Home
last modified time | relevance | path

Searched refs:keytype (Results 1 – 25 of 196) sorted by relevance

12345678

/src/crypto/openssl/providers/implementations/encode_decode/
H A Ddecode_der2key.c1007 #define DO_type_specific_keypair(keytype) \ argument
1008 "type-specific", keytype##_evp_type, \
1010 keytype##_d2i_private_key, \
1011 keytype##_d2i_public_key, \
1015 keytype##_check, \
1016 keytype##_adjust, \
1017 keytype##_free
1019 #define DO_type_specific_pub(keytype) \ argument
1020 "type-specific", keytype##_evp_type, \
1023 keytype##_d2i_public_key, \
[all …]
H A Ddecode_msblob2key.c251 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument
252 static const struct keytype_desc_st mstype##2##keytype##_desc = { \
254 ossl_##keytype##_keymgmt_functions, \
255 keytype##_decode_private_key, \
256 keytype##_decode_public_key, \
257 keytype##_adjust, \
258 keytype##_free \
260 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \
261 static void *msblob2##keytype##_newctx(void *provctx) \
263 return msblob2key_newctx(provctx, &mstype##2##keytype##_desc); \
[all …]
H A Ddecode_pvk2key.c247 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument
249 pvk2##keytype##_desc \
252 ossl_##keytype##_keymgmt_functions, \
253 keytype##_private_key_bio, \
254 keytype##_adjust, \
255 keytype##_free \
257 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \
258 static void *pvk2##keytype##_newctx(void *provctx) \
260 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \
263 ossl_##pvk_to_##keytype##_decoder_functions[] \
[all …]
H A Ddecode_epki2pki.c169 char keytype[OSSL_MAX_NAME_SIZE]; in ossl_epki2pki_der_decode() local
173 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); in ossl_epki2pki_der_decode()
176 keytype, 0); in ossl_epki2pki_der_decode()
/src/crypto/openssl/test/
H A Dendecoder_legacy_test.c73 const char *keytype; member
220 const char *keytype; member
282 if (strcmp(keys[i].keytype, type) == 0) in lookup_key()
300 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument
338 keytype, selection, in test_protected_PEM()
366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument
403 keytype, selection, in test_unprotected_PEM()
431 static int test_DER(const char *keytype, int evp_type, in test_DER() argument
468 keytype, selection, in test_DER()
512 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key()
[all …]
H A Dfake_rsaprov.c1098 #define DO_PrivateKeyInfo(keytype) \ argument
1099 "PrivateKeyInfo", keytype##_evp_type, \
1110 #define DO_SubjectPublicKeyInfo(keytype) \ argument
1111 "SubjectPublicKeyInfo", keytype##_evp_type, \
1139 #define MAKE_DECODER(keytype_name, keytype, type, kind) … argument
1140 … static struct keytype_desc_st kind##_##keytype##_desc = { keytype_name, fake_rsa_keymgmt_funcs, \
1141 … DO_##kind(keytype) }; \
1143 … static OSSL_FUNC_decoder_newctx_fn kind##_der2##keytype##_newctx; \
1145 … static void *kind##_der2##keytype##_newctx(void *provctx) \
1147 … return der2key_newctx(provctx, &kind##_##keytype##_desc, keytype_name); \
[all …]
/src/contrib/ntp/libntp/
H A Dauthreadkeys.c92 u_short keytype; /* stored key type */ member
143 int keytype; in authreadkeys() local
218 keytype = keytype_from_text(token, NULL); in authreadkeys()
219 if (keytype == 0) { in authreadkeys()
224 } else if (NID_cmac != keytype && in authreadkeys()
225 EVP_get_digestbynid(keytype) == NULL) { in authreadkeys()
229 keytype = 0; in authreadkeys()
241 keytype = 0; in authreadkeys()
243 keytype = KEY_TYPE_MD5; in authreadkeys()
286 next->keytype = keytype; in authreadkeys()
[all …]
/src/crypto/openssl/crypto/asn1/
H A Dd2i_pr.c29 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument
44 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder()
45 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder()
102 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument
121 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy()
146 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy()
166 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument
172 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex()
175 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex()
193 int keytype; in d2i_AutoPrivateKey_legacy() local
[all …]
/src/contrib/bearssl/test/x509/
H A Dalltests.txt137 keytype = RSA
149 keytype = RSA
159 keytype = RSA
170 keytype = RSA
181 keytype = RSA
192 keytype = RSA
203 keytype = RSA
214 keytype = RSA
226 keytype = RSA
237 keytype = RSA
[all …]
/src/crypto/openssh/regress/
H A Dknownhosts-command.sh41 for keytype in ${SSH_HOSTKEY_TYPES} ; do
42 algs=$keytype
43 test "x$keytype" = "xssh-dss" && continue
44 test "x$keytype" = "xssh-rsa" && algs=ssh-rsa,rsa-sha2-256,rsa-sha2-512
45 verbose "keytype $keytype"
49 test "x\$1" = "x$keytype" || die "wrong keytype \$1 (expected $keytype)"
H A Dkrl.sh69 keytype=$ktype1
71 2 | 10 | 510 | 1001) keytype=$ktype2 ;;
72 4 | 30 | 520 | 1002) keytype=$ktype3 ;;
73 8 | 50 | 530 | 1003) keytype=$ktype4 ;;
74 16 | 70 | 540 | 1004) keytype=$ktype5 ;;
75 32 | 90 | 550 | 1005) keytype=$ktype6 ;;
77 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
/src/crypto/openssl/crypto/encode_decode/
H A Ddecoder_pkey.c220 const char *keytype; /* the keytype requested, if any */ member
367 if (data->keytype == NULL) in check_keymgmt()
373 data->keytype_id = ossl_namemap_name2num(namemap, data->keytype); in check_keymgmt()
380 && (strcmp(data->keytype, "id-ecPublicKey") == 0 in check_keymgmt()
381 || strcmp(data->keytype, "1.2.840.10045.2.1") == 0)) in check_keymgmt()
432 const char *keytype, in ossl_decoder_ctx_setup_for_pkey() argument
451 keytype != NULL ? keytype : "", in ossl_decoder_ctx_setup_for_pkey()
452 keytype != NULL ? " keys" : "keys of any type", in ossl_decoder_ctx_setup_for_pkey()
516 collect_data.keytype = keytype; in ossl_decoder_ctx_setup_for_pkey()
668 char *keytype; member
[all …]
/src/crypto/openssl/fuzz/
H A Dml-kem.c62 char **keytype, size_t *keylen, in select_keytype_and_size() argument
93 *keytype = "ML-KEM-512"; in select_keytype_and_size()
97 *keytype = "ML-KEM-768"; in select_keytype_and_size()
101 *keytype = "ML-KEM-1024"; in select_keytype_and_size()
106 *keytype = "ML-KEM-13"; in select_keytype_and_size()
111 *keytype = "ML-KEM-1024"; in select_keytype_and_size()
118 *keytype = NULL; in select_keytype_and_size()
144 char *keytype = NULL; in create_mlkem_raw_key() local
149 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_mlkem_raw_key()
179 pubkey = EVP_PKEY_new_raw_public_key_ex(NULL, keytype, NULL, key, keylen); in create_mlkem_raw_key()
[all …]
H A Dml-dsa.c82 char **keytype, size_t *keylen, in select_keytype_and_size() argument
112 *keytype = "ML-DSA-44"; in select_keytype_and_size()
116 *keytype = "ML-DSA-65"; in select_keytype_and_size()
120 *keytype = "ML-DSA-87"; in select_keytype_and_size()
125 *keytype = "ML-DSA-33"; in select_keytype_and_size()
130 *keytype = "ML-DSA-87"; in select_keytype_and_size()
137 *keytype = NULL; in select_keytype_and_size()
163 char *keytype = NULL; in create_ml_dsa_raw_key() local
169 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_ml_dsa_raw_key()
211 pubkey = EVP_PKEY_new_raw_public_key_ex(NULL, keytype, NULL, key, keylen); in create_ml_dsa_raw_key()
[all …]
H A Dslh-dsa.c172 const char *keytype = NULL; in slh_dsa_gen_keys() local
176 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_keys()
177 *out1 = (void *)slh_dsa_gen_key(keytype, keysize, NULL, 0); in slh_dsa_gen_keys()
180 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_keys()
181 *out2 = (void *)slh_dsa_gen_key(keytype, keysize, NULL, 0); in slh_dsa_gen_keys()
209 const char *keytype = NULL; in slh_dsa_gen_key_with_params() local
222 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_key_with_params()
262 *out1 = (void *)slh_dsa_gen_key(keytype, keysize, params, &broken); in slh_dsa_gen_key_with_params()
312 const char *keytype; in slh_dsa_sign_verify() local
328 keytype = select_keytype(selector, &keylen); in slh_dsa_sign_verify()
[all …]
/src/crypto/heimdal/lib/krb5/
H A Dmk_req_ext.c82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { in _krb5_mk_req_internal()
91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || in _krb5_mk_req_internal()
92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || in _krb5_mk_req_internal()
93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || in _krb5_mk_req_internal()
94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { in _krb5_mk_req_internal()
128 ac->keyblock->keytype, in _krb5_mk_req_internal()
138 ret = krb5_build_ap_req (context, ac->keyblock->keytype, in _krb5_mk_req_internal()
H A Ddeprecated.c67 krb5_keytype keytype, in krb5_keytype_to_enctypes_default() argument
75 if (keytype != (krb5_keytype)KEYTYPE_DES || context->etypes_des == NULL) in krb5_keytype_to_enctypes_default()
76 return krb5_keytype_to_enctypes (context, keytype, len, val); in krb5_keytype_to_enctypes_default()
117 krb5_keytype keytype, in krb5_keytype_to_string() argument
125 if(keys[i].type == keytype) { in krb5_keytype_to_string()
133 "key type %d not supported", keytype); in krb5_keytype_to_string()
155 krb5_keytype *keytype) in krb5_string_to_keytype() argument
163 *keytype = keys[i].type; in krb5_string_to_keytype()
168 *keytype = strtol(string, &end, 0); in krb5_string_to_keytype()
169 if(*end == '\0' && *keytype != 0) { in krb5_string_to_keytype()
[all …]
H A Dkeyblock.c47 keyblock->keytype = 0; in krb5_keyblock_zero()
68 keyblock->keytype = ENCTYPE_NULL; in krb5_free_keyblock_contents()
161 return block->keytype; in krb5_keyblock_get_enctype()
201 key->keytype = type; in krb5_keyblock_init()
H A Dauth_context.c61 p->keytype = ENCTYPE_NULL; in krb5_auth_con_init()
331 auth_context->keytype, in krb5_auth_con_generatelocalsubkey()
373 krb5_keytype keytype) in krb5_auth_con_setkeytype() argument
375 auth_context->keytype = keytype; in krb5_auth_con_setkeytype()
382 krb5_keytype *keytype) in krb5_auth_con_getkeytype() argument
384 *keytype = auth_context->keytype; in krb5_auth_con_getkeytype()
399 auth_context->keyblock->keytype = etype;
H A Dsalt-aes.c70 kd.key->keytype = enctype; in AES_string_to_key()
71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in AES_string_to_key()
80 et->keytype->size, kd.key->keyvalue.data); in AES_string_to_key()
/src/crypto/heimdal/lib/kadm5/
H A Dset_keys.c99 keys[i].key.keytype = key_data[i].key_data_type[0]; in _kadm5_set_keys2()
183 is_des_key_p(int keytype) in is_des_key_p() argument
185 return keytype == ETYPE_DES_CBC_CRC || in is_des_key_p()
186 keytype == ETYPE_DES_CBC_MD4 || in is_des_key_p()
187 keytype == ETYPE_DES_CBC_MD5; in is_des_key_p()
229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { in _kadm5_set_keys_randomly()
235 kblock[i].keytype = keys[i].key.keytype; in _kadm5_set_keys_randomly()
238 keys[i].key.keytype, in _kadm5_set_keys_randomly()
243 if (is_des_key_p(keys[i].key.keytype)) in _kadm5_set_keys_randomly()
/src/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc27 static int prepare_key(struct shared_state *st, int keytype, int bits);
156 get_pubkey(struct shared_state *st, int keytype) in get_pubkey() argument
158 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_pubkey()
159 st->pubkeys == NULL || st->pubkeys[keytype] == NULL) in get_pubkey()
161 return st->pubkeys[keytype]; in get_pubkey()
165 get_privkey(struct shared_state *st, int keytype) in get_privkey() argument
167 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_privkey()
168 st->privkeys == NULL || st->privkeys[keytype] == NULL) in get_privkey()
170 return st->privkeys[keytype]; in get_privkey()
175 const char *kex, int keytype) in do_kex_with_key() argument
[all …]
/src/crypto/heimdal/admin/
H A Dcopy.c42 if(a->keytype != b->keytype || in compare_keyblock()
90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); in kt_copy()
98 entry.keyblock.keytype, in kt_copy()
/src/crypto/heimdal/lib/gssapi/krb5/
H A Dinquire_sec_context_by_oid.c102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum
108 enum keytype keytype, in inquire_sec_context_get_subkey() argument
127 switch(keytype) { in inquire_sec_context_get_subkey()
138 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); in inquire_sec_context_get_subkey()
146 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); in inquire_sec_context_get_subkey()
293 is_updated = (acceptor_subkey->keytype != in inquire_sec_context_has_updated_spnego()
294 context_handle->auth_context->keyblock->keytype); in inquire_sec_context_has_updated_spnego()
361 switch (key->keytype) { in export_lucid_sec_context_v1()
/src/crypto/heimdal/lib/hdb/
H A Dprint.c160 key->key.keytype, key->key.keyvalue.length + 2); in append_mit_key()
162 ret = krb5_enctype_keysize(context, key->key.keytype, &decrypted_key_length); in append_mit_key()
228 ent->keys.val[i].key.keytype); in entry2string_int()
231 ent->keys.val[i].key.keytype); in entry2string_int()
394 if (!mit_strong_etype(ent->keys.val[i].key.keytype)) in entry2mit_string_int()
408 if (ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD4 || in entry2mit_string_int()
409 ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD5) in entry2mit_string_int()
534 if (!mit_strong_etype(ent->keys.val[i].key.keytype)) in entry2mit_string_int()
548 if (ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD4 || in entry2mit_string_int()
549 ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD5) in entry2mit_string_int()

12345678