| /src/crypto/openssl/providers/implementations/encode_decode/ ! |
| H A D | decode_der2key.c | 1007 #define DO_type_specific_keypair(keytype) \ argument 1008 "type-specific", keytype##_evp_type, \ 1010 keytype##_d2i_private_key, \ 1011 keytype##_d2i_public_key, \ 1015 keytype##_check, \ 1016 keytype##_adjust, \ 1017 keytype##_free 1019 #define DO_type_specific_pub(keytype) \ argument 1020 "type-specific", keytype##_evp_type, \ 1023 keytype##_d2i_public_key, \ [all …]
|
| H A D | decode_msblob2key.c | 251 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument 252 static const struct keytype_desc_st mstype##2##keytype##_desc = { \ 254 ossl_##keytype##_keymgmt_functions, \ 255 keytype##_decode_private_key, \ 256 keytype##_decode_public_key, \ 257 keytype##_adjust, \ 258 keytype##_free \ 260 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \ 261 static void *msblob2##keytype##_newctx(void *provctx) \ 263 return msblob2key_newctx(provctx, &mstype##2##keytype##_desc); \ [all …]
|
| H A D | decode_pvk2key.c | 247 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument 249 pvk2##keytype##_desc \ 252 ossl_##keytype##_keymgmt_functions, \ 253 keytype##_private_key_bio, \ 254 keytype##_adjust, \ 255 keytype##_free \ 257 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \ 258 static void *pvk2##keytype##_newctx(void *provctx) \ 260 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \ 263 ossl_##pvk_to_##keytype##_decoder_functions[] \ [all …]
|
| H A D | decode_epki2pki.c | 169 char keytype[OSSL_MAX_NAME_SIZE]; in ossl_epki2pki_der_decode() local 173 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); in ossl_epki2pki_der_decode() 176 keytype, 0); in ossl_epki2pki_der_decode()
|
| /src/crypto/openssl/test/ ! |
| H A D | endecoder_legacy_test.c | 73 const char *keytype; member 220 const char *keytype; member 282 if (strcmp(keys[i].keytype, type) == 0) in lookup_key() 300 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument 338 keytype, selection, in test_protected_PEM() 366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument 403 keytype, selection, in test_unprotected_PEM() 431 static int test_DER(const char *keytype, int evp_type, in test_DER() argument 468 keytype, selection, in test_DER() 512 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key() [all …]
|
| H A D | fake_rsaprov.c | 1098 #define DO_PrivateKeyInfo(keytype) \ argument 1099 "PrivateKeyInfo", keytype##_evp_type, \ 1110 #define DO_SubjectPublicKeyInfo(keytype) \ argument 1111 "SubjectPublicKeyInfo", keytype##_evp_type, \ 1139 #define MAKE_DECODER(keytype_name, keytype, type, kind) … argument 1140 … static struct keytype_desc_st kind##_##keytype##_desc = { keytype_name, fake_rsa_keymgmt_funcs, \ 1141 … DO_##kind(keytype) }; \ 1143 … static OSSL_FUNC_decoder_newctx_fn kind##_der2##keytype##_newctx; \ 1145 … static void *kind##_der2##keytype##_newctx(void *provctx) \ 1147 … return der2key_newctx(provctx, &kind##_##keytype##_desc, keytype_name); \ [all …]
|
| /src/contrib/ntp/libntp/ ! |
| H A D | authreadkeys.c | 92 u_short keytype; /* stored key type */ member 143 int keytype; in authreadkeys() local 218 keytype = keytype_from_text(token, NULL); in authreadkeys() 219 if (keytype == 0) { in authreadkeys() 224 } else if (NID_cmac != keytype && in authreadkeys() 225 EVP_get_digestbynid(keytype) == NULL) { in authreadkeys() 229 keytype = 0; in authreadkeys() 241 keytype = 0; in authreadkeys() 243 keytype = KEY_TYPE_MD5; in authreadkeys() 286 next->keytype = keytype; in authreadkeys() [all …]
|
| /src/crypto/openssl/crypto/asn1/ ! |
| H A D | d2i_pr.c | 29 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument 44 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder() 45 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder() 102 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument 121 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy() 146 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy() 166 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument 172 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 175 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 193 int keytype; in d2i_AutoPrivateKey_legacy() local [all …]
|
| /src/contrib/bearssl/test/x509/ ! |
| H A D | alltests.txt | 137 keytype = RSA 149 keytype = RSA 159 keytype = RSA 170 keytype = RSA 181 keytype = RSA 192 keytype = RSA 203 keytype = RSA 214 keytype = RSA 226 keytype = RSA 237 keytype = RSA [all …]
|
| /src/crypto/openssh/regress/ ! |
| H A D | knownhosts-command.sh | 41 for keytype in ${SSH_HOSTKEY_TYPES} ; do 42 algs=$keytype 43 test "x$keytype" = "xssh-dss" && continue 44 test "x$keytype" = "xssh-rsa" && algs=ssh-rsa,rsa-sha2-256,rsa-sha2-512 45 verbose "keytype $keytype" 49 test "x\$1" = "x$keytype" || die "wrong keytype \$1 (expected $keytype)"
|
| H A D | krl.sh | 69 keytype=$ktype1 71 2 | 10 | 510 | 1001) keytype=$ktype2 ;; 72 4 | 30 | 520 | 1002) keytype=$ktype3 ;; 73 8 | 50 | 530 | 1003) keytype=$ktype4 ;; 74 16 | 70 | 540 | 1004) keytype=$ktype5 ;; 75 32 | 90 | 550 | 1005) keytype=$ktype6 ;; 77 $SSHKEYGEN -t $keytype -f $f -C "" -N "" > /dev/null \
|
| /src/crypto/openssl/crypto/encode_decode/ ! |
| H A D | decoder_pkey.c | 220 const char *keytype; /* the keytype requested, if any */ member 367 if (data->keytype == NULL) in check_keymgmt() 373 data->keytype_id = ossl_namemap_name2num(namemap, data->keytype); in check_keymgmt() 380 && (strcmp(data->keytype, "id-ecPublicKey") == 0 in check_keymgmt() 381 || strcmp(data->keytype, "1.2.840.10045.2.1") == 0)) in check_keymgmt() 432 const char *keytype, in ossl_decoder_ctx_setup_for_pkey() argument 451 keytype != NULL ? keytype : "", in ossl_decoder_ctx_setup_for_pkey() 452 keytype != NULL ? " keys" : "keys of any type", in ossl_decoder_ctx_setup_for_pkey() 516 collect_data.keytype = keytype; in ossl_decoder_ctx_setup_for_pkey() 668 char *keytype; member [all …]
|
| /src/crypto/openssl/fuzz/ ! |
| H A D | ml-kem.c | 62 char **keytype, size_t *keylen, in select_keytype_and_size() argument 93 *keytype = "ML-KEM-512"; in select_keytype_and_size() 97 *keytype = "ML-KEM-768"; in select_keytype_and_size() 101 *keytype = "ML-KEM-1024"; in select_keytype_and_size() 106 *keytype = "ML-KEM-13"; in select_keytype_and_size() 111 *keytype = "ML-KEM-1024"; in select_keytype_and_size() 118 *keytype = NULL; in select_keytype_and_size() 144 char *keytype = NULL; in create_mlkem_raw_key() local 149 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_mlkem_raw_key() 179 pubkey = EVP_PKEY_new_raw_public_key_ex(NULL, keytype, NULL, key, keylen); in create_mlkem_raw_key() [all …]
|
| H A D | ml-dsa.c | 82 char **keytype, size_t *keylen, in select_keytype_and_size() argument 112 *keytype = "ML-DSA-44"; in select_keytype_and_size() 116 *keytype = "ML-DSA-65"; in select_keytype_and_size() 120 *keytype = "ML-DSA-87"; in select_keytype_and_size() 125 *keytype = "ML-DSA-33"; in select_keytype_and_size() 130 *keytype = "ML-DSA-87"; in select_keytype_and_size() 137 *keytype = NULL; in select_keytype_and_size() 163 char *keytype = NULL; in create_ml_dsa_raw_key() local 169 if (!select_keytype_and_size(buf, len, &keytype, &keylen, 0)) in create_ml_dsa_raw_key() 211 pubkey = EVP_PKEY_new_raw_public_key_ex(NULL, keytype, NULL, key, keylen); in create_ml_dsa_raw_key() [all …]
|
| H A D | slh-dsa.c | 172 const char *keytype = NULL; in slh_dsa_gen_keys() local 176 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_keys() 177 *out1 = (void *)slh_dsa_gen_key(keytype, keysize, NULL, 0); in slh_dsa_gen_keys() 180 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_keys() 181 *out2 = (void *)slh_dsa_gen_key(keytype, keysize, NULL, 0); in slh_dsa_gen_keys() 209 const char *keytype = NULL; in slh_dsa_gen_key_with_params() local 222 keytype = select_keytype(selector, &keysize); in slh_dsa_gen_key_with_params() 262 *out1 = (void *)slh_dsa_gen_key(keytype, keysize, params, &broken); in slh_dsa_gen_key_with_params() 312 const char *keytype; in slh_dsa_sign_verify() local 328 keytype = select_keytype(selector, &keylen); in slh_dsa_sign_verify() [all …]
|
| /src/crypto/heimdal/lib/krb5/ ! |
| H A D | mk_req_ext.c | 82 if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { in _krb5_mk_req_internal() 91 } else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || in _krb5_mk_req_internal() 92 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || in _krb5_mk_req_internal() 93 ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || in _krb5_mk_req_internal() 94 ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { in _krb5_mk_req_internal() 128 ac->keyblock->keytype, in _krb5_mk_req_internal() 138 ret = krb5_build_ap_req (context, ac->keyblock->keytype, in _krb5_mk_req_internal()
|
| H A D | deprecated.c | 67 krb5_keytype keytype, in krb5_keytype_to_enctypes_default() argument 75 if (keytype != (krb5_keytype)KEYTYPE_DES || context->etypes_des == NULL) in krb5_keytype_to_enctypes_default() 76 return krb5_keytype_to_enctypes (context, keytype, len, val); in krb5_keytype_to_enctypes_default() 117 krb5_keytype keytype, in krb5_keytype_to_string() argument 125 if(keys[i].type == keytype) { in krb5_keytype_to_string() 133 "key type %d not supported", keytype); in krb5_keytype_to_string() 155 krb5_keytype *keytype) in krb5_string_to_keytype() argument 163 *keytype = keys[i].type; in krb5_string_to_keytype() 168 *keytype = strtol(string, &end, 0); in krb5_string_to_keytype() 169 if(*end == '\0' && *keytype != 0) { in krb5_string_to_keytype() [all …]
|
| H A D | keyblock.c | 47 keyblock->keytype = 0; in krb5_keyblock_zero() 68 keyblock->keytype = ENCTYPE_NULL; in krb5_free_keyblock_contents() 161 return block->keytype; in krb5_keyblock_get_enctype() 201 key->keytype = type; in krb5_keyblock_init()
|
| H A D | auth_context.c | 61 p->keytype = ENCTYPE_NULL; in krb5_auth_con_init() 331 auth_context->keytype, in krb5_auth_con_generatelocalsubkey() 373 krb5_keytype keytype) in krb5_auth_con_setkeytype() argument 375 auth_context->keytype = keytype; in krb5_auth_con_setkeytype() 382 krb5_keytype *keytype) in krb5_auth_con_getkeytype() argument 384 *keytype = auth_context->keytype; in krb5_auth_con_getkeytype() 399 auth_context->keyblock->keytype = etype;
|
| H A D | salt-aes.c | 70 kd.key->keytype = enctype; in AES_string_to_key() 71 ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); in AES_string_to_key() 80 et->keytype->size, kd.key->keyvalue.data); in AES_string_to_key()
|
| /src/crypto/heimdal/lib/kadm5/ ! |
| H A D | set_keys.c | 99 keys[i].key.keytype = key_data[i].key_data_type[0]; in _kadm5_set_keys2() 183 is_des_key_p(int keytype) in is_des_key_p() argument 185 return keytype == ETYPE_DES_CBC_CRC || in is_des_key_p() 186 keytype == ETYPE_DES_CBC_MD4 || in is_des_key_p() 187 keytype == ETYPE_DES_CBC_MD5; in is_des_key_p() 229 if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { in _kadm5_set_keys_randomly() 235 kblock[i].keytype = keys[i].key.keytype; in _kadm5_set_keys_randomly() 238 keys[i].key.keytype, in _kadm5_set_keys_randomly() 243 if (is_des_key_p(keys[i].key.keytype)) in _kadm5_set_keys_randomly()
|
| /src/crypto/openssh/regress/misc/fuzz-harness/ ! |
| H A D | kex_fuzz.cc | 27 static int prepare_key(struct shared_state *st, int keytype, int bits); 156 get_pubkey(struct shared_state *st, int keytype) in get_pubkey() argument 158 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_pubkey() 159 st->pubkeys == NULL || st->pubkeys[keytype] == NULL) in get_pubkey() 161 return st->pubkeys[keytype]; in get_pubkey() 165 get_privkey(struct shared_state *st, int keytype) in get_privkey() argument 167 if (st == NULL || keytype < 0 || (size_t)keytype >= st->nkeys || in get_privkey() 168 st->privkeys == NULL || st->privkeys[keytype] == NULL) in get_privkey() 170 return st->privkeys[keytype]; in get_privkey() 175 const char *kex, int keytype) in do_kex_with_key() argument [all …]
|
| /src/crypto/heimdal/admin/ ! |
| H A D | copy.c | 42 if(a->keytype != b->keytype || in compare_keyblock() 90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str); in kt_copy() 98 entry.keyblock.keytype, in kt_copy()
|
| /src/crypto/heimdal/lib/gssapi/krb5/ ! |
| H A D | inquire_sec_context_by_oid.c | 102 enum keytype { ACCEPTOR_KEY, INITIATOR_KEY, TOKEN_KEY }; enum 108 enum keytype keytype, in inquire_sec_context_get_subkey() argument 127 switch(keytype) { in inquire_sec_context_get_subkey() 138 _gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype); in inquire_sec_context_get_subkey() 146 _gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype); in inquire_sec_context_get_subkey() 293 is_updated = (acceptor_subkey->keytype != in inquire_sec_context_has_updated_spnego() 294 context_handle->auth_context->keyblock->keytype); in inquire_sec_context_has_updated_spnego() 361 switch (key->keytype) { in export_lucid_sec_context_v1()
|
| /src/crypto/heimdal/lib/hdb/ ! |
| H A D | print.c | 160 key->key.keytype, key->key.keyvalue.length + 2); in append_mit_key() 162 ret = krb5_enctype_keysize(context, key->key.keytype, &decrypted_key_length); in append_mit_key() 228 ent->keys.val[i].key.keytype); in entry2string_int() 231 ent->keys.val[i].key.keytype); in entry2string_int() 394 if (!mit_strong_etype(ent->keys.val[i].key.keytype)) in entry2mit_string_int() 408 if (ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD4 || in entry2mit_string_int() 409 ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD5) in entry2mit_string_int() 534 if (!mit_strong_etype(ent->keys.val[i].key.keytype)) in entry2mit_string_int() 548 if (ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD4 || in entry2mit_string_int() 549 ent->keys.val[k].key.keytype == ETYPE_DES_CBC_MD5) in entry2mit_string_int()
|