/freebsd/crypto/openssl/providers/implementations/encode_decode/ |
H A D | decode_der2key.c | 570 #define DO_type_specific_keypair(keytype) \ argument 571 "type-specific", keytype##_evp_type, \ 573 keytype##_d2i_private_key, \ 574 keytype##_d2i_public_key, \ 578 keytype##_check, \ 579 keytype##_adjust, \ 580 keytype##_free 582 #define DO_type_specific_pub(keytype) \ argument 583 "type-specific", keytype##_evp_type, \ 586 keytype##_d2i_public_key, \ [all …]
|
H A D | decode_pvk2key.c | 224 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument 226 pvk2##keytype##_desc = { \ 228 ossl_##keytype##_keymgmt_functions, \ 229 keytype##_private_key_bio, \ 230 keytype##_adjust, \ 231 keytype##_free \ 233 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \ 234 static void *pvk2##keytype##_newctx(void *provctx) \ 236 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \ 239 ossl_##pvk_to_##keytype##_decoder_functions[] = { \ [all …]
|
H A D | decode_msblob2key.c | 259 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument 260 static const struct keytype_desc_st mstype##2##keytype##_desc = { \ 262 ossl_##keytype##_keymgmt_functions, \ 263 keytype##_decode_private_key, \ 264 keytype##_decode_public_key, \ 265 keytype##_adjust, \ 266 keytype##_free \ 268 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \ 269 static void *msblob2##keytype##_newctx(void *provctx) \ 271 return msblob2key_newctx(provctx, &mstype##2##keytype##_desc); \ [all …]
|
H A D | decode_epki2pki.c | 131 char keytype[OSSL_MAX_NAME_SIZE]; in epki2pki_decode() local 135 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); in epki2pki_decode() 138 keytype, 0); in epki2pki_decode()
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 27 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument 38 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder() 39 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder() 78 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument 97 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy() 123 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy() 143 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument 149 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 152 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 170 int keytype; in d2i_AutoPrivateKey_legacy() local [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | endecoder_legacy_test.c | 73 const char *keytype; member 216 const char *keytype; member 280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key() 298 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument 338 keytype, selection, in test_protected_PEM() 366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument 405 keytype, selection, in test_unprotected_PEM() 433 static int test_DER(const char *keytype, int evp_type, in test_DER() argument 472 keytype, selection, in test_DER() 515 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key() [all …]
|
/freebsd/contrib/ntp/libntp/ |
H A D | authreadkeys.c | 92 u_short keytype; /* stored key type */ member 143 int keytype; in authreadkeys() local 194 * Next is keytype. See if that is all right. in authreadkeys() 218 keytype = keytype_from_text(token, NULL); in authreadkeys() 219 if (keytype == 0) { in authreadkeys() 224 } else if (NID_cmac != keytype && in authreadkeys() 225 EVP_get_digestbynid(keytype) == NULL) { in authreadkeys() 229 keytype = 0; in authreadkeys() 241 keytype = 0; in authreadkeys() 243 keytype in authreadkeys() [all...] |
H A D | authusekey.c | 19 int keytype, in authusekey() argument 31 MD5auth_setkey(keyno, keytype, buf, len, NULL); in authusekey()
|
/freebsd/contrib/bearssl/test/x509/ |
H A D | alltests.txt | 137 keytype = RSA 149 keytype = RSA 159 keytype = RSA 170 keytype = RSA 181 keytype = RSA 192 keytype = RSA 203 keytype = RSA 214 keytype = RSA 226 keytype = RSA 237 keytype = RSA [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | knownhosts-command.sh | 41 for keytype in ${SSH_HOSTKEY_TYPES} ; do 42 algs=$keytype 43 test "x$keytype" = "xssh-dss" && continue 44 test "x$keytype" = "xssh-rsa" && algs=ssh-rsa,rsa-sha2-256,rsa-sha2-512 45 verbose "keytype $keytype" 49 test "x\$1" = "x$keytype" || die "wrong keytype \$1 (expected $keytype)"
|
H A D | krl.sh | 69 keytype=$ktype1 71 2 | 10 | 510 | 1001) keytype=$ktype2 ;; 72 4 | 30 | 520 | 1002) keytype=$ktype3 ;; 73 8 | 50 | 530 | 1003) keytype=$ktype4 ;; 74 16 | 70 | 540 | 1004) keytype=$ktype5 ;; 75 32 | 90 | 550 | 1005) keytype=$ktype6 ;; 77 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | mk_req_ext.c | 82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { in _krb5_mk_req_internal() 91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || in _krb5_mk_req_internal() 92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || in _krb5_mk_req_internal() 93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || in _krb5_mk_req_internal() 94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { in _krb5_mk_req_internal() 128 ac->keyblock->keytype, in _krb5_mk_req_internal() 138 ret = krb5_build_ap_req (context, ac->keyblock->keytype, in _krb5_mk_req_internal()
|
H A D | keyblock.c | 47 keyblock->keytype = 0; in krb5_keyblock_zero() 68 keyblock->keytype = ENCTYPE_NULL; in krb5_free_keyblock_contents() 161 return block->keytype; in krb5_keyblock_get_enctype() 201 key->keytype = type; in krb5_keyblock_init()
|
H A D | auth_context.c | 61 p->keytype = ENCTYPE_NULL; in krb5_auth_con_init() 331 auth_context->keytype, in krb5_auth_con_generatelocalsubkey() 373 krb5_keytype keytype) in krb5_auth_con_setkeytype() argument 375 auth_context->keytype = keytype; in krb5_auth_con_setkeytype() 382 krb5_keytype *keytype) in krb5_auth_con_getkeytype() argument 384 *keytype = auth_context->keytype; in krb5_auth_con_getkeytype() 399 auth_context->keyblock->keytype = etype;
|
H A D | salt-aes.c | 70 kd.key->keytype = enctype; in AES_string_to_key() 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in AES_string_to_key() 80 et->keytype->size, kd.key->keyvalue.data); in AES_string_to_key()
|
H A D | mk_req.c | 62 if (auth_context && *auth_context && (*auth_context)->keytype) in krb5_mk_req_exact() 63 this_cred.session.keytype = (*auth_context)->keytype; in krb5_mk_req_exact()
|
H A D | salt.c | 55 for (st = e->keytype->string_to_key; st && st->type; st++) { in krb5_salttype_to_string() 89 for (st = e->keytype->string_to_key; st && st->type; st++) { in krb5_string_to_salttype() 204 for(st = et->keytype->string_to_key; st && st->type; st++) in krb5_string_to_key_data_salt_opaque() 268 keylen = et->keytype->bits / 8; in krb5_string_to_key_derived() 276 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in krb5_string_to_key_derived() 281 kd.key->keytype = etype; in krb5_string_to_key_derived()
|
H A D | crypto.c | 91 *keysize = et->keytype->size; in krb5_enctype_keysize() 104 *keybits = et->keytype->bits; in krb5_enctype_keybits() 118 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); in krb5_generate_random_keyblock() 121 key->keytype = type; in krb5_generate_random_keyblock() 122 if(et->keytype->random_key) in krb5_generate_random_keyblock() 123 (*et->keytype->random_key)(context, key); in krb5_generate_random_keyblock() 135 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); in _key_schedule() 140 key->key->keytype); in _key_schedule() 143 kt = et->keytype; in _key_schedule() 387 (crypto->key.key->keytype == KEYTYPE_ARCFOUR); in arcfour_checksum_p() [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 99 keys[i].key.keytype = key_data[i].key_data_type[0]; in _kadm5_set_keys2() 183 is_des_key_p(int keytype) in is_des_key_p() argument 185 return keytype == ETYPE_DES_CBC_CRC || in is_des_key_p() 186 keytype == ETYPE_DES_CBC_MD4 || in is_des_key_p() 187 keytype == ETYPE_DES_CBC_MD5; in is_des_key_p() 229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { in _kadm5_set_keys_randomly() 235 kblock[i].keytype = keys[i].key.keytype; in _kadm5_set_keys_randomly() 238 keys[i].key.keytype, in _kadm5_set_keys_randomly() 243 if (is_des_key_p(keys[i].key.keytype)) in _kadm5_set_keys_randomly()
|
/freebsd/crypto/openssl/crypto/encode_decode/ |
H A D | decoder_pkey.c | 307 EVP_PKEY **pkey, const char *keytype, in ossl_decoder_ctx_setup_for_pkey() argument 319 if (keytype != NULL in ossl_decoder_ctx_setup_for_pkey() 320 && (strcmp(keytype, "id-ecPublicKey") == 0 in ossl_decoder_ctx_setup_for_pkey() 321 || strcmp(keytype, "1.2.840.10045.2.1") == 0)) in ossl_decoder_ctx_setup_for_pkey() 328 keytype != NULL ? keytype : "", in ossl_decoder_ctx_setup_for_pkey() 329 keytype != NULL ? " keys" : "keys of any type", in ossl_decoder_ctx_setup_for_pkey() 365 if (keytype == NULL in ossl_decoder_ctx_setup_for_pkey() 366 || EVP_KEYMGMT_is_a(keymgmt, keytype) in ossl_decoder_ctx_setup_for_pkey() 433 const char *keytype, int selection, in OSSL_DECODER_CTX_new_for_pkey() argument 446 (void *)ctx, keytype, selection); in OSSL_DECODER_CTX_new_for_pkey() [all …]
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 27 static int prepare_key(struct shared_state *st, int keytype, int bits); 157 get_pubkey(struct shared_state *st, int keytype) in get_pubkey() argument 159 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_pubkey() 160 st->pubkeys == NULL || st->pubkeys[keytype] == NULL) in get_pubkey() 162 return st->pubkeys[keytype]; in get_pubkey() 166 get_privkey(struct shared_state *st, int keytype) in get_privkey() argument 168 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_privkey() 169 st->privkeys == NULL || st->privkeys[keytype] == NULL) in get_privkey() 171 return st->privkeys[keytype]; in get_privkey() 176 const char *kex, int keytype) in do_kex_with_key() argument [all …]
|
/freebsd/crypto/heimdal/admin/ |
H A D | copy.c | 42 if(a->keytype != b->keytype || in compare_keyblock() 90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); in kt_copy() 98 entry.keyblock.keytype, in kt_copy()
|
/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | inquire_sec_context_by_oid.c | 102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 108 enum keytype keytype, in inquire_sec_context_get_subkey() argument 127 switch(keytype) { in inquire_sec_context_get_subkey() 138 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); in inquire_sec_context_get_subkey() 146 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); in inquire_sec_context_get_subkey() 293 is_updated = (acceptor_subkey->keytype != in inquire_sec_context_has_updated_spnego() 294 context_handle->auth_context->keyblock->keytype); in inquire_sec_context_has_updated_spnego() 361 switch (key->keytype) { in export_lucid_sec_context_v1()
|
H A D | wrap.c | 150 krb5_keytype keytype; in _gsskrb5_wrap_size_limit() local 167 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_wrap_size_limit() 169 switch (keytype) { in _gsskrb5_wrap_size_limit() 550 krb5_keytype keytype; in _gsskrb5_wrap() local 570 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_wrap() 572 switch (keytype) { in _gsskrb5_wrap()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 41 int keytype, int optype, 141 static void help_get_legacy_alg_type_from_keymgmt(const char *keytype, in help_get_legacy_alg_type_from_keymgmt() argument 147 *type = evp_pkey_name2type(keytype); in help_get_legacy_alg_type_from_keymgmt() 182 const char *keytype, const char *propquery, in int_ctx_new() argument 198 keytype = EVP_KEYMGMT_get0_name(pkey->keymgmt); in int_ctx_new() 201 if (keytype != NULL) { in int_ctx_new() 202 id = evp_pkey_name2type(keytype); in int_ctx_new() 231 keytype = NULL; in int_ctx_new() 233 keytype = OBJ_nid2sn(id); in int_ctx_new() 268 if (e == NULL && app_pmeth == NULL && keytype != NULL) { in int_ctx_new() [all …]
|