/freebsd-10.0-release/crypto/openssl/crypto/asn1/ |
H A D | x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid [all...] |
H A D | t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/freebsd-10.0-release/contrib/ntp/libntp/ |
H A D | authkeys.c | 28 keyid_t keyid; /* key identifier */ member in struct:savekey 39 * keyid. We make this fairly big for potentially busy servers. 43 #define KEYHASH(keyid) ((keyid) & HASHMASK) 99 if (keyno == sk->keyid) 123 if (keyno == sk->keyid) 149 if (keyno == sk->keyid) 160 cache_keyid = sk->keyid; 206 printf("authtrust: keyid %08x life %lu\n", keyno, trust); 210 if (keyno == sk->keyid) [all...] |
/freebsd-10.0-release/sys/netinet/ |
H A D | sctp_auth.h | 65 uint16_t keyid; /* shared key ID */ member in struct:sctp_shared_key 91 uint16_t active_keyid; /* active send keyid */ 92 uint16_t assoc_keyid; /* current send keyid (cached) */ 93 uint16_t recv_keyid; /* last recv keyid (cached) */ 151 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 153 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 199 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 200 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 201 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 202 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); [all...] |
H A D | sctp_auth.c | 484 new_key->keyid = 0; 510 if (skey->keyid == key_id) 532 if (new_skey->keyid < skey->keyid) { 536 } else if (new_skey->keyid == skey->keyid) { 542 new_skey->keyid); 547 new_skey->keyid); 625 new_skey->keyid = skey->keyid; 1201 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) argument 1222 sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1242 sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument 1276 sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1308 sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid) argument 1335 sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1354 sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument 1387 sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1553 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument 1762 sctp_notify_authentication(struct sctp_tcb *stcb, uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked SCTP_UNUSED ) argument [all...] |
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 175 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 185 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len); 706 encrypt_enc_keyid(unsigned char *keyid, int len) argument 708 encrypt_keyid(&ki[1], keyid, len); 712 encrypt_dec_keyid(unsigned char *keyid, int len) argument 714 encrypt_keyid(&ki[0], keyid, len); 718 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 738 if (ep->keyid) 739 (void)(*ep->keyid)(dir, kp->keyid, 762 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 94 int (*keyid)(int, unsigned char *, int *); member in struct:__anon4376
|
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 753 if (ep->keyid) 754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 756 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { 761 memcpy(kp->keyid,keyid, len); 762 if (ep->keyid) 775 encrypt_enc_keyid(unsigned char *keyid, int len) argument 780 encrypt_dec_keyid(unsigned char *keyid, int len) argument 786 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon4745
|
/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | krl.sh | 43 touch $OBJ/revoked-keyid 46 echo "id: revoked $n" >> $OBJ/revoked-keyid 96 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 100 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub $OBJ/revoked-keyid \ 135 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 140 # keys all serial keyid certs CA 149 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid ; do 153 # keys all serial keyid cert [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 88 unsigned char keyid[EVP_MAX_MD_SIZE]; local 122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 130 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 161 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 203 unsigned char *keyid; local 219 keyid = X509_keyid_get0(cert, &keyidlen); 221 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/freebsd-10.0-release/sys/net80211/ |
H A D | ieee80211_crypto.c | 534 uint8_t keyid; local 553 keyid = vap->iv_def_txkey; 556 keyid = 0; 560 return (cip->ic_encap(k, m, keyid<<6) ? k : NULL); 578 uint8_t keyid; local 596 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid); 599 k = &vap->iv_nw_keys[keyid >> 6];
|
H A D | ieee80211_crypto_none.c | 91 none_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument 103 "key id %u is not set (encap)", keyid>>6);
|
H A D | ieee80211_crypto.h | 182 uint8_t keyid);
|
/freebsd-10.0-release/contrib/ntp/scripts/monitoring/ |
H A D | ntp.pl | 26 $keyid=0; 69 return ($keyid,$keyid = $id)[$[];
|
/freebsd-10.0-release/contrib/ntp/ntpd/ |
H A D | ntp_intres.c | 66 #define ce_keyid ce_config.keyid 136 keyid_t req_keyid; /* request keyid */ 168 keyid_t keyid; member in struct:ntp_res_c_pkt 233 msyslog(LOG_ERR, "invalid request keyid %08x", 401 keyid_t keyid, 414 mode, version, minpoll, maxpoll, flags, ttl, keyid, 435 ce->ce_keyid = keyid; 739 reqpkt.keyid = htonl(req_keyid); 393 addentry( char *name, int mode, int version, int minpoll, int maxpoll, u_int flags, int ttl, keyid_t keyid, char *keystr, u_char peeraf ) argument
|
H A D | ntp_peer.c | 512 peer->keyid = key; 589 peer->ttl, peer->keyid); 807 peer->keyid = key; 876 peer->ttl, peer->keyid));
|
H A D | ntp_request.c | 184 * Authentication keyid used to authenticate requests. Zero means we 567 || ntohl(tailinpkt->keyid) != info_auth_keyid) { 570 printf("failed auth %d info_auth_keyid %lu pkt keyid %lu\n", 573 (u_long)ntohl(tailinpkt->keyid)); 575 "process_private: failed auth %d info_auth_keyid %lu pkt keyid %lu\n", 578 (u_long)ntohl(tailinpkt->keyid)); 902 ip->keyid = pp->keyid; 1418 temp_cp.maxpoll, fl, temp_cp.ttl, temp_cp.keyid, 2447 * set_request_keyid - set the keyid use 2456 keyid_t keyid; local 2484 keyid_t keyid; local [all...] |
/freebsd-10.0-release/etc/rc.d/ |
H A D | sendmail | 118 authorityKeyIdentifier=keyid,issuer 124 authorityKeyIdentifier=keyid:always,issuer
|
/freebsd-10.0-release/contrib/ntp/include/ |
H A D | ntp_request.h | 95 * The version number, mode and keyid have the same function and are 100 * it is required that a request be authenticated, the keyid should be 136 keyid_t keyid; /* encryption key */ member in struct:req_pkt 146 keyid_t keyid; /* encryption key */ member in struct:req_pkt_tail 276 #define REQ_REQUEST_KEY 32 /* define a new request keyid */ 277 #define REQ_CONTROL_KEY 33 /* define a new control keyid */ 380 keyid_t keyid; /* peer.keyid */ member in struct:info_peer 578 keyid_t keyid; /* key to use for this association */ member in struct:old_conf_peer 590 keyid_t keyid; /* ke member in struct:conf_peer [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | ssh-pkcs11.c | 69 char *keyid; member in struct:pkcs11_key 183 free(k11->keyid); 275 key_filter[1].pValue = k11->keyid; 316 k11->keyid = xmalloc(k11->keyid_len); 317 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
/freebsd-10.0-release/sbin/routed/rtquery/ |
H A D | rtquery.c | 118 u_long keyid; variable 263 keyid = strtoul(p+1,&p,0); 264 if (keyid > 255 || *p != '\0') 398 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
|
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 256 ASN1_OCTET_STRING **keyid, 268 if (keyid) 269 *keyid = sid->d.subjectKeyIdentifier; 544 ASN1_OCTET_STRING **keyid, 547 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); 255 cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 543 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
|