/freebsd-10.0-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | openCryptoki.conf | 34 key_id="4"
|
/freebsd-10.0-release/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 92 * in param key_id :the name of the private protected key file without the extension 98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype); 107 * in param key_id :the name of the private protected key file without the extension 113 typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num, 123 * in param key_id :the name of the public protected key file without the extension 129 typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num, 139 * in param key_id :the name of the public protected key file without the extension 147 typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
|
/freebsd-10.0-release/crypto/openssl/crypto/engine/ |
H A D | eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
H A D | eng_openssl.c | 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); 377 in = BIO_new_file(key_id, "r");
|
H A D | engine.h | 569 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 571 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | ntp.h | 90 u_int32_t key_id; member in struct:ntpdata
|
H A D | print-ntp.c | 188 TCHECK(bp->key_id); 189 printf("\n\tKey id: %u", bp->key_id); 191 TCHECK(bp->key_id); 192 printf("\n\tKey id: %u", bp->key_id);
|
H A D | print-rsvp.c | 305 u_int8_t key_id[6]; member in struct:rsvp_obj_integrity_t 1662 EXTRACT_16BITS(obj_ptr.rsvp_obj_integrity->key_id), 1663 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->key_id+2),
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 462 * key_id - Key ID for OpenSSL engine 467 char *key_id; member in struct:eap_peer_config
|
H A D | eap_tls_common.c | 84 params->key_id = config->key_id; 105 params->key_id = config->key2_id;
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | krl.h | 51 const char *key_id);
|
H A D | krl.c | 65 char *key_id; member in struct:revoked_key_id 113 return strcmp(a->key_id, b->key_id); 154 free(rki->key_id); 329 const char *key_id) 337 debug3("%s: revoke %s", __func__, key_id); 339 (rki->key_id = strdup(key_id)) == NULL) { 345 free(rki->key_id); 423 key->cert->key_id); 328 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const Key *ca_key, const char *key_id) argument 761 char *key_id = NULL; local [all...] |
H A D | key.h | 68 char *key_id; member in struct:KeyCert
|
H A D | auth2-hostbased.c | 206 "%s CA %s from %s@%s", key->cert->key_id,
|
H A D | ssh-add.c | 275 private->cert->key_id); 278 private->cert->key_id);
|
H A D | auth2-pubkey.c | 212 key_type(key), key->cert->key_id, 391 "signed by %s CA %s via %s", key->cert->key_id, 460 key->cert->key_id, key_type(key->cert->signature_key), ca_fp,
|
/freebsd-10.0-release/crypto/openssl/engines/ |
H A D | e_sureware.c | 104 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, 106 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, 652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument 685 ret=p_surewarehk_Load_Rsa_Pubkey(msg,key_id,el, 727 ret=p_surewarehk_Load_Dsa_Pubkey(msg,key_id,el, 772 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument 788 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype); 795 res=sureware_load_public(e,key_id,hptr,el,keytype); 800 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument 817 ret=p_surewarehk_Info_Pubkey(msg,key_id, [all...] |
H A D | e_4758cca.c | 398 static EVP_PKEY *ibm_4758_load_privkey(ENGINE* e, const char* key_id, argument 414 unsigned long keyLabelLength = strlen(key_id); 429 memcpy(keyLabel, key_id, keyLabelLength); 488 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE* e, const char* key_id, argument 502 unsigned long keyLabelLength = strlen(key_id); 517 memcpy(keyLabel, key_id, keyLabelLength);
|
H A D | e_chil.c | 133 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, 135 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, 748 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, argument 786 if (p_hwcrhk_RSALoadKey(hwcrhk_context, key_id, hptr, 851 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, argument 857 res = hwcrhk_load_privkey(eng, key_id,
|
/freebsd-10.0-release/sys/netinet/ |
H A D | sctp_auth.h | 142 uint16_t key_id); 213 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
|
H A D | sctp_auth.c | 505 sctp_find_sharedkey(struct sctp_keyhead *shared_keys, uint16_t key_id) argument 510 if (skey->keyid == key_id) 564 sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t key_id) argument 569 skey = sctp_find_sharedkey(&stcb->asoc.shared_keys, key_id); 576 __FUNCTION__, (void *)stcb, key_id, skey->refcount); 581 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t key_id, int so_locked argument 590 skey = sctp_find_sharedkey(&stcb->asoc.shared_keys, key_id); 597 __FUNCTION__, (void *)stcb, key_id, skey->refcount); 603 key_id, 0, so_locked); 606 __FUNCTION__, (void *)stcb, key_id, ske [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | tls.h | 115 * @key_id: the private key's id when using engine (this is OpenSSL 151 const char *key_id; member in struct:tls_connection_params
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 1144 #key_id="45" 1148 key_id="id_45"
|
/freebsd-10.0-release/contrib/ldns/ldns/ |
H A D | keys.h | 216 ldns_status ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm);
|
/freebsd-10.0-release/lib/libc/nameser/ |
H A D | ns_print.c | 456 u_int keyflags, protocol, algorithm, key_id; local 465 key_id = dst_s_dns_key_id(rdata, edata-rdata); 467 key_id = 0; 494 n = SPRINTF((tmp, " ; key_tag= %u", key_id));
|