Searched refs:keyid (Results 1 - 25 of 57) sorted by relevance

123

/freebsd-10.2-release/crypto/openssl/crypto/asn1/
H A Dx_x509a.c79 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
115 if (!x || !x->aux || !x->aux->keyid)
117 ASN1_OCTET_STRING_free(x->aux->keyid);
118 x->aux->keyid = NULL;
123 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new()))
125 return ASN1_STRING_set(aux->keyid, id, len);
139 if (!x->aux || !x->aux->keyid)
142 *len = x->aux->keyid->length;
143 return x->aux->keyid
[all...]
H A Dt_x509a.c108 if (aux->keyid) {
110 for (i = 0; i < aux->keyid->length; i++)
111 BIO_printf(out, "%s%02X", i ? ":" : "", aux->keyid->data[i]);
/freebsd-10.2-release/crypto/openssl/crypto/x509v3/
H A Dv3_akey.c92 if (akeyid->keyid) {
93 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
94 X509V3_add_value("keyid", tmp, &extlist);
109 * keyid: use the issuers subject keyid, the value 'always' means its is
112 * to only use this if keyid is not present. With the option 'always'
120 char keyid = 0, issuer = 0; local
134 if (!strcmp(cnf->name, "keyid")) {
135 keyid
[all...]
H A Dv3_akeya.c68 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
/freebsd-10.2-release/sys/netinet/
H A Dsctp_auth.h65 uint16_t keyid; /* shared key ID */ member in struct:sctp_shared_key
91 uint16_t active_keyid; /* active send keyid */
92 uint16_t assoc_keyid; /* current send keyid (cached) */
93 uint16_t recv_keyid; /* last recv keyid (cached) */
150 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid);
152 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid,
198 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid);
199 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid);
200 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
201 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid);
[all...]
H A Dsctp_auth.c469 new_key->keyid = 0;
495 if (skey->keyid == key_id)
517 if (new_skey->keyid < skey->keyid) {
521 } else if (new_skey->keyid == skey->keyid) {
527 new_skey->keyid);
532 new_skey->keyid);
610 new_skey->keyid = skey->keyid;
1186 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) argument
1207 sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1227 sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument
1261 sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1293 sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid) argument
1320 sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1339 sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument
1372 sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1538 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument
1747 sctp_notify_authentication(struct sctp_tcb *stcb, uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked SCTP_UNUSED ) argument
[all...]
/freebsd-10.2-release/contrib/telnet/libtelnet/
H A Dencrypt.c175 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
185 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len);
706 encrypt_enc_keyid(unsigned char *keyid, int len) argument
708 encrypt_keyid(&ki[1], keyid, len);
712 encrypt_dec_keyid(unsigned char *keyid, int len) argument
714 encrypt_keyid(&ki[0], keyid, len);
718 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
738 if (ep->keyid)
739 (void)(*ep->keyid)(dir, kp->keyid,
762 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h94 int (*keyid)(int, unsigned char *, int *); member in struct:__anon4772
/freebsd-10.2-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
753 if (ep->keyid)
754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
756 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) {
761 memcpy(kp->keyid,keyid, len);
762 if (ep->keyid)
775 encrypt_enc_keyid(unsigned char *keyid, int len) argument
780 encrypt_dec_keyid(unsigned char *keyid, int len) argument
786 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon5141
/freebsd-10.2-release/crypto/openssl/crypto/pkcs12/
H A Dp12_crt.c89 unsigned char keyid[EVP_MAX_MD_SIZE]; local
120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
156 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
198 unsigned char *keyid; local
214 keyid = X509_keyid_get0(cert, &keyidlen);
216 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
/freebsd-10.2-release/crypto/openssh/regress/
H A Dkrl.sh43 touch $OBJ/revoked-keyid
46 echo "id: revoked $n" >> $OBJ/revoked-keyid
96 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
100 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub $OBJ/revoked-keyid \
138 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
143 # keys all serial keyid certs CA
152 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid ; do
156 # keys all serial keyid cert
[all...]
/freebsd-10.2-release/contrib/ntp/libntp/
H A Dauthkeys.c31 keyid_t keyid; /* key identifier */ member in struct:savekey
65 * keyid. We make this fairly big for potentially busy servers.
69 #define KEYHASH(keyid) ((keyid) & authhashmask)
364 hash = KEYHASH(sk->keyid);
398 sk->keyid = id;
426 authcache_flush_id(sk->keyid);
429 bucket = &key_hash[KEYHASH(sk->keyid)];
456 if (id == sk->keyid)
516 cache_keyid = sk->keyid;
[all...]
H A Dauthreadkeys.c91 keyid_t keyid; /* stored key ID */ member in struct:keydata
261 next->keyid = keyno;
291 next->keyid = keyno;
355 MD5auth_setkey(next->keyid, next->keytype,
/freebsd-10.2-release/sys/net80211/
H A Dieee80211_crypto.c534 uint8_t keyid; local
553 keyid = vap->iv_def_txkey;
556 keyid = 0;
560 return (cip->ic_encap(k, m, keyid<<6) ? k : NULL);
578 uint8_t keyid; local
596 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid);
599 k = &vap->iv_nw_keys[keyid >> 6];
H A Dieee80211_crypto_none.c91 none_encap(struct ieee80211_key *k, struct mbuf *m, uint8_t keyid) argument
103 "key id %u is not set (encap)", keyid>>6);
H A Dieee80211_crypto.h182 uint8_t keyid);
/freebsd-10.2-release/contrib/ntp/scripts/monitoring/
H A Dntp.pl26 $keyid=0;
69 return ($keyid,$keyid = $id)[$[];
/freebsd-10.2-release/contrib/ntp/include/
H A Dntp_request.h97 * The version number, mode and keyid have the same function and are
102 * it is required that a request be authenticated, the keyid should be
143 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt
153 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt_tail
160 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid))
290 #define REQ_REQUEST_KEY 32 /* define a new request keyid */
291 #define REQ_CONTROL_KEY 33 /* define a new control keyid */
394 keyid_t keyid; /* peer.keyid */ member in struct:info_peer
592 keyid_t keyid; /* ke member in struct:old_conf_peer
604 keyid_t keyid; /* key to use for this association */ member in struct:conf_peer
[all...]
/freebsd-10.2-release/contrib/ntp/sntp/
H A Dnetworking.h63 keyid_t keyid; member in struct:speer
/freebsd-10.2-release/etc/rc.d/
H A Dsendmail118 authorityKeyIdentifier=keyid,issuer
124 authorityKeyIdentifier=keyid:always,issuer
/freebsd-10.2-release/crypto/openssh/
H A Dssh-pkcs11.c71 char *keyid; member in struct:pkcs11_key
185 free(k11->keyid);
275 key_filter[1].pValue = k11->keyid;
316 k11->keyid = xmalloc(k11->keyid_len);
317 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
/freebsd-10.2-release/sbin/routed/rtquery/
H A Drtquery.c118 u_long keyid; variable
263 keyid = strtoul(p+1,&p,0);
264 if (keyid > 255 || *p != '\0')
398 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
/freebsd-10.2-release/usr.sbin/ntp/ntpdc/
H A Dnl.c28 printf("offsetof(keyid) = %d\n",
29 (int) offsetof(struct req_pkt, keyid));
38 printf("offsetof(keyid) = %d\n",
39 (int) offsetof(struct req_pkt_tail, keyid));
164 printf("offsetof(keyid) = %d\n",
165 (int) offsetof(struct info_peer, keyid));
468 printf("offsetof(keyid) = %d\n",
469 (int) offsetof(struct old_conf_peer, keyid));
490 printf("offsetof(keyid) = %d\n",
491 (int) offsetof(struct conf_peer, keyid));
[all...]
/freebsd-10.2-release/crypto/openssl/crypto/cms/
H A Dcms_sd.c239 ASN1_OCTET_STRING **keyid,
249 if (keyid)
250 *keyid = sid->d.subjectKeyIdentifier;
493 ASN1_OCTET_STRING **keyid,
496 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno);
238 cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
492 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument

Completed in 222 milliseconds

123