/openbsd/regress/usr.bin/ssh/ |
H A D | cert-hostkey.sh | 88 for ktype in $PLAIN_TYPES ; do 91 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 97 case $ktype in 134 for ktype in $PLAIN_TYPES ; do 164 for ktype in $PLAIN_TYPES ; do 169 for ktype in $PLAIN_TYPES ; do 190 for ktype in $PLAIN_TYPES ; do 216 case $ktype in 255 for ktype in $PLAIN_TYPES ; do 259 ${SSHKEYGEN} -q -N '' -t ${ktype} -f $OBJ/cert_host_key_${ktype} || \ [all …]
|
H A D | cert-userkey.sh | 46 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 50 case $ktype in 51 rsa-sha2-*) tflag="-t $ktype" ;; 62 t=$(kname $ktype) 63 _prefix="${ktype}" 194 for ktype in $PLAIN_TYPES ; do 195 t=$(kname $ktype) 196 _prefix="${ktype} $auth" 291 for ktype in $rsa ed25519 ; do 379 for ktype in $PLAIN_TYPES ; do [all …]
|
/openbsd/usr.bin/ssh/ |
H A D | ssh-ed25519-sk.c | 97 ssh_ed25519_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_public() argument 102 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_public() 110 ssh_ed25519_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_sk_deserialize_private() argument 115 if ((r = sshkey_ed25519_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ed25519_sk_deserialize_private() 130 char *ktype = NULL; in ssh_ed25519_sk_verify() local 155 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ed25519_sk_verify() 170 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ed25519_sk_verify() 245 free(ktype); in ssh_ed25519_sk_verify()
|
H A D | ssh-ecdsa-sk.c | 110 ssh_ecdsa_sk_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_public() argument 115 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_sk_deserialize_public() 123 ssh_ecdsa_sk_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_sk_deserialize_private() argument 129 if ((r = sshkey_ecdsa_funcs.deserialize_public(ktype, in ssh_ecdsa_sk_deserialize_private() 231 char *ktype = NULL, *webauthn_origin = NULL; in ssh_ecdsa_sk_verify() local 254 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in ssh_ecdsa_sk_verify() 258 if (strcmp(ktype, "webauthn-sk-ecdsa-sha2-nistp256@openssh.com") == 0) in ssh_ecdsa_sk_verify() 260 else if (strcmp(ktype, "sk-ecdsa-sha2-nistp256@openssh.com") != 0) { in ssh_ecdsa_sk_verify() 417 free(ktype); in ssh_ecdsa_sk_verify()
|
H A D | ssh-ed25519.c | 100 ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_public() argument 118 ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ed25519_deserialize_private() argument 208 char *ktype = NULL; in ssh_ed25519_verify() local 224 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_ed25519_verify() 227 if (strcmp("ssh-ed25519", ktype) != 0) { in ssh_ed25519_verify() 268 free(ktype); in ssh_ed25519_verify()
|
H A D | ssh-ecdsa.c | 221 ssh_ecdsa_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_public() argument 229 if ((key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype)) == -1) in ssh_ecdsa_deserialize_public() 274 ssh_ecdsa_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_ecdsa_deserialize_private() argument 282 if ((r = ssh_ecdsa_deserialize_public(ktype, b, key)) != 0) in ssh_ecdsa_deserialize_private() 386 char *ktype = NULL; in ssh_ecdsa_verify() local 400 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ecdsa_verify() 405 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ecdsa_verify() 460 free(ktype); in ssh_ecdsa_verify()
|
H A D | ssh-dss.c | 195 ssh_dss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_public() argument 232 ssh_dss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_dss_deserialize_private() argument 239 if ((r = ssh_dss_deserialize_public(ktype, b, key)) != 0) in ssh_dss_deserialize_private() 334 char *ktype = NULL; in ssh_dss_verify() local 346 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_dss_verify() 351 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify() 406 free(ktype); in ssh_dss_verify()
|
H A D | ssh-xmss.c | 127 ssh_xmss_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_public() argument 159 ssh_xmss_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_xmss_deserialize_private() argument 278 char *ktype = NULL; in ssh_xmss_verify() local 298 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_xmss_verify() 301 if (strcmp("ssh-xmss@openssh.com", ktype) != 0) { in ssh_xmss_verify() 342 free(ktype); in ssh_xmss_verify()
|
H A D | hostfile.c | 756 char *line = NULL, ktype[128]; in hostkeys_foreach_file() local 875 if (l <= 1 || l >= sizeof(ktype) || in hostkeys_foreach_file() 878 memcpy(ktype, lineinfo.rawkey, l); in hostkeys_foreach_file() 879 ktype[l] = '\0'; in hostkeys_foreach_file() 880 lineinfo.keytype = sshkey_type_from_name(ktype); in hostkeys_foreach_file() 887 strspn(ktype, "0123456789") == l) in hostkeys_foreach_file()
|
H A D | ssh_api.c | 529 int ktype, nid, r; in _ssh_order_hostkeyalgs() local 546 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs() 550 if (k->key->type != ktype && in _ssh_order_hostkeyalgs() 552 k->key->type != sshkey_type_plain(ktype))) in _ssh_order_hostkeyalgs()
|
H A D | ssh-rsa.c | 188 ssh_rsa_deserialize_public(const char *ktype, struct sshbuf *b, in ssh_rsa_deserialize_public() argument 227 ssh_rsa_deserialize_private(const char *ktype, struct sshbuf *b, in ssh_rsa_deserialize_private() argument
|
H A D | sshkey.c | 289 int ktype; in sshkey_match_keyname_to_sigalgs() local 292 (ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC) in sshkey_match_keyname_to_sigalgs() 294 else if (ktype == KEY_RSA) { in sshkey_match_keyname_to_sigalgs() 298 } else if (ktype == KEY_RSA_CERT) { in sshkey_match_keyname_to_sigalgs() 1966 char *ktype = NULL; in sshkey_from_blob_internal() local 1980 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in sshkey_from_blob_internal() 1985 type = sshkey_type_from_name(ktype); in sshkey_from_blob_internal() 2005 if ((ret = impl->funcs->deserialize_public(ktype, b, key)) != 0) in sshkey_from_blob_internal() 2024 free(ktype); in sshkey_from_blob_internal()
|
H A D | sshconnect2.c | 122 int ktype; in order_hostkeyalgs() local 173 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs() 179 if (sshkey_type_is_cert(ktype) && in order_hostkeyalgs() 186 sshkey_type_plain(ktype), in order_hostkeyalgs()
|
H A D | sshconnect.c | 690 const char *ktype = sshkey_ssh_name(key); in hostkey_accepted_by_hostkeyalgs() local 703 return match_pattern_list(ktype, hostkeyalgs, 0) == 1; in hostkey_accepted_by_hostkeyalgs()
|
H A D | ssh-keygen.c | 473 int r, rlen, ktype; in do_convert_private_ssh2() local 511 ktype = KEY_RSA; in do_convert_private_ssh2() 514 ktype = KEY_DSA; in do_convert_private_ssh2() 520 if ((key = sshkey_new(ktype)) == NULL) in do_convert_private_ssh2()
|
/openbsd/lib/libcrypto/dh/ |
H A D | dh_ameth.c | 334 const char *ktype = NULL; in do_dh_print() local 348 ktype = "PKCS#3 DH Private-Key"; in do_dh_print() 350 ktype = "PKCS#3 DH Public-Key"; in do_dh_print() 352 ktype = "PKCS#3 DH Parameters"; in do_dh_print() 361 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0) in do_dh_print()
|
/openbsd/lib/libcrypto/dsa/ |
H A D | dsa_ameth.c | 416 const char *ktype = NULL; in do_dsa_print() local 431 ktype = "Private-Key"; in do_dsa_print() 433 ktype = "Public-Key"; in do_dsa_print() 435 ktype = "DSA-Parameters"; in do_dsa_print() 440 if (BIO_printf(bp, "%s: (%d bit)\n", ktype, in do_dsa_print()
|
/openbsd/lib/libcrypto/ec/ |
H A D | ec_ameth.c | 496 do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) in do_EC_KEY_print() argument 515 if (ktype > 0) { in do_EC_KEY_print() 525 if (ktype == 2) { in do_EC_KEY_print() 530 if (ktype == 2) in do_EC_KEY_print() 532 else if (ktype == 1) in do_EC_KEY_print()
|
/openbsd/sbin/unwind/libunbound/validator/ |
H A D | val_secalgo.c | 1041 static SECKEYPublicKey* nss_key_create(KeyType ktype) in nss_key_create() argument 1056 key->keyType = ktype; in nss_key_create()
|
/openbsd/usr.sbin/unbound/validator/ |
H A D | val_secalgo.c | 1041 static SECKEYPublicKey* nss_key_create(KeyType ktype) in nss_key_create() argument 1056 key->keyType = ktype; in nss_key_create()
|
/openbsd/sys/dev/pci/drm/amd/amdgpu/ |
H A D | amdgpu_discovery.c | 990 ip_hw_id->hw_id_kset.kobj.ktype = &ip_hw_id_ktype; in amdgpu_discovery_sysfs_ips() 1094 ip_die_entry->ip_kset.kobj.ktype = &ip_die_entry_ktype; in amdgpu_discovery_sysfs_recurse() 1136 die_kset->kobj.ktype = &die_kobj_ktype; in amdgpu_discovery_sysfs_init()
|