Searched refs:keytype (Results 1 - 25 of 144) sorted by relevance

123456

/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/
H A Ddecode_der2key.c551 #define DO_type_specific_keypair(keytype) \
552 "type-specific", keytype##_evp_type, \
554 keytype##_d2i_private_key, \
555 keytype##_d2i_public_key, \
559 keytype##_check, \
560 keytype##_adjust, \
561 keytype##_free
563 #define DO_type_specific_pub(keytype) \
564 "type-specific", keytype##_evp_type, \
567 keytype##_d2i_public_ke
[all...]
H A Ddecode_msblob2key.c259 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \
260 static const struct keytype_desc_st mstype##2##keytype##_desc = { \
262 ossl_##keytype##_keymgmt_functions, \
263 keytype##_decode_private_key, \
264 keytype##_decode_public_key, \
265 keytype##_adjust, \
266 keytype##_free \
268 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \
269 static void *msblob2##keytype##_newctx(void *provctx) \
271 return msblob2key_newctx(provctx, &mstype##2##keytype##_des
[all...]
H A Ddecode_pvk2key.c224 #define IMPLEMENT_MS(KEYTYPE, keytype) \
226 pvk2##keytype##_desc = { \
228 ossl_##keytype##_keymgmt_functions, \
229 keytype##_private_key_bio, \
230 keytype##_adjust, \
231 keytype##_free \
233 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \
234 static void *pvk2##keytype##_newctx(void *provctx) \
236 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \
239 ossl_##pvk_to_##keytype##_decoder_function
[all...]
H A Ddecode_epki2pki.c131 char keytype[OSSL_MAX_NAME_SIZE]; local
135 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0);
138 keytype, 0);
/netbsd-current/external/bsd/ntp/dist/libntp/
H A Dauthusekey.c24 int keytype,
34 MD5auth_setkey(keyno, keytype, str, len, NULL);
22 authusekey( keyid_t keyno, int keytype, const u_char *str ) argument
H A Dauthreadkeys.c94 u_short keytype; /* stored key type */ member in struct:keydata
145 int keytype; local
197 * Next is keytype. See if that is all right.
221 keytype = keytype_from_text(token, NULL);
222 if (keytype == 0) {
227 } else if (NID_cmac != keytype &&
228 EVP_get_digestbynid(keytype) == NULL) {
232 keytype = 0;
244 keytype = 0;
246 keytype
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
H A Daeap.c53 krb5_keytype keytype; local
69 krb5_enctype_to_keytype(context, key->keytype, &keytype);
71 switch (keytype) {
99 krb5_keytype keytype; local
115 krb5_enctype_to_keytype(context, key->keytype, &keytype);
117 switch (keytype) {
146 krb5_keytype keytype; local
163 krb5_enctype_to_keytype(context, key->keytype,
[all...]
H A Dinquire_sec_context_by_oid.c104 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum
110 enum keytype keytype,
129 switch(keytype) {
140 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype);
148 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype);
295 is_updated = (acceptor_subkey->keytype !=
296 context_handle->auth_context->keyblock->keytype);
364 switch (key->keytype) {
106 inquire_sec_context_get_subkey(OM_uint32 *minor_status, const gsskrb5_ctx context_handle, krb5_context context, enum keytype keytype, gss_buffer_set_t *data_set) argument
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dmk_req_ext.c84 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
93 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
94 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
95 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
96 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
130 ac->keyblock->keytype,
140 ret = krb5_build_ap_req (context, ac->keyblock->keytype,
H A Dgenerate_subkey.c64 etype = key->keytype; /* use session key etype */
H A Dkeyblock.c49 keyblock->keytype = 0;
70 keyblock->keytype = KRB5_ENCTYPE_NULL;
161 return block->keytype;
201 key->keytype = type;
H A Dsalt-aes-sha1.c70 kd.key->keytype = enctype;
71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
81 et->keytype->size, kd.key->keyvalue.data);
H A Dmk_req.c64 if (auth_context && *auth_context && (*auth_context)->keytype)
65 this_cred.session.keytype = (*auth_context)->keytype;
H A Dsalt-aes-sha2.c83 kd.key->keytype = enctype;
84 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
108 et->keytype->size, kd.key->keyvalue.data);
H A Ddeprecated.c75 krb5_keytype keytype,
83 if (keytype != (krb5_keytype)KEYTYPE_DES || context->etypes_des == NULL)
84 return krb5_keytype_to_enctypes (context, keytype, len, val);
123 krb5_keytype keytype,
131 if(keys[i].type == keytype) {
139 "key type %d not supported", keytype);
158 krb5_keytype *keytype)
166 *keytype = keys[i].type;
171 *keytype = strtol(string, &end, 0);
172 if(*end == '\0' && *keytype !
[all...]
/netbsd-current/external/bsd/ntp/dist/tests/libntp/
H A Da_md5encrypt.c20 const int keytype = KEY_TYPE_MD5; variable
57 length = MD5authencrypt(keytype, key, keyLength, packetPtr, packetLength);
59 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, packetPtr, packetLength, length));
69 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, keyLength, expectedPacket.u32, packetLength, 20));
74 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, keyLength, invalidPacket.u32, packetLength, 20));
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/asn1/
H A Dd2i_pr.c27 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, argument
38 if (keytype != EVP_PKEY_NONE) {
39 key_name = evp_pkey_type2name(keytype);
78 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, argument
97 if (!EVP_PKEY_set_type(ret, keytype)) {
123 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret))
143 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, argument
149 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq);
152 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq);
170 int keytype; local
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/test/
H A Dendecoder_legacy_test.c73 const char *keytype; member in struct:test_stanza_st
216 const char *keytype; member in struct:key_st
280 if (strcmp(keys[i].keytype, type) == 0)
298 static int test_protected_PEM(const char *keytype, int evp_type, argument
338 keytype, selection,
366 static int test_unprotected_PEM(const char *keytype, int evp_type, argument
405 keytype, selection,
433 static int test_DER(const char *keytype, int evp_type, argument
472 keytype, selection,
515 || !TEST_ptr(key = lookup_key(test_stanza->keytype)))
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/asn1/
H A Dd2i_pr.c107 int keytype; local
140 keytype = EVP_PKEY_DSA;
142 keytype = EVP_PKEY_EC;
144 keytype = EVP_PKEY_RSA;
147 ret = d2i_PrivateKey(keytype, a, pp, length);
/netbsd-current/crypto/external/bsd/heimdal/dist/admin/
H A Dcopy.c44 if(a->keytype != b->keytype ||
92 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str);
100 entry.keyblock.keytype,
108 "already exists for %s, keytype %s, kvno %d",
125 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
/netbsd-current/crypto/external/bsd/openssl/dist/include/crypto/
H A Ddecoder.h36 EVP_PKEY **pkey, const char *keytype,
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/kadm5/
H A Dset_keys.c85 k->key.keytype = kd[kd_offset].key_data_type[0];
324 is_des_key_p(int keytype) argument
326 return keytype == ETYPE_DES_CBC_CRC ||
327 keytype == ETYPE_DES_CBC_MD4 ||
328 keytype == ETYPE_DES_CBC_MD5;
372 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) {
378 kblock[i].keytype = keys[i].key.keytype;
381 keys[i].key.keytype,
386 if (is_des_key_p(keys[i].key.keytype))
[all...]
H A Ddefault_keys.c52 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str);
55 (int)keys[i].key.keytype);
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/encode_decode/
H A Ddecoder_pkey.c307 EVP_PKEY **pkey, const char *keytype,
319 if (keytype != NULL
320 && (strcmp(keytype, "id-ecPublicKey") == 0
321 || strcmp(keytype, "1.2.840.10045.2.1") == 0))
328 keytype != NULL ? keytype : "",
329 keytype != NULL ? " keys" : "keys of any type",
365 if (keytype == NULL
366 || EVP_KEYMGMT_is_a(keymgmt, keytype)
433 const char *keytype, in
306 ossl_decoder_ctx_setup_for_pkey(OSSL_DECODER_CTX *ctx, EVP_PKEY **pkey, const char *keytype, OSSL_LIB_CTX *libctx, const char *propquery) argument
430 OSSL_DECODER_CTX_new_for_pkey(EVP_PKEY **pkey, const char *input_type, const char *input_structure, const char *keytype, int selection, OSSL_LIB_CTX *libctx, const char *propquery) argument
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/
H A Dmisc.c206 if (krb5_enctype_valid(context, h->entry.keys.val[i].key.keytype) != 0 &&
207 !_kdc_is_weak_exception(h->entry.principal, h->entry.keys.val[i].key.keytype))
210 h->entry.keys.val[i].key.keytype, key);
214 *enctype = (*key)->key.keytype;

Completed in 309 milliseconds

123456