/freebsd-11.0-release/crypto/openssl/crypto/engine/ |
H A D | engine.h | 664 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 666 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | tls.h | 134 * @key_id: the private key's id when using engine (this is OpenSSL 175 const char *key_id; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 971 const char *pin, const char *key_id, 1006 if (key_id) { 1018 key_id, NULL, 1025 key_id, 3764 const char *key_id = params->key_id; local 3780 if (!key_id && params->private_key && can_pkcs11 && 3783 key_id = params->private_key; 3824 key_id, cert_id, ca_cert_id); 3852 if (engine_id && key_id) { 970 tls_engine_init(struct tls_connection *conn, const char *engine_id, const char *pin, const char *key_id, const char *cert_id, const char *ca_cert_id) argument [all...] |
/freebsd-11.0-release/crypto/openssh/ |
H A D | auth2-hostbased.c | 230 "%s CA %s from %s@%s", key->cert->key_id,
|
H A D | sshkey.h | 89 char *key_id; member in struct:sshkey_cert
|
H A D | auth2-pubkey.c | 242 key_type(key), key->cert->key_id, 805 "signed by %s CA %s via %s", key->cert->key_id, 885 "%s CA %s via %s", key->cert->key_id,
|
H A D | sshkey.c | 426 free(cert->key_id); 448 cert->key_id = NULL; 1724 if (from->key_id == NULL) 1725 to->key_id = NULL; 1726 else if ((to->key_id = strdup(from->key_id)) == NULL) 1846 (ret = sshbuf_get_cstring(b, &key->cert->key_id, &kidlen)) != 0 || 2437 (ret = sshbuf_put_cstring(cert, k->cert->key_id)) != 0)
|
H A D | ssh-keygen.c | 1631 public->cert->key_id = xstrdup(cert_key_id); 1667 out, public->cert->key_id, 1886 printf(" Key ID: \"%s\"\n", key->cert->key_id);
|
H A D | sshconnect.c | 1269 host_key->cert->key_id,
|
/freebsd-11.0-release/contrib/ldns/ldns/ |
H A D | keys.h | 216 ldns_status ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm);
|
/freebsd-11.0-release/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 435 k1->cert->key_id = strdup("estragon"); 436 ASSERT_PTR_NE(k1->cert->key_id, NULL);
|
/freebsd-11.0-release/lib/libc/nameser/ |
H A D | ns_print.c | 462 u_int keyflags, protocol, algorithm, key_id; local 471 key_id = dst_s_dns_key_id(rdata, edata-rdata); 473 key_id = 0; 500 n = SPRINTF((tmp, " ; key_tag= %u", key_id));
|
/freebsd-11.0-release/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 876 u_long key_id; local 903 key_id = getkeyid("Keyid: "); 904 if (!key_id) { 908 info_auth_keyid = key_id;
|
/freebsd-11.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.c | 102 params->key_id = config->key_id; 125 params->key_id = config->key2_id;
|
/freebsd-11.0-release/contrib/tcpdump/ |
H A D | print-rsvp.c | 297 uint8_t key_id[6]; member in struct:rsvp_obj_integrity_t 1653 EXTRACT_16BITS(obj_ptr.rsvp_obj_integrity->key_id), 1654 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->key_id+2),
|
H A D | print-isoclns.c | 2086 u_short packet_len,pdu_len, key_id; local 2686 key_id = EXTRACT_16BITS((tptr+1)); 2687 ND_PRINT((ndo, "%u, password: ", key_id));
|
/freebsd-11.0-release/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1250 u_long key_id; local 1310 key_id = getkeyid("Keyid: "); 1311 if (key_id == 0 || key_id > NTP_MAXKEY) { 1316 info_auth_keyid = key_id;
|
/freebsd-11.0-release/crypto/openssl/engines/ |
H A D | e_capi.c | 165 static EVP_PKEY *capi_load_privkey(ENGINE *eng, const char *key_id, 766 static EVP_PKEY *capi_load_privkey(ENGINE *eng, const char *key_id, argument 779 key = capi_find_key(ctx, key_id);
|
/freebsd-11.0-release/contrib/ldns/ |
H A D | keys.c | 93 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg) argument 100 k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
|
/freebsd-11.0-release/contrib/wpa/src/drivers/ |
H A D | driver_nl80211_event.c | 859 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); local 860 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id);
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/ |
H A D | config_file.c | 721 STR(key_id);
|
H A D | config.c | 1870 { STRe(key_id) }, 2107 os_free(eap->key_id);
|
/freebsd-11.0-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 1749 wpa_hexdump(MSG_DEBUG, " key_id (reserved)", key->key_id, 8);
|
/freebsd-11.0-release/sys/dev/iwm/ |
H A D | if_iwmreg.h | 6081 * @key_id: 6089 uint32_t key_id; member in struct:iwm_mvm_mgmt_mcast_key_cmd
|