Searched refs:ktype (Results 1 - 20 of 20) sorted by relevance

/openbsd-current/regress/usr.bin/ssh/
H A Dcert-hostkey.sh88 for ktype in $PLAIN_TYPES ; do
89 verbose "$tid: sign host ${ktype} cert"
91 ${SSHKEYGEN} -q -N '' -t ${ktype} \
92 -f $OBJ/cert_host_key_${ktype} || \
93 fatal "ssh-keygen of cert_host_key_${ktype} failed"
95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
97 case $ktype in
98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;;
103 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
[all...]
H A Dcert-userkey.sh44 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do
45 verbose "$tid: sign user ${ktype} cert"
46 ${SSHKEYGEN} -q -N '' -t ${ktype} \
47 -f $OBJ/cert_user_key_${ktype} || \
48 fatal "ssh-keygen of cert_user_key_${ktype} failed"
50 case $ktype in
51 rsa-sha2-*) tflag="-t $ktype" ;;
56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
57 fatal "couldn't sign cert_user_key_${ktype}"
61 for ktype i
[all...]
/openbsd-current/usr.bin/ssh/
H A Dssh-ed25519-sk.c97 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument
102 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
110 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument
115 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
130 char *ktype = NULL; local
155 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
170 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
245 free(ktype);
H A Dssh-ecdsa-sk.c110 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument
115 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0)
123 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument
129 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype,
229 char *ktype = NULL, *webauthn_origin = NULL; local
252 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
256 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0)
258 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) {
394 free(ktype);
H A Dssh-ecdsa.c149 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, argument
155 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1)
192 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, argument
199 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0)
295 char *ktype = NULL; local
309 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
314 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
366 free(ktype);
H A Dssh-ed25519.c100 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, argument
118 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, argument
208 char *ktype = NULL; local
224 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
227 if (strcmp("ssh-ed25519", ktype) != 0) {
268 free(ktype);
H A Dssh-xmss.c127 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, argument
159 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, argument
278 char *ktype = NULL; local
298 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
301 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) {
342 free(ktype);
H A Dssh-dss.c195 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, argument
232 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, argument
239 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0)
334 char *ktype = NULL; local
346 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
351 if (strcmp("ssh-dss", ktype) != 0) {
406 free(ktype);
H A Dssh_api.c527 int ktype, r; local
544 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
547 if (k->key->type == ktype ||
549 sshkey_type_plain(ktype))) {
H A Dhostfile.c756 char *line = NULL, ktype[128]; local
875 if (l <= 1 || l >= sizeof(ktype) ||
878 memcpy(ktype, lineinfo.rawkey, l);
879 ktype[l] = '\0';
880 lineinfo.keytype = sshkey_type_from_name(ktype);
887 strspn(ktype, "0123456789") == l)
H A Dssh-rsa.c179 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, argument
209 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b, argument
H A Dsshkey.c277 int ktype; local
280 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
282 else if (ktype == KEY_RSA) {
286 } else if (ktype == KEY_RSA_CERT) {
1868 char *ktype = NULL; local
1882 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
1887 type = sshkey_type_from_name(ktype);
1907 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0)
1926 free(ktype);
H A Dsshconnect2.c122 int ktype; local
173 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
179 if (sshkey_type_is_cert(ktype) &&
186 sshkey_type_plain(ktype),
H A Dssh-keygen.c466 int r, rlen, ktype; local
502 ktype = KEY_RSA;
505 ktype = KEY_DSA;
511 if ((key = sshkey_new(ktype)) == NULL)
/openbsd-current/lib/libcrypto/dh/
H A Ddh_ameth.c334 const char *ktype = NULL; local
348 ktype = "PKCS#3 DH Private-Key";
350 ktype = "PKCS#3 DH Public-Key";
352 ktype = "PKCS#3 DH Parameters";
361 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
/openbsd-current/lib/libcrypto/dsa/
H A Ddsa_ameth.c416 const char *ktype = NULL; local
431 ktype = "Private-Key";
433 ktype = "Public-Key";
435 ktype = "DSA-Parameters";
440 if (BIO_printf(bp, "%s: (%d bit)\n", ktype,
/openbsd-current/lib/libcrypto/ec/
H A Dec_ameth.c491 do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) argument
510 if (ktype > 0) {
520 if (ktype == 2) {
525 if (ktype == 2)
527 else if (ktype == 1)
/openbsd-current/usr.sbin/unbound/validator/
H A Dval_secalgo.c1038 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument
1053 key->keyType = ktype;
/openbsd-current/sbin/unwind/libunbound/validator/
H A Dval_secalgo.c1038 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument
1053 key->keyType = ktype;
/openbsd-current/sys/dev/pci/drm/amd/amdgpu/
H A Damdgpu_discovery.c990 ip_hw_id->hw_id_kset.kobj.ktype = &ip_hw_id_ktype;
1094 ip_die_entry->ip_kset.kobj.ktype = &ip_die_entry_ktype;
1136 die_kset->kobj.ktype = &die_kobj_ktype;

Completed in 145 milliseconds