| /freebsd/crypto/openssh/regress/ |
| H A D | cert-hostkey.sh | 88 for ktype in $PLAIN_TYPES ; do 89 verbose "$tid: sign host ${ktype} cert" 91 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 92 -f $OBJ/cert_host_key_${ktype} || \ 93 fatal "ssh-keygen of cert_host_key_${ktype} failed" 95 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 96 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 97 case $ktype in 98 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;; 103 -n $HOSTS $OBJ/cert_host_key_${ktype} || [all …]
|
| H A D | cert-userkey.sh | 47 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do 48 verbose "$tid: sign user ${ktype} cert" 49 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 50 -f $OBJ/cert_user_key_${ktype} || \ 51 fatal "ssh-keygen of cert_user_key_${ktype} failed" 53 case $ktype in 54 rsa-sha2-*) tflag="-t $ktype" ;; 59 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 60 fatal "couldn't sign cert_user_key_${ktype}" 64 for ktype in $EXTRA_TYPES $PLAIN_TYPES ; do [all …]
|
| /freebsd/contrib/ntp/libntp/ |
| H A D | a_md5encrypt.c | 76 int ktype, in make_mac() 94 if (ktype == NID_cmac) { in make_mac() 137 ctx = get_md_ctx(ktype); in make_mac() 143 OBJ_nid2sn(ktype)); in make_mac() 148 OBJ_nid2sn(ktype)); in make_mac() 153 OBJ_nid2sn(ktype)); in make_mac() 158 OBJ_nid2sn(ktype)); in make_mac() 167 if (NID_md5 == ktype) { in make_mac() 170 ctx = get_md_ctx(ktype); in make_mac() 181 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype); in make_mac() 46 make_mac(const rwbuffT * digest,int ktype,const robuffT * key,const robuffT * msg) make_mac() argument [all...] |
| /freebsd/sys/compat/linuxkpi/common/src/ |
| H A D | linux_kobject.c | 119 if (error == 0 && kobj->ktype && kobj->ktype->default_attrs) { in kobject_add_complete() 121 t = kobj->ktype; in kobject_add_complete() 156 kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype, in kobject_init_and_add() argument 162 kobject_init(kobj, ktype); in kobject_init_and_add() 163 kobj->ktype = ktype; in kobject_init_and_add() 185 if (kobj->ktype && kobj->ktype->release) in linux_kobject_release() 186 kobj->ktype->release(kobj); in linux_kobject_release()
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-ed25519-sk.c | 99 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_public() argument 104 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_public() 112 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_private() argument 117 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_private() 132 char *ktype = NULL; in ssh_ed25519_sk_verify() local 157 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ed25519_sk_verify() 172 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ed25519_sk_verify() 247 free(ktype); in ssh_ed25519_sk_verify()
|
| H A D | ssh-ecdsa-sk.c | 128 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_public() argument 133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_sk_deserialize_public() 141 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_private() argument 147 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, in ssh_ecdsa_sk_deserialize_private() 249 char *ktype = NULL, *webauthn_origin = NULL; in ssh_ecdsa_sk_verify() local 272 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in ssh_ecdsa_sk_verify() 276 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) in ssh_ecdsa_sk_verify() 278 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { in ssh_ecdsa_sk_verify() 435 free(ktype); in ssh_ecdsa_sk_verify()
|
| H A D | ssh-ed25519.c | 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_public() argument 121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_private() argument 211 char *ktype = NULL; in ssh_ed25519_verify() local 227 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_ed25519_verify() 230 if (strcmp("ssh-ed25519", ktype) != 0) { in ssh_ed25519_verify() 271 free(ktype); in ssh_ed25519_verify()
|
| H A D | ssh-ecdsa.c | 231 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_public() argument 239 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) in ssh_ecdsa_deserialize_public() 284 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_private() argument 292 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_deserialize_private() 396 char *ktype = NULL; in ssh_ecdsa_verify() local 410 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ecdsa_verify() 415 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ecdsa_verify() 470 free(ktype); in ssh_ecdsa_verify()
|
| H A D | ssh-dss.c | 201 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_public() argument 238 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_private() argument 245 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0) in ssh_dss_deserialize_private() 340 char *ktype = NULL; in ssh_dss_verify() local 352 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_dss_verify() 357 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify() 412 free(ktype); in ssh_dss_verify()
|
| H A D | ssh-xmss.c | 132 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_public() argument 164 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_private() argument 283 char *ktype = NULL; in ssh_xmss_verify() local 303 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_xmss_verify() 306 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { in ssh_xmss_verify() 347 free(ktype); in ssh_xmss_verify()
|
| H A D | hostfile.c | 763 char *line = NULL, ktype[128]; in hostkeys_foreach_file() local 882 if (l <= 1 || l >= sizeof(ktype) || in hostkeys_foreach_file() 885 memcpy(ktype, lineinfo.rawkey, l); in hostkeys_foreach_file() 886 ktype[l] = '\0'; in hostkeys_foreach_file() 887 lineinfo.keytype = sshkey_type_from_name(ktype); in hostkeys_foreach_file() 894 strspn(ktype, "0123456789") == l) in hostkeys_foreach_file()
|
| H A D | ssh_api.c | 535 int ktype, nid, r; in _ssh_order_hostkeyalgs() local 552 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs() 556 if (k->key->type != ktype && in _ssh_order_hostkeyalgs() 558 k->key->type != sshkey_type_plain(ktype))) in _ssh_order_hostkeyalgs()
|
| /freebsd/crypto/openssl/crypto/ |
| H A D | defaults.c | 69 DWORD ktype; in get_windows_regdirs() local 82 ret = RegQueryValueExW(hkey, valuename, NULL, &ktype, NULL, in get_windows_regdirs() 86 if (ktype != REG_EXPAND_SZ && ktype != REG_SZ) in get_windows_regdirs() 101 NULL, &ktype, (LPBYTE)tempstr, &keysizebytes) in get_windows_regdirs()
|
| /freebsd/sys/compat/linuxkpi/common/include/linux/ |
| H A D | kobject.h | 61 const struct kobj_type *ktype; member 97 kobject_init(struct kobject *kobj, const struct kobj_type *ktype) in kobject_init() argument 102 kobj->ktype = ktype; in kobject_init() 158 int kobject_init_and_add(struct kobject *kobj, const struct kobj_type *ktype,
|
| H A D | sysfs.h | 136 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) in sysctl_handle_attr() 141 ops = kobj->ktype->sysfs_ops; in sysctl_handle_attr() 268 if (kobj->ktype == NULL || kobj->ktype->sysfs_ops == NULL) in sysctl_handle_bin_attr()
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | kdc_util.c | 1086 int nktypes, krb5_enctype *ktype) in select_session_keytype() argument 1091 if (!krb5_c_valid_enctype(ktype[i])) in select_session_keytype() 1094 if (!krb5_is_permitted_enctype(context, ktype[i])) in select_session_keytype() 1102 if (ktype[i] == ENCTYPE_DES3_CBC_SHA1 && !context->allow_des3) in select_session_keytype() 1104 if (ktype[i] == ENCTYPE_ARCFOUR_HMAC && !context->allow_rc4) in select_session_keytype() 1107 if (dbentry_supports_enctype(context, server, ktype[i])) in select_session_keytype() 1108 return ktype[i]; in select_session_keytype() 1140 enctype_name(krb5_enctype ktype, char *buf, size_t buflen) in enctype_name() argument 1149 if (!krb5_c_valid_enctype(ktype)) in enctype_name() 1151 else if (krb5int_c_deprecated_enctype(ktype)) in enctype_name() [all …]
|
| H A D | kdc_log.c | 74 ktypestr = ktypes2str(request->ktype, request->nktypes); in log_as_req() 143 ktypestr = ktypes2str(request->ktype, request->nktypes); in log_tgs_req()
|
| /freebsd/crypto/openssl/crypto/dsa/ |
| H A D | dsa_ameth.c | 274 const char *ktype = NULL; in do_dsa_print() local 292 ktype = "Private-Key"; in do_dsa_print() 294 ktype = "Public-Key"; in do_dsa_print() 296 ktype = "DSA-Parameters"; in do_dsa_print() 301 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0) in do_dsa_print()
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ec_ameth.c | 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) in do_EC_KEY_print() argument 296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { in do_EC_KEY_print() 302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { in do_EC_KEY_print() 308 if (ktype == EC_KEY_PRINT_PRIVATE) in do_EC_KEY_print() 310 else if (ktype == EC_KEY_PRINT_PUBLIC) in do_EC_KEY_print()
|
| /freebsd/crypto/openssl/crypto/dh/ |
| H A D | dh_ameth.c | 247 const char *ktype = NULL; in do_dh_print() local 267 ktype = "DH Private-Key"; in do_dh_print() 269 ktype = "DH Public-Key"; in do_dh_print() 271 ktype = "DH Parameters"; in do_dh_print() 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0) in do_dh_print()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | send_tgs.c | 202 req.ktype = enctypes; in k5_make_tgs_req() 210 req.ktype = defenctypes; in k5_make_tgs_req() 213 TRACE_SEND_TGS_ETYPES(context, req.ktype); in k5_make_tgs_req()
|
| H A D | preauth2.c | 385 grow_ktypes(krb5_enctype **out_ktypes, int *out_nktypes, krb5_enctype ktype) in grow_ktypes() argument 391 if ((*out_ktypes)[i] == ktype) in grow_ktypes() 394 ktypes = realloc(*out_ktypes, (*out_nktypes + 2) * sizeof(ktype)); in grow_ktypes() 397 ktypes[(*out_nktypes)++] = ktype; in grow_ktypes() 594 grow_ktypes(&req->ktype, &req->nktypes, *ep); in k5_preauth_prepare_request() 823 if ((*e)->etype == ctx->request->ktype[i]) in k5_get_etype_info()
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | util_crypt.c | 617 krb5_cryptotype ktype; in kg_translate_flag_iov() local 622 ktype = KRB5_CRYPTO_TYPE_DATA; in kg_translate_flag_iov() 625 ktype = KRB5_CRYPTO_TYPE_SIGN_ONLY; in kg_translate_flag_iov() 628 ktype = KRB5_CRYPTO_TYPE_EMPTY; in kg_translate_flag_iov() 632 return ktype; in kg_translate_flag_iov()
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | kdb.h | 433 krb5_int32 ktype, 442 krb5_int32 ktype, 745 krb5_int32 ktype, 1235 krb5_int32 *start, krb5_int32 ktype,
|
| /freebsd/sys/ofed/drivers/infiniband/core/ |
| H A D | core_priv.h | 144 struct kobject *kobj, struct kobj_type *ktype,
|