Home
last modified time | relevance | path

Searched refs:ktype (Results 1 – 25 of 60) sorted by relevance

123

/freebsd/crypto/openssh/regress/
H A Dcert-hostkey.sh88 for ktype in $PLAIN_TYPES ; do
89 verbose "$tid: sign host ${ktype} cert"
91 ${SSHKEYGEN} -q -N '' -t ${ktype} \
92 -f $OBJ/cert_host_key_${ktype} || \
93 fatal "ssh-keygen of cert_host_key_${ktype} failed"
95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
97 case $ktype in
98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;;
103 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
[all …]
H A Dcert-userkey.sh47 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do
48 verbose "$tid: sign user ${ktype} cert"
49 ${SSHKEYGEN} -q -N '' -t ${ktype} \
50 -f $OBJ/cert_user_key_${ktype} || \
51 fatal "ssh-keygen of cert_user_key_${ktype} failed"
53 case $ktype in
54 rsa-sha2-*) tflag="-t $ktype" ;;
59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
60 fatal "couldn't sign cert_user_key_${ktype}"
64 for ktype in $EXTRA_TYPES $PLAIN_TYPES ; do
[all …]
/freebsd/contrib/ntp/libntp/
H A Da_md5encrypt.c76 int ktype, in make_mac()
94 if (ktype == NID_cmac) { in make_mac()
137 ctx = get_md_ctx(ktype); in make_mac()
143 OBJ_nid2sn(ktype)); in make_mac()
148 OBJ_nid2sn(ktype)); in make_mac()
153 OBJ_nid2sn(ktype)); in make_mac()
158 OBJ_nid2sn(ktype)); in make_mac()
167 if (NID_md5 == ktype) { in make_mac()
170 ctx = get_md_ctx(ktype); in make_mac()
181 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype); in make_mac()
46 make_mac(const rwbuffT * digest,int ktype,const robuffT * key,const robuffT * msg) make_mac() argument
[all...]
/freebsd/sys/compat/linuxkpi/common/src/
H A Dlinux_kobject.c119 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { in kobject_add_complete()
121 t = kobj->ktype; in kobject_add_complete()
156 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, in kobject_init_and_add() argument
162 kobject_init(kobj, ktype); in kobject_init_and_add()
163 kobj->ktype = ktype; in kobject_init_and_add()
185 if (kobj->ktype && kobj->ktype->release) in linux_kobject_release()
186 kobj->ktype->release(kobj); in linux_kobject_release()
/freebsd/crypto/openssh/
H A Dssh-ed25519-sk.c99 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_public() argument
104 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_public()
112 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_private() argument
117 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_private()
132 char *ktype = NULL; in ssh_ed25519_sk_verify() local
157 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ed25519_sk_verify()
172 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ed25519_sk_verify()
247 free(ktype); in ssh_ed25519_sk_verify()
H A Dssh-ecdsa-sk.c128 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_public() argument
133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_sk_deserialize_public()
141 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_private() argument
147 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, in ssh_ecdsa_sk_deserialize_private()
249 char *ktype = NULL, *webauthn_origin = NULL; in ssh_ecdsa_sk_verify() local
272 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in ssh_ecdsa_sk_verify()
276 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) in ssh_ecdsa_sk_verify()
278 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { in ssh_ecdsa_sk_verify()
435 free(ktype); in ssh_ecdsa_sk_verify()
H A Dssh-ed25519.c103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_public() argument
121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_private() argument
211 char *ktype = NULL; in ssh_ed25519_verify() local
227 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_ed25519_verify()
230 if (strcmp("ssh-ed25519", ktype) != 0) { in ssh_ed25519_verify()
271 free(ktype); in ssh_ed25519_verify()
H A Dssh-ecdsa.c231 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_public() argument
239 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) in ssh_ecdsa_deserialize_public()
284 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_private() argument
292 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_deserialize_private()
396 char *ktype = NULL; in ssh_ecdsa_verify() local
410 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ecdsa_verify()
415 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ecdsa_verify()
470 free(ktype); in ssh_ecdsa_verify()
H A Dssh-dss.c201 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_public() argument
238 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_private() argument
245 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0) in ssh_dss_deserialize_private()
340 char *ktype = NULL; in ssh_dss_verify() local
352 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_dss_verify()
357 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify()
412 free(ktype); in ssh_dss_verify()
H A Dssh-xmss.c132 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_public() argument
164 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_private() argument
283 char *ktype = NULL; in ssh_xmss_verify() local
303 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_xmss_verify()
306 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { in ssh_xmss_verify()
347 free(ktype); in ssh_xmss_verify()
H A Dhostfile.c763 char *line = NULL, ktype[128]; in hostkeys_foreach_file() local
882 if (l <= 1 || l >= sizeof(ktype) || in hostkeys_foreach_file()
885 memcpy(ktype, lineinfo.rawkey, l); in hostkeys_foreach_file()
886 ktype[l] = '\0'; in hostkeys_foreach_file()
887 lineinfo.keytype = sshkey_type_from_name(ktype); in hostkeys_foreach_file()
894 strspn(ktype, "0123456789") == l) in hostkeys_foreach_file()
H A Dssh_api.c535 int ktype, nid, r; in _ssh_order_hostkeyalgs() local
552 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs()
556 if (k->key->type != ktype && in _ssh_order_hostkeyalgs()
558 k->key->type != sshkey_type_plain(ktype))) in _ssh_order_hostkeyalgs()
/freebsd/crypto/openssl/crypto/
H A Ddefaults.c69 DWORD ktype; in get_windows_regdirs() local
82 ret = RegQueryValueExW(hkey, valuename, NULL, &ktype, NULL, in get_windows_regdirs()
86 if (ktype != REG_EXPAND_SZ && ktype != REG_SZ) in get_windows_regdirs()
101 NULL, &ktype, (LPBYTE)tempstr, &keysizebytes) in get_windows_regdirs()
/freebsd/sys/compat/linuxkpi/common/include/linux/
H A Dkobject.h61 const struct kobj_type *ktype; member
97 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) in kobject_init() argument
102 kobj->ktype = ktype; in kobject_init()
158 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
H A Dsysfs.h136 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) in sysctl_handle_attr()
141 ops = kobj->ktype->sysfs_ops; in sysctl_handle_attr()
268 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) in sysctl_handle_bin_attr()
/freebsd/crypto/krb5/src/kdc/
H A Dkdc_util.c1086 int nktypes, krb5_enctype *ktype) in select_session_keytype() argument
1091 if (!krb5_c_valid_enctype(ktype[i])) in select_session_keytype()
1094 if (!krb5_is_permitted_enctype(context, ktype[i])) in select_session_keytype()
1102 if (ktype[i] == ENCTYPE_DES3_CBC_SHA1 && !context->allow_des3) in select_session_keytype()
1104 if (ktype[i] == ENCTYPE_ARCFOUR_HMAC && !context->allow_rc4) in select_session_keytype()
1107 if (dbentry_supports_enctype(context, server, ktype[i])) in select_session_keytype()
1108 return ktype[i]; in select_session_keytype()
1140 enctype_name(krb5_enctype ktype, char *buf, size_t buflen) in enctype_name() argument
1149 if (!krb5_c_valid_enctype(ktype)) in enctype_name()
1151 else if (krb5int_c_deprecated_enctype(ktype)) in enctype_name()
[all …]
H A Dkdc_log.c74 ktypestr = ktypes2str(request->ktype, request->nktypes); in log_as_req()
143 ktypestr = ktypes2str(request->ktype, request->nktypes); in log_tgs_req()
/freebsd/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c274 const char *ktype = NULL; in do_dsa_print() local
292 ktype = "Private-Key"; in do_dsa_print()
294 ktype = "Public-Key"; in do_dsa_print()
296 ktype = "DSA-Parameters"; in do_dsa_print()
301 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0) in do_dsa_print()
/freebsd/crypto/openssl/crypto/ec/
H A Dec_ameth.c283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) in do_EC_KEY_print() argument
296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { in do_EC_KEY_print()
302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { in do_EC_KEY_print()
308 if (ktype == EC_KEY_PRINT_PRIVATE) in do_EC_KEY_print()
310 else if (ktype == EC_KEY_PRINT_PUBLIC) in do_EC_KEY_print()
/freebsd/crypto/openssl/crypto/dh/
H A Ddh_ameth.c247 const char *ktype = NULL; in do_dh_print() local
267 ktype = "DH Private-Key"; in do_dh_print()
269 ktype = "DH Public-Key"; in do_dh_print()
271 ktype = "DH Parameters"; in do_dh_print()
274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0) in do_dh_print()
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dsend_tgs.c202 req.ktype = enctypes; in k5_make_tgs_req()
210 req.ktype = defenctypes; in k5_make_tgs_req()
213 TRACE_SEND_TGS_ETYPES(context, req.ktype); in k5_make_tgs_req()
H A Dpreauth2.c385 grow_ktypes(krb5_enctype **out_ktypes, int *out_nktypes, krb5_enctype ktype) in grow_ktypes() argument
391 if ((*out_ktypes)[i] == ktype) in grow_ktypes()
394 ktypes = realloc(*out_ktypes, (*out_nktypes + 2) * sizeof(ktype)); in grow_ktypes()
397 ktypes[(*out_nktypes)++] = ktype; in grow_ktypes()
594 grow_ktypes(&req->ktype, &req->nktypes, *ep); in k5_preauth_prepare_request()
823 if ((*e)->etype == ctx->request->ktype[i]) in k5_get_etype_info()
/freebsd/crypto/krb5/src/lib/gssapi/krb5/
H A Dutil_crypt.c617 krb5_cryptotype ktype; in kg_translate_flag_iov() local
622 ktype = KRB5_CRYPTO_TYPE_DATA; in kg_translate_flag_iov()
625 ktype = KRB5_CRYPTO_TYPE_SIGN_ONLY; in kg_translate_flag_iov()
628 ktype = KRB5_CRYPTO_TYPE_EMPTY; in kg_translate_flag_iov()
632 return ktype; in kg_translate_flag_iov()
/freebsd/crypto/krb5/src/include/
H A Dkdb.h433 krb5_int32 ktype,
442 krb5_int32 ktype,
745 krb5_int32 ktype,
1235 krb5_int32 *start, krb5_int32 ktype,
/freebsd/sys/ofed/drivers/infiniband/core/
H A Dcore_priv.h144 struct kobject *kobj, struct kobj_type *ktype,

123