Searched refs:key_id (Results 1 - 25 of 47) sorted by relevance

12

/freebsd-9.3-release/contrib/wpa/wpa_supplicant/examples/
H A DopenCryptoki.conf34 key_id="4"
/freebsd-9.3-release/contrib/ntp/sntp/
H A Dcrypto.h21 int key_id; member in struct:key
28 extern void get_key(int key_id, struct key **d_key);
H A Dnetworking.c106 u_int key_id; local
116 // key_id = 0;
157 key_id = ntohl(*exten_end);
158 printf("Crypto NAK = 0x%08x\n", key_id);
174 key_id = ntohl(*exten_end);
175 get_key(key_id, &pkt_key);
177 printf("unrecognized key ID = 0x%08x\n", key_id);
195 func_name, stoa(sender), key_id));
H A Dmain.h22 int key_id, struct key *pkt_key);
H A Dcrypto.c137 scan_cnt = sscanf(kbuf, "%d %9s %128s", &act->key_id, act->type, keystring);
183 /* Looks for the key with keyid key_id and sets the d_key pointer to the
188 int key_id,
197 if (itr_key->key_id == key_id) {
187 get_key( int key_id, struct key **d_key ) argument
H A Dmain.c50 int key_id; member in struct:dns_ctx
412 ctx->key_id = l;
413 get_key(ctx->key_id, &ctx->key);
415 ctx->key_id = -1;
672 pkt_len = generate_pkt(&x_pkt, &tv_xmt, dctx->key_id,
1119 int key_id,
1136 x_pkt->exten[0] = htonl(key_id);
1116 generate_pkt( struct pkt *x_pkt, const struct timeval *tv_xmt, int key_id, struct key *pkt_key ) argument
/freebsd-9.3-release/crypto/openssl/engines/vendor_defns/
H A Dsureware.h93 * in param key_id :the name of the private protected key file without the extension
99 typedef int SureWareHook_Load_Privkey_t(char *const msg, const char *key_id,
110 * in param key_id :the name of the private protected key file without the extension
116 typedef int SureWareHook_Info_Pubkey_t(char *const msg, const char *key_id,
126 * in param key_id :the name of the public protected key file without the extension
133 const char *key_id,
145 * in param key_id :the name of the public protected key file without the extension
154 const char *key_id,
/freebsd-9.3-release/contrib/ntp/sntp/tests/
H A Dcrypto.c31 md5.key_id = 10;
57 sha1.key_id = 20;
87 md5.key_id = 0;
110 sha1.key_id = 0;
139 md5.key_id = 0;
157 md5.key_id = 10;
H A DkeyFile.c11 bool CompareKeysAlternative(int key_id,int key_len,const char* type,const char* key_seq,struct key actual);
25 if (expected.key_id != actual.key_id) {
26 printf("Expected key_id: %d but was: %d\n",
27 expected.key_id, actual.key_id);
51 int key_id,
60 temp.key_id = key_id;
50 CompareKeysAlternative( int key_id, int key_len, const char * type, const char * key_seq, struct key actual ) argument
H A DpacketProcessing.c16 void PrepareAuthenticationTest(int key_id,int key_len,const char* type,const void* key_seq);
17 void PrepareAuthenticationTestMD5(int key_id,int key_len,const void* key_seq);
64 int key_id,
71 snprintf(str, 25, "%d", key_id);
77 key_ptr->key_id = key_id;
90 int key_id,
95 PrepareAuthenticationTest(key_id, key_len, "MD5", key_seq);
63 PrepareAuthenticationTest( int key_id, int key_len, const char * type, const void * key_seq ) argument
89 PrepareAuthenticationTestMD5( int key_id, int key_len, const void * key_seq ) argument
H A DpacketHandling.c84 testkey.key_id = 30;
93 generate_pkt(&testpkt, &xmt, testkey.key_id, &testkey));
106 TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0]));
108 TEST_ASSERT_EQUAL(MAX_MD5_LEN - 4, /* Remove the key_id, only keep the mac. */
/freebsd-9.3-release/crypto/openssl/crypto/engine/
H A Deng_pkey.c99 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
121 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
130 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
151 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c124 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
387 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
394 key_id);
395 in = BIO_new_file(key_id, "r");
/freebsd-9.3-release/contrib/tcpdump/
H A Dntp.h90 u_int32_t key_id; member in struct:ntpdata
H A Dprint-ntp.c188 TCHECK(bp->key_id);
189 printf("\n\tKey id: %u", bp->key_id);
191 TCHECK(bp->key_id);
192 printf("\n\tKey id: %u", bp->key_id);
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_config.h465 * key_id - Key ID for OpenSSL engine
470 char *key_id; member in struct:eap_peer_config
/freebsd-9.3-release/crypto/openssh/
H A Dkrl.h51 const char *key_id);
H A Dkrl.c65 char *key_id; member in struct:revoked_key_id
113 return strcmp(a->key_id, b->key_id);
154 free(rki->key_id);
329 const char *key_id)
337 debug3("%s: revoke %s", __func__, key_id);
339 (rki->key_id = strdup(key_id)) == NULL) {
345 free(rki->key_id);
423 key->cert->key_id);
328 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const Key *ca_key, const char *key_id) argument
761 char *key_id = NULL; local
[all...]
H A Dauth2-hostbased.c212 "%s CA %s from %s@%s", key->cert->key_id,
H A Dkey.h70 char *key_id; member in struct:KeyCert
/freebsd-9.3-release/crypto/openssl/engines/
H A De_sureware.c106 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id,
109 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
685 static EVP_PKEY *sureware_load_public(ENGINE *e, const char *key_id, argument
720 ret = p_surewarehk_Load_Rsa_Pubkey(msg, key_id, el,
766 ret = p_surewarehk_Load_Dsa_Pubkey(msg, key_id, el,
815 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument
830 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype);
836 res = sureware_load_public(e, key_id, hptr, el, keytype);
841 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument
857 ret = p_surewarehk_Info_Pubkey(msg, key_id,
[all...]
H A De_4758cca.c396 static EVP_PKEY *ibm_4758_load_privkey(ENGINE *e, const char *key_id, argument
413 unsigned long keyLabelLength = strlen(key_id);
427 memcpy(keyLabel, key_id, keyLabelLength);
486 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE *e, const char *key_id, argument
501 unsigned long keyLabelLength = strlen(key_id);
515 memcpy(keyLabel, key_id, keyLabelLength);
/freebsd-9.3-release/sys/netinet/
H A Dsctp_auth.h142 uint16_t key_id);
213 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Dkey.c119 return (key->key_id);
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls.h113 * @key_id: the private key's id when using engine (this is OpenSSL
151 const char *key_id; member in struct:tls_connection_params

Completed in 167 milliseconds

12