HomeSort by: relevance | last modified time | path
    Searched defs:ktype (Results 1 - 19 of 19) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/crypto/
defaults.c 69 DWORD ktype; local
82 ret = RegQueryValueExW(hkey, valuename, NULL, &ktype, NULL,
86 if (ktype != REG_EXPAND_SZ && ktype != REG_SZ)
101 NULL, &ktype, (LPBYTE)tempstr, &keysizebytes)
  /src/crypto/external/bsd/openssh/dist/
ssh-ed25519-sk.c 100 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b,
105 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
113 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b,
118 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
133 char *ktype = NULL; local
158 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
173 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
248 free(ktype);
ssh-ed25519.c 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b,
121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b,
234 char *ktype = NULL; local
250 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
253 if (strcmp("ssh-ed25519", ktype) != 0) {
294 free(ktype);
ssh-ecdsa-sk.c 114 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b,
119 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0)
127 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b,
133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype,
235 char *ktype = NULL, *webauthn_origin = NULL; local
258 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
262 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0)
264 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) {
421 free(ktype);
ssh-ecdsa.c 225 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b,
233 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1)
278 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b,
286 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0)
413 char *ktype = NULL; local
427 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
432 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
487 free(ktype);
ssh_api.c 534 int ktype, nid, r; local
551 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
555 if (k->key->type != ktype &&
557 k->key->type != sshkey_type_plain(ktype)))
hostfile.c 788 char *line = NULL, ktype[128]; local
913 if (l <= 1 || l >= sizeof(ktype) ||
916 memcpy(ktype, lineinfo.rawkey, l);
917 ktype[l] = '\0';
918 lineinfo.keytype = sshkey_type_from_name(ktype);
925 strspn(ktype, "0123456789") == l)
sshconnect.c 764 const char *ktype = sshkey_ssh_name(key); local
777 return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
sshconnect2.c 141 int ktype; local
192 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
198 if (sshkey_type_is_cert(ktype) &&
205 sshkey_type_plain(ktype),
ssh-keygen.c 441 int r, rlen, ktype; local
475 ktype = KEY_RSA;
480 if ((key = sshkey_new(ktype)) == NULL)
sshkey.c 278 int ktype; local
281 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
283 else if (ktype == KEY_RSA) {
287 } else if (ktype == KEY_RSA_CERT) {
1946 char *ktype = NULL; local
1960 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
1965 type = sshkey_type_from_name(ktype);
1985 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0)
2004 free(ktype);
  /src/external/gpl3/gcc.old/dist/gcc/cp/
cp-objcp-common.cc 151 tree ktype = CONST_CAST_TREE (type); local
152 if (tree *slot = hash_map_safe_get (debug_type_map, ktype))
154 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
  /src/crypto/external/apache2/openssl/dist/crypto/dsa/
dsa_ameth.c 274 const char *ktype = NULL; local
292 ktype = "Private-Key";
294 ktype = "Public-Key";
296 ktype = "DSA-Parameters";
301 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
  /src/crypto/external/bsd/openssl/dist/crypto/dsa/
dsa_ameth.c 275 const char *ktype = NULL; local
293 ktype = "Private-Key";
295 ktype = "Public-Key";
297 ktype = "DSA-Parameters";
302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
  /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/
dsa_ameth.c 332 const char *ktype = NULL; local
346 ktype = "Private-Key";
348 ktype = "Public-Key";
350 ktype = "DSA-Parameters";
355 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
  /src/external/gpl3/gcc/dist/gcc/cp/
cp-objcp-common.cc 298 tree ktype = CONST_CAST_TREE (type); local
299 if (tree *slot = hash_map_safe_get (debug_type_map, ktype))
301 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
  /src/crypto/external/apache2/openssl/dist/crypto/dh/
dh_ameth.c 247 const char *ktype = NULL; local
267 ktype = "DH Private-Key";
269 ktype = "DH Public-Key";
271 ktype = "DH Parameters";
274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
  /src/crypto/external/bsd/openssl/dist/crypto/dh/
dh_ameth.c 247 const char *ktype = NULL; local
267 ktype = "DH Private-Key";
269 ktype = "DH Public-Key";
271 ktype = "DH Parameters";
274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
  /src/crypto/external/bsd/openssl.old/dist/crypto/dh/
dh_ameth.c 270 const char *ktype = NULL; local
290 ktype = "DH Private-Key";
292 ktype = "DH Public-Key";
294 ktype = "DH Parameters";
297 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)

Completed in 47 milliseconds