/opensolaris-onvv-gate/usr/src/common/openssl/crypto/asn1/ |
H A D | x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid [all...] |
H A D | t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 75 ASN1_OCTET_STRING **keyid, char *keymatch); 151 ASN1_OCTET_STRING *keyid = NULL; local 168 &keyid, &keymatch)) { 176 if (keyid) M_ASN1_OCTET_STRING_free(keyid); 183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 189 pass, passlen, pkey, cert, ca, keyid, 201 ASN1_OCTET_STRING **keyid, 220 if (*keyid) { 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
H A D | p12_crt.c | 75 unsigned char keyid[EVP_MAX_MD_SIZE]; variable 98 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 181 unsigned char *keyid; local 197 keyid = X509_keyid_get0(cert, &keyidlen); 199 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/opensolaris-onvv-gate/usr/src/common/net/wanboot/ |
H A D | p12auxpars.c | 166 * keyid - If private key localkeyids friendlynames are to match a 169 * keyid_len- Length of the keyid byte string. 177 * Match based on the value of 'matchty' and the contents of 'keyid' 185 * 'keyid'. 208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, argument 264 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len, 295 * keyid - If private key localkeyids friendlynames are to match a 298 * keyid_len- Length of the keyid byte string. 319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, argument 355 if (keyid 646 ASN1_TYPE *keyid = NULL; local [all...] |
H A D | p12auxutl.c | 160 if (cert->aux != NULL && cert->aux->keyid != NULL && 161 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { 162 str = cert->aux->keyid->data; 163 len = cert->aux->keyid->length; 209 if (cert->aux != NULL && cert->aux->keyid != NULL && 210 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { 211 str = cert->aux->keyid->data; 212 len = cert->aux->keyid->length;
|
H A D | p12misc.c | 244 * keyid_len- Length of the keyid byte string. 248 * Note that setting a keyid into a cert which will not be written out as 263 ASN1_TYPE *keyid = NULL; local 278 (keyid = ASN1_TYPE_new()) == NULL) { 283 ASN1_TYPE_set(keyid, V_ASN1_OCTET_STRING, str); 286 attr = type2attrib(keyid, NID_localKeyID); 293 keyid = NULL; 318 if (keyid != NULL) 319 ASN1_TYPE_free(keyid); 339 * >= 0 - The number of characters in the keyid returne [all...] |
H A D | auxutil.c | 294 * LocalKeyId is also stored in the aux structure, under the name 'keyid'. 304 * order. Search for the name or keyid in the stack of certs. If it is 311 * A pointer to cert and/or pkey which matches the name or keyid is stored 372 if (x->aux == NULL || x->aux->keyid == NULL) 374 s = x->aux->keyid;
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.c | 164 uchar_t keyid[MAXKEYLEN]; member in struct:key_info 728 encrypt_enc_keyid(uchar_t *keyid, int len) argument 730 encrypt_keyid(&ki[KI_DECRYPT], keyid, len); 734 encrypt_dec_keyid(uchar_t *keyid, int len) argument 736 encrypt_keyid(&ki[KI_ENCRYPT], keyid, len); 740 encrypt_keyid(struct key_info *kp, uchar_t *keyid, int len) argument 757 if (ep->keyid) 758 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); 761 (memcmp(keyid, k 781 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 88 int (*keyid)(int, unsigned char *, int *); member in struct:__anon147
|
/opensolaris-onvv-gate/usr/src/common/openssl/apps/ |
H A D | openssl.cnf | 191 authorityKeyIdentifier=keyid,issuer 227 authorityKeyIdentifier=keyid:always,issuer:always 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always
|
/opensolaris-onvv-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_none.c | 91 none_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument 98 "key id %u is not set (encap)\n", keyid >> 6);
|
H A D | net80211_crypto.c | 414 uint8_t keyid; local 430 keyid = ivp[IEEE80211_WEP_IVLEN]; 431 k = &ic->ic_nw_keys[keyid >> 6];
|
H A D | net80211_crypto_wep.c | 52 static int wep_encap(struct ieee80211_key *, mblk_t *, uint8_t keyid); 126 wep_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument 166 ivp[IEEE80211_WEP_IVLEN] = keyid;
|
H A D | net80211_crypto_ccmp.c | 119 ccmp_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument 136 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
|
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 230 * keyid - If private key localkeyids friendlynames are to match a 233 * keyid_len- Length of the keyid byte string. 241 * Match based on the value of 'matchty' and the contents of 'keyid' 249 * 'keyid'. 272 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, 328 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len, 690 if (cert->aux != NULL && cert->aux->keyid != NULL && 691 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { 692 str = cert->aux->keyid->data; 693 len = cert->aux->keyid 960 ASN1_TYPE *keyid = NULL; local 1533 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 1796 ASN1_TYPE *keyid = NULL; local [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/sys/usb/clients/usbkbm/ |
H A D | usbkbm.h | 110 uint8_t keyid; /* report id of keyboard input */ member in struct:usbkbm_report_format
|
/opensolaris-onvv-gate/usr/src/uts/common/io/kbtrans/ |
H A D | kbtrans_streams.c | 1614 * Here keyid is the keycode of UPARROW, LEFTARROW, or RIGHTARROW 1616 * otherwise it indicates a function key and keyid is the number 1620 kbtrans_vt_compose(struct kbtrans *upper, unsigned short keyid, argument 1630 switch (keyid) { 1645 *bufp++ = keyid + 1677 unsigned short keyid; local 1692 keyid = entry & 0xFF; 1693 if (keyid == ALT) { 1695 } else if (keyid == ALTGRAPH) { 1713 * keyid i [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/ |
H A D | rtquery.c | 95 static ulong_t keyid; variable 262 keyid = strtoul(p+1, &p, 0); 263 if (keyid > 255 || *p != '\0' || 399 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
|
/opensolaris-onvv-gate/usr/src/uts/common/sys/ |
H A D | net80211_crypto.h | 163 uint8_t keyid);
|
/opensolaris-onvv-gate/usr/src/uts/common/io/usb/clients/usbkbm/ |
H A D | usbkbm.c | 1103 if (usbkbmd->usbkbm_report_format.keyid != 1106 usbkbmd->usbkbm_report_format.keyid) { 1292 led_id = usbkbmd->usbkbm_report_format.keyid; 1387 if (usbkbmd->usbkbm_report_format.keyid != HID_REPORT_ID_UNDEFINED) { 1388 if (*buffer != usbkbmd->usbkbm_report_format.keyid) { 1935 kbd_fmt->keyid = HID_REPORT_ID_UNDEFINED; 2019 kbd_fmt->keyid = (uint8_t)rptid;
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 1029 (void) memcpy(p, encr_data.decrypt.keyid, encr_data.decrypt.keyidlen); 1371 (void) memcpy(p, encr_data.encrypt.keyid, encr_data.encrypt.keyidlen); 1384 (int)encr_data.encrypt.keyid[0], 1784 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, boolean_t saveit) argument 1798 "\t(send_keyid) store %d byte %s keyid\n", 1804 (void) memcpy(encr_data.encrypt.keyid, keyid, keylen); 1807 (void) memcpy(encr_data.decrypt.keyid, keyid, keylen); 1811 (void) memcpy(p, keyid, keyle 1911 encrypt_set_keyid_state(uchar_t *keyid, int *keyidlen, int dir) argument 1967 encrypt_keyid(uchar_t *newkeyid, int *keyidlen, uchar_t *keyid, int len, int dir) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_ntp.c | 215 (void) sprintf(get_line((char *)ntp->keyid - 217 "Key ID = %8lu", ntohl(ntp->keyid));
|