/external/openssh/ |
ssh-dss.c | 133 char *ktype; local 136 ktype = buffer_get_cstring(&b, NULL); 137 if (strcmp("ssh-dss", ktype) != 0) { 138 error("ssh_dss_verify: cannot handle type %s", ktype); 140 xfree(ktype); 143 xfree(ktype);
|
ssh-ecdsa.c | 106 char *ktype; local 118 ktype = buffer_get_string(&b, NULL); 119 if (strcmp(key_ssh_name_plain(key), ktype) != 0) { 120 error("%s: cannot handle type %s", __func__, ktype); 122 xfree(ktype); 125 xfree(ktype);
|
ssh-rsa.c | 113 char *ktype; local 130 ktype = buffer_get_cstring(&b, NULL); 131 if (strcmp("ssh-rsa", ktype) != 0) { 132 error("ssh_rsa_verify: cannot handle type %s", ktype); 134 xfree(ktype); 137 xfree(ktype);
|
key.c | 1467 char *ktype = NULL, *curve = NULL; local [all...] |
ssh-keygen.c | 390 int magic, rlen, ktype, i1, i2, i3, i4; local 420 ktype = KEY_DSA; 422 ktype = KEY_RSA; 428 key = key_new_private(ktype); [all...] |
sshconnect2.c | 111 int ktype; local 136 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC) 139 key_type_plain(ktype), NULL)) [all...] |
/external/kernel-headers/original/linux/ |
kobject.h | 58 struct kobj_type * ktype; member in struct:kobject 122 struct kobj_type * ktype; member in struct:kset 152 if (k->kset && k->kset->ktype) 153 return k->kset->ktype; 155 return k->ktype; 178 .ktype = _type, \ 186 .ktype = _type, \
|
/external/openssl/crypto/dh/ |
dh_ameth.c | 323 const char *ktype = NULL; local 350 ktype = "PKCS#3 DH Private-Key"; 352 ktype = "PKCS#3 DH Public-Key"; 354 ktype = "PKCS#3 DH Parameters"; 364 if (BIO_printf(bp,"%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0)
|
/external/openssl/crypto/dsa/ |
dsa_ameth.c | 435 const char *ktype = NULL; local 450 ktype = "Private-Key"; 452 ktype = "Public-Key"; 454 ktype = "DSA-Parameters"; 473 if (BIO_printf(bp,"%s: (%d bit)\n",ktype, BN_num_bits(x->p))
|
/external/openssl/crypto/krb5/ |
krb5_asn.h | 172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|
/external/openssl/include/openssl/ |
krb5_asn.h | 172 ASN1_INTEGER *ktype; member in struct:krb5_encryptionkey_st
|