/freebsd-13-stable/sbin/routed/rtquery/ |
H A D | rtquery.c | 120 u_long keyid; variable 265 keyid = strtoul(p+1,&p,0); 266 if (keyid > 255 || *p != '\0') 400 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
|
/freebsd-13-stable/sys/net80211/ |
H A D | ieee80211_crypto.c | 618 uint8_t keyid; local 657 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid); 660 k = &vap->iv_nw_keys[keyid >> 6];
|
H A D | ieee80211_crypto_ccmp.c | 146 uint8_t keyid; local 148 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; 154 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
|
H A D | ieee80211_crypto_wep.c | 130 uint8_t keyid; local 132 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; 174 ivp[3] = keyid;
|
H A D | ieee80211_crypto_tkip.c | 158 uint8_t keyid; local 160 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; 166 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
|
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | ap_config.c | 281 const char *keyid; local 319 keyid = NULL; 330 if (!os_strcmp(name, "keyid")) { 331 keyid = value; 393 if (keyid) { 394 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid)); 395 if ((size_t) len >= sizeof(psk->keyid)) { 397 "PSK keyid to [all...] |
H A D | sta_info.c | 1211 if (!psk || !psk->keyid[0]) 1214 return psk->keyid; 1256 const char *keyid; local 1271 keyid = ap_sta_wpa_get_keyid(hapd, sta); 1272 if (keyid) { 1274 " keyid=%s", keyid);
|
H A D | ctrl_iface_ap.c | 210 const char *keyid; local 345 keyid = ap_sta_wpa_get_keyid(hapd, sta); 346 if (keyid) { 347 ret = os_snprintf(buf + len, buflen - len, "keyid=%s\n", keyid);
|
/freebsd-13-stable/crypto/openssl/crypto/cms/ |
H A D | cms_local.h | 378 ASN1_OCTET_STRING **keyid, 391 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert);
|
H A D | cms_sd.c | 196 ASN1_OCTET_STRING **keyid, 206 if (keyid) 207 *keyid = sid->d.subjectKeyIdentifier; 480 ASN1_OCTET_STRING **keyid, 483 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); 195 cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 479 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
|
/freebsd-13-stable/usr.sbin/ntp/ntpdc/ |
H A D | nl.c | 28 printf("offsetof(keyid) = %d\n", 29 (int) offsetof(struct req_pkt, keyid)); 38 printf("offsetof(keyid) = %d\n", 39 (int) offsetof(struct req_pkt_tail, keyid)); 164 printf("offsetof(keyid) = %d\n", 165 (int) offsetof(struct info_peer, keyid)); 468 printf("offsetof(keyid) = %d\n", 469 (int) offsetof(struct old_conf_peer, keyid)); 490 printf("offsetof(keyid) = %d\n", 491 (int) offsetof(struct conf_peer, keyid)); [all...] |
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | enc_des.c | 85 int keyid[2]; member in struct:fb 92 char *keyid; member in struct:keyidlist 413 * We only accept a keyid of 0. If we get a keyid of
|
/freebsd-13-stable/contrib/telnet/libtelnet/ |
H A D | enc_des.c | 70 int keyid[2]; member in struct:fb 85 const char *keyid; member in struct:keyidlist 405 * We only accept a keyid of 0. If we get a keyid of
|
/freebsd-13-stable/crypto/openssh/ |
H A D | monitor.c | 626 u_int keyid, compat; local 631 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || 636 if (keyid > INT_MAX) 657 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) 658 fatal("%s: no hostkey for index %d", __func__, keyid); 682 if ((key = get_hostkey_by_index(keyid)) != NULL) { 687 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && 695 fatal("%s: no hostkey from index %d", __func__, keyid);
|
/freebsd-13-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_kern_tls.c | 225 free_keyid(struct tlspcb *tlsp, int keyid) argument 228 CTR3(KTR_CXGBE, "%s: tid %d key addr %#x", __func__, tlsp->tid, keyid); 229 vmem_free(tlsp->sc->key_map, keyid, TLS_KEY_CONTEXT_SZ); 542 int atid, error, keyid; local 601 keyid = -1; 603 keyid = get_new_keyid(tlsp); 604 if (keyid < 0) { 609 tlsp->tx_key_addr = keyid; 745 int error, keyid, kwrlen, kctxlen, len; local 826 keyid [all...] |
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 239 keyid_t keyid; /* key identifer */ local 281 memcpy(&keyid, dgst, 4); 282 keyid = ntohl(keyid); 289 private, keyid, lifetime)); 291 return (keyid); 318 keyid_t keyid = 0; /* next key ID */ local 340 keyid = ntp_random() & 0xffffffff; 341 if (keyid <= NTP_MAXKEY) 344 if (authhavekey(keyid)) [all...] |
H A D | ntp_peer.c | 693 p->ttl, p->keyid)); 946 peer->keyid = key; 1014 peer->cast_flags, peer->ttl, peer->keyid));
|
H A D | ntp_proto.c | 307 int keyid; local 341 keyid = ntohl(((u_int32 *)rpkt)[base_packet_length / 4]); 342 if (keyid != 0) { 348 * not (yet) be a keyid, but in this case FLAG_SKEY is set. 350 * if the keyid is 0 and FLAG_SKEY is not set. 352 if (!peer || (!peer->keyid && !(peer->flags & FLAG_SKEY))) { 1019 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org %#010x.%08x xmt %#010x.%08x CRYPTONAK\n", 1165 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org %#010x.%08x xmt %#010x.%08x MAC\n", 1185 if (0 != peer && 0 != peer->keyid) { 1193 if (peer->keyid ! [all...] |
H A D | ntp_request.c | 188 * Authentication keyid used to authenticate requests. Zero means we 587 || ntohl(tailinpkt->keyid) != info_auth_keyid) { 588 DPRINTF(5, ("failed auth %d info_auth_keyid %u pkt keyid %u maclen %lu\n", 591 ntohl(tailinpkt->keyid), (u_long)mac_len)); 594 "process_private: failed auth %d info_auth_keyid %u pkt keyid %u maclen %lu\n", 597 ntohl(tailinpkt->keyid), (u_long)mac_len); 894 ip->keyid = pp->keyid; 1369 * - keyid 1381 temp_cp.maxpoll, fl, temp_cp.ttl, temp_cp.keyid, [all...] |
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | x509.h | 140 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|
/freebsd-13-stable/sys/dev/cxgbe/tom/ |
H A D | t4_tls.c | 456 free_keyid(struct toepcb *toep, int keyid) argument 460 vmem_free(sc->key_map, keyid, TLS_KEY_CONTEXT_SZ); 500 int kwrlen, kctxlen, keyid, len; local 514 if ((keyid = get_new_keyid(toep)) < 0) { 518 keyid = get_keyid(tls_ofld, k_ctx->l_p_key); 523 free_keyid(toep, keyid); 543 kwr->kaddr = htobe32(V_ULP_MEMIO_ADDR(keyid >> 5)); 553 tls_ofld->tx_key_addr = keyid; 556 tls_ofld->rx_key_addr = keyid;
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | cms.c | 238 char *keyid; local 241 len = hex_encode(ki->data, ki->length, &keyid); 245 asprintf(str, "certificate with id %s", keyid); 246 free(keyid);
|
/freebsd-13-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 886 if (akid->keyid && issuer->skid && 887 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid)) 958 return (x->akid != NULL ? x->akid->keyid : NULL);
|
/freebsd-13-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc_ops.c | 130 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." }, 133 { "addr", "keyid", "version", "minpoll#|prefer|burst|iburst|'minpoll N'|'maxpoll N'|'keyid N'|'version N' ..." }, 139 { "addr", "keyid", "version", "minpoll" }, 179 { "keyid", "keyid", "keyid", "keyid" }, 182 { "keyid", "keyi 1329 u_long keyid; local [all...] |
H A D | ntpdc.c | 93 static void keyid (struct parse *, FILE *); 142 { "keyid", keyid, { OPT|NTP_UINT, NO, NO, NO }, 144 "set/show keyid to use for authenticated requests" }, 1716 * keyid - get a keyid to use for authenticating requests 1719 keyid( function 1726 (void) fprintf(fp, "no keyid defined\n"); 1728 (void) fprintf(fp, "no keyid will be sent\n"); 1730 (void) fprintf(fp, "keyid i [all...] |