| /src/crypto/external/apache2/openssl/dist/crypto/ |
| defaults.c | 69 DWORD ktype; local 82 ret = RegQueryValueExW(hkey, valuename, NULL, &ktype, NULL, 86 if (ktype != REG_EXPAND_SZ && ktype != REG_SZ) 101 NULL, &ktype, (LPBYTE)tempstr, &keysizebytes)
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-ed25519-sk.c | 100 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, 105 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 113 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, 118 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 133 char *ktype = NULL; local 158 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 173 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 248 free(ktype);
|
| ssh-ed25519.c | 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, 121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, 234 char *ktype = NULL; local 250 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 253 if (strcmp("ssh-ed25519", ktype) != 0) { 294 free(ktype);
|
| ssh-ecdsa-sk.c | 114 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, 119 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) 127 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, 133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, 235 char *ktype = NULL, *webauthn_origin = NULL; local 258 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 262 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) 264 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { 421 free(ktype);
|
| ssh-ecdsa.c | 225 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, 233 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) 278 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, 286 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) 413 char *ktype = NULL; local 427 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 432 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 487 free(ktype);
|
| ssh_api.c | 534 int ktype, nid, r; local 551 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 555 if (k->key->type != ktype && 557 k->key->type != sshkey_type_plain(ktype)))
|
| hostfile.c | 788 char *line = NULL, ktype[128]; local 913 if (l <= 1 || l >= sizeof(ktype) || 916 memcpy(ktype, lineinfo.rawkey, l); 917 ktype[l] = '\0'; 918 lineinfo.keytype = sshkey_type_from_name(ktype); 925 strspn(ktype, "0123456789") == l)
|
| sshconnect.c | 764 const char *ktype = sshkey_ssh_name(key); local 777 return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
|
| sshconnect2.c | 141 int ktype; local 192 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 198 if (sshkey_type_is_cert(ktype) && 205 sshkey_type_plain(ktype),
|
| ssh-keygen.c | 441 int r, rlen, ktype; local 475 ktype = KEY_RSA; 480 if ((key = sshkey_new(ktype)) == NULL)
|
| sshkey.c | 278 int ktype; local 281 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) 283 else if (ktype == KEY_RSA) { 287 } else if (ktype == KEY_RSA_CERT) { 1946 char *ktype = NULL; local 1960 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 1965 type = sshkey_type_from_name(ktype); 1985 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0) 2004 free(ktype);
|
| /src/external/gpl3/gcc.old/dist/gcc/cp/ |
| cp-objcp-common.cc | 151 tree ktype = CONST_CAST_TREE (type); local 152 if (tree *slot = hash_map_safe_get (debug_type_map, ktype)) 154 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
|
| /src/crypto/external/apache2/openssl/dist/crypto/dsa/ |
| dsa_ameth.c | 274 const char *ktype = NULL; local 292 ktype = "Private-Key"; 294 ktype = "Public-Key"; 296 ktype = "DSA-Parameters"; 301 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/dsa/ |
| dsa_ameth.c | 275 const char *ktype = NULL; local 293 ktype = "Private-Key"; 295 ktype = "Public-Key"; 297 ktype = "DSA-Parameters"; 302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/ |
| dsa_ameth.c | 332 const char *ktype = NULL; local 346 ktype = "Private-Key"; 348 ktype = "Public-Key"; 350 ktype = "DSA-Parameters"; 355 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
|
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| cp-objcp-common.cc | 298 tree ktype = CONST_CAST_TREE (type); local 299 if (tree *slot = hash_map_safe_get (debug_type_map, ktype)) 301 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
|
| /src/crypto/external/apache2/openssl/dist/crypto/dh/ |
| dh_ameth.c | 247 const char *ktype = NULL; local 267 ktype = "DH Private-Key"; 269 ktype = "DH Public-Key"; 271 ktype = "DH Parameters"; 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/dh/ |
| dh_ameth.c | 247 const char *ktype = NULL; local 267 ktype = "DH Private-Key"; 269 ktype = "DH Public-Key"; 271 ktype = "DH Parameters"; 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dh/ |
| dh_ameth.c | 270 const char *ktype = NULL; local 290 ktype = "DH Private-Key"; 292 ktype = "DH Public-Key"; 294 ktype = "DH Parameters"; 297 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|