/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.c | 162 uchar_t keyid[MAXKEYLEN]; member 726 encrypt_enc_keyid(uchar_t *keyid, int len) in encrypt_enc_keyid() argument 728 encrypt_keyid(&ki[KI_DECRYPT], keyid, len); in encrypt_enc_keyid() 732 encrypt_dec_keyid(uchar_t *keyid, int len) in encrypt_dec_keyid() argument 734 encrypt_keyid(&ki[KI_ENCRYPT], keyid, len); in encrypt_dec_keyid() 738 encrypt_keyid(struct key_info *kp, uchar_t *keyid, int len) in encrypt_keyid() argument 755 if (ep->keyid) in encrypt_keyid() 756 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 759 (memcmp(keyid, kp->keyid, len) != 0)) { in encrypt_keyid() 764 (void) memcpy(kp->keyid, keyid, len); in encrypt_keyid() [all …]
|
H A D | encrypt.h | 86 int (*keyid)(int, unsigned char *, int *); member
|
H A D | enc_des.c | 93 int keyid[2]; /* keyid for each direction */ member
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_none.c | 89 none_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in none_encap() argument 96 "key id %u is not set (encap)\n", keyid >> 6); in none_encap()
|
H A D | net80211_crypto.c | 412 uint8_t keyid; in ieee80211_crypto_decap() local 428 keyid = ivp[IEEE80211_WEP_IVLEN]; in ieee80211_crypto_decap() 429 k = &ic->ic_nw_keys[keyid >> 6]; in ieee80211_crypto_decap()
|
H A D | net80211_crypto_wep.c | 52 static int wep_encap(struct ieee80211_key *, mblk_t *, uint8_t keyid); 126 wep_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in wep_encap() argument 166 ivp[IEEE80211_WEP_IVLEN] = keyid; in wep_encap()
|
H A D | net80211_crypto_ccmp.c | 119 ccmp_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in ccmp_encap() argument 136 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */ in ccmp_encap()
|
H A D | net80211_crypto_tkip.c | 137 tkip_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in tkip_encap() argument 160 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */ in tkip_encap()
|
/illumos-gate/usr/src/uts/common/io/kbtrans/ |
H A D | kbtrans_streams.c | 1674 kbtrans_vt_compose(struct kbtrans *upper, unsigned short keyid, in kbtrans_vt_compose() argument 1684 switch (keyid) { in kbtrans_vt_compose() 1699 *bufp++ = keyid + in kbtrans_vt_compose() 1728 unsigned short keyid; in kbtrans_ascii_keypressed() local 1742 keyid = entry & 0xFF; in kbtrans_ascii_keypressed() 1743 if (keyid == ALT) { in kbtrans_ascii_keypressed() 1745 } else if (keyid == ALTGRAPH) { in kbtrans_ascii_keypressed() 1766 keyid = (entry & 0xF) + 1; in kbtrans_ascii_keypressed() 1768 kbtrans_vt_compose(upper, keyid, B_FALSE, buf); in kbtrans_ascii_keypressed() 1815 keyid = entry & 0xFF; in kbtrans_ascii_keypressed() [all …]
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 1029 (void) memcpy(p, encr_data.decrypt.keyid, encr_data.decrypt.keyidlen); in encrypt_send_request_start() 1371 (void) memcpy(p, encr_data.encrypt.keyid, encr_data.encrypt.keyidlen); in encrypt_start_output() 1384 (int)encr_data.encrypt.keyid[0], in encrypt_start_output() 1784 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, boolean_t saveit) in encrypt_send_keyid() argument 1804 (void) memcpy(encr_data.encrypt.keyid, keyid, keylen); in encrypt_send_keyid() 1807 (void) memcpy(encr_data.decrypt.keyid, keyid, keylen); in encrypt_send_keyid() 1811 (void) memcpy(p, keyid, keylen); in encrypt_send_keyid() 1822 "DEC_KEYID"), keyid[0]); in encrypt_send_keyid() 1911 encrypt_set_keyid_state(uchar_t *keyid, int *keyidlen, int dir) in encrypt_set_keyid_state() argument 1928 if (*keyidlen != 1 || (*keyid != '\0')) { in encrypt_set_keyid_state() [all …]
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/ |
H A D | rtquery.c | 93 static ulong_t keyid; variable 260 keyid = strtoul(p+1, &p, 0); in main() 261 if (keyid > 255 || *p != '\0' || in main() 397 NA0.au.a_md5.md5_keyid = (int8_t)keyid; in query_loop()
|
H A D | parms.c | 543 if (ap2->keyid == l) { in get_passwd() 550 k.keyid = (int)l; in get_passwd()
|
H A D | defs.h | 357 uint8_t keyid; member
|
H A D | output.c | 310 na->au.a_md5.md5_keyid = ap->keyid; in clr_ws_buf()
|
H A D | input.c | 1455 if (NA->au.a_md5.md5_keyid != ap->keyid) in ck_passwd()
|
/illumos-gate/usr/src/uts/common/io/usb/clients/usbkbm/ |
H A D | usbkbm.c | 1127 if (usbkbmd->usbkbm_report_format.keyid != in usbkbm_rsrv() 1130 usbkbmd->usbkbm_report_format.keyid) { in usbkbm_rsrv() 1317 led_id = usbkbmd->usbkbm_report_format.keyid; in usbkbm_streams_setled() 1412 if (usbkbmd->usbkbm_report_format.keyid != HID_REPORT_ID_UNDEFINED) { in usbkbm_polled_keycheck() 1413 if (*buffer != usbkbmd->usbkbm_report_format.keyid) { in usbkbm_polled_keycheck() 1960 kbd_fmt->keyid = HID_REPORT_ID_UNDEFINED; in usbkbm_get_input_format() 2044 kbd_fmt->keyid = (uint8_t)rptid; in usbkbm_get_input_format()
|
/illumos-gate/usr/src/uts/common/sys/usb/clients/usbkbm/ |
H A D | usbkbm.h | 110 uint8_t keyid; /* report id of keyboard input */ member
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_ntp.c | 213 (void) sprintf(get_line((char *)ntp->keyid - in interpret_ntp() 215 "Key ID = %8lu", ntohl(ntp->keyid)); in interpret_ntp()
|
H A D | ntp.h | 301 uint32_t keyid; member
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | net80211_crypto.h | 163 uint8_t keyid);
|
/illumos-gate/usr/src/head/arpa/ |
H A D | telnet.h | 411 unsigned char keyid[TELNET_MAXNUMKEYS]; member
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 3075 uchar_t *keyid, unsigned int keyidlen) in add_cert_to_safe() argument 3092 if (keyidlen > 0 && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) { in add_cert_to_safe() 3118 uchar_t *keyid, unsigned int keyidlen, char *label, int label_len) in add_key_to_safe() argument 3142 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in add_key_to_safe() 3421 unsigned char keyid[EVP_MAX_MD_SIZE]; in local_export_pk12() local 3444 keyid, &keyidlen); in local_export_pk12() 3446 keyid, keyidlen, in local_export_pk12() 3466 cert_authsafe = add_cert_to_safe(xcert, cred, keyid, in local_export_pk12() 3845 const ASN1_TYPE *keyid = NULL; in openssl_parse_bag() local 3849 keyid = PKCS12_SAFEBAG_get0_attr(bag, NID_localKeyID); in openssl_parse_bag() [all …]
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 1049 char *keyid, TSS_UUID *uuid, TSS_HKEY hParent, in tss_find_and_load_key() argument 1055 find_uuid(keyid, uuid)) { in tss_find_and_load_key() 1262 char *keyid; in token_generate_leaf_key() local 1269 keyid = TPMTOK_PUBLIC_LEAF_KEY_ID; in token_generate_leaf_key() 1274 keyid = TPMTOK_PRIVATE_LEAF_KEY_ID; in token_generate_leaf_key() 1303 ret = add_uuid(keyid, &newuuid); in token_generate_leaf_key()
|