/external/openssh/regress/ |
H A D | cert-userkey.sh | 20 for ktype in rsa dsa $ecdsa ; do 21 verbose "$tid: sign user ${ktype} cert" 22 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 23 -f $OBJ/cert_user_key_${ktype} || \ 24 fail "ssh-keygen of cert_user_key_${ktype} failed" 27 -n ${USER},mekmitasdigoat $OBJ/cert_user_key_${ktype} || 28 fail "couldn't sign cert_user_key_${ktype}" 30 test "${ktype}" = "ecdsa" && continue 31 cp $OBJ/cert_user_key_${ktype} $OBJ/cert_user_key_${ktype}_v0 [all...] |
H A D | cert-hostkey.sh | 27 for ktype in rsa dsa $ecdsa ; do 28 verbose "$tid: sign host ${ktype} cert" 30 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 31 -f $OBJ/cert_host_key_${ktype} || \ 32 fail "ssh-keygen of cert_host_key_${ktype} failed" 35 -n $HOSTS $OBJ/cert_host_key_${ktype} || 36 fail "couldn't sign cert_host_key_${ktype}" 38 test "${ktype}" = "ecdsa" && continue 39 cp $OBJ/cert_host_key_${ktype} $OBJ/cert_host_key_${ktype}_v0 [all...] |
/external/openssh/ |
H A D | ssh-dss.c | 133 char *ktype; local 136 ktype = buffer_get_cstring(&b, NULL); 137 if (strcmp("ssh-dss", ktype) != 0) { 138 error("ssh_dss_verify: cannot handle type %s", ktype); 140 xfree(ktype); 143 xfree(ktype);
|
H A D | ssh-ecdsa.c | 106 char *ktype; local 118 ktype = buffer_get_string(&b, NULL); 119 if (strcmp(key_ssh_name_plain(key), ktype) != 0) { 120 error("%s: cannot handle type %s", __func__, ktype); 122 xfree(ktype); 125 xfree(ktype);
|
H A D | ssh-rsa.c | 113 char *ktype; local 130 ktype = buffer_get_cstring(&b, NULL); 131 if (strcmp("ssh-rsa", ktype) != 0) { 132 error("ssh_rsa_verify: cannot handle type %s", ktype); 134 xfree(ktype); 137 xfree(ktype);
|
H A D | key.c | 1467 char *ktype = NULL, *curve = NULL; local 1479 if ((ktype = buffer_get_cstring_ret(&b, NULL)) == NULL) { 1484 type = key_type_from_name(ktype); 1487 nid = key_ecdsa_nid_from_name(ktype); 1567 error("key_from_blob: cannot handle type %s", ktype); 1578 if (ktype != NULL) 1579 xfree(ktype);
|
H A D | sshconnect2.c | 111 int ktype; local 136 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC) 139 key_type_plain(ktype), NULL))
|
H A D | ssh-keygen.c | 390 int magic, rlen, ktype, i1, i2, i3, i4; local 420 ktype = KEY_DSA; 422 ktype = KEY_RSA; 428 key = key_new_private(ktype);
|
/external/kernel-headers/original/linux/ |
H A D | kobject.h | 58 struct kobj_type * ktype; member in struct:kobject 122 struct kobj_type * ktype; member in struct:kset 152 if (k->kset && k->kset->ktype) 153 return k->kset->ktype; 155 return k->ktype; 178 .ktype = _type, \ 186 .ktype = _type, \
|
H A D | key.h | 245 extern int register_key_type(struct key_type *ktype); 246 extern void unregister_key_type(struct key_type *ktype);
|
/external/openssl/crypto/ec/ |
H A D | ec_ameth.c | 427 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) argument 452 if (ktype > 0) 465 if (ktype == 2) 474 if (ktype > 0) 483 if (ktype == 2) 485 else if (ktype == 1)
|
/external/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
H A D | krb5_asn.c | 129 ASN1_EXP(KRB5_ENCKEY, ktype, ASN1_INTEGER, 0),
|
/external/openssl/include/openssl/ |
H A D | krb5_asn.h | 172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
/external/openssl/crypto/dh/ |
H A D | dh_ameth.c | 323 const char *ktype = NULL; local 350 ktype = "PKCS#3 DH Private-Key"; 352 ktype = "PKCS#3 DH Public-Key"; 354 ktype = "PKCS#3 DH Parameters"; 364 if (BIO_printf(bp,"%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
/external/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 435 const char *ktype = NULL; local 450 ktype = "Private-Key"; 452 ktype = "Public-Key"; 454 ktype = "DSA-Parameters"; 473 if (BIO_printf(bp,"%s: (%d bit)\n",ktype, BN_num_bits(x->p))
|