| /src/crypto/openssl/providers/implementations/encode_decode/ |
| H A D | decode_der2key.c | 1007 #define DO_type_specific_keypair(keytype) \ argument 1008 "type-specific", keytype##_evp_type, \ 1010 keytype##_d2i_private_key, \ 1011 keytype##_d2i_public_key, \ 1015 keytype##_check, \ 1016 keytype##_adjust, \ 1017 keytype##_free 1019 #define DO_type_specific_pub(keytype) \ argument 1020 "type-specific", keytype##_evp_type, \ 1023 keytype##_d2i_public_key, \ [all …]
|
| H A D | decode_msblob2key.c | 40 const char *name; /* Keytype */ 251 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument 252 static const struct keytype_desc_st mstype##2##keytype##_desc = { \ 253 EVP_PKEY_##KEYTYPE, #KEYTYPE, \ 254 ossl_##keytype##_keymgmt_functions, \ 255 keytype##_decode_private_key, \ 256 keytype##_decode_public_key, \ 257 keytype##_adjust, \ 258 keytype##_free \ 260 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \ [all …]
|
| H A D | decode_pvk2key.c | 42 const char *name; /* Keytype */ 247 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument 249 pvk2##keytype##_desc \ 251 EVP_PKEY_##KEYTYPE, #KEYTYPE, \ 252 ossl_##keytype##_keymgmt_functions, \ 253 keytype##_private_key_bio, \ 254 keytype##_adjust, \ 255 keytype##_free \ 257 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \ 258 static void *pvk2##keytype##_newctx(void *provctx) \ [all …]
|
| /src/contrib/bearssl/test/x509/ |
| H A D | alltests.txt | 137 keytype = RSA 149 keytype = RSA 159 keytype = RSA 170 keytype = RSA 181 keytype = RSA 192 keytype = RSA 203 keytype = RSA 214 keytype = RSA 226 keytype = RSA 237 keytype = RSA [all …]
|
| /src/crypto/openssh/regress/ |
| H A D | knownhosts-command.sh | 41 for keytype in ${SSH_HOSTKEY_TYPES} ; do 42 algs=$keytype 43 test "x$keytype" = "xssh-dss" && continue 44 test "x$keytype" = "xssh-rsa" && algs=ssh-rsa,rsa-sha2-256,rsa-sha2-512 45 verbose "keytype $keytype" 49 test "x\$1" = "x$keytype" || die "wrong keytype \$1 (expected $keytype)" 54 fail "ssh connect failed for keytype $x"
|
| H A D | limit-keytype.sh | 1 # $OpenBSD: limit-keytype.sh,v 1.10 2021/02/25 03:27:34 djm Exp $ 74 keytype() { function 95 "PubkeyAcceptedAlgorithms `keytype $ktype2`,`keytype $ktype1`" 102 prepare_config "PubkeyAcceptedAlgorithms `keytype $ktype1`" 118 prepare_config "PubkeyAcceptedAlgorithms `keytype $ktype2`" \ 119 "Match user x$USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`" 128 prepare_config "PubkeyAcceptedAlgorithms `keytype $ktype4`" \ 129 "Match user $USER" "PubkeyAcceptedAlgorithms +`keytype $ktype1`"
|
| H A D | krl.sh | 67 # Vary the keytype. We use mostly ed25519 since this is fast and well 69 keytype=$ktype1 71 2 | 10 | 510 | 1001) keytype=$ktype2 ;; 72 4 | 30 | 520 | 1002) keytype=$ktype3 ;; 73 8 | 50 | 530 | 1003) keytype=$ktype4 ;; 74 16 | 70 | 540 | 1004) keytype=$ktype5 ;; 75 32 | 90 | 550 | 1005) keytype=$ktype6 ;; 77 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
|
| /src/crypto/openssl/test/ |
| H A D | endecode_test.c | 142 const char *keytype, int selection, const char *pass); 287 const char *keytype, int selection, in decode_EVP_PKEY_prov() argument 320 keytype, in decode_EVP_PKEY_prov() 873 #define KEYS(KEYTYPE) \ argument 874 static EVP_PKEY *key_##KEYTYPE = NULL 875 #define MAKE_KEYS(KEYTYPE, KEYTYPEstr, params) \ argument 877 && TEST_ptr(key_##KEYTYPE = make_key(KEYTYPEstr, NULL, params)) 878 #define FREE_KEYS(KEYTYPE) \ argument 879 EVP_PKEY_free(key_##KEYTYPE); 881 #define DOMAIN_KEYS(KEYTYPE) \ argument [all …]
|
| H A D | endecoder_legacy_test.c | 73 const char *keytype; member 220 const char *keytype; member 282 if (strcmp(keys[i].keytype, type) == 0) in lookup_key() 300 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument 338 keytype, selection, in test_protected_PEM() 366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument 403 keytype, selection, in test_unprotected_PEM() 431 static int test_DER(const char *keytype, int evp_type, in test_DER() argument 468 keytype, selection, in test_DER() 512 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key() [all …]
|
| /src/crypto/openssl/crypto/asn1/ |
| H A D | d2i_pr.c | 29 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument 44 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder() 45 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder() 102 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument 121 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy() 146 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy() 166 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument 172 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 175 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 193 int keytype; in d2i_AutoPrivateKey_legacy() local [all …]
|
| /src/crypto/openssl/crypto/encode_decode/ |
| H A D | decoder_pkey.c | 220 const char *keytype; /* the keytype requested, if any */ member 366 /* If no keytype was specified, everything matches. */ in check_keymgmt() 367 if (data->keytype == NULL) in check_keymgmt() 371 /* We haven't cached the IDs from the keytype string yet. */ in check_keymgmt() 373 data->keytype_id = ossl_namemap_name2num(namemap, data->keytype); in check_keymgmt() 376 * If keytype is a value ambiguously used for both EC and SM2, in check_keymgmt() 380 && (strcmp(data->keytype, "id-ecPublicKey") == 0 in check_keymgmt() 381 || strcmp(data->keytype, "1.2.840.10045.2.1") == 0)) in check_keymgmt() 391 /* Specified keytype could not be resolved, so nothing matches. */ in check_keymgmt() 395 /* Does not match the keytype specified, so skip. */ in check_keymgmt() [all …]
|
| /src/sys/dev/ath/ath_hal/ar5212/ |
| H A D | ar5212_keycache.c | 68 uint32_t keyType; in ar5212ResetKeyCacheEntry() local 75 keyType = OS_REG_READ(ah, AR_KEYTABLE_TYPE(entry)); in ar5212ResetKeyCacheEntry() 86 if (keyType == AR_KEYTABLE_TYPE_TKIP && IS_MIC_ENABLED(ah)) { in ar5212ResetKeyCacheEntry() 161 uint32_t keyType; in ar5212SetKeyCacheEntry() local 172 keyType = AR_KEYTABLE_TYPE_AES; in ar5212SetKeyCacheEntry() 181 keyType = AR_KEYTABLE_TYPE_CCM; in ar5212SetKeyCacheEntry() 184 keyType = AR_KEYTABLE_TYPE_TKIP; in ar5212SetKeyCacheEntry() 200 keyType = AR_KEYTABLE_TYPE_40; in ar5212SetKeyCacheEntry() 202 keyType = AR_KEYTABLE_TYPE_104; in ar5212SetKeyCacheEntry() 204 keyType = AR_KEYTABLE_TYPE_128; in ar5212SetKeyCacheEntry() [all …]
|
| /src/contrib/ntp/libntp/ |
| H A D | authreadkeys.c | 92 u_short keytype; /* stored key type */ member 143 int keytype; in authreadkeys() local 194 * Next is keytype. See if that is all right. in authreadkeys() 218 keytype = keytype_from_text(token, NULL); in authreadkeys() 219 if (keytype == 0) { in authreadkeys() 224 } else if (NID_cmac != keytype && in authreadkeys() 225 EVP_get_digestbynid(keytype) == NULL) { in authreadkeys() 229 keytype = 0; in authreadkeys() 241 keytype = 0; in authreadkeys() 243 keytype = KEY_TYPE_MD5; in authreadkeys() [all …]
|
| /src/contrib/llvm-project/lldb/include/lldb/DataFormatters/ |
| H A D | TypeCategoryMap.h | 31 typedef ConstString KeyType; typedef 32 typedef std::map<KeyType, lldb::TypeCategoryImplSP> MapType; 44 void Add(KeyType name, const lldb::TypeCategoryImplSP &entry); 46 bool Delete(KeyType name); 48 bool Enable(KeyType category_name, Position pos = Default); 50 bool Disable(KeyType category_name); 62 bool Get(KeyType name, lldb::TypeCategoryImplSP &entry);
|
| /src/crypto/heimdal/lib/kadm5/ |
| H A D | set_keys.c | 99 keys[i].key.keytype = key_data[i].key_data_type[0]; in _kadm5_set_keys2() 183 is_des_key_p(int keytype) in is_des_key_p() argument 185 return keytype == ETYPE_DES_CBC_CRC || in is_des_key_p() 186 keytype == ETYPE_DES_CBC_MD4 || in is_des_key_p() 187 keytype == ETYPE_DES_CBC_MD5; in is_des_key_p() 229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { in _kadm5_set_keys_randomly() 235 kblock[i].keytype = keys[i].key.keytype; in _kadm5_set_keys_randomly() 238 keys[i].key.keytype, in _kadm5_set_keys_randomly() 243 if (is_des_key_p(keys[i].key.keytype)) in _kadm5_set_keys_randomly()
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | mk_req_ext.c | 82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { in _krb5_mk_req_internal() 91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || in _krb5_mk_req_internal() 92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || in _krb5_mk_req_internal() 93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || in _krb5_mk_req_internal() 94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { in _krb5_mk_req_internal() 128 ac->keyblock->keytype, in _krb5_mk_req_internal() 138 ret = krb5_build_ap_req (context, ac->keyblock->keytype, in _krb5_mk_req_internal()
|
| H A D | deprecated.c | 67 krb5_keytype keytype, in krb5_keytype_to_enctypes_default() argument 75 if (keytype != (krb5_keytype)KEYTYPE_DES || context->etypes_des == NULL) in krb5_keytype_to_enctypes_default() 76 return krb5_keytype_to_enctypes (context, keytype, len, val); in krb5_keytype_to_enctypes_default() 117 krb5_keytype keytype, in krb5_keytype_to_string() argument 125 if(keys[i].type == keytype) { in krb5_keytype_to_string() 133 "key type %d not supported", keytype); in krb5_keytype_to_string() 155 krb5_keytype *keytype) in krb5_string_to_keytype() argument 163 *keytype = keys[i].type; in krb5_string_to_keytype() 168 *keytype = strtol(string, &end, 0); in krb5_string_to_keytype() 169 if(*end == '\0' && *keytype != 0) { in krb5_string_to_keytype() [all …]
|
| /src/crypto/openssh/regress/misc/fuzz-harness/ |
| H A D | kex_fuzz.cc | 27 static int prepare_key(struct shared_state *st, int keytype, int bits); 156 get_pubkey(struct shared_state *st, int keytype) in get_pubkey() argument 158 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_pubkey() 159 st->pubkeys == NULL || st->pubkeys[keytype] == NULL) in get_pubkey() 161 return st->pubkeys[keytype]; in get_pubkey() 165 get_privkey(struct shared_state *st, int keytype) in get_privkey() argument 167 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_privkey() 168 st->privkeys == NULL || st->privkeys[keytype] == NULL) in get_privkey() 170 return st->privkeys[keytype]; in get_privkey() 175 const char *kex, int keytype) in do_kex_with_key() argument [all …]
|
| /src/crypto/heimdal/doc/doxyout/krb5/man/man3/ |
| H A D | krb5_deprecated.3 | 16 …_CALL \fBkrb5_keytype_to_enctypes\fP (krb5_context context, krb5_keytype keytype, unsigned *len, k… 25 …Bkrb5_keytype_to_enctypes_default\fP (krb5_context context, krb5_keytype keytype, unsigned *len, k… 28 …IB_CALL \fBkrb5_keytype_to_string\fP (krb5_context context, krb5_keytype keytype, char **string) K… 31 …g_to_keytype\fP (krb5_context context, const char *string, krb5_keytype *keytype) KRB5_DEPRECATED_… 211 …B5_LIB_CALL krb5_keytype_to_enctypes (krb5_context context, krb5_keytype keytype, unsigned * len, … 214 …ALL krb5_keytype_to_enctypes_default (krb5_context context, krb5_keytype keytype, unsigned * len, … 217 … KRB5_LIB_CALL krb5_keytype_to_string (krb5_context context, krb5_keytype keytype, char ** string)" 248 …IB_CALL krb5_string_to_keytype (krb5_context context, const char * string, krb5_keytype * keytype)"
|
| /src/sys/dev/ath/ath_hal/ar5211/ |
| H A D | ar5211_keycache.c | 120 uint32_t keyType; in ar5211SetKeyCacheEntry() local 131 keyType = AR_KEYTABLE_TYPE_AES; in ar5211SetKeyCacheEntry() 141 keyType = AR_KEYTABLE_TYPE_40; in ar5211SetKeyCacheEntry() 143 keyType = AR_KEYTABLE_TYPE_104; in ar5211SetKeyCacheEntry() 145 keyType = AR_KEYTABLE_TYPE_128; in ar5211SetKeyCacheEntry() 148 keyType = AR_KEYTABLE_TYPE_CLR; in ar5211SetKeyCacheEntry() 175 OS_REG_WRITE(ah, AR_KEYTABLE_TYPE(entry), keyType); in ar5211SetKeyCacheEntry()
|
| /src/sys/contrib/dev/athk/ |
| H A D | key.c | 44 u32 keyType; in ath_hw_keyreset() local 53 keyType = REG_READ(ah, AR_KEYTABLE_TYPE(entry)); in ath_hw_keyreset() 66 if (keyType == AR_KEYTABLE_TYPE_TKIP) { in ath_hw_keyreset() 135 u32 keyType; in ath_hw_set_keycache_entry() local 145 keyType = AR_KEYTABLE_TYPE_AES; in ath_hw_set_keycache_entry() 153 keyType = AR_KEYTABLE_TYPE_CCM; in ath_hw_set_keycache_entry() 156 keyType = AR_KEYTABLE_TYPE_TKIP; in ath_hw_set_keycache_entry() 170 keyType = AR_KEYTABLE_TYPE_40; in ath_hw_set_keycache_entry() 172 keyType = AR_KEYTABLE_TYPE_104; in ath_hw_set_keycache_entry() 174 keyType = AR_KEYTABLE_TYPE_128; in ath_hw_set_keycache_entry() [all …]
|
| /src/sys/contrib/dev/ath/ath_hal/ar9300/ |
| H A D | ar9300_keycache.c | 40 static const int keyType[] = { variable 88 ahp->ah_keytype[entry] = keyType[HAL_CIPHER_CLR]; in ar9300_reset_key_cache_entry() 380 ahp->ah_keytype[entry] = keyType[k->kv_type]; in ar9300_set_key_cache_entry() 382 "keyType=%d\n", __func__, entry, k->kv_type, keyType[k->kv_type]); in ar9300_set_key_cache_entry() 451 u_int32_t keyType; in ar9300_check_key_cache_entry() local 464 keyType = AR_KEYTABLE_TYPE_AES; in ar9300_check_key_cache_entry() 473 keyType = AR_KEYTABLE_TYPE_CCM; in ar9300_check_key_cache_entry() 476 keyType = AR_KEYTABLE_TYPE_TKIP; in ar9300_check_key_cache_entry() 491 keyType = AR_KEYTABLE_TYPE_40; in ar9300_check_key_cache_entry() 493 keyType = AR_KEYTABLE_TYPE_104; in ar9300_check_key_cache_entry() [all …]
|
| /src/crypto/heimdal/admin/ |
| H A D | copy.c | 42 if(a->keytype != b->keytype || in compare_keyblock() 90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); in kt_copy() 98 entry.keyblock.keytype, in kt_copy() 106 "already exists for %s, keytype %s, kvno %d", in kt_copy() 123 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str, in kt_copy()
|
| /src/crypto/openssl/fuzz/ |
| H A D | ml-kem.c | 55 * @param keytype Pointer to store the selected key type string. 62 char **keytype, size_t *keylen, in select_keytype_and_size() argument 93 *keytype = "ML-KEM-512"; in select_keytype_and_size() 97 *keytype = "ML-KEM-768"; in select_keytype_and_size() 101 *keytype = "ML-KEM-1024"; in select_keytype_and_size() 106 *keytype = "ML-KEM-13"; in select_keytype_and_size() 111 *keytype = "ML-KEM-1024"; in select_keytype_and_size() 118 *keytype = NULL; in select_keytype_and_size() 144 char *keytype = NULL; in create_mlkem_raw_key() local 149 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_mlkem_raw_key() [all …]
|
| /src/crypto/openssl/doc/man3/ |
| H A D | PKCS12_create.pod | 13 int nid_key, int nid_cert, int iter, int mac_iter, int keytype); 16 int iter, int mac_iter, int keytype, 23 int iter, int mac_iter, int keytype, 39 I<keytype> is the type of key. 54 The parameters I<nid_key>, I<nid_cert>, I<iter>, I<mac_iter> and I<keytype> 67 I<keytype> adds a flag to the store private key. This is a non standard extension
|