/freebsd/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 88 for ktype in $PLAIN_TYPES ; do 89 verbose "$tid: sign host ${ktype} cert" 91 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 92 -f $OBJ/cert_host_key_${ktype} || \ 93 fatal "ssh-keygen of cert_host_key_${ktype} failed" 95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 97 case $ktype in 98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;; 103 -n $HOSTS $OBJ/cert_host_key_${ktype} || [all …]
|
H A D | cert-userkey.sh | 44 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do 45 verbose "$tid: sign user ${ktype} cert" 46 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 47 -f $OBJ/cert_user_key_${ktype} || \ 48 fatal "ssh-keygen of cert_user_key_${ktype} failed" 50 case $ktype in 51 rsa-sha2-*) tflag="-t $ktype" ;; 56 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 57 fatal "couldn't sign cert_user_key_${ktype}" 61 for ktype in $EXTRA_TYPES $PLAIN_TYPES ; do [all …]
|
/freebsd/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 76 int ktype, in make_mac() 94 if (ktype == NID_cmac) { in make_mac() 137 ctx = get_md_ctx(ktype); in make_mac() 143 OBJ_nid2sn(ktype)); in make_mac() 148 OBJ_nid2sn(ktype)); in make_mac() 153 OBJ_nid2sn(ktype)); in make_mac() 158 OBJ_nid2sn(ktype)); in make_mac() 167 if (NID_md5 == ktype) { in make_mac() 170 ctx = get_md_ctx(ktype); in make_mac() 181 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype); in make_mac() 46 make_mac(const rwbuffT * digest,int ktype,const robuffT * key,const robuffT * msg) make_mac() argument [all...] |
/freebsd/sys/compat/linuxkpi/common/src/ |
H A D | linux_kobject.c | 119 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { in kobject_add_complete() 121 t = kobj->ktype; in kobject_add_complete() 156 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, in kobject_init_and_add() argument 162 kobject_init(kobj, ktype); in kobject_init_and_add() 163 kobj->ktype = ktype; in kobject_init_and_add() 185 if (kobj->ktype && kobj->ktype->release) in linux_kobject_release() 186 kobj->ktype->release(kobj); in linux_kobject_release()
|
H A D | linux_compat.c | 696 if (ldev->kobj.ktype == &linux_cdev_static_ktype) { in linux_get_fop() 721 if (ldev->kobj.ktype == &linux_cdev_static_ktype) { in linux_drop_fop() 724 MPASS(ldev->kobj.ktype == &linux_cdev_ktype); in linux_drop_fop() 2271 ldev->kobj.ktype == &linux_cdev_ktype) in linux_cdev_deref() 2347 MPASS(ldev->kobj.ktype == &linux_cdev_ktype); in linux_destroy_dev()
|
/freebsd/crypto/openssh/ |
H A D | ssh-ed25519-sk.c | 99 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_public() argument 104 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_public() 112 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_private() argument 117 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_private() 132 char *ktype = NULL; in ssh_ed25519_sk_verify() local 157 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ed25519_sk_verify() 172 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ed25519_sk_verify() 247 free(ktype); in ssh_ed25519_sk_verify()
|
H A D | ssh-ecdsa-sk.c | 128 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_public() argument 133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_sk_deserialize_public() 141 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_private() argument 147 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, in ssh_ecdsa_sk_deserialize_private() 249 char *ktype = NULL, *webauthn_origin = NULL; in ssh_ecdsa_sk_verify() local 272 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in ssh_ecdsa_sk_verify() 276 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) in ssh_ecdsa_sk_verify() 278 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { in ssh_ecdsa_sk_verify() 435 free(ktype); in ssh_ecdsa_sk_verify()
|
H A D | ssh-ed25519.c | 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_public() argument 121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_private() argument 211 char *ktype = NULL; in ssh_ed25519_verify() local 227 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_ed25519_verify() 230 if (strcmp("ssh-ed25519", ktype) != 0) { in ssh_ed25519_verify() 271 free(ktype); in ssh_ed25519_verify()
|
H A D | ssh-ecdsa.c | 231 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_public() argument 239 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) in ssh_ecdsa_deserialize_public() 284 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_private() argument 292 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_deserialize_private() 396 char *ktype = NULL; in ssh_ecdsa_verify() local 410 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ecdsa_verify() 415 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ecdsa_verify() 470 free(ktype); in ssh_ecdsa_verify()
|
H A D | ssh-dss.c | 201 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_public() argument 238 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_private() argument 245 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0) in ssh_dss_deserialize_private() 340 char *ktype = NULL; in ssh_dss_verify() local 352 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_dss_verify() 357 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify() 412 free(ktype); in ssh_dss_verify()
|
H A D | ssh-xmss.c | 132 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_public() argument 164 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_private() argument 283 char *ktype = NULL; in ssh_xmss_verify() local 303 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_xmss_verify() 306 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { in ssh_xmss_verify() 347 free(ktype); in ssh_xmss_verify()
|
H A D | hostfile.c | 763 char *line = NULL, ktype[128]; in hostkeys_foreach_file() local 882 if (l <= 1 || l >= sizeof(ktype) || in hostkeys_foreach_file() 885 memcpy(ktype, lineinfo.rawkey, l); in hostkeys_foreach_file() 886 ktype[l] = '\0'; in hostkeys_foreach_file() 887 lineinfo.keytype = sshkey_type_from_name(ktype); in hostkeys_foreach_file() 894 strspn(ktype, "0123456789") == l) in hostkeys_foreach_file()
|
H A D | ssh_api.c | 535 int ktype, r; in _ssh_order_hostkeyalgs() local 552 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs() 555 if (k->key->type == ktype || in _ssh_order_hostkeyalgs() 557 sshkey_type_plain(ktype))) { in _ssh_order_hostkeyalgs()
|
H A D | ssh-rsa.c | 195 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_rsa_deserialize_public() argument 234 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_rsa_deserialize_private() argument
|
H A D | sshkey.c | 313 int ktype; in sshkey_match_keyname_to_sigalgs() local 316 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) in sshkey_match_keyname_to_sigalgs() 318 else if (ktype == KEY_RSA) { in sshkey_match_keyname_to_sigalgs() 322 } else if (ktype == KEY_RSA_CERT) { in sshkey_match_keyname_to_sigalgs() 2009 char *ktype = NULL; in sshkey_from_blob_internal() local 2023 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in sshkey_from_blob_internal() 2028 type = sshkey_type_from_name(ktype); in sshkey_from_blob_internal() 2048 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0) in sshkey_from_blob_internal() 2067 free(ktype); in sshkey_from_blob_internal()
|
H A D | sshconnect2.c | 127 int ktype; in order_hostkeyalgs() local 178 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs() 184 if (sshkey_type_is_cert(ktype) && in order_hostkeyalgs() 191 sshkey_type_plain(ktype), in order_hostkeyalgs()
|
/freebsd/sys/compat/linuxkpi/common/include/linux/ |
H A D | kobject.h | 61 const struct kobj_type *ktype; member 97 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) in kobject_init() argument 102 kobj->ktype = ktype; in kobject_init() 158 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
|
H A D | sysfs.h | 94 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) in sysctl_handle_attr() 99 ops = kobj->ktype->sysfs_ops; in sysctl_handle_attr()
|
/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 275 const char *ktype = NULL; in do_dsa_print() local 293 ktype = "Private-Key"; in do_dsa_print() 295 ktype = "Public-Key"; in do_dsa_print() 297 ktype = "DSA-Parameters"; in do_dsa_print() 302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0) in do_dsa_print()
|
/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 247 const char *ktype = NULL; in do_dh_print() local 267 ktype = "DH Private-Key"; in do_dh_print() 269 ktype = "DH Public-Key"; in do_dh_print() 271 ktype = "DH Parameters"; in do_dh_print() 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0) in do_dh_print()
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) in do_EC_KEY_print() argument 296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { in do_EC_KEY_print() 302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { in do_EC_KEY_print() 308 if (ktype == EC_KEY_PRINT_PRIVATE) in do_EC_KEY_print() 310 else if (ktype == EC_KEY_PRINT_PUBLIC) in do_EC_KEY_print()
|
/freebsd/sys/ofed/drivers/infiniband/core/ |
H A D | core_priv.h | 144 struct kobject *kobj, struct kobj_type *ktype,
|
H A D | ib_sysfs.c | 1404 struct kobject *kobj, struct kobj_type *ktype, in ib_port_register_module_stat() argument 1416 ret = kobject_init_and_add(kobj, ktype, &port->kobj, "%s", in ib_port_register_module_stat()
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | admin.h | 229 ktype, int32_t stype, int32_t
|
/freebsd/contrib/bearssl/test/ |
H A D | test_x509.c | 1220 char *ktype, *kusage, *sstatus, *shashes, *stime; in parse_object() local 1222 ktype = get_value(objtype, objdata, linenum, "keytype"); in parse_object() 1231 if (eqstring(ktype, "RSA")) { in parse_object() 1233 } else if (eqstring(ktype, "EC")) { in parse_object() 1238 ktype, linenum); in parse_object()
|