Searched refs:key_id (Results 1 - 25 of 41) sorted by relevance

12

/macosx-10.10/ntp-92/sntp/
H A Dcrypto.h21 int key_id; member in struct:key
30 void get_key(int key_id, struct key **d_key);
H A Dcrypto.c102 if ((scan_cnt = sscanf(kbuf, "%i %c %16s", &act->key_id, &act->type, act->key_seq)) == 3) {
115 printf("sntp auth_init: key_id %i type %c with key %s\n", act->key_id, act->type, act->key_seq);
138 printf("key_id %i type %c with key %s (key length: %i)\n",
139 kptr->key_id, kptr->type, kptr->key_seq, kptr->key_len);
152 /* Looks for the key with keyid key_id and sets the d_key pointer to the
157 int key_id,
168 if (itr_key->key_id == key_id) {
156 get_key( int key_id, struct key **d_key ) argument
/macosx-10.10/OpenSSL098-52/src/engines/vendor_defns/
H A Dsureware.h92 * in param key_id :the name of the private protected key file without the extension
98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
107 * in param key_id :the name of the private protected key file without the extension
113 typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num,
123 * in param key_id :the name of the public protected key file without the extension
129 typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
139 * in param key_id :the name of the public protected key file without the extension
147 typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
/macosx-10.10/OpenSSL098-52/src/crypto/engine/
H A Deng_pkey.c96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument
122 pkey = e->load_privkey(e, key_id, ui_method, callback_data);
132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument
158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
H A Deng_openssl.c122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument
376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id);
377 in = BIO_new_file(key_id, "r");
H A Dengine.h541 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
543 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
/macosx-10.10/apache-793/httpd/modules/ssl/
H A Dssl_engine_pphrase.c42 const char *key_id; member in struct:__anon6374
137 const char *key_id = asn1_table_vhost_key(mc, p, sc->vhost_id, idx); local
151 "Init: No private key specified for %s", key_id);
169 ppcb_arg.key_id = key_id;
193 ssl_asn1_t *asn1 = ssl_asn1_table_get(mc->tPrivateKey, key_id);
203 "Attempting to load encrypted (?) private key %s", key_id);
302 key_id);
327 "required", key_id);
334 "requested", key_id);
[all...]
H A Dssl_engine_init.c823 const char *key_id)
839 "(BasicConstraints: CA == TRUE !?)", key_id);
846 key_id, pathlen);
854 "which matches the server name", key_id);
871 const char *vhost_id = mctx->sc->vhost_id, *key_id, *certfile, *keyfile; local
892 key_id = apr_psprintf(ptemp, "%s:%d", vhost_id, i);
900 key_id, certfile);
909 " check %s", key_id, certfile);
935 if (!(asn1 = ssl_asn1_table_get(mc->tPrivateKey, key_id)) ||
941 " check %s", key_id, keyfil
820 ssl_check_public_cert(server_rec *s, apr_pool_t *ptemp, X509 *cert, const char *key_id) argument
[all...]
/macosx-10.10/tcpdump-61/tcpdump/
H A Dntp.h90 u_int32_t key_id; member in struct:ntpdata
H A Dprint-ntp.c186 TCHECK(bp->key_id);
187 printf("\n\tKey id: %u", bp->key_id);
189 TCHECK(bp->key_id);
190 printf("\n\tKey id: %u", bp->key_id);
/macosx-10.10/OpenSSH-189/openssh/
H A Dkrl.h51 const char *key_id);
H A Dkrl.c65 char *key_id; member in struct:revoked_key_id
113 return strcmp(a->key_id, b->key_id);
154 free(rki->key_id);
329 const char *key_id)
337 debug3("%s: revoke %s", __func__, key_id);
339 (rki->key_id = strdup(key_id)) == NULL) {
345 free(rki->key_id);
423 key->cert->key_id);
328 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const Key *ca_key, const char *key_id) argument
757 char *key_id = NULL; local
[all...]
H A Dkey.h75 char *key_id; member in struct:KeyCert
H A Dauth2-hostbased.c202 "%s CA %s from %s@%s", key->cert->key_id,
H A Dkey.c74 cert->key_id = NULL;
195 if (cert->key_id != NULL)
196 xfree(cert->key_id);
1194 to->key_id = from->key_id == NULL ? NULL : xstrdup(from->key_id);
1360 (key->cert->key_id = buffer_get_cstring_ret(b, &kidlen)) == NULL ||
1949 buffer_put_cstring(&k->cert->certblob, k->cert->key_id);
H A Dssh-add.c300 private->cert->key_id);
303 private->cert->key_id);
H A Dauth2-pubkey.c349 "signed by %s CA %s via %s", key->cert->key_id,
419 key->cert->key_id, key_type(key->cert->signature_key), ca_fp,
/macosx-10.10/OpenSSL098-52/src/engines/
H A De_sureware.c104 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id,
106 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument
685 ret=p_surewarehk_Load_Rsa_Pubkey(msg,key_id,el,
727 ret=p_surewarehk_Load_Dsa_Pubkey(msg,key_id,el,
774 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument
790 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype);
797 res=sureware_load_public(e,key_id,hptr,el,keytype);
802 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument
819 ret=p_surewarehk_Info_Pubkey(msg,key_id,
[all...]
H A De_4758cca.c398 static EVP_PKEY *ibm_4758_load_privkey(ENGINE* e, const char* key_id, argument
414 unsigned long keyLabelLength = strlen(key_id);
429 memcpy(keyLabel, key_id, keyLabelLength);
492 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE* e, const char* key_id, argument
506 unsigned long keyLabelLength = strlen(key_id);
521 memcpy(keyLabel, key_id, keyLabelLength);
H A De_chil.c133 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id,
135 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id,
749 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, argument
787 if (p_hwcrhk_RSALoadKey(hwcrhk_context, key_id, hptr,
854 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, argument
860 res = hwcrhk_load_privkey(eng, key_id,
/macosx-10.10/bind9-45.101/bind9/lib/dns/
H A Dkey.c119 return (key->key_id);
H A Ddst_api.c445 if (!dns_name_equal(name, key->key_name) || id != key->key_id ||
544 if (pubkey->key_id != key->key_id)
628 key->key_id = id;
930 if (key1->key_id != key2->key_id) {
938 if (key1->key_id != key2->key_rid &&
939 key1->key_rid != key2->key_id)
1087 return (buildfilename(key->key_name, key->key_id, key->key_alg,
1544 key->key_id);
[all...]
H A Ddst_internal.h96 isc_uint16_t key_id; /*%< identifier of the key */ member in struct:dst_key
/macosx-10.10/dcerpc-61/dcerpc/ncklib/
H A Dcnrcvr.c734 unsigned32 key_id;
793 key_id = auth_tlr->key_id;
797 SWAB_INPLACE_32 (key_id);
808 key_id,
1131 * by its key_id (transferred in auth_tlr).
730 unsigned32 key_id; local
/macosx-10.10/OpenSSL098-52/src/include/openssl/
H A Dengine.h541 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
543 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,

Completed in 209 milliseconds

12