTypeECDSA) ||
382 CFEqual(ktype, kSecAttrKeyTypeEC)) {
385 } else if(CFEqual(ktype, kSecAttrKeyTypeAES)) {
388 } else if(CFEqual(ktype, kSecAttrKeyType3DES)) {
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecKey.cpp372 CFStringRef ktype = (CFStringRef) CFDictionaryGetValue(parameters, kSecAttrKeyType); local
373 if (ktype == NULL)
378 if (CFEqual(ktype, kSecAttrKeyTypeRSA)) {
381 } else if(CFEqual(ktype, kSecAttrKeyTypeECDSA) ||
382 CFEqual(ktype, kSecAttrKeyTypeEC)) {
385 } else if(CFEqual(ktype, kSecAttrKeyTypeAES)) {
388 } else if(CFEqual(ktype, kSecAttrKeyType3DES)) {
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecKey.cpp372 CFStringRef ktype = (CFStringRef) CFDictionaryGetValue(parameters, kSecAttrKeyType); local
373 if (ktype == NULL)
378 if (CFEqual(ktype, kSecAttrKeyTypeRSA)) {
381 } else if(CFEqual(ktype, kSecAttrKeyTypeECDSA) ||
382 CFEqual(ktype, kSecAttrKeyTypeEC)) {
385 } else if(CFEqual(ktype, kSecAttrKeyTypeAES)) {
388 } else if(CFEqual(ktype, kSecAttrKeyType3DES)) {
/macosx-10.10/BerkeleyDB-21/db/hash/
H A Dhash_rec.c79 int cmp_n, cmp_p, dtype, ktype, ret; local
132 ktype = DB_UNDO(op) || PAIR_ISKEYBIG(argp->opcode) ?
142 &argp->key, &argp->data, ktype, dtype)) != 0)
H A Dhash_page.c2231 int ktype, dtype, ret; local
2238 ktype = HPAGE_TYPE(dbp, src_page, H_KEYINDEX(src_ndx));
2242 if (ktype == H_OFFPAGE) {
2257 &tkey, &tdata, ktype, dtype)) != 0)
/macosx-10.10/MITKerberosShim-66/Kerberos/
H A Dkrb5.h638 (krb5_enctype ktype) KERBEROS_APPLE_DEPRECATED("use GSS.framework");
1092 krb5_enctype *ktype; /* requested enctype(s) */ member in struct:_krb5_kdc_req
/macosx-10.10/MITKerberosShim-66/include/
H A Dmit-krb5.h614 (mit_krb5_enctype ktype);
1068 mit_krb5_enctype *ktype; /* requested enctype(s) */ member in struct:_mit_krb5_kdc_req
/macosx-10.10/MITKerberosShim-66/mit-include/krb5/
H A Dkrb5.h640 (krb5_enctype ktype) KERBEROS_APPLE_DEPRECATED("use GSS.framework");
1094 krb5_enctype *ktype; /* requested enctype(s) */ member in struct:_krb5_kdc_req

Completed in 227 milliseconds