Home
last modified time | relevance | path

Searched refs:keytypes (Results 1 – 22 of 22) sorted by relevance

/src/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc323 const int keytypes[] = { KEY_RSA, KEY_ECDSA, KEY_ED25519, -1 }; in main() local
343 for (i = 0; keytypes[i] != -1; i++) { in main()
348 do_kex_with_key(st, ts, kextypes[j], keytypes[i]); in main()
350 kextypes[j], sshkey_type(st->pubkeys[keytypes[i]])); in main()
361 kextypes[j], sshkey_type(st->pubkeys[keytypes[i]])); in main()
376 for (i = 0; keytypes[i] != -1; i++) { in main()
378 sshkey_type(st->privkeys[keytypes[i]])); in main()
380 if (sshkey_save_private(st->privkeys[keytypes[i]], path, in main()
385 sshkey_type(st->pubkeys[keytypes[i]])); in main()
387 if (sshkey_save_public(st->pubkeys[keytypes[i]], path, "") != 0) in main()
/src/crypto/openssl/doc/man7/
H A DEVP_PKEY-X25519.pod11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are
41 In addition to the common parameters that all keytypes should support (see
42 L<provider-keymgmt(7)/Common parameters>), the implementation of these keytypes
H A DEVP_PKEY-HMAC.pod7 - EVP_PKEY legacy MAC keytypes and algorithm support
24 All the B<MAC> keytypes support the following parameters.
H A DEVP_PKEY-RSA.pod18 In addition to the common parameters that all keytypes should support (see
225 =for comment RSA-PSS, and probably also RSA-OAEP, need separate keytypes,
226 and will be described in separate pages for those RSA keytypes.
H A DEVP_KEM-ML-KEM.pod10 The B<ML-KEM> keytypes and parameters are described in L<EVP_PKEY-ML-KEM(7)>.
H A DEVP_PKEY-FFC.pod14 The B<DSA>, B<DH> and B<DHX> keytypes are implemented in OpenSSL's default and
35 In addition to the common parameters that all keytypes should support (see
H A DEVP_PKEY-ML-KEM.pod17 The B<ML-KEM-512>, B<ML-KEM-768>, and B<ML-KEM-1024> keytypes are implemented
58 In addition to the common parameters that all keytypes should support (see
H A DEVP_PKEY-SLH-DSA.pod80 In addition to the common parameters that all keytypes should support (see
H A DEVP_PKEY-DH.pod28 In addition to the common FFC parameters that all FFC keytypes should support
H A DEVP_PKEY-ML-DSA.pod58 In addition to the common parameters that all keytypes should support (see
/src/crypto/openssl/crypto/evp/
H A Dsignature.c630 const char **keytypes; in evp_pkey_signature_init() local
632 keytypes = signature->query_key_types(); in evp_pkey_signature_init()
633 for (; *keytypes != NULL; keytypes++) in evp_pkey_signature_init()
634 if (EVP_PKEY_CTX_is_a(ctx, *keytypes)) in evp_pkey_signature_init()
636 if (*keytypes == NULL) { in evp_pkey_signature_init()
/src/crypto/openssl/providers/implementations/signature/
H A Deddsa_sig.c782 static const char *keytypes[] = { "ED25519", NULL }; in ed25519_sigalg_query_key_types() local
784 return keytypes; in ed25519_sigalg_query_key_types()
789 static const char *keytypes[] = { "ED448", NULL }; in ed448_sigalg_query_key_types() local
791 return keytypes; in ed448_sigalg_query_key_types()
H A Ddsa_sig.c932 static const char *keytypes[] = { "DSA", NULL }; in dsa_sigalg_query_key_types() local
934 return keytypes; in dsa_sigalg_query_key_types()
H A Decdsa_sig.c950 static const char *keytypes[] = { "EC", NULL }; local
952 return keytypes;
H A Drsa_sig.c1961 static const char *keytypes[] = { "RSA", NULL }; in rsa_sigalg_query_key_types() local
1963 return keytypes; in rsa_sigalg_query_key_types()
/src/crypto/openssl/crypto/conf/
H A Dconf_def.c893 const unsigned short *keytypes = (const unsigned short *)conf->meth_data; in is_keytype() local
912 return (keytypes[key] & type) ? 1 : 0; in is_keytype()
/src/crypto/heimdal/
H A DChangeLog.199896 * kuser/klist.c: try to list enctypes as keytypes
180 * admin/ktutil.c: fix printing of unrecognized keytypes
309 * kdc/kerberos5.c: always treat keytypes as enctypes; use new
786 instead of keytypes. If so use the same value to encrypt ticket,
825 from protocol keytypes (that really are enctypes) to internal
834 keytypes, salttypes, and salts.
864 keytypes.
H A DNEWS973 * Some support for using enctypes instead of keytypes.
H A DChangeLog.19991199 keytypes/enctypes are compatible, not that they are the same
2065 * kadmin/get.c (print_entry_long): print the keytypes and salts
H A DChangeLog.2004488 * kuser/klist.c (print_cred_verbose): keytypes are no longer, use
H A DChangeLog.200554 keytypes any more, just use enctypes.
/src/crypto/heimdal/kadmin/
H A DChangeLog272 * get.c: print keytypes on long format