/macosx-10.10/ntp-92/sntp/ |
H A D | crypto.h | 21 int key_id; member in struct:key 30 void get_key(int key_id, struct key **d_key);
|
H A D | crypto.c | 102 if ((scan_cnt = sscanf(kbuf, "%i %c %16s", &act->key_id, &act->type, act->key_seq)) == 3) { 115 printf("sntp auth_init: key_id %i type %c with key %s\n", act->key_id, act->type, act->key_seq); 138 printf("key_id %i type %c with key %s (key length: %i)\n", 139 kptr->key_id, kptr->type, kptr->key_seq, kptr->key_len); 152 /* Looks for the key with keyid key_id and sets the d_key pointer to the 157 int key_id, 168 if (itr_key->key_id == key_id) { 156 get_key( int key_id, struct key **d_key ) argument
|
/macosx-10.10/OpenSSL098-52/src/engines/vendor_defns/ |
H A D | sureware.h | 92 * in param key_id :the name of the private protected key file without the extension 98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype); 107 * in param key_id :the name of the private protected key file without the extension 113 typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num, 123 * in param key_id :the name of the public protected key file without the extension 129 typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num, 139 * in param key_id :the name of the public protected key file without the extension 147 typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
|
/macosx-10.10/OpenSSL098-52/src/crypto/engine/ |
H A D | eng_pkey.c | 96 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, argument 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 132 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, argument 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data);
|
H A D | eng_openssl.c | 122 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 371 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, argument 376 fprintf(stderr, "(TEST_ENG_OPENSSL_PKEY)Loading Private key %s\n", key_id); 377 in = BIO_new_file(key_id, "r");
|
H A D | engine.h | 541 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 543 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/macosx-10.10/apache-793/httpd/modules/ssl/ |
H A D | ssl_engine_pphrase.c | 42 const char *key_id; member in struct:__anon6374 137 const char *key_id = asn1_table_vhost_key(mc, p, sc->vhost_id, idx); local 151 "Init: No private key specified for %s", key_id); 169 ppcb_arg.key_id = key_id; 193 ssl_asn1_t *asn1 = ssl_asn1_table_get(mc->tPrivateKey, key_id); 203 "Attempting to load encrypted (?) private key %s", key_id); 302 key_id); 327 "required", key_id); 334 "requested", key_id); [all...] |
H A D | ssl_engine_init.c | 823 const char *key_id) 839 "(BasicConstraints: CA == TRUE !?)", key_id); 846 key_id, pathlen); 854 "which matches the server name", key_id); 871 const char *vhost_id = mctx->sc->vhost_id, *key_id, *certfile, *keyfile; local 892 key_id = apr_psprintf(ptemp, "%s:%d", vhost_id, i); 900 key_id, certfile); 909 " check %s", key_id, certfile); 935 if (!(asn1 = ssl_asn1_table_get(mc->tPrivateKey, key_id)) || 941 " check %s", key_id, keyfil 820 ssl_check_public_cert(server_rec *s, apr_pool_t *ptemp, X509 *cert, const char *key_id) argument [all...] |
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | ntp.h | 90 u_int32_t key_id; member in struct:ntpdata
|
H A D | print-ntp.c | 186 TCHECK(bp->key_id); 187 printf("\n\tKey id: %u", bp->key_id); 189 TCHECK(bp->key_id); 190 printf("\n\tKey id: %u", bp->key_id);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | krl.h | 51 const char *key_id);
|
H A D | krl.c | 65 char *key_id; member in struct:revoked_key_id 113 return strcmp(a->key_id, b->key_id); 154 free(rki->key_id); 329 const char *key_id) 337 debug3("%s: revoke %s", __func__, key_id); 339 (rki->key_id = strdup(key_id)) == NULL) { 345 free(rki->key_id); 423 key->cert->key_id); 328 ssh_krl_revoke_cert_by_key_id(struct ssh_krl *krl, const Key *ca_key, const char *key_id) argument 757 char *key_id = NULL; local [all...] |
H A D | key.h | 75 char *key_id; member in struct:KeyCert
|
H A D | auth2-hostbased.c | 202 "%s CA %s from %s@%s", key->cert->key_id,
|
H A D | key.c | 74 cert->key_id = NULL; 195 if (cert->key_id != NULL) 196 xfree(cert->key_id); 1194 to->key_id = from->key_id == NULL ? NULL : xstrdup(from->key_id); 1360 (key->cert->key_id = buffer_get_cstring_ret(b, &kidlen)) == NULL || 1949 buffer_put_cstring(&k->cert->certblob, k->cert->key_id);
|
H A D | ssh-add.c | 300 private->cert->key_id); 303 private->cert->key_id);
|
H A D | auth2-pubkey.c | 349 "signed by %s CA %s via %s", key->cert->key_id, 419 key->cert->key_id, key_type(key->cert->signature_key), ca_fp,
|
/macosx-10.10/OpenSSL098-52/src/engines/ |
H A D | e_sureware.c | 104 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, 106 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, 652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument 685 ret=p_surewarehk_Load_Rsa_Pubkey(msg,key_id,el, 727 ret=p_surewarehk_Load_Dsa_Pubkey(msg,key_id,el, 774 static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, argument 790 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype); 797 res=sureware_load_public(e,key_id,hptr,el,keytype); 802 static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, argument 819 ret=p_surewarehk_Info_Pubkey(msg,key_id, [all...] |
H A D | e_4758cca.c | 398 static EVP_PKEY *ibm_4758_load_privkey(ENGINE* e, const char* key_id, argument 414 unsigned long keyLabelLength = strlen(key_id); 429 memcpy(keyLabel, key_id, keyLabelLength); 492 static EVP_PKEY *ibm_4758_load_pubkey(ENGINE* e, const char* key_id, argument 506 unsigned long keyLabelLength = strlen(key_id); 521 memcpy(keyLabel, key_id, keyLabelLength);
|
H A D | e_chil.c | 133 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, 135 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, 749 static EVP_PKEY *hwcrhk_load_privkey(ENGINE *eng, const char *key_id, argument 787 if (p_hwcrhk_RSALoadKey(hwcrhk_context, key_id, hptr, 854 static EVP_PKEY *hwcrhk_load_pubkey(ENGINE *eng, const char *key_id, argument 860 res = hwcrhk_load_privkey(eng, key_id,
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | key.c | 119 return (key->key_id);
|
H A D | dst_api.c | 445 if (!dns_name_equal(name, key->key_name) || id != key->key_id || 544 if (pubkey->key_id != key->key_id) 628 key->key_id = id; 930 if (key1->key_id != key2->key_id) { 938 if (key1->key_id != key2->key_rid && 939 key1->key_rid != key2->key_id) 1087 return (buildfilename(key->key_name, key->key_id, key->key_alg, 1544 key->key_id); [all...] |
H A D | dst_internal.h | 96 isc_uint16_t key_id; /*%< identifier of the key */ member in struct:dst_key
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | cnrcvr.c | 734 unsigned32 key_id; 793 key_id = auth_tlr->key_id; 797 SWAB_INPLACE_32 (key_id); 808 key_id, 1131 * by its key_id (transferred in auth_tlr). 730 unsigned32 key_id; local
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | engine.h | 541 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 543 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|