Searched refs:keyid (Results 26 - 50 of 81) sorted by relevance

1234

/freebsd-9.3-release/contrib/ntp/scripts/monitoring/
H A Dntp.pl26 $keyid=0;
69 return ($keyid,$keyid = $id)[$[];
/freebsd-9.3-release/contrib/ntp/include/
H A Dntp_request.h97 * The version number, mode and keyid have the same function and are
102 * it is required that a request be authenticated, the keyid should be
143 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt
153 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt_tail
160 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid))
290 #define REQ_REQUEST_KEY 32 /* define a new request keyid */
291 #define REQ_CONTROL_KEY 33 /* define a new control keyid */
394 keyid_t keyid; /* peer.keyid */ member in struct:info_peer
592 keyid_t keyid; /* ke member in struct:old_conf_peer
604 keyid_t keyid; /* key to use for this association */ member in struct:conf_peer
[all...]
/freebsd-9.3-release/contrib/ntp/sntp/
H A Dnetworking.h63 keyid_t keyid; member in struct:speer
/freebsd-9.3-release/crypto/openssh/
H A Dssh-pkcs11.c71 char *keyid; member in struct:pkcs11_key
185 free(k11->keyid);
275 key_filter[1].pValue = k11->keyid;
316 k11->keyid = xmalloc(k11->keyid_len);
317 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
/freebsd-9.3-release/sbin/routed/rtquery/
H A Drtquery.c118 u_long keyid; variable
263 keyid = strtoul(p+1,&p,0);
264 if (keyid > 255 || *p != '\0')
398 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
/freebsd-9.3-release/sys/net80211/
H A Dieee80211_crypto.h182 uint8_t keyid);
H A Dieee80211_crypto_ccmp.c66 static int ccmp_encap(struct ieee80211_key *k, struct mbuf *, uint8_t keyid);
141 ccmp_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument
164 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
H A Dieee80211_crypto_wep.c53 static int wep_encap(struct ieee80211_key *, struct mbuf *, uint8_t keyid);
124 wep_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument
184 ivp[3] = keyid;
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Dprivate.c347 dns_keytag_t keyid = (private->data[2] | private->data[1] << 8); local
362 sprintf(keybuf, "key %d/%s", keyid, algbuf);
H A Ddnssec.c255 sig.keyid = dst_key_id(key);
865 sig.keyid = dst_key_id(key);
1146 sig.keyid == keytag) {
1486 isc_uint16_t keyid, sigid; local
1488 keyid = dst_key_id(key->key);
1501 sigid = sig.keyid;
1502 if (keyid == sigid && keyalg == sigalg) {
H A Dvalidator.c1223 siginfo->keyid ==
1451 sig.keyid != keytag ||
1489 isc_uint16_t keyid)
1511 "accepted expired %sRRSIG (keyid=%u)",
1513 "wildcard " : "", keyid);
1516 "verify failed due to bad signature (keyid=%u): "
1517 "%s", keyid, isc_result_totext(result));
1520 "verify rdataset (keyid=%u): %s",
1521 keyid, isc_result_totext(result));
1619 val->siginfo->keyid);
1488 verify(dns_validator_t *val, dst_key_t *key, dns_rdata_t *rdata, isc_uint16_t keyid) argument
1707 checkkey(dns_validator_t *val, dns_rdata_t *keyrdata, isc_uint16_t keyid, dns_secalg_t algorithm) argument
1749 keyfromds(dns_validator_t *val, dns_rdataset_t *rdataset, dns_rdata_t *dsrdata, isc_uint8_t digest, isc_uint16_t keyid, dns_secalg_t algorithm, dns_rdata_t *keyrdata) argument
[all...]
/freebsd-9.3-release/usr.sbin/ntp/ntpdc/
H A Dnl.c28 printf("offsetof(keyid) = %d\n",
29 (int) offsetof(struct req_pkt, keyid));
38 printf("offsetof(keyid) = %d\n",
39 (int) offsetof(struct req_pkt_tail, keyid));
164 printf("offsetof(keyid) = %d\n",
165 (int) offsetof(struct info_peer, keyid));
468 printf("offsetof(keyid) = %d\n",
469 (int) offsetof(struct old_conf_peer, keyid));
490 printf("offsetof(keyid) = %d\n",
491 (int) offsetof(struct conf_peer, keyid));
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_sd.c240 ASN1_OCTET_STRING **keyid,
250 if (keyid)
251 *keyid = sid->d.subjectKeyIdentifier;
504 ASN1_OCTET_STRING **keyid,
507 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno);
239 cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
503 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
H A Dcms.h193 ASN1_OCTET_STRING **keyid,
243 ASN1_OCTET_STRING **keyid,
H A Dcms_lcl.h404 ASN1_OCTET_STRING **keyid,
H A Dcms_env.c250 ASN1_OCTET_STRING **keyid,
262 return cms_SignerIdentifier_get0_signer_id(ktri->rid, keyid, issuer, sno);
249 CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
/freebsd-9.3-release/contrib/ntp/ntpd/
H A Dntp_peer.c684 p->ttl, p->keyid));
908 peer->keyid = key;
976 peer->cast_flags, peer->ttl, peer->keyid));
H A Dntp_crypto.c235 keyid_t keyid; /* key identifer */ local
271 memcpy(&keyid, dgst, 4);
272 keyid = ntohl(keyid);
279 private, keyid, lifetime));
281 return (keyid);
308 keyid_t keyid = 0; /* next key ID */ local
330 keyid = ntp_random() & 0xffffffff;
331 if (keyid <= NTP_MAXKEY)
334 if (authhavekey(keyid))
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/
H A Dsig_24.c409 RETERR(uint16_tobuffer(sig->keyid, target));
477 sig->keyid = uint16_fromregion(&sr);
H A Drrsig_46.c404 RETERR(uint16_tobuffer(sig->keyid, target));
472 sig->keyid = uint16_fromregion(&sr);
/freebsd-9.3-release/contrib/telnet/libtelnet/
H A Denc_des.c74 int keyid[2]; member in struct:fb
89 const char *keyid; member in struct:keyidlist
409 * We only accept a keyid of 0. If we get a keyid of
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/
H A Denc_des.c85 int keyid[2]; member in struct:fb
93 char *keyid; member in struct:keyidlist
428 * We only accept a keyid of 0. If we get a keyid of
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dcms.c239 char *keyid; local
242 len = hex_encode(ki->data, ki->length, &keyid);
246 asprintf(str, "certificate with id %s", keyid);
247 free(keyid);
/freebsd-9.3-release/lib/bind/dns/dns/
H A Drdatastruct.h919 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
1602 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/
H A Dv3_purp.c699 if (subject->akid->keyid && issuer->skid &&
700 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid))

Completed in 202 milliseconds

1234