Lines Matching refs:keyid
307 int keyid;
341 keyid = ntohl(((u_int32 *)rpkt)[base_packet_length / 4]);
342 if (keyid != 0) {
348 * not (yet) be a keyid, but in this case FLAG_SKEY is set.
350 * if the keyid is 0 and FLAG_SKEY is not set.
352 if (!peer || (!peer->keyid && !(peer->flags & FLAG_SKEY))) {
1019 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org %#010x.%08x xmt %#010x.%08x CRYPTONAK\n",
1165 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org %#010x.%08x xmt %#010x.%08x MAC\n",
1185 if (0 != peer && 0 != peer->keyid) {
1193 if (peer->keyid != skeyid) {
1195 peer->keyid, skeyid,
1660 " with unknown peer %s mode %d/%s:%s keyid %08x len %d auth %d\n",
2136 } else if (!AUTH(peer->keyid || has_mac ||
2267 * then see if the sender's IP is trusted for this keyid.
2375 if (skeyid == peer->keyid)
4102 peer->keyid == 0) {
4220 peer->keyid = xkeyid;
4424 xkeyid = peer->keyid;
4462 DPRINTF(1, ("peer_xmit: at %ld %s->%s mode %d keyid %08x len %zu index %d\n",
4467 DPRINTF(1, ("peer_xmit: at %ld %s->%s mode %d keyid %08x len %zu\n",
4747 DPRINTF(1, ("fast_xmit: at %ld %s->%s mode %d keyid %08x len %lu\n",