HomeSort by: relevance | last modified time | path
    Searched refs:ktype (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/crypto/
defaults.c 69 DWORD ktype; local
82 ret = RegQueryValueExW(hkey, valuename, NULL, &ktype, NULL,
86 if (ktype != REG_EXPAND_SZ && ktype != REG_SZ)
101 NULL, &ktype, (LPBYTE)tempstr, &keysizebytes)
  /src/external/bsd/ntp/dist/libntp/
a_md5encrypt.c 78 int ktype,
96 if (ktype == NID_cmac) {
139 ctx = get_md_ctx(ktype);
145 OBJ_nid2sn(ktype));
150 OBJ_nid2sn(ktype));
155 OBJ_nid2sn(ktype));
160 OBJ_nid2sn(ktype));
169 if (NID_md5 == ktype) {
172 ctx = get_md_ctx(ktype);
183 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype);
    [all...]
  /src/crypto/external/bsd/openssh/dist/
ssh-ed25519-sk.c 100 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b,
105 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
113 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b,
118 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0)
133 char *ktype = NULL; local
158 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
173 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
248 free(ktype);
ssh-ed25519.c 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b,
121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b,
234 char *ktype = NULL; local
250 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
253 if (strcmp("ssh-ed25519", ktype) != 0) {
294 free(ktype);
ssh-ecdsa-sk.c 114 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b,
119 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0)
127 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b,
133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype,
235 char *ktype = NULL, *webauthn_origin = NULL; local
258 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
262 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0)
264 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) {
421 free(ktype);
ssh-ecdsa.c 225 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b,
233 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1)
278 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b,
286 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0)
413 char *ktype = NULL; local
427 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 ||
432 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) {
487 free(ktype);
ssh_api.c 534 int ktype, nid, r; local
551 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
555 if (k->key->type != ktype &&
557 k->key->type != sshkey_type_plain(ktype)))
hostfile.c 788 char *line = NULL, ktype[128]; local
913 if (l <= 1 || l >= sizeof(ktype) ||
916 memcpy(ktype, lineinfo.rawkey, l);
917 ktype[l] = '\0';
918 lineinfo.keytype = sshkey_type_from_name(ktype);
925 strspn(ktype, "0123456789") == l)
ssh-rsa.c 193 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b,
232 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b,
sshkey.c 278 int ktype; local
281 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
283 else if (ktype == KEY_RSA) {
287 } else if (ktype == KEY_RSA_CERT) {
1946 char *ktype = NULL; local
1960 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) {
1965 type = sshkey_type_from_name(ktype);
1985 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0)
2004 free(ktype);
sshconnect2.c 141 int ktype; local
192 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
198 if (sshkey_type_is_cert(ktype) &&
205 sshkey_type_plain(ktype),
sshconnect.c 764 const char *ktype = sshkey_ssh_name(key); local
777 return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
  /src/crypto/external/apache2/openssl/dist/crypto/dsa/
dsa_ameth.c 274 const char *ktype = NULL; local
292 ktype = "Private-Key";
294 ktype = "Public-Key";
296 ktype = "DSA-Parameters";
301 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
  /src/crypto/external/bsd/openssl/dist/crypto/dsa/
dsa_ameth.c 275 const char *ktype = NULL; local
293 ktype = "Private-Key";
295 ktype = "Public-Key";
297 ktype = "DSA-Parameters";
302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
common_glue.c 142 * @ktype is the enctype to get a key for, or -1 to get the first one
152 int32_t ktype, int32_t stype,
162 if (ktype != entry->key_data[i].key_data_kvno)
165 keyblock->keytype = ktype;
  /src/external/gpl3/gcc.old/dist/gcc/cp/
cp-objcp-common.cc 151 tree ktype = CONST_CAST_TREE (type); local
152 if (tree *slot = hash_map_safe_get (debug_type_map, ktype))
154 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
  /src/crypto/external/apache2/openssl/dist/crypto/dh/
dh_ameth.c 247 const char *ktype = NULL; local
267 ktype = "DH Private-Key";
269 ktype = "DH Public-Key";
271 ktype = "DH Parameters";
274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ec_ameth.c 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype)
296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) {
302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) {
308 if (ktype == EC_KEY_PRINT_PRIVATE)
310 else if (ktype == EC_KEY_PRINT_PUBLIC)
  /src/crypto/external/bsd/openssl/dist/crypto/dh/
dh_ameth.c 247 const char *ktype = NULL; local
267 ktype = "DH Private-Key";
269 ktype = "DH Public-Key";
271 ktype = "DH Parameters";
274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ec_ameth.c 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype)
296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) {
302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) {
308 if (ktype == EC_KEY_PRINT_PRIVATE)
310 else if (ktype == EC_KEY_PRINT_PUBLIC)
  /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/
dsa_ameth.c 332 const char *ktype = NULL; local
346 ktype = "Private-Key";
348 ktype = "Public-Key";
350 ktype = "DSA-Parameters";
355 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
  /src/external/gpl3/gcc/dist/gcc/cp/
cp-objcp-common.cc 298 tree ktype = CONST_CAST_TREE (type); local
299 if (tree *slot = hash_map_safe_get (debug_type_map, ktype))
301 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
  /src/crypto/external/bsd/openssl.old/dist/crypto/dh/
dh_ameth.c 270 const char *ktype = NULL; local
290 ktype = "DH Private-Key";
292 ktype = "DH Public-Key";
294 ktype = "DH Parameters";
297 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/
ec_ameth.c 359 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype)
372 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) {
378 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) {
384 if (ktype == EC_KEY_PRINT_PRIVATE)
386 else if (ktype == EC_KEY_PRINT_PUBLIC)
  /src/external/bsd/unbound/dist/validator/
val_secalgo.c 1041 static SECKEYPublicKey* nss_key_create(KeyType ktype)
1056 key->keyType = ktype;

Completed in 67 milliseconds

1 2