/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | openCryptoki.conf | 34 key_id="4"
|
/freebsd-11-stable/contrib/ntp/sntp/ |
H A D | crypto.h | 21 int key_id; member in struct:key 29 extern void get_key(int key_id, struct key **d_key);
|
H A D | networking.c | 107 u_int key_id; local 117 // key_id = 0; 162 key_id = ntohl(*exten_end); 163 printf("Crypto NAK = 0x%08x from %s\n", key_id, stoa(sender)); 179 key_id = ntohl(*exten_end); 180 get_key(key_id, &pkt_key); 182 printf("unrecognized key ID = 0x%08x\n", key_id); 200 func_name, stoa(sender), key_id));
|
H A D | main.h | 22 int key_id, struct key *pkt_key);
|
H A D | crypto.c | 257 &act->key_id, act->typen, keystring); 284 act->key_id, act->typen); 311 /* Looks for the key with keyid key_id and sets the d_key pointer to the 316 int key_id, 325 if (itr_key->key_id == key_id) { 315 get_key( int key_id, struct key **d_key ) argument
|
H A D | main.c | 54 int key_id; member in struct:dns_ctx 414 ctx->key_id = OPT_VALUE_AUTHENTICATION; 415 get_key(ctx->key_id, &ctx->key); 418 progname, ctx->key_id, OPT_ARG(KEYFILE)); 422 ctx->key_id = -1; 678 pkt_len = generate_pkt(&x_pkt, &tv_xmt, dctx->key_id, 1125 int key_id, 1142 printf("generate_pkt: key_id %d, key pointer %p\n", key_id, pkt_key); 1145 x_pkt->exten[0] = htonl(key_id); 1122 generate_pkt( struct pkt *x_pkt, const struct timeval *tv_xmt, int key_id, struct key *pkt_key ) argument [all...] |
/freebsd-11-stable/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 93 * in param key_id :the name of the private protected key file without the extension 99 typedef int SureWareHook_Load_Privkey_t(char *const msg, const char *key_id, 110 * in param key_id :the name of the private protected key file without the extension 116 typedef int SureWareHook_Info_Pubkey_t(char *const msg, const char *key_id, 126 * in param key_id :the name of the public protected key file without the extension 133 const char *key_id, 145 * in param key_id :the name of the public protected key file without the extension 154 const char *key_id,
|
/freebsd-11-stable/contrib/ntp/sntp/tests/ |
H A D | keyFile.c | 11 bool CompareKeysAlternative(int key_id,int key_len,const char* type,const char* key_seq,struct key actual); 25 if (expected.key_id != actual.key_id) { 26 printf("Expected key_id: %d but was: %d\n", 27 expected.key_id, actual.key_id); 51 int key_id, 60 temp.key_id = key_id; 50 CompareKeysAlternative( int key_id, int key_len, const char * type, const char * key_seq, struct key actual ) argument
|
H A D | crypto.c | 39 md5.key_id = 10; 66 sha1.key_id = 20; 99 cmac.key_id = 30; 129 md5.key_id = 0; 153 sha1.key_id = 0; 181 cmac.key_id = 0; 237 md5.key_id = 0; 256 md5.key_id = 10;
|
H A D | packetProcessing.c | 19 void PrepareAuthenticationTest(int key_id,int key_len,const char* type,const void* key_seq); 20 void PrepareAuthenticationTestMD5(int key_id,int key_len,const void* key_seq); 68 int key_id, 75 snprintf(str, 25, "%d", key_id); 81 key_ptr->key_id = key_id; 94 int key_id, 99 PrepareAuthenticationTest(key_id, key_len, "MD5", key_seq); 67 PrepareAuthenticationTest( int key_id, int key_len, const char * type, const void * key_seq ) argument 93 PrepareAuthenticationTestMD5( int key_id, int key_len, const void * key_seq ) argument
|
H A D | packetHandling.c | 84 testkey.key_id = 30; 94 generate_pkt(&testpkt, &xmt, testkey.key_id, &testkey)); 107 TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0])); 109 TEST_ASSERT_EQUAL(MAX_MD5_LEN - 4, /* Remove the key_id, only keep the mac. */
|
/freebsd-11-stable/crypto/openssl/crypto/engine/ |
H A D | eng_pkey.c | 99 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument 121 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 130 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument 151 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
H A D | eng_openssl.c | 124 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 387 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument 394 key_id); 395 in = BIO_new_file(key_id, "r");
|
H A D | engine.h | 664 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 666 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-ntp.c | 128 uint32_t key_id; member in struct:ntpdata 306 ND_TCHECK(bp->key_id); 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); 309 ND_TCHECK(bp->key_id); 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
|
H A D | print-lisp.c | 196 nd_uint16_t key_id; member in struct:map_register_hdr 239 uint16_t key_id; local 271 key_id = EXTRACT_16BITS(&lisp_hdr->key_id); 274 tok2str(auth_type, "unknown-type", key_id)));
|
/freebsd-11-stable/crypto/openssh/ |
H A D | krl.h | 52 const struct sshkey *ca_key, const char *key_id);
|
H A D | krl.c | 66 char *key_id; member in struct:revoked_key_id 114 return strcmp(a->key_id, b->key_id); 155 free(rki->key_id); 337 const char *key_id) 346 KRL_DBG(("%s: revoke %s", __func__, key_id)); 348 (rki->key_id = strdup(key_id)) == NULL) { 354 free(rki->key_id); 434 key->cert->key_id); 336 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const struct sshkey *ca_key, const char *key_id) argument 814 char *key_id = NULL; local [all...] |
H A D | ssh-add.c | 316 private->cert->key_id, ssh_err(r)); 320 private->cert->key_id);
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 581 * key_id - Key ID for OpenSSL engine 586 char *key_id; member in struct:eap_peer_config
|
/freebsd-11-stable/crypto/openssl/engines/ |
H A D | e_sureware.c | 106 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, 109 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, 685 static EVP_PKEY *sureware_load_public(ENGINE *e, const char *key_id, argument 722 ret = p_surewarehk_Load_Rsa_Pubkey(msg, key_id, el, 769 ret = p_surewarehk_Load_Dsa_Pubkey(msg, key_id, el, 816 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument 831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype); 837 res = sureware_load_public(e, key_id, hptr, el, keytype); 842 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument 858 ret = p_surewarehk_Info_Pubkey(msg, key_id, [all...] |
H A D | e_4758cca.c | 396 static EVP_PKEY *ibm_4758_load_privkey(ENGINE *e, const char *key_id, argument 413 unsigned long keyLabelLength = strlen(key_id); 427 memcpy(keyLabel, key_id, keyLabelLength); 486 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE *e, const char *key_id, argument 501 unsigned long keyLabelLength = strlen(key_id); 515 memcpy(keyLabel, key_id, keyLabelLength);
|
H A D | e_chil.c | 139 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, 142 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, 766 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, argument 801 if (p_hwcrhk_RSALoadKey(hwcrhk_context, key_id, hptr, &rmsg, &ppctx)) { 876 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, argument 882 res = hwcrhk_load_privkey(eng, key_id, ui_method, callback_data);
|
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.h | 141 uint16_t key_id); 212 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
|
H A D | sctp_auth.c | 490 sctp_find_sharedkey(struct sctp_keyhead *shared_keys, uint16_t key_id) argument 495 if (skey->keyid == key_id) 549 sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t key_id) argument 554 skey = sctp_find_sharedkey(&stcb->asoc.shared_keys, key_id); 561 __func__, (void *)stcb, key_id, skey->refcount); 566 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t key_id, int so_locked argument 575 skey = sctp_find_sharedkey(&stcb->asoc.shared_keys, key_id); 581 __func__, (void *)stcb, key_id, skey->refcount); 587 key_id, 0, so_locked); 590 __func__, (void *)stcb, key_id, ske [all...] |