/freebsd-13-stable/crypto/openssl/crypto/x509/ |
H A D | x_x509a.c | 30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 71 if (!x || !x->aux || !x->aux->keyid) 73 ASN1_OCTET_STRING_free(x->aux->keyid); 74 x->aux->keyid = NULL; 79 if (aux->keyid == NULL 80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL) 82 return ASN1_STRING_set(aux->keyid, id, len); 96 if (!x->aux || !x->aux->keyid) 99 *len = x->aux->keyid->length; 100 return x->aux->keyid [all...] |
H A D | t_x509.c | 331 const unsigned char *alias, *keyid; local 371 keyid = X509_keyid_get0(x, &keyidlen); 372 if (keyid) { 375 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
|
/freebsd-13-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 43 if (akeyid->keyid) { 44 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); 45 X509V3_add_value("keyid", tmp, &extlist); 60 * keyid: use the issuers subject keyid, the value 'always' means its is 63 * to only use this if keyid is not present. With the option 'always' 71 char keyid = 0, issuer = 0; local 85 if (strcmp(cnf->name, "keyid") == 0) { 86 keyid [all...] |
H A D | v3_akeya.c | 18 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/freebsd-13-stable/sys/netinet/ |
H A D | sctp_auth.h | 67 uint16_t keyid; /* shared key ID */ member in struct:sctp_shared_key 93 uint16_t active_keyid; /* active send keyid */ 94 uint16_t assoc_keyid; /* current send keyid (cached) */ 95 uint16_t recv_keyid; /* last recv keyid (cached) */ 150 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 152 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 194 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 195 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 196 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 197 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); [all...] |
H A D | sctp_auth.c | 467 new_key->keyid = 0; 493 if (skey->keyid == key_id) 515 if (new_skey->keyid < skey->keyid) { 519 } else if (new_skey->keyid == skey->keyid) { 525 new_skey->keyid); 530 new_skey->keyid); 604 new_skey->keyid = skey->keyid; 1145 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) argument 1166 sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1186 sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument 1220 sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1252 sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid) argument 1280 sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1299 sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument 1333 sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument 1502 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument 1710 sctp_notify_authentication(struct sctp_tcb *stcb, uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked) argument [all...] |
/freebsd-13-stable/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 171 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 181 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len); 702 encrypt_enc_keyid(unsigned char *keyid, int len) argument 704 encrypt_keyid(&ki[1], keyid, len); 708 encrypt_dec_keyid(unsigned char *keyid, int len) argument 710 encrypt_keyid(&ki[0], keyid, len); 714 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 734 if (ep->keyid) 735 (void)(*ep->keyid)(dir, kp->keyid, 758 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 90 int (*keyid)(int, unsigned char *, int *); member in struct:__anon6287
|
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 753 if (ep->keyid) 754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 756 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { 761 memcpy(kp->keyid,keyid, len); 762 if (ep->keyid) 775 encrypt_enc_keyid(unsigned char *keyid, int len) argument 780 encrypt_dec_keyid(unsigned char *keyid, int len) argument 786 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon6689
|
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | krl.sh | 48 touch $OBJ/revoked-keyid 52 echo "id: revoked $n" >> $OBJ/revoked-keyid 118 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 123 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \ 124 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed" 128 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \ 176 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 180 check_krl $f $OBJ/krl-keyid [all...] |
/freebsd-13-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 40 unsigned char keyid[EVP_MAX_MD_SIZE]; local 65 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) 73 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 102 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 140 unsigned char *keyid; local 156 keyid = X509_keyid_get0(cert, &keyidlen); 158 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/freebsd-13-stable/sys/net80211/ |
H A D | ieee80211_crypto_none.c | 106 uint8_t keyid; local 108 keyid = ieee80211_crypto_get_keyid(vap, k); 115 "key id %u is not set (encap)", keyid);
|
/freebsd-13-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 54 ASN1_OCTET_STRING **keyid, 69 if (keyid) 70 *keyid = NULL; 81 if (keyid) 82 *keyid = oik->d.subjectKeyIdentifier; 110 ASN1_OCTET_STRING **keyid, 121 if (keyid) 122 *keyid = NULL; 128 if (keyid) 129 *keyid 51 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 109 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument [all...] |
H A D | cms_lib.c | 543 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument 549 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); 573 ASN1_OCTET_STRING *keyid = NULL; local 580 keyid = ASN1_STRING_dup(cert_keyid); 581 if (!keyid) { 586 *pkeyid = keyid;
|
/freebsd-13-stable/contrib/ntp/libntp/ |
H A D | authkeys.c | 31 keyid_t keyid; /* key identifier */ member in struct:savekey 65 * keyid. We make this fairly big for potentially busy servers. 69 #define KEYHASH(keyid) ((keyid) & authhashmask) 464 hash = KEYHASH(sk->keyid); 498 sk->keyid = id; 526 authcache_flush_id(sk->keyid); 529 bucket = &key_hash[KEYHASH(sk->keyid)]; 556 if (id == sk->keyid) 616 cache_keyid = sk->keyid; [all...] |
H A D | authreadkeys.c | 91 keyid_t keyid; /* stored key ID */ member in struct:keydata 265 next->keyid = keyno; 295 next->keyid = keyno; 393 MD5auth_setkey(next->keyid, next->keytype,
|
/freebsd-13-stable/sys/dev/rtwn/ |
H A D | if_rtwn_cam.c | 198 uint8_t algo, keyid; local 203 keyid = k->wk_keyix; 205 keyid = 0; 228 "%s: keyix %u, keyid %u, algo %u/%u, flags %04X, len %u, " 229 "macaddr %s\n", __func__, k->wk_keyix, keyid, 252 SM(R92C_CAM_KEYID, keyid) |
|
/freebsd-13-stable/contrib/ntp/scripts/monitoring/ |
H A D | ntp.pl | 26 $keyid=0; 69 return ($keyid,$keyid = $id)[$[];
|
/freebsd-13-stable/contrib/ntp/include/ |
H A D | ntp_request.h | 97 * The version number, mode and keyid have the same function and are 102 * it is required that a request be authenticated, the keyid should be 143 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt 153 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt_tail 160 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid)) 290 #define REQ_REQUEST_KEY 32 /* define a new request keyid */ 291 #define REQ_CONTROL_KEY 33 /* define a new control keyid */ 394 keyid_t keyid; /* peer.keyid */ member in struct:info_peer 594 keyid_t keyid; /* ke member in struct:old_conf_peer 606 keyid_t keyid; /* key to use for this association */ member in struct:conf_peer [all...] |
/freebsd-13-stable/contrib/unbound/smallapp/ |
H A D | unbound-control-setup.sh.in | 133 authorityKeyIdentifier=keyid:always,issuer:always
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | cms.h | 164 ASN1_OCTET_STRING **keyid, 229 ASN1_OCTET_STRING **keyid, 308 ASN1_OCTET_STRING **keyid, 315 ASN1_OCTET_STRING **keyid,
|
/freebsd-13-stable/contrib/ntp/sntp/ |
H A D | networking.h | 63 keyid_t keyid; member in struct:speer
|
/freebsd-13-stable/libexec/rc/rc.d/ |
H A D | sendmail | 119 authorityKeyIdentifier=keyid,issuer 125 authorityKeyIdentifier=keyid:always,issuer
|
/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-pkcs11.c | 72 char *keyid; member in struct:pkcs11_key 187 free(k11->keyid); 286 key_filter[1].pValue = k11->keyid; 328 k11->keyid = xmalloc(k11->keyid_len); 329 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|