| /src/crypto/external/apache2/openssl/dist/crypto/ |
| defaults.c | 69 DWORD ktype; local 82 ret = RegQueryValueExW(hkey, valuename, NULL, &ktype, NULL, 86 if (ktype != REG_EXPAND_SZ && ktype != REG_SZ) 101 NULL, &ktype, (LPBYTE)tempstr, &keysizebytes)
|
| /src/external/bsd/ntp/dist/libntp/ |
| a_md5encrypt.c | 78 int ktype, 96 if (ktype == NID_cmac) { 139 ctx = get_md_ctx(ktype); 145 OBJ_nid2sn(ktype)); 150 OBJ_nid2sn(ktype)); 155 OBJ_nid2sn(ktype)); 160 OBJ_nid2sn(ktype)); 169 if (NID_md5 == ktype) { 172 ctx = get_md_ctx(ktype); 183 msyslog(LOG_ERR, "MAC encrypt: invalid key type %d", ktype); [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-ed25519-sk.c | 100 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, 105 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 113 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, 118 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) 133 char *ktype = NULL; local 158 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 173 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 248 free(ktype);
|
| ssh-ed25519.c | 103 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, 121 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, 234 char *ktype = NULL; local 250 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || 253 if (strcmp("ssh-ed25519", ktype) != 0) { 294 free(ktype);
|
| ssh-ecdsa-sk.c | 114 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, 119 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) 127 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, 133 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, 235 char *ktype = NULL, *webauthn_origin = NULL; local 258 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 262 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) 264 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { 421 free(ktype);
|
| ssh-ecdsa.c | 225 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, 233 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) 278 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, 286 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) 413 char *ktype = NULL; local 427 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || 432 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { 487 free(ktype);
|
| ssh_api.c | 534 int ktype, nid, r; local 551 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 555 if (k->key->type != ktype && 557 k->key->type != sshkey_type_plain(ktype)))
|
| hostfile.c | 788 char *line = NULL, ktype[128]; local 913 if (l <= 1 || l >= sizeof(ktype) || 916 memcpy(ktype, lineinfo.rawkey, l); 917 ktype[l] = '\0'; 918 lineinfo.keytype = sshkey_type_from_name(ktype); 925 strspn(ktype, "0123456789") == l)
|
| ssh-rsa.c | 193 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, 232 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b,
|
| sshkey.c | 278 int ktype; local 281 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) 283 else if (ktype == KEY_RSA) { 287 } else if (ktype == KEY_RSA_CERT) { 1946 char *ktype = NULL; local 1960 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { 1965 type = sshkey_type_from_name(ktype); 1985 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0) 2004 free(ktype);
|
| sshconnect2.c | 141 int ktype; local 192 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 198 if (sshkey_type_is_cert(ktype) && 205 sshkey_type_plain(ktype),
|
| sshconnect.c | 764 const char *ktype = sshkey_ssh_name(key); local 777 return match_pattern_list(ktype, hostkeyalgs, 0) == 1;
|
| /src/crypto/external/apache2/openssl/dist/crypto/dsa/ |
| dsa_ameth.c | 274 const char *ktype = NULL; local 292 ktype = "Private-Key"; 294 ktype = "Public-Key"; 296 ktype = "DSA-Parameters"; 301 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/dsa/ |
| dsa_ameth.c | 275 const char *ktype = NULL; local 293 ktype = "Private-Key"; 295 ktype = "Public-Key"; 297 ktype = "DSA-Parameters"; 302 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, mod_len) <= 0)
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| common_glue.c | 142 * @ktype is the enctype to get a key for, or -1 to get the first one 152 int32_t ktype, int32_t stype, 162 if (ktype != entry->key_data[i].key_data_kvno) 165 keyblock->keytype = ktype;
|
| /src/external/gpl3/gcc.old/dist/gcc/cp/ |
| cp-objcp-common.cc | 151 tree ktype = CONST_CAST_TREE (type); local 152 if (tree *slot = hash_map_safe_get (debug_type_map, ktype)) 154 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
|
| /src/crypto/external/apache2/openssl/dist/crypto/dh/ |
| dh_ameth.c | 247 const char *ktype = NULL; local 267 ktype = "DH Private-Key"; 269 ktype = "DH Public-Key"; 271 ktype = "DH Parameters"; 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ec_ameth.c | 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) 296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { 302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { 308 if (ktype == EC_KEY_PRINT_PRIVATE) 310 else if (ktype == EC_KEY_PRINT_PUBLIC)
|
| /src/crypto/external/bsd/openssl/dist/crypto/dh/ |
| dh_ameth.c | 247 const char *ktype = NULL; local 267 ktype = "DH Private-Key"; 269 ktype = "DH Public-Key"; 271 ktype = "DH Parameters"; 274 || BIO_printf(bp, "%s: (%d bit)\n", ktype, DH_bits(x)) <= 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ec_ameth.c | 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) 296 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { 302 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { 308 if (ktype == EC_KEY_PRINT_PRIVATE) 310 else if (ktype == EC_KEY_PRINT_PUBLIC)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/ |
| dsa_ameth.c | 332 const char *ktype = NULL; local 346 ktype = "Private-Key"; 348 ktype = "Public-Key"; 350 ktype = "DSA-Parameters"; 355 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
|
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| cp-objcp-common.cc | 298 tree ktype = CONST_CAST_TREE (type); local 299 if (tree *slot = hash_map_safe_get (debug_type_map, ktype)) 301 hash_map_safe_put<hm_ggc> (debug_type_map, ktype, dtype);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dh/ |
| dh_ameth.c | 270 const char *ktype = NULL; local 290 ktype = "DH Private-Key"; 292 ktype = "DH Public-Key"; 294 ktype = "DH Parameters"; 297 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ec_ameth.c | 359 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) 372 if (ktype != EC_KEY_PRINT_PARAM && EC_KEY_get0_public_key(x) != NULL) { 378 if (ktype == EC_KEY_PRINT_PRIVATE && EC_KEY_get0_private_key(x) != NULL) { 384 if (ktype == EC_KEY_PRINT_PRIVATE) 386 else if (ktype == EC_KEY_PRINT_PUBLIC)
|
| /src/external/bsd/unbound/dist/validator/ |
| val_secalgo.c | 1041 static SECKEYPublicKey* nss_key_create(KeyType ktype) 1056 key->keyType = ktype;
|