/dragonfly/crypto/libressl/crypto/engine/ |
H A D | eng_pkey.c | 105 ENGINE_load_private_key(ENGINE *e, const char *key_id, UI_METHOD *ui_method, in ENGINE_load_private_key() argument 125 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key() 134 ENGINE_load_public_key(ENGINE *e, const char *key_id, UI_METHOD *ui_method, in ENGINE_load_public_key() argument 154 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_public_key()
|
H A D | eng_openssl.c | 128 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id, 392 openssl_load_privkey(ENGINE *eng, const char *key_id, UI_METHOD *ui_method, in openssl_load_privkey() argument 399 key_id); in openssl_load_privkey() 400 in = BIO_new_file(key_id, "r"); in openssl_load_privkey()
|
/dragonfly/crypto/openssh/ |
H A D | krl.c | 68 char *key_id; member 117 return strcmp(a->key_id, b->key_id); in key_id_cmp() 159 free(rki->key_id); in revoked_certs_free() 342 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument 353 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id() 359 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id() 852 char *key_id = NULL; in parse_revoked_certs() local 929 free(key_id); in parse_revoked_certs() 930 key_id = NULL; in parse_revoked_certs() 949 free(key_id); in parse_revoked_certs() [all …]
|
H A D | krl.h | 53 const struct sshkey *ca_key, const char *key_id);
|
H A D | PROTOCOL.krl | 111 string key_id[0] 114 This section must contain at least one "key_id". This section may appear
|
H A D | auth2-hostbased.c | 245 "%s CA %s from %s@%s", key->cert->key_id, in hostbased_key_allowed()
|
H A D | auth2-pubkey.c | 434 "i", cert->key_id, in match_principals_command() 568 "%s CA %s via %s", key->cert->key_id, in user_cert_trusted_ca()
|
H A D | sshkey.h | 114 char *key_id; member
|
H A D | ssh-add.c | 421 private->cert->key_id); in add_file() 427 private->cert->key_id); in add_file()
|
H A D | auth2-pubkeyfile.c | 375 key->cert->key_id, in auth_check_authkey_line()
|
H A D | sshkey.c | 543 free(cert->key_id); in cert_free() 565 cert->key_id = NULL; in cert_new() 1814 if (from->key_id == NULL) in sshkey_cert_copy() 1815 to->key_id = NULL; in sshkey_cert_copy() 1816 else if ((to->key_id = strdup(from->key_id)) == NULL) { in sshkey_cert_copy() 2258 (ret = sshbuf_get_cstring(b, &key->cert->key_id, &kidlen)) != 0 || in cert_parse() 3059 (ret = sshbuf_put_cstring(cert, k->cert->key_id)) != 0) in sshkey_certify_custom()
|
H A D | auth.c | 247 key->cert->key_id, in format_method_key()
|
/dragonfly/contrib/tcpdump/ |
H A D | print-lisp.c | 193 nd_uint16_t key_id; member 237 uint16_t key_id; in lisp_print() local 271 key_id = GET_BE_U_2(lisp_hdr->key_id); in lisp_print() 274 tok2str(auth_type, "unknown-type", key_id)); in lisp_print()
|
H A D | print-ntp.c | 112 nd_uint32_t key_id; member 312 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print() 314 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print() 322 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print()
|
H A D | print-rsvp.c | 319 uint8_t key_id[6]; member 1769 GET_BE_U_2(obj_ptr.rsvp_obj_integrity->key_id), in rsvp_obj_print() 1770 GET_BE_U_4(obj_ptr.rsvp_obj_integrity->key_id + 2), in rsvp_obj_print()
|
H A D | print-isoclns.c | 2498 u_short pdu_len, key_id; in isis_print() local 3137 key_id = GET_BE_U_2(tptr); in isis_print() 3138 ND_PRINT("%u, password: ", key_id); in isis_print()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 586 char *key_id; member
|
H A D | eap_tls_common.c | 125 params->key_id = config->key_id; in eap_tls_params_from_conf1() 149 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
|
/dragonfly/lib/libc/nameser/ |
H A D | ns_print.c | 452 u_int keyflags, protocol, algorithm, key_id; in ns_sprintrrf() local 461 key_id = dst_s_dns_key_id(rdata, edata-rdata); in ns_sprintrrf() 463 key_id = 0; in ns_sprintrrf() 490 n = SPRINTF((tmp, " ; key_tag= %u", key_id)); in ns_sprintrrf()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1175 const char *pin, const char *key_id, in tls_engine_init() argument 1182 if (!key_id) in tls_engine_init() 1185 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init() 1189 key_id, in tls_engine_init() 1227 if (key_id) { in tls_engine_init() 1239 key_id, NULL, in tls_engine_init() 1246 key_id, in tls_engine_init() 4900 const char *key_id = params->key_id; in tls_connection_set_params() local 4926 key_id = params->private_key; in tls_connection_set_params() 4978 key_id, cert_id, ca_cert_id); in tls_connection_set_params() [all …]
|
H A D | tls.h | 208 const char *key_id; member
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | engine.h | 548 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, 550 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
|
/dragonfly/contrib/ldns/ldns/ |
H A D | keys.h | 237 ldns_status ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm a);
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 193 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member
|
/dragonfly/contrib/ldns/ |
H A D | keys.c | 112 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg) in ldns_key_new_frm_engine() argument 119 k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL); in ldns_key_new_frm_engine()
|