/freebsd-11.0-release/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 60 for ktype in $PLAIN_TYPES ; do 61 verbose "$tid: sign host ${ktype} cert" 63 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 64 -f $OBJ/cert_host_key_${ktype} || \ 65 fatal "ssh-keygen of cert_host_key_${ktype} failed" 67 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 68 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 71 -n $HOSTS $OBJ/cert_host_key_${ktype} || 72 fatal "couldn't sign cert_host_key_${ktype}" 74 $OBJ/cert_host_key_${ktype} [all...] |
H A D | cert-userkey.sh | 22 for ktype in $PLAIN_TYPES ; do 23 verbose "$tid: sign user ${ktype} cert" 24 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 25 -f $OBJ/cert_user_key_${ktype} || \ 26 fail "ssh-keygen of cert_user_key_${ktype} failed" 28 -z $$ -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} || 29 fail "couldn't sign cert_user_key_${ktype}" 33 for ktype in $PLAIN_TYPES ; do 34 t=$(kname $ktype) 36 _prefix="${ktype} privse [all...] |
/freebsd-11.0-release/sys/compat/linuxkpi/common/include/linux/ |
H A D | kobject.h | 55 const struct kobj_type *ktype; member in struct:kobject 77 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) argument 82 kobj->ktype = ktype; 145 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
|
H A D | sysfs.h | 84 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) 89 ops = kobj->ktype->sysfs_ops;
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | ssh-ecdsa.c | 121 char *ktype = NULL; local 134 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 139 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 184 free(ktype);
|
H A D | ssh-ed25519.c | 100 char *ktype = NULL; local 115 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 118 if (strcmp("ssh-ed25519", ktype) != 0) { 164 free(ktype);
|
H A D | ssh-dss.c | 139 char *ktype = NULL; local 157 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 162 if (strcmp("ssh-dss", ktype) != 0) { 212 free(ktype);
|
H A D | ssh-rsa.c | 167 char *ktype = NULL; local 180 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 184 if ((hash_alg = rsa_hash_alg_from_ident(ktype)) == -1) { 228 free(ktype);
|
H A D | ssh_api.c | 486 int ktype, r; local 503 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 506 if (k->key->type == ktype || 508 sshkey_type_plain(ktype))) {
|
H A D | hostfile.c | 674 char line[8192], oline[8192], ktype[128]; local 808 if (l <= 1 || l >= sizeof(ktype) || 811 memcpy(ktype, lineinfo.rawkey, l); 812 ktype[l] = '\0'; 813 lineinfo.keytype = sshkey_type_from_name(ktype); 820 strspn(ktype, "0123456789") == l)
|
H A D | sshconnect2.c | 108 int ktype; local 133 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 136 sshkey_type_plain(ktype), NULL))
|
H A D | ssh-keygen.c | 436 int r, rlen, ktype; local 470 ktype = KEY_DSA; 472 ktype = KEY_RSA; 478 if ((key = sshkey_new_private(ktype)) == NULL)
|
H A D | sshkey.c | 1957 char *ktype = NULL, *curve = NULL; local 1974 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 1979 type = sshkey_type_from_name(ktype); 2043 key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype); 2129 free(ktype);
|
/freebsd-11.0-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 162 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
H A D | krb5_asn.c | 127 ASN1_EXP(KRB5_ENCKEY, ktype, ASN1_INTEGER, 0),
|
/freebsd-11.0-release/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 419 const char *ktype = NULL; local 434 ktype = "Private-Key"; 436 ktype = "Public-Key"; 438 ktype = "DSA-Parameters"; 455 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
|
/freebsd-11.0-release/sys/compat/linuxkpi/common/src/ |
H A D | linux_compat.c | 175 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { 177 t = kobj->ktype; 215 if (kobj->ktype && kobj->ktype->release) 216 kobj->ktype->release(kobj); 368 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, argument 374 kobject_init(kobj, ktype); 375 kobj->ktype = ktype; [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 229 ktype, int32_t stype, int32_t
|
/freebsd-11.0-release/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 412 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) argument 435 if (ktype > 0) { 448 if (ktype == 2) { 455 if (ktype > 0) { 462 if (ktype == 2) 464 else if (ktype == 1)
|
/freebsd-11.0-release/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 340 const char *ktype = NULL; local 369 ktype = "DH Private-Key"; 371 ktype = "DH Public-Key"; 373 ktype = "DH Parameters"; 382 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
/freebsd-11.0-release/contrib/unbound/validator/ |
H A D | val_secalgo.c | 704 static SECKEYPublicKey* nss_key_create(KeyType ktype) argument 719 key->keyType = ktype;
|