Searched refs:keyid (Results 1 - 25 of 79) sorted by relevance

1234

/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/tkey/ns1/
H A Dsetup.sh23 keyid=`echo $keyname | $PERL -p -e 's/^.*\+0*//;'`
25 perl -p -e "s/KEYID/$keyid/;" < named.conf.in > named.conf
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/rdata/generic/
H A Drrsig_46.h34 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
H A Dsig_24.h35 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/
H A Dx_x509a.c78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
112 if (!x || !x->aux || !x->aux->keyid)
114 ASN1_OCTET_STRING_free(x->aux->keyid);
115 x->aux->keyid = NULL;
119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0;
120 return ASN1_STRING_set(aux->keyid, id, len);
132 if(!x->aux || !x->aux->keyid) return NULL;
133 if(len) *len = x->aux->keyid->length;
134 return x->aux->keyid
[all...]
H A Dt_x509a.c101 if(aux->keyid) {
103 for(i = 0; i < aux->keyid->length; i++)
106 aux->keyid->data[i]);
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509v3/
H A Dv3_akey.c87 if(akeyid->keyid) {
88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
89 X509V3_add_value("keyid", tmp, &extlist);
104 * keyid: use the issuers subject keyid, the value 'always' means its is
107 * to only use this if keyid is not present. With the option 'always'
114 char keyid=0, issuer=0; local
129 if(!strcmp(cnf->name, "keyid"))
131 keyid
[all...]
H A Dv3_akeya.c67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
/macosx-10.10.1/OpenSSL098-52/src/crypto/pkcs12/
H A Dp12_kiss.c70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
75 ASN1_OCTET_STRING **keyid, char *keymatch);
151 ASN1_OCTET_STRING *keyid = NULL; local
168 &keyid, &keymatch)) {
176 if (keyid) M_ASN1_OCTET_STRING_free(keyid);
183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
189 pass, passlen, pkey, cert, ca, keyid,
201 ASN1_OCTET_STRING **keyid,
220 if (*keyid) {
199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
H A Dp12_crt.c92 unsigned char keyid[EVP_MAX_MD_SIZE]; local
127 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
135 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
166 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
208 unsigned char *keyid; local
224 keyid = X509_keyid_get0(cert, &keyidlen);
226 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dnssec/ns1/
H A Dsign.sh69 # Save keyid for managed key id test.
71 keyid=`expr $keyname : 'K.+001+\(.*\)'`
72 keyid=`expr $keyid + 0`
73 echo "$keyid" > managed.key.id
/macosx-10.10.1/ntp-92/libntp/
H A Dauthkeys.c26 keyid_t keyid; /* key identifier */ member in struct:savekey
37 * keyid. We make this fairly big for potentially busy servers.
41 #define KEYHASH(keyid) ((keyid) & HASHMASK)
98 if (keyno == sk->keyid)
122 if (keyno == sk->keyid)
153 if (keyno == sk->keyid) {
180 cache_keyid = sk->keyid;
228 if (keyno == sk->keyid)
292 sk->keyid
[all...]
/macosx-10.10.1/bind9-45.101/bind9/bin/named/
H A Dtsigconf.c46 const char *keyid = NULL; local
69 keyid = cfg_obj_asstring(cfg_map_getname(key));
81 isc_buffer_init(&keynamesrc, keyid, strlen(keyid));
82 isc_buffer_add(&keynamesrc, strlen(keyid));
97 keyid, algstr);
134 "configuring key '%s': %s", keyid,
H A Dcontrolconf.c713 controlkey_t *keyid, *next; local
722 for (keyid = ISC_LIST_HEAD(*keyids); keyid != NULL; keyid = next) {
723 next = ISC_LIST_NEXT(keyid, link);
725 result = cfgkeylist_find(keylist, keyid->keyname, &keydef);
730 keyid->keyname, socktext);
731 ISC_LIST_UNLINK(*keyids, keyid, link);
732 free_controlkey(keyid, mctx);
754 algstr, keyid
808 controlkey_t *keyid = NULL; local
[all...]
/macosx-10.10.1/libtelnet-13/
H A Dencrypt.c180 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
190 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len);
711 encrypt_enc_keyid(unsigned char *keyid, int len) argument
713 encrypt_keyid(&ki[1], keyid, len);
717 encrypt_dec_keyid(unsigned char *keyid, int len) argument
719 encrypt_keyid(&ki[0], keyid, len);
723 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
743 if (ep->keyid)
744 (void)(*ep->keyid)(dir, kp->keyid,
767 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h94 int (*keyid)(int, unsigned char *, int *); member in struct:__anon9534
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/libtelnet/
H A Dencrypt.c167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
750 if (ep->keyid)
751 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
753 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) {
758 memcpy(kp->keyid,keyid, len);
759 if (ep->keyid)
772 encrypt_enc_keyid(unsigned char *keyid, int len) argument
777 encrypt_dec_keyid(unsigned char *keyid, int len) argument
783 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon499
/macosx-10.10.1/OpenSSH-189/openssh/regress/
H A Dkrl.sh47 touch $OBJ/revoked-keyid
50 echo "id: revoked $n" >> $OBJ/revoked-keyid
100 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
104 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub $OBJ/revoked-keyid \
139 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
144 # keys all serial keyid certs CA
153 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid ; do
157 # keys all serial keyid cert
[all...]
/macosx-10.10.1/OpenSSL098-52/src/apps/
H A Dopenssl-vms.cnf191 authorityKeyIdentifier=keyid,issuer
227 authorityKeyIdentifier=keyid:always,issuer:always
260 authorityKeyIdentifier=keyid:always,issuer:always
293 authorityKeyIdentifier=keyid,issuer:always
H A Dopenssl.cnf191 authorityKeyIdentifier=keyid,issuer
227 authorityKeyIdentifier=keyid:always,issuer:always
260 authorityKeyIdentifier=keyid:always,issuer:always
293 authorityKeyIdentifier=keyid,issuer:always
/macosx-10.10.1/OpenSSL098-52/src/test/
H A DUss.cnf32 authorityKeyIdentifier=keyid,issuer:always
H A DP1ss.cnf36 authorityKeyIdentifier=keyid,issuer:always
H A DP2ss.cnf39 authorityKeyIdentifier=keyid,issuer:always
H A DCAss.cnf73 authorityKeyIdentifier=keyid:always,issuer:always
/macosx-10.10.1/ruby-106/ruby/test/openssl/
H A Dtest_x509crl.rb123 ["authorityKeyIdentifier", "keyid:always", false],
128 ["authorityKeyIdentifier", "keyid:always", false],
143 keyid = OpenSSL::TestUtils.get_subject_key_id(cert)
144 assert_match(/^keyid:#{keyid}/, exts[1].value)
159 keyid = OpenSSL::TestUtils.get_subject_key_id(cert)
160 assert_match(/^keyid:#{keyid}/, exts[1].value)

Completed in 241 milliseconds

1234