Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 25 of 35) sorted by relevance

12

/dragonfly/crypto/libressl/crypto/engine/
H A Deng_pkey.c105 ENGINE_load_private_key(ENGINE *e, const char *key_id, UI_METHOD *ui_method, in ENGINE_load_private_key() argument
125 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key()
134 ENGINE_load_public_key(ENGINE *e, const char *key_id, UI_METHOD *ui_method, in ENGINE_load_public_key() argument
154 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_public_key()
H A Deng_openssl.c128 static EVP_PKEY *openssl_load_privkey(ENGINE *eng, const char *key_id,
392 openssl_load_privkey(ENGINE *eng, const char *key_id, UI_METHOD *ui_method, in openssl_load_privkey() argument
399 key_id); in openssl_load_privkey()
400 in = BIO_new_file(key_id, "r"); in openssl_load_privkey()
/dragonfly/crypto/openssh/
H A Dkrl.c68 char *key_id; member
117 return strcmp(a->key_id, b->key_id); in key_id_cmp()
159 free(rki->key_id); in revoked_certs_free()
342 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument
353 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id()
359 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id()
852 char *key_id = NULL; in parse_revoked_certs() local
929 free(key_id); in parse_revoked_certs()
930 key_id = NULL; in parse_revoked_certs()
949 free(key_id); in parse_revoked_certs()
[all …]
H A Dkrl.h53 const struct sshkey *ca_key, const char *key_id);
H A DPROTOCOL.krl111 string key_id[0]
114 This section must contain at least one "key_id". This section may appear
H A Dauth2-hostbased.c245 "%s CA %s from %s@%s", key->cert->key_id, in hostbased_key_allowed()
H A Dauth2-pubkey.c434 "i", cert->key_id, in match_principals_command()
568 "%s CA %s via %s", key->cert->key_id, in user_cert_trusted_ca()
H A Dsshkey.h114 char *key_id; member
H A Dssh-add.c421 private->cert->key_id); in add_file()
427 private->cert->key_id); in add_file()
H A Dauth2-pubkeyfile.c375 key->cert->key_id, in auth_check_authkey_line()
H A Dsshkey.c543 free(cert->key_id); in cert_free()
565 cert->key_id = NULL; in cert_new()
1814 if (from->key_id == NULL) in sshkey_cert_copy()
1815 to->key_id = NULL; in sshkey_cert_copy()
1816 else if ((to->key_id = strdup(from->key_id)) == NULL) { in sshkey_cert_copy()
2258 (ret = sshbuf_get_cstring(b, &key->cert->key_id, &kidlen)) != 0 || in cert_parse()
3059 (ret = sshbuf_put_cstring(cert, k->cert->key_id)) != 0) in sshkey_certify_custom()
H A Dauth.c247 key->cert->key_id, in format_method_key()
/dragonfly/contrib/tcpdump/
H A Dprint-lisp.c193 nd_uint16_t key_id; member
237 uint16_t key_id; in lisp_print() local
271 key_id = GET_BE_U_2(lisp_hdr->key_id); in lisp_print()
274 tok2str(auth_type, "unknown-type", key_id)); in lisp_print()
H A Dprint-ntp.c112 nd_uint32_t key_id; member
312 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print()
314 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print()
322 ND_PRINT("\n\tKey id: %u", GET_BE_U_4(bp->key_id)); in ntp_time_print()
H A Dprint-rsvp.c319 uint8_t key_id[6]; member
1769 GET_BE_U_2(obj_ptr.rsvp_obj_integrity->key_id), in rsvp_obj_print()
1770 GET_BE_U_4(obj_ptr.rsvp_obj_integrity->key_id + 2), in rsvp_obj_print()
H A Dprint-isoclns.c2498 u_short pdu_len, key_id; in isis_print() local
3137 key_id = GET_BE_U_2(tptr); in isis_print()
3138 ND_PRINT("%u, password: ", key_id); in isis_print()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_config.h586 char *key_id; member
H A Deap_tls_common.c125 params->key_id = config->key_id; in eap_tls_params_from_conf1()
149 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
/dragonfly/lib/libc/nameser/
H A Dns_print.c452 u_int keyflags, protocol, algorithm, key_id; in ns_sprintrrf() local
461 key_id = dst_s_dns_key_id(rdata, edata-rdata); in ns_sprintrrf()
463 key_id = 0; in ns_sprintrrf()
490 n = SPRINTF((tmp, " ; key_tag= %u", key_id)); in ns_sprintrrf()
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dtls_openssl.c1175 const char *pin, const char *key_id, in tls_engine_init() argument
1182 if (!key_id) in tls_engine_init()
1185 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1189 key_id, in tls_engine_init()
1227 if (key_id) { in tls_engine_init()
1239 key_id, NULL, in tls_engine_init()
1246 key_id, in tls_engine_init()
4900 const char *key_id = params->key_id; in tls_connection_set_params() local
4926 key_id = params->private_key; in tls_connection_set_params()
4978 key_id, cert_id, ca_cert_id); in tls_connection_set_params()
[all …]
H A Dtls.h208 const char *key_id; member
/dragonfly/crypto/libressl/include/openssl/
H A Dengine.h548 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id,
550 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id,
/dragonfly/contrib/ldns/ldns/
H A Dkeys.h237 ldns_status ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm a);
/dragonfly/contrib/wpa_supplicant/src/common/
H A Dwpa_common.h193 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member
/dragonfly/contrib/ldns/
H A Dkeys.c112 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg) in ldns_key_new_frm_engine() argument
119 k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL); in ldns_key_new_frm_engine()

12