/openbsd-current/regress/usr.bin/ssh/ |
H A D | cert-hostkey.sh | 88 for ktype in $PLAIN_TYPES ; do 89 verbose "$tid: sign host ${ktype} cert" 91 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 92 -f $OBJ/cert_host_key_${ktype} || \ 93 fatal "ssh-keygen of cert_host_key_${ktype} failed" 95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 97 case $ktype in 98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;; 103 -n $HOSTS $OBJ/cert_host_key_${ktype} || [all...] |
H A D | cert-userkey.sh | 44 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do 45 verbose "$tid: sign user ${ktype} cert" 46 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 47 -f $OBJ/cert_user_key_${ktype} || \ 48 fatal "ssh-keygen of cert_user_key_${ktype} failed" 50 case $ktype in 51 rsa-sha2-*) tflag="-t $ktype" ;; 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 57 fatal "couldn't sign cert_user_key_${ktype}" 61 for ktype i [all...] |
/openbsd-current/usr.bin/ssh/ |
H A D | ssh-ed25519-sk.c | 97 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument 102 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 110 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument 115 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 130 char *ktype = NULL; local 155 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 170 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 245 free(ktype);
|
H A D | ssh-ecdsa-sk.c | 110 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, argument 115 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) 123 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, argument 129 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, 229 char *ktype = NULL, *webauthn_origin = NULL; local 252 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 256 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) 258 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { 394 free(ktype);
|
H A D | ssh-ecdsa.c | 149 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, argument 155 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) 192 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, argument 199 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) 295 char *ktype = NULL; local 309 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 314 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 366 free(ktype);
|
H A D | ssh-ed25519.c | 100 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, argument 118 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, argument 208 char *ktype = NULL; local 224 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 227 if (strcmp("ssh-ed25519", ktype) != 0) { 268 free(ktype);
|
H A D | ssh-xmss.c | 127 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, argument 159 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, argument 278 char *ktype = NULL; local 298 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 301 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { 342 free(ktype);
|
H A D | ssh-dss.c | 195 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, argument 232 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, argument 239 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0) 334 char *ktype = NULL; local 346 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 351 if (strcmp("ssh-dss", ktype) != 0) { 406 free(ktype);
|
H A D | ssh_api.c | 527 int ktype, r; local 544 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 547 if (k->key->type == ktype || 549 sshkey_type_plain(ktype))) {
|
H A D | hostfile.c | 756 char *line = NULL, ktype[128]; local 875 if (l <= 1 || l >= sizeof(ktype) || 878 memcpy(ktype, lineinfo.rawkey, l); 879 ktype[l] = '\0'; 880 lineinfo.keytype = sshkey_type_from_name(ktype); 887 strspn(ktype, "0123456789") == l)
|
H A D | ssh-rsa.c | 179 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, argument 209 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b, argument
|
H A D | sshkey.c | 277 int ktype; local 280 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) 282 else if (ktype == KEY_RSA) { 286 } else if (ktype == KEY_RSA_CERT) { 1868 char *ktype = NULL; local 1882 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 1887 type = sshkey_type_from_name(ktype); 1907 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0) 1926 free(ktype);
|
H A D | sshconnect2.c | 122 int ktype; local 173 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 179 if (sshkey_type_is_cert(ktype) && 186 sshkey_type_plain(ktype),
|
H A D | ssh-keygen.c | 466 int r, rlen, ktype; local 502 ktype = KEY_RSA; 505 ktype = KEY_DSA; 511 if ((key = sshkey_new(ktype)) == NULL)
|
/openbsd-current/lib/libcrypto/dh/ |
H A D | dh_ameth.c | 334 const char *ktype = NULL; local 348 ktype = "PKCS#3 DH Private-Key"; 350 ktype = "PKCS#3 DH Public-Key"; 352 ktype = "PKCS#3 DH Parameters"; 361 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
/openbsd-current/lib/libcrypto/dsa/ |
H A D | dsa_ameth.c | 416 const char *ktype = NULL; local 431 ktype = "Private-Key"; 433 ktype = "Public-Key"; 435 ktype = "DSA-Parameters"; 440 if (BIO_printf(bp, "%s: (%d bit)\n", ktype,
|
/openbsd-current/lib/libcrypto/ec/ |
H A D | ec_ameth.c | 491 do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) argument 510 if (ktype > 0) { 520 if (ktype == 2) { 525 if (ktype == 2) 527 else if (ktype == 1)
|
/openbsd-current/usr.sbin/unbound/validator/ |
H A D | val_secalgo.c | 1038 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument 1053 key->keyType = ktype;
|
/openbsd-current/sbin/unwind/libunbound/validator/ |
H A D | val_secalgo.c | 1038 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument 1053 key->keyType = ktype;
|
/openbsd-current/sys/dev/pci/drm/amd/amdgpu/ |
H A D | amdgpu_discovery.c | 990 ip_hw_id->hw_id_kset.kobj.ktype = &ip_hw_id_ktype; 1094 ip_die_entry->ip_kset.kobj.ktype = &ip_die_entry_ktype; 1136 die_kset->kobj.ktype = &die_kobj_ktype;
|