Searched refs:key_id (Results 1 - 25 of 76) sorted by relevance

1234

/freebsd-current/contrib/wpa/wpa_supplicant/examples/
H A DopenCryptoki.conf34 key_id="4"
/freebsd-current/contrib/ntp/sntp/
H A Dcrypto.h20 keyid_t key_id; member in struct:key
28 extern void get_key(keyid_t key_id, struct key **d_key);
H A Dnetworking.c107 u_int key_id; local
117 // key_id = 0;
162 key_id = ntohl(*exten_end);
163 printf("Crypto NAK = 0x%08x from %s\n", key_id, stoa(sender));
179 key_id = ntohl(*exten_end);
180 get_key(key_id, &pkt_key);
182 printf("unrecognized key ID = 0x%08x\n", key_id);
200 func_name, stoa(sender), key_id));
H A Dmain.h22 int key_id, struct key *pkt_key);
H A Dcrypto.c249 &act->key_id, act->typen, keystring);
276 act->key_id, act->typen);
303 /* Looks for the key with keyid key_id and sets the d_key pointer to the
308 keyid_t key_id,
318 if (itr_key->key_id == key_id) {
307 get_key( keyid_t key_id, struct key ** d_key ) argument
H A Dmain.c55 int key_id; member in struct:dns_ctx
415 ctx->key_id = OPT_VALUE_AUTHENTICATION;
416 get_key(ctx->key_id, &ctx->key);
419 progname, ctx->key_id, OPT_ARG(KEYFILE));
423 ctx->key_id = -1;
679 pkt_len = generate_pkt(&x_pkt, &tv_xmt, dctx->key_id,
1126 int key_id,
1143 printf("generate_pkt: key_id %d, key pointer %p\n", key_id, pkt_key);
1146 x_pkt->exten[0] = htonl(key_id);
1123 generate_pkt( struct pkt *x_pkt, const struct timeval *tv_xmt, int key_id, struct key *pkt_key ) argument
[all...]
/freebsd-current/contrib/ntp/sntp/tests/
H A Dcrypto.c42 sk.key_id = 10;
75 sha1.key_id = 20;
109 cmac.key_id = 30;
139 u_char PKT_DATA[ PAYLOAD_LEN + sizeof(sk.key_id)
144 sk.key_id = 0;
152 memcpy(p, &sk.key_id, sizeof(sk.key_id)); p += sizeof(sk.key_id);
179 sha1.key_id = 0;
201 cmac.key_id
[all...]
H A DkeyFile.c11 bool CompareKeysAlternative(int key_id,int key_len,const char* type,const char* key_seq,struct key actual);
25 if (expected.key_id != actual.key_id) {
26 printf("Expected key_id: %d but was: %d\n",
27 expected.key_id, actual.key_id);
51 int key_id,
60 temp.key_id = key_id;
50 CompareKeysAlternative( int key_id, int key_len, const char * type, const char * key_seq, struct key actual ) argument
H A DpacketProcessing.c17 void PrepareAuthenticationTest(int key_id,int key_len,const char* type,const void* key_seq);
66 int key_id,
74 snprintf(str, sizeof(str), "%d", key_id);
82 key_ptr->key_id = key_id;
65 PrepareAuthenticationTest( int key_id, int key_len, const char * type, const void * key_seq ) argument
H A DpacketHandling.c93 testkey.key_id = 30;
103 generate_pkt(&testpkt, &xmt, testkey.key_id,
117 TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0]));
/freebsd-current/crypto/openssl/apps/lib/
H A Dengine.c105 char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc) argument
112 } else if (key_id == NULL) {
120 + strlen(key_id)
129 OPENSSL_strlcat(new_uri, key_id, uri_sz);
/freebsd-current/lib/libsecureboot/openpgp/
H A Dpacket.h54 char *key_id; member in struct:OpenPGP_sig
H A Dopgp_sig.c139 sig->key_id = octets2hex(ptr, 8);
172 free(sig->key_id);
173 sig->key_id = octets2hex(sp, 8);
315 DEBUG_PRINTF(2, ("rc=%d keyID=%s\n", rc, sig->key_id ? sig->key_id : "?"));
316 if (rc == 0 && sig->key_id) {
317 key = load_key_id(sig->key_id);
319 warnx("cannot find key-id: %s", sig->key_id);
/freebsd-current/crypto/openssl/crypto/engine/
H A Deng_pkey.c56 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
77 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
127 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
148 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c76 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
417 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
424 key_id);
425 in = BIO_new_file(key_id, "r");
/freebsd-current/contrib/tcpdump/
H A Dprint-lisp.c193 nd_uint16_t key_id; member in struct:map_register_hdr
237 uint16_t key_id; local
271 key_id = GET_BE_U_2(lisp_hdr->key_id);
274 tok2str(auth_type, "unknown-type", key_id));
H A Dprint-ntp.c110 nd_uint32_t key_id; member in struct:ntp_time_data
310 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id));
312 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id));
320 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id));
/freebsd-current/crypto/openssh/
H A Dkrl.c67 char *key_id; local
116 return strcmp(a->key_id, b->key_id);
158 free(rki->key_id);
342 const char *key_id)
351 KRL_DBG(("revoke %s", key_id));
353 (rki->key_id = strdup(key_id)) == NULL) {
359 free(rki->key_id);
461 key->cert->key_id);
341 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const struct sshkey *ca_key, const char *key_id) argument
874 char *key_id = NULL; local
[all...]
H A Dkrl.h55 const struct sshkey *ca_key, const char *key_id);
/freebsd-current/contrib/wpa/src/eap_peer/
H A Deap_config.h266 * key_id - Key ID for OpenSSL engine
271 char *key_id; member in struct:eap_peer_cert_config
/freebsd-current/crypto/openssl/engines/
H A De_ossltest.c376 static EVP_PKEY *load_key(ENGINE *eng, const char *key_id, int pub, argument
382 if (OPENSSL_strncasecmp(key_id, "ot:", 3) != 0)
384 key_id += 3;
387 pub ? "Public" : "Private", key_id);
388 in = BIO_new_file(key_id, "r");
399 static EVP_PKEY *ossltest_load_privkey(ENGINE *eng, const char *key_id, argument
402 return load_key(eng, key_id, 0, ui_method, ui_data);
405 static EVP_PKEY *ossltest_load_pubkey(ENGINE *eng, const char *key_id, argument
408 return load_key(eng, key_id, 1, ui_method, ui_data);
/freebsd-current/contrib/libfido2/src/
H A Du2f.c200 key_lookup(fido_dev_t *dev, const char *rp_id, const fido_blob_t *key_id, argument
210 if (key_id->len > UINT8_MAX || rp_id == NULL) {
211 fido_log_debug("%s: key_id->len=%zu, rp_id=%p", __func__,
212 key_id->len, (const void *)rp_id);
227 key_id_len = (uint8_t)key_id->len;
234 iso7816_add(apdu, key_id->ptr, key_id_len) < 0) {
314 const fido_blob_t *key_id, fido_blob_t *sig, fido_blob_t *ad, int *ms)
327 if (cdh->len != SHA256_DIGEST_LENGTH || key_id->len > UINT8_MAX ||
342 key_id_len = (uint8_t)key_id->len;
349 iso7816_add(apdu, key_id
313 do_auth(fido_dev_t *dev, const fido_blob_t *cdh, const char *rp_id, const fido_blob_t *key_id, fido_blob_t *sig, fido_blob_t *ad, int *ms) argument
759 u2f_authenticate_single(fido_dev_t *dev, const fido_blob_t *key_id, fido_assert_t *fa, size_t idx, int *ms) argument
[all...]
/freebsd-current/sys/contrib/dev/iwlwifi/fw/api/
H A Ddatapath.h631 * @u.add.key_id: key ID (0-7) for the new key
640 * @u.modify.key_id: key ID
643 * @u.remove.key_id: key ID
651 __le32 key_id; member in struct:iwl_sec_key_cmd::__anon31::__anon32
662 __le32 key_id; member in struct:iwl_sec_key_cmd::__anon31::__anon33
667 __le32 key_id; member in struct:iwl_sec_key_cmd::__anon31::__anon34
H A Dsta.h435 * @key_id: key ID
443 __le32 key_id; member in struct:iwl_mvm_mgmt_mcast_key_cmd_v1
454 * @key_id: key ID
460 __le32 key_id; member in struct:iwl_mvm_mgmt_mcast_key_cmd
/freebsd-current/sys/netinet/
H A Dsctp_auth.h138 uint16_t key_id);
205 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);

Completed in 292 milliseconds

1234