Searched refs:keyid (Results 26 - 50 of 55) sorted by relevance

123

/freebsd-10.0-release/sys/net80211/
H A Dieee80211_crypto_ccmp.c66 static int ccmp_encap(struct ieee80211_key *k, struct mbuf *, uint8_t keyid);
141 ccmp_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument
164 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
H A Dieee80211_crypto_wep.c53 static int wep_encap(struct ieee80211_key *, struct mbuf *, uint8_t keyid);
124 wep_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument
184 ivp[3] = keyid;
H A Dieee80211_crypto_tkip.c57 static int tkip_encap(struct ieee80211_key *, struct mbuf *m, uint8_t keyid);
155 tkip_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument
191 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
/freebsd-10.0-release/contrib/ntp/ntpdc/
H A Dntpdc.c98 static void keyid P((struct parse *, FILE *));
145 { "keyid", keyid, { OPT|NTP_UINT, NO, NO, NO },
147 "set/show keyid to use for authenticated requests" },
950 if (((struct conf_peer *)qpkt.data)->keyid > 0)
951 info_auth_keyid = ((struct conf_peer *)qpkt.data)->keyid;
973 qpktail->keyid = htonl(info_auth_keyid);
1771 * keyid - get a keyid to use for authenticating requests
1774 keyid( function
[all...]
H A Dntpdc_ops.c122 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." },
125 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." },
131 { "addr", "keyid", "version", "minpoll" },
171 { "keyid", "keyid", "keyid", "keyid" },
174 { "keyid", "keyi
1302 u_long keyid; local
[all...]
/freebsd-10.0-release/contrib/telnet/libtelnet/
H A Denc_des.c74 int keyid[2]; member in struct:fb
89 const char *keyid; member in struct:keyidlist
409 * We only accept a keyid of 0. If we get a keyid of
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/
H A Denc_des.c85 int keyid[2]; member in struct:fb
92 char *keyid; member in struct:keyidlist
413 * We only accept a keyid of 0. If we get a keyid of
/freebsd-10.0-release/crypto/openssl/crypto/cms/
H A Dcms.h202 ASN1_OCTET_STRING **keyid,
262 ASN1_OCTET_STRING **keyid,
H A Dcms_env.c261 ASN1_OCTET_STRING **keyid,
274 keyid, issuer, sno);
260 CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
H A Dcms_lcl.h441 ASN1_OCTET_STRING **keyid,
/freebsd-10.0-release/contrib/ntp/ntpd/
H A Dntp_crypto.c192 keyid_t keyid; /* key identifer */ local
226 memcpy(&keyid, dgst, 4);
227 keyid = ntohl(keyid);
237 private, keyid, lifetime);
239 return (keyid);
266 keyid_t keyid = 0; /* next key ID */ local
288 keyid = (ntp_random() + NTP_MAXKEY + 1) & ((1 <<
290 if (authhavekey(keyid))
309 peer->keylist[i] = keyid;
[all...]
H A Dntp_config.c1453 "%s makes a poor request keyid",
1473 "%s makes a poor control keyid",
1877 /* find a keyid */
1902 /* save keyid so we will accept config requests with it */
2329 keyid_t keyid,
2372 mode, version, minpoll, maxpoll, flags, ttl, keyid, keystr);
2376 version, minpoll, maxpoll, flags, ttl, keyid, keystr);
2321 save_resolve( char *name, int mode, int version, int minpoll, int maxpoll, u_int flags, int ttl, keyid_t keyid, u_char *keystr, u_char peeraf ) argument
H A Dntp_control.c216 { CP_KEYID, RO, "keyid" }, /* 28 */
666 "recv_len %d, properlen %d, wants auth with keyid %08x, MAC length=%d\n",
672 printf("invalid keyid %08x\n",
854 keyid_t keyid = htonl(res_keyid); local
865 memcpy(datapt, &keyid, sizeof keyid);
1646 ctl_putuint(peer_var[CP_KEYID].text, peer->keyid);
H A Dntp_proto.c553 "receive: at %ld %s<-%s mode %d code %d keyid %08x len %d mac %d auth %d\n",
663 "receive: at %ld %s<-%s mode %d code %d keyid %08x len %d mac %d auth %d\n",
981 } else if (!AUTH(peer->keyid || (restrict_mask & RES_DONTTRUST),
1037 if (skeyid == peer->keyid)
2529 peer->keyid = xkeyid;
2741 xkeyid = peer->keyid;
2782 "transmit: at %ld %s->%s mode %d keyid %08x len %d mac %d index %d\n",
2791 "transmit: at %ld %s->%s mode %d keyid %08x len %d mac %d\n",
3002 "transmit: at %ld %s->%s mode %d keyid %08x len %d mac %d\n",
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/
H A Dv3_purp.c733 if(akid->keyid && issuer->skid &&
734 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dcms.c238 char *keyid; local
241 len = hex_encode(ki->data, ki->length, &keyid);
245 asprintf(str, "certificate with id %s", keyid);
246 free(keyid);
/freebsd-10.0-release/contrib/ntp/util/
H A Dntp-keygen.c608 BIGNUM *keyid;
614 keyid = BN_new(); key = BN_new();
615 BN_rand(keyid, 16, -1, 0);
/freebsd-10.0-release/contrib/wpa/src/common/
H A Dwpa_common.h267 u8 keyid[2]; member in struct:wpa_igtk_kde
/freebsd-10.0-release/sbin/routed/
H A Dparms.c515 if (ap2->keyid == l) {
520 k.keyid = (int)l;
H A Ddefs.h305 u_char keyid; member in struct:interface::auth
H A Dinput.c960 if (NA->au.a_md5.md5_keyid != ap->keyid)
/freebsd-10.0-release/crypto/openssh/
H A Dmonitor.c699 int keyid; local
703 keyid = buffer_get_int(m);
720 if ((key = get_hostkey_by_index(keyid)) != NULL) {
723 } else if ((key = get_hostkey_public_by_index(keyid)) != NULL &&
729 fatal("%s: no hostkey from index %d", __func__, keyid);
/freebsd-10.0-release/sys/netinet/
H A Dsctp_usrreq.c3888 shared_key->keyid = sca->sca_keynumber;
3925 shared_key->keyid = sca->sca_keynumber;
3958 shared_key->keyid = sca->sca_keynumber;
4102 struct sctp_authkeyid *keyid; local
4104 SCTP_CHECK_AND_CAST(keyid, optval, struct sctp_authkeyid, optsize);
4105 SCTP_FIND_STCB(inp, stcb, keyid->scact_assoc_id);
4109 if (sctp_deact_sharedkey(stcb, keyid->scact_keynumber)) {
4117 (keyid->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4118 (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4120 if (sctp_deact_sharedkey_ep(inp, keyid
[all...]
/freebsd-10.0-release/contrib/ntp/ntpq/
H A Dntpq.c178 { CP_KEYID, UI, "keyid" }, /* 28 */
269 static void keyid P((struct parse *, FILE *));
335 { "keyid", keyid, { OPT|NTP_UINT, NO, NO, NO },
337 "set keyid to use for authenticated requests" },
1046 printf("Authenticated with keyid %lu\n", (u_long)key);
1236 * Get the keyid and the password if we don't have one.
1259 * Stick the keyid in the packet where
2283 * keyid - get a keyid t
2286 keyid( function
[all...]
/freebsd-10.0-release/contrib/ntp/include/
H A Dntp.h298 keyid_t keyid; /* current key ID */ member in struct:peer

Completed in 476 milliseconds

123