/external/openssh/regress/ |
D | cert-userkey.sh | 17 case $ktype in 30 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do 31 verbose "$tid: sign user ${ktype} cert" 32 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 33 -f $OBJ/cert_user_key_${ktype} || \ 34 fatal "ssh-keygen of cert_user_key_${ktype} failed" 36 case $ktype in 37 rsa-sha2-*) tflag="-t $ktype" ;; 42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 43 fatal "couldn't sign cert_user_key_${ktype}" [all …]
|
D | cert-hostkey.sh | 77 for ktype in $PLAIN_TYPES ; do 78 verbose "$tid: sign host ${ktype} cert" 80 ${SSHKEYGEN} -q -N '' -t ${ktype} \ 81 -f $OBJ/cert_host_key_${ktype} || \ 82 fatal "ssh-keygen of cert_host_key_${ktype} failed" 84 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed" 85 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain 86 case $ktype in 87 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;; 92 -n $HOSTS $OBJ/cert_host_key_${ktype} || [all …]
|
/external/boringssl/src/crypto/evp/ |
D | print.c | 221 const char *ktype = NULL; in do_dsa_print() local 235 ktype = "DSA-Parameters"; in do_dsa_print() 237 ktype = "Private-Key"; in do_dsa_print() 239 ktype = "Public-Key"; in do_dsa_print() 256 BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0) { in do_dsa_print() 293 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) { in do_EC_KEY_print() argument 317 if (ktype > 0) { in do_EC_KEY_print() 342 if (ktype == 2) { in do_EC_KEY_print() 351 if (ktype > 0) { in do_EC_KEY_print() 358 if (ktype == 2) { in do_EC_KEY_print() [all …]
|
/external/openssh/ |
D | ssh-ed25519.c | 100 char *ktype = NULL; in ssh_ed25519_verify() local 116 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_ed25519_verify() 119 if (strcmp("ssh-ed25519", ktype) != 0) { in ssh_ed25519_verify() 165 free(ktype); in ssh_ed25519_verify()
|
D | ssh-ecdsa.c | 121 char *ktype = NULL; in ssh_ecdsa_verify() local 135 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ecdsa_verify() 140 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ecdsa_verify() 185 free(ktype); in ssh_ecdsa_verify()
|
D | ssh-dss.c | 139 char *ktype = NULL; in ssh_dss_verify() local 158 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_dss_verify() 163 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify() 213 free(ktype); in ssh_dss_verify()
|
D | ssh-rsa.c | 167 char *ktype = NULL; in ssh_rsa_verify() local 181 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in ssh_rsa_verify() 185 if ((hash_alg = rsa_hash_alg_from_ident(ktype)) == -1) { in ssh_rsa_verify() 229 free(ktype); in ssh_rsa_verify()
|
D | hostfile.c | 678 char line[8192], oline[8192], ktype[128]; in hostkeys_foreach() local 812 if (l <= 1 || l >= sizeof(ktype) || in hostkeys_foreach() 815 memcpy(ktype, lineinfo.rawkey, l); in hostkeys_foreach() 816 ktype[l] = '\0'; in hostkeys_foreach() 817 lineinfo.keytype = sshkey_type_from_name(ktype); in hostkeys_foreach() 824 strspn(ktype, "0123456789") == l) in hostkeys_foreach()
|
D | ssh_api.c | 490 int ktype, r; in _ssh_order_hostkeyalgs() local 507 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs() 510 if (k->key->type == ktype || in _ssh_order_hostkeyalgs() 512 sshkey_type_plain(ktype))) { in _ssh_order_hostkeyalgs()
|
D | ssh-keygen.c | 438 int r, rlen, ktype; in do_convert_private_ssh2_from_blob() local 472 ktype = KEY_DSA; in do_convert_private_ssh2_from_blob() 474 ktype = KEY_RSA; in do_convert_private_ssh2_from_blob() 480 if ((key = sshkey_new_private(ktype)) == NULL) in do_convert_private_ssh2_from_blob()
|
D | sshconnect2.c | 109 int ktype; in order_hostkeyalgs() local 134 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs() 137 sshkey_type_plain(ktype), NULL)) in order_hostkeyalgs()
|
D | sshkey.c | 1965 char *ktype = NULL, *curve = NULL; in sshkey_from_blob_internal() local 1983 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in sshkey_from_blob_internal() 1988 type = sshkey_type_from_name(ktype); in sshkey_from_blob_internal() 2052 key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype); in sshkey_from_blob_internal() 2140 free(ktype); in sshkey_from_blob_internal()
|
D | clientloop.c | 2400 const char *ktype = sshkey_ssh_name(key); in key_accepted_by_hostkeyalgs() local 2410 return match_pattern_list(ktype, hostkeyalgs, 0) == 1; in key_accepted_by_hostkeyalgs()
|