Home
last modified time | relevance | path

Searched refs:ktypes (Results 1 – 18 of 18) sorted by relevance

/freebsd/crypto/openssh/regress/
H A Dkeytype.sh10 ktypes=""
13 ssh-dss) ktypes="$ktypes dsa-1024" ;;
14 ssh-rsa) ktypes="$ktypes rsa-2048 rsa-3072" ;;
15 ssh-ed25519) ktypes="$ktypes ed25519-512" ;;
16 ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
17 ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;;
18 ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;;
19 sk-ssh-ed25519*) ktypes="$ktypes ed25519-sk" ;;
20 sk-ecdsa-sha2-nistp256*) ktypes="$ktypes ecdsa-sk" ;;
24 for kt in $ktypes; do
[all …]
/freebsd/crypto/krb5/src/lib/krb5/ccache/
H A Dcc_retr.c115 pref (krb5_enctype my_ktype, int nktypes, krb5_enctype *ktypes) in pref() argument
119 if (my_ktype == ktypes[i]) in pref()
198 krb5_creds *creds, int nktypes, krb5_enctype *ktypes) in krb5_cc_retrieve_cred_seq() argument
220 if (ktypes) { in krb5_cc_retrieve_cred_seq()
222 nktypes, ktypes); in krb5_cc_retrieve_cred_seq()
258 krb5_enctype *ktypes; in k5_cc_retrieve_cred_default() local
263 ret = krb5_get_tgs_ktypes (context, mcreds->server, &ktypes); in k5_cc_retrieve_cred_default()
266 nktypes = k5_count_etypes (ktypes); in k5_cc_retrieve_cred_default()
269 nktypes, ktypes); in k5_cc_retrieve_cred_default()
270 free (ktypes); in k5_cc_retrieve_cred_default()
/freebsd/crypto/krb5/src/lib/gssapi/krb5/
H A Dset_allowable_enctypes.c86 if (req->ktypes == NULL) { in gss_krb5int_set_allowable_enctypes()
100 for (i = 0, j = 0; i < req->num_ktypes && req->ktypes[i]; i++) { in gss_krb5int_set_allowable_enctypes()
101 if (krb5_c_valid_enctype(req->ktypes[i])) in gss_krb5int_set_allowable_enctypes()
102 new_ktypes[j++] = req->ktypes[i]; in gss_krb5int_set_allowable_enctypes()
H A Dkrb5_gss_glue.c211 krb5_enctype *ktypes) in gss_krb5_set_allowable_enctypes() argument
221 req.ktypes = ktypes; in gss_krb5_set_allowable_enctypes()
H A Dgssapi_krb5.h232 krb5_enctype *ktypes);
H A DgssapiP_krb5.h1097 krb5_enctype *ktypes; member
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dinit_ctx.c506 krb5_get_default_in_tkt_ktypes(krb5_context context, krb5_enctype **ktypes) in krb5_get_default_in_tkt_ktypes() argument
512 *ktypes = NULL; in krb5_get_default_in_tkt_ktypes()
528 default_enctype_list, ktypes); in krb5_get_default_in_tkt_ktypes()
542 krb5_enctype **ktypes) in krb5_get_tgs_ktypes() argument
548 *ktypes = NULL; in krb5_get_tgs_ktypes()
552 return k5_copy_etypes(context->tgs_etypes, ktypes); in krb5_get_tgs_ktypes()
568 default_enctype_list, ktypes); in krb5_get_tgs_ktypes()
574 krb5_get_permitted_enctypes(krb5_context context, krb5_enctype **ktypes) in krb5_get_permitted_enctypes() argument
580 *ktypes = NULL; in krb5_get_permitted_enctypes()
583 return k5_copy_etypes(context->tgs_etypes, ktypes); in krb5_get_permitted_enctypes()
[all …]
H A Din_tkt_sky.c70 krb5_address *const *addrs, krb5_enctype *ktypes, in krb5_get_in_tkt_with_skey() argument
80 retval = k5_populate_gic_opt(context, &opts, options, addrs, ktypes, in krb5_get_in_tkt_with_skey()
H A Dpreauth2.c388 krb5_enctype *ktypes; in grow_ktypes() local
394 ktypes = realloc(*out_ktypes, (*out_nktypes + 2) * sizeof(ktype)); in grow_ktypes()
395 if (ktypes != NULL) { in grow_ktypes()
396 *out_ktypes = ktypes; in grow_ktypes()
397 ktypes[(*out_nktypes)++] = ktype; in grow_ktypes()
398 ktypes[*out_nktypes] = 0; in grow_ktypes()
H A Dget_creds.c75 krb5_enctype *ktypes; in construct_matching_creds() local
79 ret = krb5_get_tgs_ktypes(context, mcreds->server, &ktypes); in construct_matching_creds()
80 for (i = 0; ktypes[i]; i++) in construct_matching_creds()
81 if (ktypes[i] == mcreds->keyblock.enctype) in construct_matching_creds()
83 if (ktypes[i] == 0) in construct_matching_creds()
85 free (ktypes); in construct_matching_creds()
H A Dgic_keytab.c344 krb5_address *const *addrs, krb5_enctype *ktypes, in krb5_get_in_tkt_with_keytab() argument
355 retval = k5_populate_gic_opt(context, &opts, options, addrs, ktypes, in krb5_get_in_tkt_with_keytab()
H A Dgic_pwd.c374 krb5_address *const *addrs, krb5_enctype *ktypes, in krb5_get_in_tkt_with_password() argument
391 retval = k5_populate_gic_opt(context, &opts, options, addrs, ktypes, in krb5_get_in_tkt_with_password()
H A Dint-proto.h311 krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types,
H A Dget_in_tkt.c2094 krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, in k5_populate_gic_opt() argument
2110 if (ktypes) { in k5_populate_gic_opt()
2111 i = k5_count_etypes(ktypes); in k5_populate_gic_opt()
2113 krb5_get_init_creds_opt_set_etype_list(opt, ktypes, i); in k5_populate_gic_opt()
/freebsd/crypto/heimdal/lib/hdb/
H A Dkeys.c323 char **ktypes, **kp; in hdb_generate_key_set() local
334 ktypes = krb5_config_get_strings(context, NULL, "kadmin", in hdb_generate_key_set()
336 if (ktypes == NULL) in hdb_generate_key_set()
337 ktypes = (char **)(intptr_t)default_keytypes; in hdb_generate_key_set()
344 for(kp = ktypes; kp && *kp; kp++) { in hdb_generate_key_set()
407 if (ktypes != (char **)(intptr_t)default_keytypes) in hdb_generate_key_set()
408 krb5_config_free_strings(ktypes); in hdb_generate_key_set()
/freebsd/crypto/openssh/
H A Dsshconnect2.c331 char *oktypes, *ktypes; member
443 authctxt.active_ktype = authctxt.oktypes = authctxt.ktypes = NULL; in ssh_userauth2()
2138 if (authctxt->ktypes == NULL) { in userauth_hostbased()
2140 authctxt->ktypes = authctxt->oktypes; in userauth_hostbased()
2149 authctxt->active_ktype = strsep(&authctxt->ktypes, ","); in userauth_hostbased()
2178 authctxt->oktypes = authctxt->ktypes = NULL; in userauth_hostbased()
/freebsd/crypto/krb5/src/kdc/
H A Dkdc_util.h117 int nktypes, krb5_enctype *ktypes);
/freebsd/crypto/krb5/src/include/krb5/
H A Dkrb5.hin2999 * @param [out] ktypes Zero-terminated list of encryption types
3005 * Use krb5_free_enctypes() to free @a ktypes when it is no longer needed.
3010 krb5_get_permitted_enctypes(krb5_context context, krb5_enctype **ktypes);
5166 krb5_address *const *addrs, krb5_enctype *ktypes,
5174 krb5_address *const *addrs, krb5_enctype *ktypes,
5182 krb5_address *const *addrs, krb5_enctype *ktypes,