Home
last modified time | relevance | path

Searched refs:keytype (Results 1 – 25 of 170) sorted by relevance

1234567

/freebsd/crypto/openssl/providers/implementations/encode_decode/
H A Ddecode_der2key.c570 #define DO_type_specific_keypair(keytype) \ argument
571 "type-specific", keytype##_evp_type, \
573 keytype##_d2i_private_key, \
574 keytype##_d2i_public_key, \
578 keytype##_check, \
579 keytype##_adjust, \
580 keytype##_free
582 #define DO_type_specific_pub(keytype) \ argument
583 "type-specific", keytype##_evp_type, \
586 keytype##_d2i_public_key, \
[all …]
H A Ddecode_pvk2key.c224 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument
226 pvk2##keytype##_desc = { \
228 ossl_##keytype##_keymgmt_functions, \
229 keytype##_private_key_bio, \
230 keytype##_adjust, \
231 keytype##_free \
233 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \
234 static void *pvk2##keytype##_newctx(void *provctx) \
236 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \
239 ossl_##pvk_to_##keytype##_decoder_functions[] = { \
[all …]
H A Ddecode_msblob2key.c259 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument
260 static const struct keytype_desc_st mstype##2##keytype##_desc = { \
262 ossl_##keytype##_keymgmt_functions, \
263 keytype##_decode_private_key, \
264 keytype##_decode_public_key, \
265 keytype##_adjust, \
266 keytype##_free \
268 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \
269 static void *msblob2##keytype##_newctx(void *provctx) \
271 return msblob2key_newctx(provctx, &mstype##2##keytype##_desc); \
[all …]
H A Ddecode_epki2pki.c131 char keytype[OSSL_MAX_NAME_SIZE]; in epki2pki_decode() local
135 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); in epki2pki_decode()
138 keytype, 0); in epki2pki_decode()
/freebsd/crypto/openssl/crypto/asn1/
H A Dd2i_pr.c27 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument
38 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder()
39 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder()
78 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument
97 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy()
123 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy()
143 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument
149 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex()
152 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex()
170 int keytype; in d2i_AutoPrivateKey_legacy() local
[all …]
/freebsd/crypto/openssl/test/
H A Dendecoder_legacy_test.c73 const char *keytype; member
216 const char *keytype; member
280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key()
298 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument
338 keytype, selection, in test_protected_PEM()
366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument
405 keytype, selection, in test_unprotected_PEM()
433 static int test_DER(const char *keytype, int evp_type, in test_DER() argument
472 keytype, selection, in test_DER()
515 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key()
[all …]
/freebsd/contrib/ntp/libntp/
H A Dauthreadkeys.c92 u_short keytype; /* stored key type */ member
143 int keytype; in authreadkeys() local
194 * Next is keytype. See if that is all right. in authreadkeys()
218 keytype = keytype_from_text(token, NULL); in authreadkeys()
219 if (keytype == 0) { in authreadkeys()
224 } else if (NID_cmac != keytype && in authreadkeys()
225 EVP_get_digestbynid(keytype) == NULL) { in authreadkeys()
229 keytype = 0; in authreadkeys()
241 keytype = 0; in authreadkeys()
243 keytype in authreadkeys()
[all...]
H A Dauthusekey.c19 int keytype, in authusekey() argument
31 MD5auth_setkey(keyno, keytype, buf, len, NULL); in authusekey()
/freebsd/contrib/bearssl/test/x509/
H A Dalltests.txt137 keytype = RSA
149 keytype = RSA
159 keytype = RSA
170 keytype = RSA
181 keytype = RSA
192 keytype = RSA
203 keytype = RSA
214 keytype = RSA
226 keytype = RSA
237 keytype = RSA
[all …]
/freebsd/crypto/openssh/regress/
H A Dknownhosts-command.sh41 for keytype in ${SSH_HOSTKEY_TYPES} ; do
42 algs=$keytype
43 test "x$keytype" = "xssh-dss" && continue
44 test "x$keytype" = "xssh-rsa" && algs=ssh-rsa,rsa-sha2-256,rsa-sha2-512
45 verbose "keytype $keytype"
49 test "x\$1" = "x$keytype" || die "wrong keytype \$1 (expected $keytype)"
H A Dkrl.sh69 keytype=$ktype1
71 2 | 10 | 510 | 1001) keytype=$ktype2 ;;
72 4 | 30 | 520 | 1002) keytype=$ktype3 ;;
73 8 | 50 | 530 | 1003) keytype=$ktype4 ;;
74 16 | 70 | 540 | 1004) keytype=$ktype5 ;;
75 32 | 90 | 550 | 1005) keytype=$ktype6 ;;
77 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
/freebsd/crypto/heimdal/lib/krb5/
H A Dmk_req_ext.c82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { in _krb5_mk_req_internal()
91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || in _krb5_mk_req_internal()
92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || in _krb5_mk_req_internal()
93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || in _krb5_mk_req_internal()
94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { in _krb5_mk_req_internal()
128 ac->keyblock->keytype, in _krb5_mk_req_internal()
138 ret = krb5_build_ap_req (context, ac->keyblock->keytype, in _krb5_mk_req_internal()
H A Dkeyblock.c47 keyblock->keytype = 0; in krb5_keyblock_zero()
68 keyblock->keytype = ENCTYPE_NULL; in krb5_free_keyblock_contents()
161 return block->keytype; in krb5_keyblock_get_enctype()
201 key->keytype = type; in krb5_keyblock_init()
H A Dauth_context.c61 p->keytype = ENCTYPE_NULL; in krb5_auth_con_init()
331 auth_context->keytype, in krb5_auth_con_generatelocalsubkey()
373 krb5_keytype keytype) in krb5_auth_con_setkeytype() argument
375 auth_context->keytype = keytype; in krb5_auth_con_setkeytype()
382 krb5_keytype *keytype) in krb5_auth_con_getkeytype() argument
384 *keytype = auth_context->keytype; in krb5_auth_con_getkeytype()
399 auth_context->keyblock->keytype = etype;
H A Dsalt-aes.c70 kd.key->keytype = enctype; in AES_string_to_key()
71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in AES_string_to_key()
80 et->keytype->size, kd.key->keyvalue.data); in AES_string_to_key()
H A Dmk_req.c62 if (auth_context && *auth_context && (*auth_context)->keytype) in krb5_mk_req_exact()
63 this_cred.session.keytype = (*auth_context)->keytype; in krb5_mk_req_exact()
H A Dsalt.c55 for (st = e->keytype->string_to_key; st && st->type; st++) { in krb5_salttype_to_string()
89 for (st = e->keytype->string_to_key; st && st->type; st++) { in krb5_string_to_salttype()
204 for(st = et->keytype->string_to_key; st && st->type; st++) in krb5_string_to_key_data_salt_opaque()
268 keylen = et->keytype->bits / 8; in krb5_string_to_key_derived()
276 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in krb5_string_to_key_derived()
281 kd.key->keytype = etype; in krb5_string_to_key_derived()
H A Dcrypto.c91 *keysize = et->keytype->size; in krb5_enctype_keysize()
104 *keybits = et->keytype->bits; in krb5_enctype_keybits()
118 ret = krb5_data_alloc(&key->keyvalue, et->keytype->size); in krb5_generate_random_keyblock()
121 key->keytype = type; in krb5_generate_random_keyblock()
122 if(et->keytype->random_key) in krb5_generate_random_keyblock()
123 (*et->keytype->random_key)(context, key); in krb5_generate_random_keyblock()
135 struct _krb5_encryption_type *et = _krb5_find_enctype(key->key->keytype); in _key_schedule()
140 key->key->keytype); in _key_schedule()
143 kt = et->keytype; in _key_schedule()
387 (crypto->key.key->keytype == KEYTYPE_ARCFOUR); in arcfour_checksum_p()
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dset_keys.c99 keys[i].key.keytype = key_data[i].key_data_type[0]; in _kadm5_set_keys2()
183 is_des_key_p(int keytype) in is_des_key_p() argument
185 return keytype == ETYPE_DES_CBC_CRC || in is_des_key_p()
186 keytype == ETYPE_DES_CBC_MD4 || in is_des_key_p()
187 keytype == ETYPE_DES_CBC_MD5; in is_des_key_p()
229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { in _kadm5_set_keys_randomly()
235 kblock[i].keytype = keys[i].key.keytype; in _kadm5_set_keys_randomly()
238 keys[i].key.keytype, in _kadm5_set_keys_randomly()
243 if (is_des_key_p(keys[i].key.keytype)) in _kadm5_set_keys_randomly()
/freebsd/crypto/openssl/crypto/encode_decode/
H A Ddecoder_pkey.c307 EVP_PKEY **pkey, const char *keytype, in ossl_decoder_ctx_setup_for_pkey() argument
319 if (keytype != NULL in ossl_decoder_ctx_setup_for_pkey()
320 && (strcmp(keytype, "id-ecPublicKey") == 0 in ossl_decoder_ctx_setup_for_pkey()
321 || strcmp(keytype, "1.2.840.10045.2.1") == 0)) in ossl_decoder_ctx_setup_for_pkey()
328 keytype != NULL ? keytype : "", in ossl_decoder_ctx_setup_for_pkey()
329 keytype != NULL ? " keys" : "keys of any type", in ossl_decoder_ctx_setup_for_pkey()
365 if (keytype == NULL in ossl_decoder_ctx_setup_for_pkey()
366 || EVP_KEYMGMT_is_a(keymgmt, keytype) in ossl_decoder_ctx_setup_for_pkey()
433 const char *keytype, int selection, in OSSL_DECODER_CTX_new_for_pkey() argument
446 (void *)ctx, keytype, selection); in OSSL_DECODER_CTX_new_for_pkey()
[all …]
/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc27 static int prepare_key(struct shared_state *st, int keytype, int bits);
157 get_pubkey(struct shared_state *st, int keytype) in get_pubkey() argument
159 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_pubkey()
160 st->pubkeys == NULL || st->pubkeys[keytype] == NULL) in get_pubkey()
162 return st->pubkeys[keytype]; in get_pubkey()
166 get_privkey(struct shared_state *st, int keytype) in get_privkey() argument
168 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_privkey()
169 st->privkeys == NULL || st->privkeys[keytype] == NULL) in get_privkey()
171 return st->privkeys[keytype]; in get_privkey()
176 const char *kex, int keytype) in do_kex_with_key() argument
[all …]
/freebsd/crypto/heimdal/admin/
H A Dcopy.c42 if(a->keytype != b->keytype || in compare_keyblock()
90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); in kt_copy()
98 entry.keyblock.keytype, in kt_copy()
/freebsd/crypto/heimdal/lib/gssapi/krb5/
H A Dinquire_sec_context_by_oid.c102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum
108 enum keytype keytype, in inquire_sec_context_get_subkey() argument
127 switch(keytype) { in inquire_sec_context_get_subkey()
138 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); in inquire_sec_context_get_subkey()
146 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); in inquire_sec_context_get_subkey()
293 is_updated = (acceptor_subkey->keytype != in inquire_sec_context_has_updated_spnego()
294 context_handle->auth_context->keyblock->keytype); in inquire_sec_context_has_updated_spnego()
361 switch (key->keytype) { in export_lucid_sec_context_v1()
H A Dwrap.c150 krb5_keytype keytype; in _gsskrb5_wrap_size_limit() local
167 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_wrap_size_limit()
169 switch (keytype) { in _gsskrb5_wrap_size_limit()
550 krb5_keytype keytype; in _gsskrb5_wrap() local
570 krb5_enctype_to_keytype (context, key->keytype, &keytype); in _gsskrb5_wrap()
572 switch (keytype) { in _gsskrb5_wrap()
/freebsd/crypto/openssl/crypto/evp/
H A Dpmeth_lib.c41 int keytype, int optype,
141 static void help_get_legacy_alg_type_from_keymgmt(const char *keytype, in help_get_legacy_alg_type_from_keymgmt() argument
147 *type = evp_pkey_name2type(keytype); in help_get_legacy_alg_type_from_keymgmt()
182 const char *keytype, const char *propquery, in int_ctx_new() argument
198 keytype = EVP_KEYMGMT_get0_name(pkey->keymgmt); in int_ctx_new()
201 if (keytype != NULL) { in int_ctx_new()
202 id = evp_pkey_name2type(keytype); in int_ctx_new()
231 keytype = NULL; in int_ctx_new()
233 keytype = OBJ_nid2sn(id); in int_ctx_new()
268 if (e == NULL && app_pmeth == NULL && keytype != NULL) { in int_ctx_new()
[all …]

1234567