/freebsd-10.0-release/sys/net80211/ |
H A D | ieee80211_crypto_ccmp.c | 66 static int ccmp_encap(struct ieee80211_key *k, struct mbuf *, uint8_t keyid); 141 ccmp_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument 164 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
|
H A D | ieee80211_crypto_wep.c | 53 static int wep_encap(struct ieee80211_key *, struct mbuf *, uint8_t keyid); 124 wep_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument 184 ivp[3] = keyid;
|
H A D | ieee80211_crypto_tkip.c | 57 static int tkip_encap(struct ieee80211_key *, struct mbuf *m, uint8_t keyid); 155 tkip_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument 191 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
|
/freebsd-10.0-release/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 98 static void keyid P((struct parse *, FILE *)); 145 { "keyid", keyid, { OPT|NTP_UINT, NO, NO, NO }, 147 "set/show keyid to use for authenticated requests" }, 950 if (((struct conf_peer *)qpkt.data)->keyid > 0) 951 info_auth_keyid = ((struct conf_peer *)qpkt.data)->keyid; 973 qpktail->keyid = htonl(info_auth_keyid); 1771 * keyid - get a keyid to use for authenticating requests 1774 keyid( function [all...] |
H A D | ntpdc_ops.c | 122 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." }, 125 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." }, 131 { "addr", "keyid", "version", "minpoll" }, 171 { "keyid", "keyid", "keyid", "keyid" }, 174 { "keyid", "keyi 1302 u_long keyid; local [all...] |
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | enc_des.c | 74 int keyid[2]; member in struct:fb 89 const char *keyid; member in struct:keyidlist 409 * We only accept a keyid of 0. If we get a keyid of
|
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | enc_des.c | 85 int keyid[2]; member in struct:fb 92 char *keyid; member in struct:keyidlist 413 * We only accept a keyid of 0. If we get a keyid of
|
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms.h | 202 ASN1_OCTET_STRING **keyid, 262 ASN1_OCTET_STRING **keyid,
|
H A D | cms_env.c | 261 ASN1_OCTET_STRING **keyid, 274 keyid, issuer, sno); 260 CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
|
H A D | cms_lcl.h | 441 ASN1_OCTET_STRING **keyid,
|
/freebsd-10.0-release/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 192 keyid_t keyid; /* key identifer */ local 226 memcpy(&keyid, dgst, 4); 227 keyid = ntohl(keyid); 237 private, keyid, lifetime); 239 return (keyid); 266 keyid_t keyid = 0; /* next key ID */ local 288 keyid = (ntp_random() + NTP_MAXKEY + 1) & ((1 << 290 if (authhavekey(keyid)) 309 peer->keylist[i] = keyid; [all...] |
H A D | ntp_config.c | 1453 "%s makes a poor request keyid", 1473 "%s makes a poor control keyid", 1877 /* find a keyid */ 1902 /* save keyid so we will accept config requests with it */ 2329 keyid_t keyid, 2372 mode, version, minpoll, maxpoll, flags, ttl, keyid, keystr); 2376 version, minpoll, maxpoll, flags, ttl, keyid, keystr); 2321 save_resolve( char *name, int mode, int version, int minpoll, int maxpoll, u_int flags, int ttl, keyid_t keyid, u_char *keystr, u_char peeraf ) argument
|
H A D | ntp_control.c | 216 { CP_KEYID, RO, "keyid" }, /* 28 */ 666 "recv_len %d, properlen %d, wants auth with keyid %08x, MAC length=%d\n", 672 printf("invalid keyid %08x\n", 854 keyid_t keyid = htonl(res_keyid); local 865 memcpy(datapt, &keyid, sizeof keyid); 1646 ctl_putuint(peer_var[CP_KEYID].text, peer->keyid);
|
H A D | ntp_proto.c | 553 "receive: at %ld %s<-%s mode %d code %d keyid %08x len %d mac %d auth %d\n", 663 "receive: at %ld %s<-%s mode %d code %d keyid %08x len %d mac %d auth %d\n", 981 } else if (!AUTH(peer->keyid || (restrict_mask & RES_DONTTRUST), 1037 if (skeyid == peer->keyid) 2529 peer->keyid = xkeyid; 2741 xkeyid = peer->keyid; 2782 "transmit: at %ld %s->%s mode %d keyid %08x len %d mac %d index %d\n", 2791 "transmit: at %ld %s->%s mode %d keyid %08x len %d mac %d\n", 3002 "transmit: at %ld %s->%s mode %d keyid %08x len %d mac %d\n",
|
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 733 if(akid->keyid && issuer->skid && 734 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | cms.c | 238 char *keyid; local 241 len = hex_encode(ki->data, ki->length, &keyid); 245 asprintf(str, "certificate with id %s", keyid); 246 free(keyid);
|
/freebsd-10.0-release/contrib/ntp/util/ |
H A D | ntp-keygen.c | 608 BIGNUM *keyid; 614 keyid = BN_new(); key = BN_new(); 615 BN_rand(keyid, 16, -1, 0);
|
/freebsd-10.0-release/contrib/wpa/src/common/ |
H A D | wpa_common.h | 267 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/freebsd-10.0-release/sbin/routed/ |
H A D | parms.c | 515 if (ap2->keyid == l) { 520 k.keyid = (int)l;
|
H A D | defs.h | 305 u_char keyid; member in struct:interface::auth
|
H A D | input.c | 960 if (NA->au.a_md5.md5_keyid != ap->keyid)
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | monitor.c | 699 int keyid; local 703 keyid = buffer_get_int(m); 720 if ((key = get_hostkey_by_index(keyid)) != NULL) { 723 } else if ((key = get_hostkey_public_by_index(keyid)) != NULL && 729 fatal("%s: no hostkey from index %d", __func__, keyid);
|
/freebsd-10.0-release/sys/netinet/ |
H A D | sctp_usrreq.c | 3888 shared_key->keyid = sca->sca_keynumber; 3925 shared_key->keyid = sca->sca_keynumber; 3958 shared_key->keyid = sca->sca_keynumber; 4102 struct sctp_authkeyid *keyid; local 4104 SCTP_CHECK_AND_CAST(keyid, optval, struct sctp_authkeyid, optsize); 4105 SCTP_FIND_STCB(inp, stcb, keyid->scact_assoc_id); 4109 if (sctp_deact_sharedkey(stcb, keyid->scact_keynumber)) { 4117 (keyid->scact_assoc_id == SCTP_FUTURE_ASSOC) || 4118 (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) { 4120 if (sctp_deact_sharedkey_ep(inp, keyid [all...] |
/freebsd-10.0-release/contrib/ntp/ntpq/ |
H A D | ntpq.c | 178 { CP_KEYID, UI, "keyid" }, /* 28 */ 269 static void keyid P((struct parse *, FILE *)); 335 { "keyid", keyid, { OPT|NTP_UINT, NO, NO, NO }, 337 "set keyid to use for authenticated requests" }, 1046 printf("Authenticated with keyid %lu\n", (u_long)key); 1236 * Get the keyid and the password if we don't have one. 1259 * Stick the keyid in the packet where 2283 * keyid - get a keyid t 2286 keyid( function [all...] |
/freebsd-10.0-release/contrib/ntp/include/ |
H A D | ntp.h | 298 keyid_t keyid; /* current key ID */ member in struct:peer
|