/freebsd/contrib/ntp/sntp/tests/ |
H A D | keyFile.c | 11 bool CompareKeysAlternative(int key_id,int key_len,const char* type,const char* key_seq,struct key … 25 if (expected.key_id != actual.key_id) { in CompareKeys() 27 expected.key_id, actual.key_id); in CompareKeys() 51 int key_id, in CompareKeysAlternative() argument 60 temp.key_id = key_id; in CompareKeysAlternative()
|
H A D | crypto.c | 42 sk.key_id = 10; in test_MakeMd5Mac() 75 sha1.key_id = 20; in test_MakeSHA1Mac() 109 cmac.key_id = 30; in test_MakeCMac() 139 u_char PKT_DATA[ PAYLOAD_LEN + sizeof(sk.key_id) 144 sk.key_id = 0; in test_VerifySHA1() 152 memcpy(p, &sk.key_id, sizeof(sk.key_id)); p += sizeof(sk.key_id); in test_VerifySHA1() 179 sha1.key_id = 0; in test_VerifyCMAC() 201 cmac.key_id in VerifyOpenSSLCMAC() [all...] |
H A D | packetProcessing.c | 17 void PrepareAuthenticationTest(int key_id,int key_len,const char* type,const void* key_seq); 66 int key_id, in PrepareAuthenticationTest() argument 74 snprintf(str, sizeof(str), "%d", key_id); in PrepareAuthenticationTest() 82 key_ptr->key_id = key_id; in PrepareAuthenticationTest() 92 PrepareAuthenticationTestMD5(int key_id,int key_len,const void * key_seq) PrepareAuthenticationTestMD5() argument
|
H A D | packetHandling.c | 93 testkey.key_id = 30; in test_GenerateAuthenticatedPacket() 103 generate_pkt(&testpkt, &xmt, testkey.key_id, in test_GenerateAuthenticatedPacket() 117 TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0])); in test_OffsetCalculationPositiveOffset()
|
/freebsd/contrib/ntp/sntp/ |
H A D | networking.c | 107 u_int key_id; in process_pkt() local 162 key_id = ntohl(*exten_end); in process_pkt() 163 printf("Crypto NAK = 0x%08x from %s\n", key_id, stoa(sender)); in process_pkt() 179 key_id = ntohl(*exten_end); in process_pkt() 180 get_key(key_id, &pkt_key); in process_pkt() 182 printf("unrecognized key ID = 0x%08x\n", key_id); in process_pkt() 200 func_name, stoa(sender), key_id)); in process_pkt()
|
H A D | crypto.c | 249 &act->key_id, act->typen, keystring); in auth_init() 276 act->key_id, act->typen); in auth_init() 303 /* Looks for the key with keyid key_id and sets the d_key pointer to the in auth_init() 308 keyid_t key_id, in auth_init() 318 if (itr_key->key_id == key_id) { in get_key() 315 get_key(int key_id,struct key ** d_key) get_key() argument
|
H A D | crypto.h | 20 keyid_t key_id; member 28 extern void get_key(keyid_t key_id, struct key **d_key);
|
H A D | main.c | 55 int key_id; member 415 ctx->key_id = OPT_VALUE_AUTHENTICATION; in handle_lookup() 416 get_key(ctx->key_id, &ctx->key); in handle_lookup() 419 progname, ctx->key_id, OPT_ARG(KEYFILE)); in handle_lookup() 423 ctx->key_id = -1; in handle_lookup() 679 pkt_len = generate_pkt(&x_pkt, &tv_xmt, dctx->key_id, in xmt() 1126 int key_id, in generate_pkt() argument 1143 printf("generate_pkt: key_id %d, key pointer %p\n", key_id, pkt_key); in generate_pkt() 1146 x_pkt->exten[0] = htonl(key_id); in generate_pkt() [all...] |
H A D | main.h | 22 int key_id, struct key *pkt_key);
|
/freebsd/lib/libsecureboot/openpgp/ |
H A D | opgp_sig.c | 139 sig->key_id = octets2hex(ptr, 8); 172 free(sig->key_id); 173 sig->key_id = octets2hex(sp, 8); 315 DEBUG_PRINTF(2, ("rc=%d keyID=%s\n", rc, sig->key_id ? sig->key_id : "?")); 316 if (rc == 0 && sig->key_id) { 317 key = load_key_id(sig->key_id); 319 warnx("cannot find key-id: %s", sig->key_id);
|
H A D | packet.h | 54 char *key_id; member
|
/freebsd/crypto/openssl/crypto/engine/ |
H A D | eng_pkey.c | 56 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, in ENGINE_load_private_key() argument 77 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key() 85 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, in ENGINE_load_private_key() 106 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key() 127 ENGINE_load_public_key(ENGINE * e,const char * key_id,UI_METHOD * ui_method,void * callback_data) ENGINE_load_public_key() argument
|
H A D | eng_openssl.c | 76 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 417 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, in openssl_load_privkey() argument 424 key_id); in openssl_load_privkey() 425 in = BIO_new_file(key_id, "r"); in openssl_load_privkey()
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | engine.c | 105 char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc) in make_engine_uri() argument 112 } else if (key_id == NULL) { in make_engine_uri() 120 + strlen(key_id) in make_engine_uri() 129 OPENSSL_strlcat(new_uri, key_id, uri_sz); in make_engine_uri()
|
/freebsd/crypto/openssh/ |
H A D | krl.c | 67 char *key_id; member 116 return strcmp(a->key_id, b->key_id); in key_id_cmp() 158 free(rki->key_id); in revoked_certs_free() 342 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument 351 KRL_DBG(("revoke %s", key_id)); in ssh_krl_revoke_cert_by_key_id() 353 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id() 359 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id() 461 key->cert->key_id); in ssh_krl_revoke_key() 714 KRL_DBG(("key ID %s", rki->key_id)); in revoked_certs_generate() 715 if ((r = sshbuf_put_cstring(sect, rki->key_id)) != 0) in revoked_certs_generate() [all …]
|
/freebsd/contrib/libfido2/src/ |
H A D | u2f.c | 200 key_lookup(fido_dev_t *dev, const char *rp_id, const fido_blob_t *key_id, in key_lookup() argument 210 if (key_id->len > UINT8_MAX || rp_id == NULL) { in key_lookup() 212 key_id->len, (const void *)rp_id); in key_lookup() 227 key_id_len = (uint8_t)key_id->len; in key_lookup() 234 iso7816_add(apdu, key_id->ptr, key_id_len) < 0) { in key_lookup() 314 const fido_blob_t *key_id, fido_blob_t *sig, fido_blob_t *ad, int *ms) in do_auth() argument 327 if (cdh->len != SHA256_DIGEST_LENGTH || key_id->len > UINT8_MAX || in do_auth() 342 key_id_len = (uint8_t)key_id->len; in do_auth() 349 iso7816_add(apdu, key_id->ptr, key_id_len) < 0) { in do_auth() 759 u2f_authenticate_single(fido_dev_t *dev, const fido_blob_t *key_id, in u2f_authenticate_single() argument [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-lisp.c | 191 nd_uint16_t key_id; member 235 uint16_t key_id; in lisp_print() local 269 key_id = GET_BE_U_2(lisp_hdr->key_id); in lisp_print() 272 tok2str(auth_type, "unknown-type", key_id)); in lisp_print()
|
H A D | print-ntp.c | 106 nd_uint32_t key_id; member 306 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print() 308 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print() 316 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print()
|
/freebsd/crypto/openssl/engines/ |
H A D | e_ossltest.c | 376 static EVP_PKEY *load_key(ENGINE *eng, const char *key_id, int pub, in load_key() argument 382 if (OPENSSL_strncasecmp(key_id, "ot:", 3) != 0) in load_key() 384 key_id += 3; in load_key() 387 pub ? "Public" : "Private", key_id); in load_key() 388 in = BIO_new_file(key_id, "r"); in load_key() 399 static EVP_PKEY *ossltest_load_privkey(ENGINE *eng, const char *key_id, in ossltest_load_privkey() argument 402 return load_key(eng, key_id, 0, ui_method, ui_data); in ossltest_load_privkey() 405 static EVP_PKEY *ossltest_load_pubkey(ENGINE *eng, const char *key_id, in ossltest_load_pubkey() argument 408 return load_key(eng, key_id, 1, ui_method, ui_data); in ossltest_load_pubkey()
|
/freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
H A D | datapath.h | 649 * @u.add.key_id: key ID (0-7) for the new key 658 * @u.modify.key_id: key ID 661 * @u.remove.key_id: key ID 669 __le32 key_id; 680 __le32 key_id; 685 __le32 key_id; 651 __le32 key_id; global() member 662 __le32 key_id; global() member 667 __le32 key_id; global() member
|
H A D | sta.h | 437 * @key_id: key ID 445 __le32 key_id; 456 * @key_id: key ID 462 __le32 key_id; 443 __le32 key_id; global() member 460 __le32 key_id; global() member
|
/freebsd/contrib/wpa/wpa_supplicant/examples/ |
H A D | openCryptoki.conf | 34 key_id="4"
|
/freebsd/sys/contrib/dev/iwlwifi/mvm/ |
H A D | mld-key.c | 137 .u.modify.key_id = cpu_to_le32(key->keyidx), in iwl_mvm_mld_update_sta_keys() 177 .u.remove.key_id = cpu_to_le32(keyidx), in iwl_mvm_mld_send_key() 191 .u.add.key_id = cpu_to_le32(keyconf->keyidx), in iwl_mvm_mld_send_key()
|
/freebsd/sys/netinet/ |
H A D | sctp_auth.c | 485 sctp_find_sharedkey(struct sctp_keyhead *shared_keys, uint16_t key_id) in sctp_find_sharedkey() argument 490 if (skey->keyid == key_id) in sctp_find_sharedkey() 544 sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t key_id) in sctp_auth_key_acquire() argument 549 skey = sctp_find_sharedkey(&stcb->asoc.shared_keys, key_id); in sctp_auth_key_acquire() 556 __func__, (void *)stcb, key_id, skey->refcount); in sctp_auth_key_acquire() 561 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t key_id, int so_locked) in sctp_auth_key_release() argument 566 skey = sctp_find_sharedkey(&stcb->asoc.shared_keys, key_id); in sctp_auth_key_release() 572 __func__, (void *)stcb, key_id, skey->refcount); in sctp_auth_key_release() 578 0, &key_id, so_locked); in sctp_auth_key_release() 581 __func__, (void *)stcb, key_id, skey->refcount); in sctp_auth_key_release()
|
H A D | sctp_auth.h | 138 uint16_t key_id); 205 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
|