| /freebsd/crypto/openssl/apps/lib/ |
| H A D | engine_loader.c | 40 char *keyid; member 45 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 51 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 60 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 72 char *keyid = NULL; in engine_open() local 90 keyid = OPENSSL_strdup(q + 1); in engine_open() 93 if (e != NULL && keyid != NULL) in engine_open() 94 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() 97 OPENSSL_free(keyid); in engine_open() 125 pkey = ENGINE_load_private_key(ctx->e, ctx->keyid, in engine_load() [all …]
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | encrypt.c | 167 unsigned char keyid[MAXKEYLEN]; member 177 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len); 698 encrypt_enc_keyid(unsigned char *keyid, int len) in encrypt_enc_keyid() argument 700 encrypt_keyid(&ki[1], keyid, len); in encrypt_enc_keyid() 704 encrypt_dec_keyid(unsigned char *keyid, int len) in encrypt_dec_keyid() argument 706 encrypt_keyid(&ki[0], keyid, len); in encrypt_dec_keyid() 710 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) in encrypt_keyid() argument 730 if (ep->keyid) in encrypt_keyid() 731 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 734 (memcmp(keyid, kp->keyid, len) != 0)) { in encrypt_keyid() [all …]
|
| /freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | encrypt.c | 167 unsigned char keyid[MAXKEYLEN]; member 733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) in encrypt_keyid() argument 753 if (ep->keyid) in encrypt_keyid() 754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 756 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { in encrypt_keyid() 761 memcpy(kp->keyid,keyid, len); in encrypt_keyid() 762 if (ep->keyid) in encrypt_keyid() 763 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 765 if (ep->keyid) in encrypt_keyid() 766 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() [all …]
|
| /freebsd/sys/netinet/ |
| H A D | sctp_auth.h | 64 uint16_t keyid; /* shared key ID */ member 147 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 149 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 191 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 192 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 193 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 194 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); 195 extern int sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid); 196 extern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid); 197 extern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); [all …]
|
| H A D | sctp_auth.c | 464 new_key->keyid = 0; in sctp_alloc_sharedkey() 490 if (skey->keyid == key_id) in sctp_find_sharedkey() 512 if (new_skey->keyid < skey->keyid) { in sctp_insert_sharedkey() 516 } else if (new_skey->keyid == skey->keyid) { in sctp_insert_sharedkey() 522 new_skey->keyid); in sctp_insert_sharedkey() 527 new_skey->keyid); in sctp_insert_sharedkey() 601 new_skey->keyid = skey->keyid; in sctp_copy_sharedkey() 1142 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) in sctp_clear_cachedkeys() argument 1147 if (keyid == stcb->asoc.authinfo.assoc_keyid) { in sctp_clear_cachedkeys() 1151 if (keyid == stcb->asoc.authinfo.recv_keyid) { in sctp_clear_cachedkeys() [all …]
|
| /freebsd/crypto/openssl/crypto/x509/ |
| H A D | x_x509a.c | 30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 71 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 73 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 74 x->aux->keyid = NULL; in X509_keyid_set1() 79 if (aux->keyid == NULL in X509_keyid_set1() 80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL) in X509_keyid_set1() 82 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 96 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 99 *len = x->aux->keyid->length; in X509_keyid_get0() 100 return x->aux->keyid->data; in X509_keyid_get0()
|
| H A D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = i2s_ASN1_OCTET_STRING(NULL, akeyid->keyid); in STACK_OF() 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 127 if (strcmp(cnf->name, "keyid") == 0 && keyid == 0) { in v2i_AUTHORITY_KEYID() 128 keyid = 1; in v2i_AUTHORITY_KEYID() 130 keyid = 2; in v2i_AUTHORITY_KEYID() 168 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID() 190 if (keyid == 2 && ikeyid == NULL) { in v2i_AUTHORITY_KEYID() 223 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
| /freebsd/crypto/openssh/regress/ |
| H A D | krl.sh | 57 touch $OBJ/revoked-keyid 61 echo "id: revoked $n" >> $OBJ/revoked-keyid 131 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 136 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \ 137 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed" 141 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \ 189 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 193 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG" 211 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \ 212 $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
|
| /freebsd/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_crt.c | 23 unsigned char *keyid, 46 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex2() local 70 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex2() 78 pkeyid = keyid; in PKCS12_create_ex2() 131 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex2() 193 unsigned char *keyid, in pkcs12_add_cert_bag() argument 205 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in pkcs12_add_cert_bag() 222 unsigned char *keyid = NULL; in PKCS12_add_cert() local 229 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert() 231 return pkcs12_add_cert_bag(pbags, cert, name, namelen, keyid, keyidlen); in PKCS12_add_cert()
|
| /freebsd/crypto/openssl/test/ |
| H A D | ca-and-certs.cnf | 38 authorityKeyIdentifier = keyid,issuer:always 44 authorityKeyIdentifier = keyid:always 50 authorityKeyIdentifier = keyid:always 88 authorityKeyIdentifier = keyid:always,issuer:always
|
| H A D | proxy.cnf | 27 authorityKeyIdentifier = keyid,issuer:always 54 authorityKeyIdentifier = keyid,issuer:always
|
| /freebsd/crypto/openssl/crypto/cms/ |
| H A D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() argument 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() argument 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
|
| H A D | cms_lib.c | 740 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 746 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in ossl_cms_keyid_cert_cmp() 775 ASN1_OCTET_STRING *keyid = NULL; in ossl_cms_set1_keyid() local 782 keyid = ASN1_STRING_dup(cert_keyid); in ossl_cms_set1_keyid() 783 if (!keyid) { in ossl_cms_set1_keyid() 788 *pkeyid = keyid; in ossl_cms_set1_keyid()
|
| /freebsd/contrib/ntp/libntp/ |
| H A D | authkeys.c | 31 keyid_t keyid; /* key identifier */ member 65 * keyid. We make this fairly big for potentially busy servers. 69 #define KEYHASH(keyid) ((keyid) & authhashmask) argument 463 hash = KEYHASH(sk->keyid); in auth_resize_hashtable() 497 sk->keyid = id; in allocsymkey() 525 authcache_flush_id(sk->keyid); in freesymkey() 528 bucket = &key_hash[KEYHASH(sk->keyid)]; in freesymkey() 555 if (id == sk->keyid) in auth_findkey() 618 cache_keyid = sk->keyid; in authhavekey() [all...] |
| H A D | authreadkeys.c | 91 keyid_t keyid; /* stored key ID */ member 285 next->keyid = keyno; in authreadkeys() 390 MD5auth_setkey(next->keyid, next->keytype, in authreadkeys()
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-pkcs11.c | 76 char *keyid; member 210 free(k11->keyid); in pkcs11_k11_free() 382 key_filter[1].pValue = k11->keyid; in pkcs11_get_key() 501 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_rsa_wrap() 502 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_rsa_wrap() 617 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_ecdsa_wrap() 618 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_ecdsa_wrap() 1343 char *label, CK_ULONG bits, CK_BYTE keyid, u_int32_t *err) in pkcs11_rsa_generate_private_key() argument 1376 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key() 1388 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key() [all …]
|
| /freebsd/crypto/openssl/demos/certs/ |
| H A D | ca.cnf | 43 authorityKeyIdentifier=keyid 52 authorityKeyIdentifier=keyid 65 authorityKeyIdentifier=keyid 75 authorityKeyIdentifier=keyid:always
|
| /freebsd/sys/net80211/ |
| H A D | ieee80211_crypto_none.c | 104 uint8_t keyid; in none_encap() local 106 keyid = ieee80211_crypto_get_keyid(vap, k); in none_encap() 113 "key id %u is not set (encap)", keyid); in none_encap()
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | hostapd.wpa_psk | 7 # keyid=<keyid_string> 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
|
| /freebsd/sys/dev/rtwn/ |
| H A D | if_rtwn_cam.c | 186 uint8_t algo, keyid; in rtwn_key_set_cb0() local 191 keyid = k->wk_keyix; in rtwn_key_set_cb0() 193 keyid = 0; in rtwn_key_set_cb0() 224 "macaddr %s\n", __func__, k->wk_keyix, keyid, in rtwn_key_set_cb0() 247 SM(R92C_CAM_KEYID, keyid) | in rtwn_key_set_cb0()
|
| /freebsd/contrib/ntp/include/ |
| H A D | ntp_request.h | 143 keyid_t keyid; /* (optional) encryption key */ member 153 keyid_t keyid; /* (optional) encryption key */ member 160 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid)) 394 keyid_t keyid; /* peer.keyid */ member 594 keyid_t keyid; /* key to use for this association */ member 606 keyid_t keyid; /* key to use for this association */ member
|
| /freebsd/crypto/openssl/demos/certs/apps/ |
| H A D | apps.cnf | 52 authorityKeyIdentifier=keyid 62 authorityKeyIdentifier=keyid:always
|
| /freebsd/contrib/ntp/ntpdc/ |
| H A D | layout.std | 14 offsetof(keyid) = 192 19 offsetof(keyid) = 8 82 offsetof(keyid) = 28 236 offsetof(keyid) = 12 247 offsetof(keyid) = 12
|
| /freebsd/contrib/ntp/scripts/monitoring/ |
| H A D | ntp.pl | 26 $keyid=0; 69 return ($keyid,$keyid = $id)[$[];
|
| /freebsd/contrib/ntp/tests/libntp/ |
| H A D | digests.c | 30 void dump_mac(keyid_t keyid, u_char *pmac, size_t octets); 504 keyid_t keyid, 513 dc += snprintf(dump + dc, sizeof(dump) - dc, "digest with key %u { ", keyid); 387 dump_mac(keyid_t keyid,u_char * pmac,size_t octets) dump_mac() argument
|