/macosx-10.10.1/OpenSSH-189/openssh/regress/ |
H A D | cert-hostkey.sh | 27 for ktype in rsa dsa $ecdsa ; do 28 verbose "$tid: sign host ${ktype} cert" 30 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 31 -f $OBJ/cert_host_key_${ktype} || \ 32 fail "ssh-keygen of cert_host_key_${ktype} failed" 35 -n $HOSTS $OBJ/cert_host_key_${ktype} || 36 fail "couldn't sign cert_host_key_${ktype}" 38 test "${ktype}" = "ecdsa" && continue 39 cp $OBJ/cert_host_key_${ktype} $OBJ/cert_host_key_${ktype}_v0 [all...] |
H A D | cert-userkey.sh | 20 for ktype in rsa dsa $ecdsa ; do 21 verbose "$tid: sign user ${ktype} cert" 22 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 23 -f $OBJ/cert_user_key_${ktype} || \ 24 fail "ssh-keygen of cert_user_key_${ktype} failed" 26 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} || 27 fail "couldn't sign cert_user_key_${ktype}" 29 test "${ktype}" = "ecdsa" && continue 30 cp $OBJ/cert_user_key_${ktype} $OBJ/cert_user_key_${ktype}_v0 [all...] |
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | ssh-dss.c | 138 char *ktype; local 141 ktype = buffer_get_cstring(&b, NULL); 142 if (strcmp("ssh-dss", ktype) != 0) { 143 error("ssh_dss_verify: cannot handle type %s", ktype); 145 xfree(ktype); 148 xfree(ktype);
|
H A D | ssh-ecdsa.c | 106 char *ktype; local 118 ktype = buffer_get_string(&b, NULL); 119 if (strcmp(key_ssh_name_plain(key), ktype) != 0) { 120 error("%s: cannot handle type %s", __func__, ktype); 122 xfree(ktype); 125 xfree(ktype);
|
H A D | ssh-rsa.c | 118 char *ktype; local 135 ktype = buffer_get_cstring(&b, NULL); 136 if (strcmp("ssh-rsa", ktype) != 0) { 137 error("ssh_rsa_verify: cannot handle type %s", ktype); 139 xfree(ktype); 142 xfree(ktype);
|
H A D | key.c | 1476 char *ktype = NULL, *curve = NULL; local 1488 if ((ktype = buffer_get_cstring_ret(&b, NULL)) == NULL) { 1493 type = key_type_from_name(ktype); 1496 nid = key_ecdsa_nid_from_name(ktype); 1576 error("key_from_blob: cannot handle type %s", ktype); 1587 if (ktype != NULL) 1588 xfree(ktype);
|
H A D | sshconnect2.c | 114 int ktype; local 139 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC) 142 key_type_plain(ktype), NULL))
|
H A D | ssh-keygen.c | 401 int magic, rlen, ktype, i1, i2, i3, i4; local 431 ktype = KEY_DSA; 433 ktype = KEY_RSA; 439 key = key_new_private(ktype);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecKey.c | 293 CFStringRef ktype = CFDictionaryGetValue(parameters, kSecAttrKeyType); local 295 require(ktype, errOut); 297 if (CFEqual(ktype, kSecAttrKeyTypeEC)) { 299 } else if (CFEqual(ktype, kSecAttrKeyTypeRSA)) { 606 CFTypeRef ktype = CFDictionaryGetValue(refAttributes, kSecAttrKeyType); local 611 if (CFGetTypeID(ktype) == CFNumberGetTypeID()) { 612 CFNumberGetValue(ktype, kCFNumberSInt32Type, &algorithm); 613 } else if (isString(ktype)) { 614 algorithm = CFStringGetIntValue(ktype); 616 if (!CFEqual(t, ktype)) { [all...] |
/macosx-10.10.1/OpenSSL098-52/src/crypto/krb5/ |
H A D | krb5_asn.h | 172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
H A D | krb5_asn.c | 129 ASN1_EXP(KRB5_ENCKEY, ktype, ASN1_INTEGER, 0),
|
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | krb5_asn.h | 172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
/macosx-10.10.1/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkcs12.c | 82 int nkey = 0, ncert = 0, kiter = 0, miter = 0, ktype = 0; local 105 ktype = NUM2INT(keytype); 108 nkey, ncert, kiter, miter, ktype);
|
/macosx-10.10.1/Heimdal-398.1.2/lib/kadm5/ |
H A D | common_glue.c | 147 * @ktype is the enctype to get a key for, or -1 to get the first one 157 int32_t ktype, int32_t stype, 167 if (ktype != entry->key_data[i].key_data_kvno) 170 keyblock->keytype = ktype; 155 kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, int32_t ktype, int32_t stype, int32_t kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) argument
|
H A D | kadm5-protos.h | 302 int32_t ktype, int32_t stype,
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKey.cpp | 372 CFStringRef ktype = (CFStringRef) CFDictionaryGetValue(parameters, kSecAttrKeyType); local 373 if (ktype == NULL) 378 if (CFEqual(ktype, kSecAttrKeyTypeRSA)) { 381 } else if(CFEqual(ktype, kSecAttrKeyTypeECDSA) || 382 CFEqual(ktype, kSecAttrKeyTypeEC)) { 385 } else if(CFEqual(ktype, kSecAttrKeyTypeAES)) { 388 } else if(CFEqual(ktype, kSecAttrKeyType3DES)) {
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKey.cpp | 372 CFStringRef ktype = (CFStringRef) CFDictionaryGetValue(parameters, kSecAttrKeyType); local 373 if (ktype == NULL) 378 if (CFEqual(ktype, kSecAttrKeyTypeRSA)) { 381 } else if(CFEqual(ktype, kSecAttrKeyTypeECDSA) || 382 CFEqual(ktype, kSecAttrKeyTypeEC)) { 385 } else if(CFEqual(ktype, kSecAttrKeyTypeAES)) { 388 } else if(CFEqual(ktype, kSecAttrKeyType3DES)) {
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKey.cpp | 372 CFStringRef ktype = (CFStringRef) CFDictionaryGetValue(parameters, kSecAttrKeyType); local 373 if (ktype == NULL) 378 if (CFEqual(ktype, kSecAttrKeyTypeRSA)) { 381 } else if(CFEqual(ktype, kSecAttrKeyTypeECDSA) || 382 CFEqual(ktype, kSecAttrKeyTypeEC)) { 385 } else if(CFEqual(ktype, kSecAttrKeyTypeAES)) { 388 } else if(CFEqual(ktype, kSecAttrKeyType3DES)) {
|
/macosx-10.10.1/BerkeleyDB-21/db/hash/ |
H A D | hash_rec.c | 79 int cmp_n, cmp_p, dtype, ktype, ret; local 132 ktype = DB_UNDO(op) || PAIR_ISKEYBIG(argp->opcode) ? 142 &argp->key, &argp->data, ktype, dtype)) != 0)
|
H A D | hash_page.c | 2231 int ktype, dtype, ret; local 2238 ktype = HPAGE_TYPE(dbp, src_page, H_KEYINDEX(src_ndx)); 2242 if (ktype == H_OFFPAGE) { 2257 &tkey, &tdata, ktype, dtype)) != 0)
|
/macosx-10.10.1/MITKerberosShim-66/Kerberos/ |
H A D | krb5.h | 638 (krb5_enctype ktype) KERBEROS_APPLE_DEPRECATED("use GSS.framework"); 1092 krb5_enctype *ktype; /* requested enctype(s) */ member in struct:_krb5_kdc_req
|
/macosx-10.10.1/MITKerberosShim-66/include/ |
H A D | mit-krb5.h | 614 (mit_krb5_enctype ktype); 1068 mit_krb5_enctype *ktype; /* requested enctype(s) */ member in struct:_mit_krb5_kdc_req
|
/macosx-10.10.1/MITKerberosShim-66/mit-include/krb5/ |
H A D | krb5.h | 640 (krb5_enctype ktype) KERBEROS_APPLE_DEPRECATED("use GSS.framework"); 1094 krb5_enctype *ktype; /* requested enctype(s) */ member in struct:_krb5_kdc_req
|