/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/tkey/ns1/ |
H A D | setup.sh | 23 keyid=`echo $keyname | $PERL -p -e 's/^.*\+0*//;'` 25 perl -p -e "s/KEYID/$keyid/;" < named.conf.in > named.conf
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 34 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 35 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid [all...] |
H A D | t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509v3/ |
H A D | v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/pkcs12/ |
H A D | p12_kiss.c | 70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 75 ASN1_OCTET_STRING **keyid, char *keymatch); 151 ASN1_OCTET_STRING *keyid = NULL; local 168 &keyid, &keymatch)) { 176 if (keyid) M_ASN1_OCTET_STRING_free(keyid); 183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 189 pass, passlen, pkey, cert, ca, keyid, 201 ASN1_OCTET_STRING **keyid, 220 if (*keyid) { 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
H A D | p12_crt.c | 92 unsigned char keyid[EVP_MAX_MD_SIZE]; local 127 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 135 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 166 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 208 unsigned char *keyid; local 224 keyid = X509_keyid_get0(cert, &keyidlen); 226 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dnssec/ns1/ |
H A D | sign.sh | 69 # Save keyid for managed key id test. 71 keyid=`expr $keyname : 'K.+001+\(.*\)'` 72 keyid=`expr $keyid + 0` 73 echo "$keyid" > managed.key.id
|
/macosx-10.10.1/ntp-92/libntp/ |
H A D | authkeys.c | 26 keyid_t keyid; /* key identifier */ member in struct:savekey 37 * keyid. We make this fairly big for potentially busy servers. 41 #define KEYHASH(keyid) ((keyid) & HASHMASK) 98 if (keyno == sk->keyid) 122 if (keyno == sk->keyid) 153 if (keyno == sk->keyid) { 180 cache_keyid = sk->keyid; 228 if (keyno == sk->keyid) 292 sk->keyid [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/named/ |
H A D | tsigconf.c | 46 const char *keyid = NULL; local 69 keyid = cfg_obj_asstring(cfg_map_getname(key)); 81 isc_buffer_init(&keynamesrc, keyid, strlen(keyid)); 82 isc_buffer_add(&keynamesrc, strlen(keyid)); 97 keyid, algstr); 134 "configuring key '%s': %s", keyid,
|
H A D | controlconf.c | 713 controlkey_t *keyid, *next; local 722 for (keyid = ISC_LIST_HEAD(*keyids); keyid != NULL; keyid = next) { 723 next = ISC_LIST_NEXT(keyid, link); 725 result = cfgkeylist_find(keylist, keyid->keyname, &keydef); 730 keyid->keyname, socktext); 731 ISC_LIST_UNLINK(*keyids, keyid, link); 732 free_controlkey(keyid, mctx); 754 algstr, keyid 808 controlkey_t *keyid = NULL; local [all...] |
/macosx-10.10.1/libtelnet-13/ |
H A D | encrypt.c | 180 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 190 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len); 711 encrypt_enc_keyid(unsigned char *keyid, int len) argument 713 encrypt_keyid(&ki[1], keyid, len); 717 encrypt_dec_keyid(unsigned char *keyid, int len) argument 719 encrypt_keyid(&ki[0], keyid, len); 723 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 743 if (ep->keyid) 744 (void)(*ep->keyid)(dir, kp->keyid, 767 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 94 int (*keyid)(int, unsigned char *, int *); member in struct:__anon9534
|
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/libtelnet/ |
H A D | encrypt.c | 167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 750 if (ep->keyid) 751 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 753 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { 758 memcpy(kp->keyid,keyid, len); 759 if (ep->keyid) 772 encrypt_enc_keyid(unsigned char *keyid, int len) argument 777 encrypt_dec_keyid(unsigned char *keyid, int len) argument 783 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon499
|
/macosx-10.10.1/OpenSSH-189/openssh/regress/ |
H A D | krl.sh | 47 touch $OBJ/revoked-keyid 50 echo "id: revoked $n" >> $OBJ/revoked-keyid 100 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 104 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub $OBJ/revoked-keyid \ 139 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 144 # keys all serial keyid certs CA 153 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid ; do 157 # keys all serial keyid cert [all...] |
/macosx-10.10.1/OpenSSL098-52/src/apps/ |
H A D | openssl-vms.cnf | 191 authorityKeyIdentifier=keyid,issuer 227 authorityKeyIdentifier=keyid:always,issuer:always 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always
|
H A D | openssl.cnf | 191 authorityKeyIdentifier=keyid,issuer 227 authorityKeyIdentifier=keyid:always,issuer:always 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always
|
/macosx-10.10.1/OpenSSL098-52/src/test/ |
H A D | Uss.cnf | 32 authorityKeyIdentifier=keyid,issuer:always
|
H A D | P1ss.cnf | 36 authorityKeyIdentifier=keyid,issuer:always
|
H A D | P2ss.cnf | 39 authorityKeyIdentifier=keyid,issuer:always
|
H A D | CAss.cnf | 73 authorityKeyIdentifier=keyid:always,issuer:always
|
/macosx-10.10.1/ruby-106/ruby/test/openssl/ |
H A D | test_x509crl.rb | 123 ["authorityKeyIdentifier", "keyid:always", false], 128 ["authorityKeyIdentifier", "keyid:always", false], 143 keyid = OpenSSL::TestUtils.get_subject_key_id(cert) 144 assert_match(/^keyid:#{keyid}/, exts[1].value) 159 keyid = OpenSSL::TestUtils.get_subject_key_id(cert) 160 assert_match(/^keyid:#{keyid}/, exts[1].value)
|