Home
last modified time | relevance | path

Searched refs:ktype (Results 1 – 13 of 13) sorted by relevance

/external/openssh/regress/
Dcert-userkey.sh17 case $ktype in
30 for ktype in $PLAIN_TYPES $EXTRA_TYPES ; do
31 verbose "$tid: sign user ${ktype} cert"
32 ${SSHKEYGEN} -q -N '' -t ${ktype} \
33 -f $OBJ/cert_user_key_${ktype} || \
34 fatal "ssh-keygen of cert_user_key_${ktype} failed"
36 case $ktype in
37 rsa-sha2-*) tflag="-t $ktype" ;;
42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
43 fatal "couldn't sign cert_user_key_${ktype}"
[all …]
Dcert-hostkey.sh77 for ktype in $PLAIN_TYPES ; do
78 verbose "$tid: sign host ${ktype} cert"
80 ${SSHKEYGEN} -q -N '' -t ${ktype} \
81 -f $OBJ/cert_host_key_${ktype} || \
82 fatal "ssh-keygen of cert_host_key_${ktype} failed"
84 $OBJ/cert_host_key_${ktype}.pub || fatal "KRL update failed"
85 cat $OBJ/cert_host_key_${ktype}.pub >> $OBJ/host_revoked_plain
86 case $ktype in
87 rsa-sha2-*) tflag="-t $ktype"; ca="$OBJ/host_ca_key2" ;;
92 -n $HOSTS $OBJ/cert_host_key_${ktype} ||
[all …]
/external/boringssl/src/crypto/evp/
Dprint.c221 const char *ktype = NULL; in do_dsa_print() local
235 ktype = "DSA-Parameters"; in do_dsa_print()
237 ktype = "Private-Key"; in do_dsa_print()
239 ktype = "Public-Key"; in do_dsa_print()
256 BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0) { in do_dsa_print()
293 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, int ktype) { in do_EC_KEY_print() argument
317 if (ktype > 0) { in do_EC_KEY_print()
342 if (ktype == 2) { in do_EC_KEY_print()
351 if (ktype > 0) { in do_EC_KEY_print()
358 if (ktype == 2) { in do_EC_KEY_print()
[all …]
/external/openssh/
Dssh-ed25519.c100 char *ktype = NULL; in ssh_ed25519_verify() local
116 if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 || in ssh_ed25519_verify()
119 if (strcmp("ssh-ed25519", ktype) != 0) { in ssh_ed25519_verify()
165 free(ktype); in ssh_ed25519_verify()
Dssh-ecdsa.c121 char *ktype = NULL; in ssh_ecdsa_verify() local
135 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_ecdsa_verify()
140 if (strcmp(sshkey_ssh_name_plain(key), ktype) != 0) { in ssh_ecdsa_verify()
185 free(ktype); in ssh_ecdsa_verify()
Dssh-dss.c139 char *ktype = NULL; in ssh_dss_verify() local
158 if (sshbuf_get_cstring(b, &ktype, NULL) != 0 || in ssh_dss_verify()
163 if (strcmp("ssh-dss", ktype) != 0) { in ssh_dss_verify()
213 free(ktype); in ssh_dss_verify()
Dssh-rsa.c167 char *ktype = NULL; in ssh_rsa_verify() local
181 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in ssh_rsa_verify()
185 if ((hash_alg = rsa_hash_alg_from_ident(ktype)) == -1) { in ssh_rsa_verify()
229 free(ktype); in ssh_rsa_verify()
Dhostfile.c678 char line[8192], oline[8192], ktype[128]; in hostkeys_foreach() local
812 if (l <= 1 || l >= sizeof(ktype) || in hostkeys_foreach()
815 memcpy(ktype, lineinfo.rawkey, l); in hostkeys_foreach()
816 ktype[l] = '\0'; in hostkeys_foreach()
817 lineinfo.keytype = sshkey_type_from_name(ktype); in hostkeys_foreach()
824 strspn(ktype, "0123456789") == l) in hostkeys_foreach()
Dssh_api.c490 int ktype, r; in _ssh_order_hostkeyalgs() local
507 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in _ssh_order_hostkeyalgs()
510 if (k->key->type == ktype || in _ssh_order_hostkeyalgs()
512 sshkey_type_plain(ktype))) { in _ssh_order_hostkeyalgs()
Dssh-keygen.c438 int r, rlen, ktype; in do_convert_private_ssh2_from_blob() local
472 ktype = KEY_DSA; in do_convert_private_ssh2_from_blob()
474 ktype = KEY_RSA; in do_convert_private_ssh2_from_blob()
480 if ((key = sshkey_new_private(ktype)) == NULL) in do_convert_private_ssh2_from_blob()
Dsshconnect2.c109 int ktype; in order_hostkeyalgs() local
134 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) in order_hostkeyalgs()
137 sshkey_type_plain(ktype), NULL)) in order_hostkeyalgs()
Dsshkey.c1965 char *ktype = NULL, *curve = NULL; in sshkey_from_blob_internal() local
1983 if (sshbuf_get_cstring(b, &ktype, NULL) != 0) { in sshkey_from_blob_internal()
1988 type = sshkey_type_from_name(ktype); in sshkey_from_blob_internal()
2052 key->ecdsa_nid = sshkey_ecdsa_nid_from_name(ktype); in sshkey_from_blob_internal()
2140 free(ktype); in sshkey_from_blob_internal()
Dclientloop.c2400 const char *ktype = sshkey_ssh_name(key); in key_accepted_by_hostkeyalgs() local
2410 return match_pattern_list(ktype, hostkeyalgs, 0) == 1; in key_accepted_by_hostkeyalgs()