Home
last modified time | relevance | path

Searched refs:keyid (Results 1 – 25 of 126) sorted by relevance

123456

/freebsd/crypto/openssl/apps/lib/
H A Dengine_loader.c39 char *keyid; member
44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument
50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new()
59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free()
71 char *keyid = NULL; in engine_open() local
91 keyid = OPENSSL_strdup(q + 1); in engine_open()
94 if (e != NULL && keyid != NULL) in engine_open()
95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open()
98 OPENSSL_free(keyid); in engine_open()
127 ENGINE_load_private_key(ctx->e, ctx->keyid, in engine_load()
[all …]
/freebsd/contrib/telnet/libtelnet/
H A Dencrypt.c167 unsigned char keyid[MAXKEYLEN]; member
177 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len);
698 encrypt_enc_keyid(unsigned char *keyid, int len) in encrypt_enc_keyid() argument
700 encrypt_keyid(&ki[1], keyid, len); in encrypt_enc_keyid()
704 encrypt_dec_keyid(unsigned char *keyid, int len) in encrypt_dec_keyid() argument
706 encrypt_keyid(&ki[0], keyid, len); in encrypt_dec_keyid()
710 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) in encrypt_keyid() argument
730 if (ep->keyid) in encrypt_keyid()
731 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
734 (memcmp(keyid, kp->keyid, len) != 0)) { in encrypt_keyid()
[all …]
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c167 unsigned char keyid[MAXKEYLEN]; member
733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) in encrypt_keyid() argument
753 if (ep->keyid) in encrypt_keyid()
754 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
756 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { in encrypt_keyid()
761 memcpy(kp->keyid,keyid, len); in encrypt_keyid()
762 if (ep->keyid) in encrypt_keyid()
763 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
765 if (ep->keyid) in encrypt_keyid()
766 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
[all …]
/freebsd/sys/netinet/
H A Dsctp_auth.h64 uint16_t keyid; /* shared key ID */ member
147 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid);
149 sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid,
191 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid);
192 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid);
193 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
194 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid);
195 extern int sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid);
196 extern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid);
197 extern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
[all …]
H A Dsctp_auth.c464 new_key->keyid = 0; in sctp_alloc_sharedkey()
490 if (skey->keyid == key_id) in sctp_find_sharedkey()
512 if (new_skey->keyid < skey->keyid) { in sctp_insert_sharedkey()
516 } else if (new_skey->keyid == skey->keyid) { in sctp_insert_sharedkey()
522 new_skey->keyid); in sctp_insert_sharedkey()
527 new_skey->keyid); in sctp_insert_sharedkey()
601 new_skey->keyid = skey->keyid; in sctp_copy_sharedkey()
1142 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) in sctp_clear_cachedkeys() argument
1147 if (keyid == stcb->asoc.authinfo.assoc_keyid) { in sctp_clear_cachedkeys()
1151 if (keyid == stcb->asoc.authinfo.recv_keyid) { in sctp_clear_cachedkeys()
[all …]
/freebsd/crypto/openssl/crypto/x509/
H A Dx_x509a.c30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
71 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1()
73 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1()
74 x->aux->keyid = NULL; in X509_keyid_set1()
79 if (aux->keyid == NULL in X509_keyid_set1()
80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL) in X509_keyid_set1()
82 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1()
96 if (!x->aux || !x->aux->keyid) in X509_keyid_get0()
99 *len = x->aux->keyid->length; in X509_keyid_get0()
100 return x->aux->keyid->data; in X509_keyid_get0()
H A Dv3_akid.c46 if (akeyid->keyid) { in STACK_OF()
47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF()
100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
123 keyid = 1; in v2i_AUTHORITY_KEYID()
125 keyid = 2; in v2i_AUTHORITY_KEYID()
157 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID()
174 if ((keyid == 2 || issuer == 0) in v2i_AUTHORITY_KEYID()
206 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
/freebsd/crypto/openssh/regress/
H A Dkrl.sh57 touch $OBJ/revoked-keyid
61 echo "id: revoked $n" >> $OBJ/revoked-keyid
131 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
136 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
137 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
141 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
189 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
193 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG"
211 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \
212 $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
/freebsd/crypto/openssl/crypto/pkcs12/
H A Dp12_crt.c21 unsigned char *keyid,
47 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local
71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex()
79 pkeyid = keyid; in PKCS12_create_ex()
115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex()
160 unsigned char *keyid, in pkcs12_add_cert_bag() argument
172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in pkcs12_add_cert_bag()
189 unsigned char *keyid = NULL; in PKCS12_add_cert() local
196 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert()
198 return pkcs12_add_cert_bag(pbags, cert, name, namelen, keyid, keyidlen); in PKCS12_add_cert()
/freebsd/crypto/openssl/test/
H A Dca-and-certs.cnf36 authorityKeyIdentifier = keyid,issuer:always
42 authorityKeyIdentifier = keyid:always
48 authorityKeyIdentifier = keyid:always
86 authorityKeyIdentifier = keyid:always,issuer:always
H A Dproxy.cnf27 authorityKeyIdentifier = keyid,issuer:always
54 authorityKeyIdentifier = keyid,issuer:always
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_kari.c58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() argument
73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id()
114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() argument
126 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id()
133 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
134 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
H A Dcms_lib.c688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument
694 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in ossl_cms_keyid_cert_cmp()
718 ASN1_OCTET_STRING *keyid = NULL; in ossl_cms_set1_keyid() local
725 keyid = ASN1_STRING_dup(cert_keyid); in ossl_cms_set1_keyid()
726 if (!keyid) { in ossl_cms_set1_keyid()
731 *pkeyid = keyid; in ossl_cms_set1_keyid()
/freebsd/contrib/ntp/libntp/
H A Dauthkeys.c31 keyid_t keyid; /* key identifier */ member
65 * keyid. We make this fairly big for potentially busy servers.
69 #define KEYHASH(keyid) ((keyid) & authhashmask) argument
463 hash = KEYHASH(sk->keyid); in auth_resize_hashtable()
497 sk->keyid = id; in allocsymkey()
525 authcache_flush_id(sk->keyid); in freesymkey()
528 bucket = &key_hash[KEYHASH(sk->keyid)]; in freesymkey()
555 if (id == sk->keyid) in auth_findkey()
618 cache_keyid = sk->keyid; in authhavekey()
[all...]
H A Dauthreadkeys.c91 keyid_t keyid; /* stored key ID */ member
285 next->keyid = keyno; in authreadkeys()
390 MD5auth_setkey(next->keyid, next->keytype, in authreadkeys()
/freebsd/crypto/openssh/
H A Dssh-pkcs11.c76 char *keyid; member
210 free(k11->keyid); in pkcs11_k11_free()
382 key_filter[1].pValue = k11->keyid; in pkcs11_get_key()
501 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_rsa_wrap()
502 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_rsa_wrap()
615 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_ecdsa_wrap()
616 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_ecdsa_wrap()
1327 char *label, CK_ULONG bits, CK_BYTE keyid, u_int32_t *err) in pkcs11_rsa_generate_private_key() argument
1360 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key()
1372 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key()
[all …]
/freebsd/crypto/openssl/demos/certs/
H A Dca.cnf43 authorityKeyIdentifier=keyid
52 authorityKeyIdentifier=keyid
65 authorityKeyIdentifier=keyid
75 authorityKeyIdentifier=keyid:always
/freebsd/sys/net80211/
H A Dieee80211_crypto_none.c104 uint8_t keyid; in none_encap() local
106 keyid = ieee80211_crypto_get_keyid(vap, k); in none_encap()
113 "key id %u is not set (encap)", keyid); in none_encap()
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.wpa_psk7 # keyid=<keyid_string>
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
/freebsd/sys/dev/rtwn/
H A Dif_rtwn_cam.c185 uint8_t algo, keyid; in rtwn_key_set_cb0() local
190 keyid = k->wk_keyix; in rtwn_key_set_cb0()
192 keyid = 0; in rtwn_key_set_cb0()
216 "macaddr %s\n", __func__, k->wk_keyix, keyid, in rtwn_key_set_cb0()
239 SM(R92C_CAM_KEYID, keyid) | in rtwn_key_set_cb0()
/freebsd/crypto/openssl/test/smime-certs/
H A Dca.cnf43 authorityKeyIdentifier=keyid
55 authorityKeyIdentifier=keyid
65 authorityKeyIdentifier=keyid:always
/freebsd/contrib/ntp/include/
H A Dntp_request.h143 keyid_t keyid; /* (optional) encryption key */ member
153 keyid_t keyid; /* (optional) encryption key */ member
160 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid))
394 keyid_t keyid; /* peer.keyid */ member
594 keyid_t keyid; /* key to use for this association */ member
606 keyid_t keyid; /* key to use for this association */ member
/freebsd/crypto/openssl/demos/certs/apps/
H A Dapps.cnf52 authorityKeyIdentifier=keyid
62 authorityKeyIdentifier=keyid:always
/freebsd/contrib/ntp/ntpdc/
H A Dlayout.std14 offsetof(keyid) = 192
19 offsetof(keyid) = 8
82 offsetof(keyid) = 28
236 offsetof(keyid) = 12
247 offsetof(keyid) = 12
/freebsd/contrib/ntp/scripts/monitoring/
H A Dntp.pl26 $keyid=0;
69 return ($keyid,$keyid = $id)[$[];

123456