Home
last modified time | relevance | path

Searched refs:keyid (Results 1 – 25 of 28) sorted by relevance

12

/titanic_41/usr/src/common/net/wanboot/
H A Dp12auxpars.c208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, in sunw_PKCS12_parse() argument
264 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len, in sunw_PKCS12_parse()
319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, in parse_pkcs12() argument
355 if (keyid == NULL) { in parse_pkcs12()
362 retval = sunw_find_localkeyid(keyid, kstr_len, in parse_pkcs12()
646 ASN1_TYPE *keyid = NULL; in parse_one_bag() local
655 keyid = PKCS12_get_attr(bag, NID_localKeyID); in parse_one_bag()
697 if (keyid != NULL) { in parse_one_bag()
698 if (keyid->type != V_ASN1_OCTET_STRING) { in parse_one_bag()
705 keyid->value.octet_string->data, in parse_one_bag()
[all …]
H A Dp12auxutl.c160 if (cert->aux != NULL && cert->aux->keyid != NULL && in sunw_PKCS12_create()
161 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { in sunw_PKCS12_create()
162 str = cert->aux->keyid->data; in sunw_PKCS12_create()
163 len = cert->aux->keyid->length; in sunw_PKCS12_create()
209 if (cert->aux != NULL && cert->aux->keyid != NULL && in sunw_PKCS12_create()
210 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { in sunw_PKCS12_create()
211 str = cert->aux->keyid->data; in sunw_PKCS12_create()
212 len = cert->aux->keyid->length; in sunw_PKCS12_create()
H A Dp12misc.c267 ASN1_TYPE *keyid = NULL; in sunw_set_localkeyid() local
282 (keyid = ASN1_TYPE_new()) == NULL) { in sunw_set_localkeyid()
287 ASN1_TYPE_set(keyid, V_ASN1_OCTET_STRING, str); in sunw_set_localkeyid()
290 attr = type2attrib(keyid, NID_localKeyID); in sunw_set_localkeyid()
297 keyid = NULL; in sunw_set_localkeyid()
322 if (keyid != NULL) in sunw_set_localkeyid()
323 ASN1_TYPE_free(keyid); in sunw_set_localkeyid()
H A Dauxutil.c380 if (x->aux == NULL || x->aux->keyid == NULL)
382 s = x->aux->keyid;
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dencrypt.c164 uchar_t keyid[MAXKEYLEN]; member
728 encrypt_enc_keyid(uchar_t *keyid, int len) in encrypt_enc_keyid() argument
730 encrypt_keyid(&ki[KI_DECRYPT], keyid, len); in encrypt_enc_keyid()
734 encrypt_dec_keyid(uchar_t *keyid, int len) in encrypt_dec_keyid() argument
736 encrypt_keyid(&ki[KI_ENCRYPT], keyid, len); in encrypt_dec_keyid()
740 encrypt_keyid(struct key_info *kp, uchar_t *keyid, int len) in encrypt_keyid() argument
757 if (ep->keyid) in encrypt_keyid()
758 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
761 (memcmp(keyid, kp->keyid, len) != 0)) { in encrypt_keyid()
766 (void) memcpy(kp->keyid, keyid, len); in encrypt_keyid()
[all …]
H A Dencrypt.h88 int (*keyid)(int, unsigned char *, int *); member
H A Denc_des.c92 int keyid[2]; /* keyid for each direction */ member
/titanic_41/usr/src/lib/libpkg/common/
H A Dp12lib.c276 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, in sunw_PKCS12_parse() argument
332 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len, in sunw_PKCS12_parse()
694 if (cert->aux != NULL && cert->aux->keyid != NULL && in sunw_PKCS12_create()
695 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { in sunw_PKCS12_create()
696 str = cert->aux->keyid->data; in sunw_PKCS12_create()
697 len = cert->aux->keyid->length; in sunw_PKCS12_create()
743 if (cert->aux != NULL && cert->aux->keyid != NULL && in sunw_PKCS12_create()
744 cert->aux->keyid->type == V_ASN1_OCTET_STRING) { in sunw_PKCS12_create()
745 str = cert->aux->keyid->data; in sunw_PKCS12_create()
746 len = cert->aux->keyid->length; in sunw_PKCS12_create()
[all …]
/titanic_41/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto_none.c91 none_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in none_encap() argument
98 "key id %u is not set (encap)\n", keyid >> 6); in none_encap()
H A Dnet80211_crypto.c414 uint8_t keyid; in ieee80211_crypto_decap() local
430 keyid = ivp[IEEE80211_WEP_IVLEN]; in ieee80211_crypto_decap()
431 k = &ic->ic_nw_keys[keyid >> 6]; in ieee80211_crypto_decap()
H A Dnet80211_crypto_wep.c52 static int wep_encap(struct ieee80211_key *, mblk_t *, uint8_t keyid);
126 wep_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in wep_encap() argument
166 ivp[IEEE80211_WEP_IVLEN] = keyid; in wep_encap()
H A Dnet80211_crypto_ccmp.c119 ccmp_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in ccmp_encap() argument
136 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */ in ccmp_encap()
H A Dnet80211_crypto_tkip.c137 tkip_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) in tkip_encap() argument
160 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */ in tkip_encap()
/titanic_41/usr/src/uts/common/io/kbtrans/
H A Dkbtrans_streams.c1620 kbtrans_vt_compose(struct kbtrans *upper, unsigned short keyid, in kbtrans_vt_compose() argument
1630 switch (keyid) { in kbtrans_vt_compose()
1645 *bufp++ = keyid + in kbtrans_vt_compose()
1677 unsigned short keyid; in kbtrans_ascii_keypressed() local
1692 keyid = entry & 0xFF; in kbtrans_ascii_keypressed()
1693 if (keyid == ALT) { in kbtrans_ascii_keypressed()
1695 } else if (keyid == ALTGRAPH) { in kbtrans_ascii_keypressed()
1716 keyid = (entry & 0xF) + 1; in kbtrans_ascii_keypressed()
1718 kbtrans_vt_compose(upper, keyid, B_FALSE, buf); in kbtrans_ascii_keypressed()
1747 keyid = entry & 0xFF; in kbtrans_ascii_keypressed()
[all …]
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c1029 (void) memcpy(p, encr_data.decrypt.keyid, encr_data.decrypt.keyidlen); in encrypt_send_request_start()
1371 (void) memcpy(p, encr_data.encrypt.keyid, encr_data.encrypt.keyidlen); in encrypt_start_output()
1384 (int)encr_data.encrypt.keyid[0], in encrypt_start_output()
1784 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, boolean_t saveit) in encrypt_send_keyid() argument
1804 (void) memcpy(encr_data.encrypt.keyid, keyid, keylen); in encrypt_send_keyid()
1807 (void) memcpy(encr_data.decrypt.keyid, keyid, keylen); in encrypt_send_keyid()
1811 (void) memcpy(p, keyid, keylen); in encrypt_send_keyid()
1822 "DEC_KEYID"), keyid[0]); in encrypt_send_keyid()
1911 encrypt_set_keyid_state(uchar_t *keyid, int *keyidlen, int dir) in encrypt_set_keyid_state() argument
1928 if (*keyidlen != 1 || (*keyid != '\0')) { in encrypt_set_keyid_state()
[all …]
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/in.routed/
H A Drtquery.c95 static ulong_t keyid; variable
262 keyid = strtoul(p+1, &p, 0); in main()
263 if (keyid > 255 || *p != '\0' || in main()
399 NA0.au.a_md5.md5_keyid = (int8_t)keyid; in query_loop()
H A Dparms.c543 if (ap2->keyid == l) { in get_passwd()
550 k.keyid = (int)l; in get_passwd()
/titanic_41/usr/src/uts/common/io/usb/clients/usbkbm/
H A Dusbkbm.c1103 if (usbkbmd->usbkbm_report_format.keyid != in usbkbm_rput()
1106 usbkbmd->usbkbm_report_format.keyid) { in usbkbm_rput()
1292 led_id = usbkbmd->usbkbm_report_format.keyid; in usbkbm_streams_setled()
1387 if (usbkbmd->usbkbm_report_format.keyid != HID_REPORT_ID_UNDEFINED) { in usbkbm_polled_keycheck()
1388 if (*buffer != usbkbmd->usbkbm_report_format.keyid) { in usbkbm_polled_keycheck()
1935 kbd_fmt->keyid = HID_REPORT_ID_UNDEFINED; in usbkbm_get_input_format()
2019 kbd_fmt->keyid = (uint8_t)rptid; in usbkbm_get_input_format()
/titanic_41/usr/src/uts/common/sys/usb/clients/usbkbm/
H A Dusbkbm.h110 uint8_t keyid; /* report id of keyboard input */ member
/titanic_41/usr/src/uts/common/sys/
H A Dnet80211_crypto.h163 uint8_t keyid);
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_ntp.c215 (void) sprintf(get_line((char *)ntp->keyid - in interpret_ntp()
217 "Key ID = %8lu", ntohl(ntp->keyid)); in interpret_ntp()
H A Dntp.h303 uint32_t keyid; member
/titanic_41/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c3038 uchar_t *keyid, unsigned int keyidlen) in add_cert_to_safe() argument
3055 if (keyidlen > 0 && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) { in add_cert_to_safe()
3081 uchar_t *keyid, unsigned int keyidlen, in add_key_to_safe() argument
3106 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in add_key_to_safe()
3360 unsigned char keyid[EVP_MAX_MD_SIZE]; in local_export_pk12() local
3383 keyid, &keyidlen); in local_export_pk12()
3385 keyid, keyidlen, in local_export_pk12()
3405 cert_authsafe = add_cert_to_safe(xcert, cred, keyid, in local_export_pk12()
3805 ASN1_TYPE *keyid = NULL; in openssl_parse_bag() local
3809 keyid = PKCS12_get_attr(bag, NID_localKeyID); in openssl_parse_bag()
[all …]
/titanic_41/usr/src/head/arpa/
H A Dtelnet.h412 unsigned char keyid[TELNET_MAXNUMKEYS]; member
/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dtpm_specific.c1045 char *keyid, TSS_UUID *uuid, TSS_HKEY hParent, in tss_find_and_load_key() argument
1051 find_uuid(keyid, uuid)) { in tss_find_and_load_key()
1258 char *keyid; in token_generate_leaf_key() local
1265 keyid = TPMTOK_PUBLIC_LEAF_KEY_ID; in token_generate_leaf_key()
1270 keyid = TPMTOK_PRIVATE_LEAF_KEY_ID; in token_generate_leaf_key()
1299 ret = add_uuid(keyid, &newuuid); in token_generate_leaf_key()

12