/dragonfly/lib/libtelnet/ |
H A D | encrypt.c | 163 unsigned char keyid[MAXKEYLEN]; member 726 if (ep->keyid) in encrypt_keyid() 727 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 730 (memcmp(keyid, kp->keyid, len) != 0)) { in encrypt_keyid() 735 memmove(kp->keyid, keyid, len); in encrypt_keyid() 736 if (ep->keyid) in encrypt_keyid() 737 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 739 if (ep->keyid) in encrypt_keyid() 740 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 758 memmove(kp->keyid, keyid, keylen); in encrypt_send_keyid() [all …]
|
H A D | encrypt.h | 91 int (*keyid)(int, unsigned char *, int *); member
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | x_x509a.c | 99 .offset = offsetof(X509_CERT_AUX, keyid), 181 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 183 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 184 x->aux->keyid = NULL; in X509_keyid_set1() 189 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1() 191 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 207 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 210 *len = x->aux->keyid->length; in X509_keyid_get0() 211 return x->aux->keyid->data; in X509_keyid_get0()
|
H A D | t_x509a.c | 111 if (aux->keyid) { in X509_CERT_AUX_print() 113 for (i = 0; i < aux->keyid->length; i++) in X509_CERT_AUX_print() 115 aux->keyid->data[i]); in X509_CERT_AUX_print()
|
/dragonfly/crypto/libressl/crypto/x509/ |
H A D | x509_akey.c | 102 if (akeyid->keyid != NULL) { in STACK_OF() 103 if ((tmpstr = hex_to_string(akeyid->keyid->data, in STACK_OF() 104 akeyid->keyid->length)) == NULL) in STACK_OF() 152 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 167 keyid = 1; in v2i_AUTHORITY_KEYID() 169 keyid = 2; in v2i_AUTHORITY_KEYID() 190 if (keyid) { in v2i_AUTHORITY_KEYID() 194 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID() 225 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
H A D | x509_akeya.c | 70 .offset = offsetof(AUTHORITY_KEYID, keyid),
|
/dragonfly/crypto/libressl/crypto/pkcs12/ |
H A D | p12_crt.c | 94 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create() local 116 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); in PKCS12_create() 123 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 152 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 193 unsigned char *keyid; in PKCS12_add_cert() local 207 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert() 209 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_add_cert()
|
/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_kari.c | 99 ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument 113 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 114 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 125 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 126 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 158 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, in CMS_RecipientEncryptedKey_get0_id() argument 168 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 169 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 175 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 176 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
|
H A D | cms_lib.c | 667 cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in cms_keyid_cert_cmp() argument 674 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in cms_keyid_cert_cmp() 704 ASN1_OCTET_STRING *keyid = NULL; in cms_set1_keyid() local 712 keyid = ASN1_STRING_dup(cert_keyid); in cms_set1_keyid() 713 if (!keyid) { in cms_set1_keyid() 718 *pkeyid = keyid; in cms_set1_keyid()
|
H A D | cms_sd.c | 227 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) in cms_SignerIdentifier_get0_signer_id() argument 235 if (keyid) in cms_SignerIdentifier_get0_signer_id() 236 *keyid = sid->d.subjectKeyIdentifier; in cms_SignerIdentifier_get0_signer_id() 521 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, in CMS_SignerInfo_get0_signer_id() argument 524 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); in CMS_SignerInfo_get0_signer_id()
|
H A D | cms_lcl.h | 430 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno); 441 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert);
|
/dragonfly/usr.sbin/dntpd/ |
H A D | ntpreq.c | 78 msg->keyid = ntohl(msg->keyid); in ntp_ntoh() 91 msg->keyid = htonl(msg->keyid); in ntp_hton()
|
H A D | ntp.h | 114 u_int32_t keyid; member
|
/dragonfly/sys/netproto/802_11/wlan/ |
H A D | ieee80211_crypto_none.c | 106 uint8_t keyid; in none_encap() local 108 keyid = ieee80211_crypto_get_keyid(vap, k); in none_encap() 115 "key id %u is not set (encap)", keyid); in none_encap()
|
H A D | ieee80211_crypto.c | 595 uint8_t keyid; in ieee80211_crypto_decap() local 613 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid); in ieee80211_crypto_decap() 616 k = &vap->iv_nw_keys[keyid >> 6]; in ieee80211_crypto_decap()
|
/dragonfly/sys/sys/ |
H A D | dmsg.h | 614 uint64_t keyid; member 622 uint64_t keyid; member 632 uint64_t keyid; member 642 uint64_t keyid; member 652 uint64_t keyid; member
|
/dragonfly/sys/dev/disk/xdisk/ |
H A D | xdisk.c | 114 uint64_t keyid; member 909 msg->any.blk_read.keyid = sc->keyid; in xa_start() 918 msg->any.blk_write.keyid = sc->keyid; in xa_start() 929 msg->any.blk_flush.keyid = sc->keyid; in xa_start() 938 msg->any.blk_freeblks.keyid = sc->keyid; in xa_start()
|
/dragonfly/contrib/file/magic/Magdir/ |
H A D | pgp | 107 >3 belong x keyid: %08X 124 >4 belong x keyid: %08X 141 >4 belong x keyid: %08X 158 >4 belong x keyid: %08X 175 >4 belong x keyid: %08X 192 >4 belong x keyid: %08X 207 >4 belong x keyid: %08X 222 >4 belong x keyid: %08X
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | ap_config.c | 281 const char *keyid; in hostapd_config_read_wpa_psk() local 319 keyid = NULL; in hostapd_config_read_wpa_psk() 331 keyid = value; in hostapd_config_read_wpa_psk() 393 if (keyid) { in hostapd_config_read_wpa_psk() 394 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid)); in hostapd_config_read_wpa_psk() 395 if ((size_t) len >= sizeof(psk->keyid)) { in hostapd_config_read_wpa_psk()
|
H A D | sta_info.c | 1211 if (!psk || !psk->keyid[0]) in ap_sta_wpa_get_keyid() 1214 return psk->keyid; in ap_sta_wpa_get_keyid() 1256 const char *keyid; in ap_sta_set_authorized() local 1271 keyid = ap_sta_wpa_get_keyid(hapd, sta); in ap_sta_set_authorized() 1272 if (keyid) { in ap_sta_set_authorized() 1274 " keyid=%s", keyid); in ap_sta_set_authorized()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | cms.h | 213 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno); 264 int CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, 331 X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, 337 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm,
|
/dragonfly/sys/netproto/802_11/wlan_wep/ |
H A D | ieee80211_crypto_wep.c | 134 uint8_t keyid; in wep_setiv() local 136 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; in wep_setiv() 178 ivp[3] = keyid; in wep_setiv()
|
/dragonfly/sbin/routed/rtquery/ |
H A D | rtquery.c | 87 u_long keyid; variable 233 keyid = strtoul(p+1,&p,0); in main() 234 if (keyid > 255 || *p != '\0') in main() 366 NA0.au.a_md5.md5_keyid = (int8_t)keyid; in query_loop()
|
/dragonfly/crypto/openssh/ |
H A D | monitor.c | 615 u_int keyid, compat; in mm_answer_sign() local 620 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || in mm_answer_sign() 625 if (keyid > INT_MAX) in mm_answer_sign() 646 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) in mm_answer_sign() 647 fatal_f("no hostkey for index %d", keyid); in mm_answer_sign() 670 if ((key = get_hostkey_by_index(keyid)) != NULL) { in mm_answer_sign() 674 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && in mm_answer_sign() 680 fatal_f("no hostkey from index %d", keyid); in mm_answer_sign()
|
/dragonfly/sys/netproto/802_11/wlan_ccmp/ |
H A D | ieee80211_crypto_ccmp.c | 150 uint8_t keyid; in ccmp_setiv() local 152 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; in ccmp_setiv() 158 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */ in ccmp_setiv()
|