Searched refs:keyid (Results 1 - 25 of 65) sorted by relevance

123

/freebsd-13-stable/crypto/openssl/crypto/x509/
H A Dx_x509a.c30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
71 if (!x || !x->aux || !x->aux->keyid)
73 ASN1_OCTET_STRING_free(x->aux->keyid);
74 x->aux->keyid = NULL;
79 if (aux->keyid == NULL
80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL)
82 return ASN1_STRING_set(aux->keyid, id, len);
96 if (!x->aux || !x->aux->keyid)
99 *len = x->aux->keyid->length;
100 return x->aux->keyid
[all...]
H A Dt_x509.c331 const unsigned char *alias, *keyid; local
371 keyid = X509_keyid_get0(x, &keyidlen);
372 if (keyid) {
375 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
/freebsd-13-stable/crypto/openssl/crypto/x509v3/
H A Dv3_akey.c43 if (akeyid->keyid) {
44 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length);
45 X509V3_add_value("keyid", tmp, &extlist);
60 * keyid: use the issuers subject keyid, the value 'always' means its is
63 * to only use this if keyid is not present. With the option 'always'
71 char keyid = 0, issuer = 0; local
85 if (strcmp(cnf->name, "keyid") == 0) {
86 keyid
[all...]
H A Dv3_akeya.c18 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
/freebsd-13-stable/sys/netinet/
H A Dsctp_auth.h67 uint16_t keyid; /* shared key ID */ member in struct:sctp_shared_key
93 uint16_t active_keyid; /* active send keyid */
94 uint16_t assoc_keyid; /* current send keyid (cached) */
95 uint16_t recv_keyid; /* last recv keyid (cached) */
150 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid);
152 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid,
194 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid);
195 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid);
196 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
197 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid);
[all...]
H A Dsctp_auth.c467 new_key->keyid = 0;
493 if (skey->keyid == key_id)
515 if (new_skey->keyid < skey->keyid) {
519 } else if (new_skey->keyid == skey->keyid) {
525 new_skey->keyid);
530 new_skey->keyid);
604 new_skey->keyid = skey->keyid;
1145 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) argument
1166 sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1186 sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument
1220 sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1252 sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid) argument
1280 sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1299 sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid) argument
1333 sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid) argument
1502 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument
1710 sctp_notify_authentication(struct sctp_tcb *stcb, uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked) argument
[all...]
/freebsd-13-stable/contrib/telnet/libtelnet/
H A Dencrypt.c171 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
181 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len);
702 encrypt_enc_keyid(unsigned char *keyid, int len) argument
704 encrypt_keyid(&ki[1], keyid, len);
708 encrypt_dec_keyid(unsigned char *keyid, int len) argument
710 encrypt_keyid(&ki[0], keyid, len);
714 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
734 if (ep->keyid)
735 (void)(*ep->keyid)(dir, kp->keyid,
758 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h90 int (*keyid)(int, unsigned char *, int *); member in struct:__anon6287
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
753 if (ep->keyid)
754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
756 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) {
761 memcpy(kp->keyid,keyid, len);
762 if (ep->keyid)
775 encrypt_enc_keyid(unsigned char *keyid, int len) argument
780 encrypt_dec_keyid(unsigned char *keyid, int len) argument
786 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon6689
/freebsd-13-stable/crypto/openssh/regress/
H A Dkrl.sh48 touch $OBJ/revoked-keyid
52 echo "id: revoked $n" >> $OBJ/revoked-keyid
118 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
123 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
124 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
128 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
176 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
180 check_krl $f $OBJ/krl-keyid
[all...]
/freebsd-13-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_crt.c40 unsigned char keyid[EVP_MAX_MD_SIZE]; local
65 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen))
73 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
102 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
140 unsigned char *keyid; local
156 keyid = X509_keyid_get0(cert, &keyidlen);
158 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
/freebsd-13-stable/sys/net80211/
H A Dieee80211_crypto_none.c106 uint8_t keyid; local
108 keyid = ieee80211_crypto_get_keyid(vap, k);
115 "key id %u is not set (encap)", keyid);
/freebsd-13-stable/crypto/openssl/crypto/cms/
H A Dcms_kari.c54 ASN1_OCTET_STRING **keyid,
69 if (keyid)
70 *keyid = NULL;
81 if (keyid)
82 *keyid = oik->d.subjectKeyIdentifier;
110 ASN1_OCTET_STRING **keyid,
121 if (keyid)
122 *keyid = NULL;
128 if (keyid)
129 *keyid
51 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
109 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument
[all...]
H A Dcms_lib.c543 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument
549 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid);
573 ASN1_OCTET_STRING *keyid = NULL; local
580 keyid = ASN1_STRING_dup(cert_keyid);
581 if (!keyid) {
586 *pkeyid = keyid;
/freebsd-13-stable/contrib/ntp/libntp/
H A Dauthkeys.c31 keyid_t keyid; /* key identifier */ member in struct:savekey
65 * keyid. We make this fairly big for potentially busy servers.
69 #define KEYHASH(keyid) ((keyid) & authhashmask)
464 hash = KEYHASH(sk->keyid);
498 sk->keyid = id;
526 authcache_flush_id(sk->keyid);
529 bucket = &key_hash[KEYHASH(sk->keyid)];
556 if (id == sk->keyid)
616 cache_keyid = sk->keyid;
[all...]
H A Dauthreadkeys.c91 keyid_t keyid; /* stored key ID */ member in struct:keydata
265 next->keyid = keyno;
295 next->keyid = keyno;
393 MD5auth_setkey(next->keyid, next->keytype,
/freebsd-13-stable/sys/dev/rtwn/
H A Dif_rtwn_cam.c198 uint8_t algo, keyid; local
203 keyid = k->wk_keyix;
205 keyid = 0;
228 "%s: keyix %u, keyid %u, algo %u/%u, flags %04X, len %u, "
229 "macaddr %s\n", __func__, k->wk_keyix, keyid,
252 SM(R92C_CAM_KEYID, keyid) |
/freebsd-13-stable/contrib/ntp/scripts/monitoring/
H A Dntp.pl26 $keyid=0;
69 return ($keyid,$keyid = $id)[$[];
/freebsd-13-stable/contrib/ntp/include/
H A Dntp_request.h97 * The version number, mode and keyid have the same function and are
102 * it is required that a request be authenticated, the keyid should be
143 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt
153 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt_tail
160 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid))
290 #define REQ_REQUEST_KEY 32 /* define a new request keyid */
291 #define REQ_CONTROL_KEY 33 /* define a new control keyid */
394 keyid_t keyid; /* peer.keyid */ member in struct:info_peer
594 keyid_t keyid; /* ke member in struct:old_conf_peer
606 keyid_t keyid; /* key to use for this association */ member in struct:conf_peer
[all...]
/freebsd-13-stable/contrib/unbound/smallapp/
H A Dunbound-control-setup.sh.in133 authorityKeyIdentifier=keyid:always,issuer:always
/freebsd-13-stable/crypto/openssl/include/openssl/
H A Dcms.h164 ASN1_OCTET_STRING **keyid,
229 ASN1_OCTET_STRING **keyid,
308 ASN1_OCTET_STRING **keyid,
315 ASN1_OCTET_STRING **keyid,
/freebsd-13-stable/contrib/ntp/sntp/
H A Dnetworking.h63 keyid_t keyid; member in struct:speer
/freebsd-13-stable/libexec/rc/rc.d/
H A Dsendmail119 authorityKeyIdentifier=keyid,issuer
125 authorityKeyIdentifier=keyid:always,issuer
/freebsd-13-stable/crypto/openssh/
H A Dssh-pkcs11.c72 char *keyid; member in struct:pkcs11_key
187 free(k11->keyid);
286 key_filter[1].pValue = k11->keyid;
328 k11->keyid = xmalloc(k11->keyid_len);
329 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);

Completed in 307 milliseconds

123