Searched refs:keyid (Results 26 - 50 of 65) sorted by relevance

123

/freebsd-13-stable/sbin/routed/rtquery/
H A Drtquery.c120 u_long keyid; variable
265 keyid = strtoul(p+1,&p,0);
266 if (keyid > 255 || *p != '\0')
400 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
/freebsd-13-stable/sys/net80211/
H A Dieee80211_crypto.c618 uint8_t keyid; local
657 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid);
660 k = &vap->iv_nw_keys[keyid >> 6];
H A Dieee80211_crypto_ccmp.c146 uint8_t keyid; local
148 keyid = ieee80211_crypto_get_keyid(vap, k) << 6;
154 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
H A Dieee80211_crypto_wep.c130 uint8_t keyid; local
132 keyid = ieee80211_crypto_get_keyid(vap, k) << 6;
174 ivp[3] = keyid;
H A Dieee80211_crypto_tkip.c158 uint8_t keyid; local
160 keyid = ieee80211_crypto_get_keyid(vap, k) << 6;
166 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
/freebsd-13-stable/contrib/wpa/src/ap/
H A Dap_config.c281 const char *keyid; local
319 keyid = NULL;
330 if (!os_strcmp(name, "keyid")) {
331 keyid = value;
393 if (keyid) {
394 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid));
395 if ((size_t) len >= sizeof(psk->keyid)) {
397 "PSK keyid to
[all...]
H A Dsta_info.c1211 if (!psk || !psk->keyid[0])
1214 return psk->keyid;
1256 const char *keyid; local
1271 keyid = ap_sta_wpa_get_keyid(hapd, sta);
1272 if (keyid) {
1274 " keyid=%s", keyid);
H A Dctrl_iface_ap.c210 const char *keyid; local
345 keyid = ap_sta_wpa_get_keyid(hapd, sta);
346 if (keyid) {
347 ret = os_snprintf(buf + len, buflen - len, "keyid=%s\n", keyid);
/freebsd-13-stable/crypto/openssl/crypto/cms/
H A Dcms_local.h378 ASN1_OCTET_STRING **keyid,
391 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert);
H A Dcms_sd.c196 ASN1_OCTET_STRING **keyid,
206 if (keyid)
207 *keyid = sid->d.subjectKeyIdentifier;
480 ASN1_OCTET_STRING **keyid,
483 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno);
195 cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
479 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
/freebsd-13-stable/usr.sbin/ntp/ntpdc/
H A Dnl.c28 printf("offsetof(keyid) = %d\n",
29 (int) offsetof(struct req_pkt, keyid));
38 printf("offsetof(keyid) = %d\n",
39 (int) offsetof(struct req_pkt_tail, keyid));
164 printf("offsetof(keyid) = %d\n",
165 (int) offsetof(struct info_peer, keyid));
468 printf("offsetof(keyid) = %d\n",
469 (int) offsetof(struct old_conf_peer, keyid));
490 printf("offsetof(keyid) = %d\n",
491 (int) offsetof(struct conf_peer, keyid));
[all...]
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Denc_des.c85 int keyid[2]; member in struct:fb
92 char *keyid; member in struct:keyidlist
413 * We only accept a keyid of 0. If we get a keyid of
/freebsd-13-stable/contrib/telnet/libtelnet/
H A Denc_des.c70 int keyid[2]; member in struct:fb
85 const char *keyid; member in struct:keyidlist
405 * We only accept a keyid of 0. If we get a keyid of
/freebsd-13-stable/crypto/openssh/
H A Dmonitor.c626 u_int keyid, compat; local
631 if ((r = sshbuf_get_u32(m, &keyid)) != 0 ||
636 if (keyid > INT_MAX)
657 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
658 fatal("%s: no hostkey for index %d", __func__, keyid);
682 if ((key = get_hostkey_by_index(keyid)) != NULL) {
687 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
695 fatal("%s: no hostkey from index %d", __func__, keyid);
/freebsd-13-stable/sys/dev/cxgbe/crypto/
H A Dt4_kern_tls.c225 free_keyid(struct tlspcb *tlsp, int keyid) argument
228 CTR3(KTR_CXGBE, "%s: tid %d key addr %#x", __func__, tlsp->tid, keyid);
229 vmem_free(tlsp->sc->key_map, keyid, TLS_KEY_CONTEXT_SZ);
542 int atid, error, keyid; local
601 keyid = -1;
603 keyid = get_new_keyid(tlsp);
604 if (keyid < 0) {
609 tlsp->tx_key_addr = keyid;
745 int error, keyid, kwrlen, kctxlen, len; local
826 keyid
[all...]
/freebsd-13-stable/contrib/ntp/ntpd/
H A Dntp_crypto.c239 keyid_t keyid; /* key identifer */ local
281 memcpy(&keyid, dgst, 4);
282 keyid = ntohl(keyid);
289 private, keyid, lifetime));
291 return (keyid);
318 keyid_t keyid = 0; /* next key ID */ local
340 keyid = ntp_random() & 0xffffffff;
341 if (keyid <= NTP_MAXKEY)
344 if (authhavekey(keyid))
[all...]
H A Dntp_peer.c693 p->ttl, p->keyid));
946 peer->keyid = key;
1014 peer->cast_flags, peer->ttl, peer->keyid));
H A Dntp_proto.c307 int keyid; local
341 keyid = ntohl(((u_int32 *)rpkt)[base_packet_length / 4]);
342 if (keyid != 0) {
348 * not (yet) be a keyid, but in this case FLAG_SKEY is set.
350 * if the keyid is 0 and FLAG_SKEY is not set.
352 if (!peer || (!peer->keyid && !(peer->flags & FLAG_SKEY))) {
1019 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org %#010x.%08x xmt %#010x.%08x CRYPTONAK\n",
1165 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org %#010x.%08x xmt %#010x.%08x MAC\n",
1185 if (0 != peer && 0 != peer->keyid) {
1193 if (peer->keyid !
[all...]
H A Dntp_request.c188 * Authentication keyid used to authenticate requests. Zero means we
587 || ntohl(tailinpkt->keyid) != info_auth_keyid) {
588 DPRINTF(5, ("failed auth %d info_auth_keyid %u pkt keyid %u maclen %lu\n",
591 ntohl(tailinpkt->keyid), (u_long)mac_len));
594 "process_private: failed auth %d info_auth_keyid %u pkt keyid %u maclen %lu\n",
597 ntohl(tailinpkt->keyid), (u_long)mac_len);
894 ip->keyid = pp->keyid;
1369 * - keyid
1381 temp_cp.maxpoll, fl, temp_cp.ttl, temp_cp.keyid,
[all...]
/freebsd-13-stable/crypto/openssl/include/crypto/
H A Dx509.h140 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
/freebsd-13-stable/sys/dev/cxgbe/tom/
H A Dt4_tls.c456 free_keyid(struct toepcb *toep, int keyid) argument
460 vmem_free(sc->key_map, keyid, TLS_KEY_CONTEXT_SZ);
500 int kwrlen, kctxlen, keyid, len; local
514 if ((keyid = get_new_keyid(toep)) < 0) {
518 keyid = get_keyid(tls_ofld, k_ctx->l_p_key);
523 free_keyid(toep, keyid);
543 kwr->kaddr = htobe32(V_ULP_MEMIO_ADDR(keyid >> 5));
553 tls_ofld->tx_key_addr = keyid;
556 tls_ofld->rx_key_addr = keyid;
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dcms.c238 char *keyid; local
241 len = hex_encode(ki->data, ki->length, &keyid);
245 asprintf(str, "certificate with id %s", keyid);
246 free(keyid);
/freebsd-13-stable/crypto/openssl/crypto/x509v3/
H A Dv3_purp.c886 if (akid->keyid && issuer->skid &&
887 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid))
958 return (x->akid != NULL ? x->akid->keyid : NULL);
/freebsd-13-stable/contrib/ntp/ntpdc/
H A Dntpdc_ops.c130 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." },
133 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." },
139 { "addr", "keyid", "version", "minpoll" },
179 { "keyid", "keyid", "keyid", "keyid" },
182 { "keyid", "keyi
1329 u_long keyid; local
[all...]
H A Dntpdc.c93 static void keyid (struct parse *, FILE *);
142 { "keyid", keyid, { OPT|NTP_UINT, NO, NO, NO },
144 "set/show keyid to use for authenticated requests" },
1716 * keyid - get a keyid to use for authenticating requests
1719 keyid( function
1726 (void) fprintf(fp, "no keyid defined\n");
1728 (void) fprintf(fp, "no keyid will be sent\n");
1730 (void) fprintf(fp, "keyid i
[all...]

Completed in 407 milliseconds

123