/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
H A D | decode_der2key.c | 551 #define DO_type_specific_keypair(keytype) \ 552 "type-specific", keytype##_evp_type, \ 554 keytype##_d2i_private_key, \ 555 keytype##_d2i_public_key, \ 559 keytype##_check, \ 560 keytype##_adjust, \ 561 keytype##_free 563 #define DO_type_specific_pub(keytype) \ 564 "type-specific", keytype##_evp_type, \ 567 keytype##_d2i_public_ke [all...] |
H A D | decode_msblob2key.c | 259 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ 260 static const struct keytype_desc_st mstype##2##keytype##_desc = { \ 262 ossl_##keytype##_keymgmt_functions, \ 263 keytype##_decode_private_key, \ 264 keytype##_decode_public_key, \ 265 keytype##_adjust, \ 266 keytype##_free \ 268 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \ 269 static void *msblob2##keytype##_newctx(void *provctx) \ 271 return msblob2key_newctx(provctx, &mstype##2##keytype##_des [all...] |
H A D | decode_pvk2key.c | 224 #define IMPLEMENT_MS(KEYTYPE, keytype) \ 226 pvk2##keytype##_desc = { \ 228 ossl_##keytype##_keymgmt_functions, \ 229 keytype##_private_key_bio, \ 230 keytype##_adjust, \ 231 keytype##_free \ 233 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \ 234 static void *pvk2##keytype##_newctx(void *provctx) \ 236 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \ 239 ossl_##pvk_to_##keytype##_decoder_function [all...] |
H A D | decode_epki2pki.c | 131 char keytype[OSSL_MAX_NAME_SIZE]; local 135 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); 138 keytype, 0);
|
/netbsd-current/external/bsd/ntp/dist/libntp/ |
H A D | authusekey.c | 24 int keytype, 34 MD5auth_setkey(keyno, keytype, str, len, NULL); 22 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
|
H A D | authreadkeys.c | 94 u_short keytype; /* stored key type */ member in struct:keydata 145 int keytype; local 197 * Next is keytype. See if that is all right. 221 keytype = keytype_from_text(token, NULL); 222 if (keytype == 0) { 227 } else if (NID_cmac != keytype && 228 EVP_get_digestbynid(keytype) == NULL) { 232 keytype = 0; 244 keytype = 0; 246 keytype [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | aeap.c | 53 krb5_keytype keytype; local 69 krb5_enctype_to_keytype(context, key->keytype, &keytype); 71 switch (keytype) { 99 krb5_keytype keytype; local 115 krb5_enctype_to_keytype(context, key->keytype, &keytype); 117 switch (keytype) { 146 krb5_keytype keytype; local 163 krb5_enctype_to_keytype(context, key->keytype, [all...] |
H A D | inquire_sec_context_by_oid.c | 104 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 110 enum keytype keytype, 129 switch(keytype) { 140 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); 148 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); 295 is_updated = (acceptor_subkey->keytype != 296 context_handle->auth_context->keyblock->keytype); 364 switch (key->keytype) { 106 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | mk_req_ext.c | 84 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { 93 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || 94 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || 95 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || 96 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { 130 ac->keyblock->keytype, 140 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
|
H A D | generate_subkey.c | 64 etype = key->keytype; /* use session key etype */
|
H A D | keyblock.c | 49 keyblock->keytype = 0; 70 keyblock->keytype = KRB5_ENCTYPE_NULL; 161 return block->keytype; 201 key->keytype = type;
|
H A D | salt-aes-sha1.c | 70 kd.key->keytype = enctype; 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 81 et->keytype->size, kd.key->keyvalue.data);
|
H A D | mk_req.c | 64 if (auth_context && *auth_context && (*auth_context)->keytype) 65 this_cred.session.keytype = (*auth_context)->keytype;
|
H A D | salt-aes-sha2.c | 83 kd.key->keytype = enctype; 84 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 108 et->keytype->size, kd.key->keyvalue.data);
|
H A D | deprecated.c | 75 krb5_keytype keytype, 83 if (keytype != (krb5_keytype)KEYTYPE_DES || context->etypes_des == NULL) 84 return krb5_keytype_to_enctypes (context, keytype, len, val); 123 krb5_keytype keytype, 131 if(keys[i].type == keytype) { 139 "key type %d not supported", keytype); 158 krb5_keytype *keytype) 166 *keytype = keys[i].type; 171 *keytype = strtol(string, &end, 0); 172 if(*end == '\0' && *keytype ! [all...] |
/netbsd-current/external/bsd/ntp/dist/tests/libntp/ |
H A D | a_md5encrypt.c | 20 const int keytype = KEY_TYPE_MD5; variable 57 length = MD5authencrypt(keytype, key, keyLength, packetPtr, packetLength); 59 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, packetPtr, packetLength, length)); 69 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, expectedPacket.u32, packetLength, 20)); 74 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, keyLength, invalidPacket.u32, packetLength, 20));
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | d2i_pr.c | 27 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, argument 38 if (keytype != EVP_PKEY_NONE) { 39 key_name = evp_pkey_type2name(keytype); 78 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, argument 97 if (!EVP_PKEY_set_type(ret, keytype)) { 123 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) 143 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, argument 149 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); 152 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); 170 int keytype; local [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | endecoder_legacy_test.c | 73 const char *keytype; member in struct:test_stanza_st 216 const char *keytype; member in struct:key_st 280 if (strcmp(keys[i].keytype, type) == 0) 298 static int test_protected_PEM(const char *keytype, int evp_type, argument 338 keytype, selection, 366 static int test_unprotected_PEM(const char *keytype, int evp_type, argument 405 keytype, selection, 433 static int test_DER(const char *keytype, int evp_type, argument 472 keytype, selection, 515 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
H A D | d2i_pr.c | 107 int keytype; local 140 keytype = EVP_PKEY_DSA; 142 keytype = EVP_PKEY_EC; 144 keytype = EVP_PKEY_RSA; 147 ret = d2i_PrivateKey(keytype, a, pp, length);
|
/netbsd-current/crypto/external/bsd/heimdal/dist/admin/ |
H A D | copy.c | 44 if(a->keytype != b->keytype || 92 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); 100 entry.keyblock.keytype, 108 "already exists for %s, keytype %s, kvno %d", 125 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
|
/netbsd-current/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | decoder.h | 36 EVP_PKEY **pkey, const char *keytype,
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | set_keys.c | 85 k->key.keytype = kd[kd_offset].key_data_type[0]; 324 is_des_key_p(int keytype) argument 326 return keytype == ETYPE_DES_CBC_CRC || 327 keytype == ETYPE_DES_CBC_MD4 || 328 keytype == ETYPE_DES_CBC_MD5; 372 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { 378 kblock[i].keytype = keys[i].key.keytype; 381 keys[i].key.keytype, 386 if (is_des_key_p(keys[i].key.keytype)) [all...] |
H A D | default_keys.c | 52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 55 (int)keys[i].key.keytype);
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/encode_decode/ |
H A D | decoder_pkey.c | 307 EVP_PKEY **pkey, const char *keytype, 319 if (keytype != NULL 320 && (strcmp(keytype, "id-ecPublicKey") == 0 321 || strcmp(keytype, "1.2.840.10045.2.1") == 0)) 328 keytype != NULL ? keytype : "", 329 keytype != NULL ? " keys" : "keys of any type", 365 if (keytype == NULL 366 || EVP_KEYMGMT_is_a(keymgmt, keytype) 433 const char *keytype, in 306 ossl_decoder_ctx_setup_for_pkey(OSSL_DECODER_CTX *ctx, EVP_PKEY **pkey, const char *keytype, OSSL_LIB_CTX *libctx, const char *propquery) argument 430 OSSL_DECODER_CTX_new_for_pkey(EVP_PKEY **pkey, const char *input_type, const char *input_structure, const char *keytype, int selection, OSSL_LIB_CTX *libctx, const char *propquery) argument [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | misc.c | 206 if (krb5_enctype_valid(context, h->entry.keys.val[i].key.keytype) != 0 && 207 !_kdc_is_weak_exception(h->entry.principal, h->entry.keys.val[i].key.keytype)) 210 h->entry.keys.val[i].key.keytype, key); 214 *enctype = (*key)->key.keytype;
|