Home
last modified time | relevance | path

Searched refs:keyid (Results 1 – 25 of 42) sorted by relevance

12

/dragonfly/lib/libtelnet/
H A Dencrypt.c163 unsigned char keyid[MAXKEYLEN]; member
726 if (ep->keyid) in encrypt_keyid()
727 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
730 (memcmp(keyid, kp->keyid, len) != 0)) { in encrypt_keyid()
735 memmove(kp->keyid, keyid, len); in encrypt_keyid()
736 if (ep->keyid) in encrypt_keyid()
737 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
739 if (ep->keyid) in encrypt_keyid()
740 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
758 memmove(kp->keyid, keyid, keylen); in encrypt_send_keyid()
[all …]
H A Dencrypt.h91 int (*keyid)(int, unsigned char *, int *); member
/dragonfly/crypto/libressl/crypto/asn1/
H A Dx_x509a.c99 .offset = offsetof(X509_CERT_AUX, keyid),
181 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1()
183 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1()
184 x->aux->keyid = NULL; in X509_keyid_set1()
189 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1()
191 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1()
207 if (!x->aux || !x->aux->keyid) in X509_keyid_get0()
210 *len = x->aux->keyid->length; in X509_keyid_get0()
211 return x->aux->keyid->data; in X509_keyid_get0()
H A Dt_x509a.c111 if (aux->keyid) { in X509_CERT_AUX_print()
113 for (i = 0; i < aux->keyid->length; i++) in X509_CERT_AUX_print()
115 aux->keyid->data[i]); in X509_CERT_AUX_print()
/dragonfly/crypto/libressl/crypto/x509/
H A Dx509_akey.c102 if (akeyid->keyid != NULL) { in STACK_OF()
103 if ((tmpstr = hex_to_string(akeyid->keyid->data, in STACK_OF()
104 akeyid->keyid->length)) == NULL) in STACK_OF()
152 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
167 keyid = 1; in v2i_AUTHORITY_KEYID()
169 keyid = 2; in v2i_AUTHORITY_KEYID()
190 if (keyid) { in v2i_AUTHORITY_KEYID()
194 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID()
225 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
H A Dx509_akeya.c70 .offset = offsetof(AUTHORITY_KEYID, keyid),
/dragonfly/crypto/libressl/crypto/pkcs12/
H A Dp12_crt.c94 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create() local
116 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); in PKCS12_create()
123 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create()
152 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create()
193 unsigned char *keyid; in PKCS12_add_cert() local
207 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert()
209 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_add_cert()
/dragonfly/crypto/libressl/crypto/cms/
H A Dcms_kari.c99 ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument
113 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
114 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
125 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
126 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id()
158 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, in CMS_RecipientEncryptedKey_get0_id() argument
168 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
169 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id()
175 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
176 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
H A Dcms_lib.c667 cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in cms_keyid_cert_cmp() argument
674 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in cms_keyid_cert_cmp()
704 ASN1_OCTET_STRING *keyid = NULL; in cms_set1_keyid() local
712 keyid = ASN1_STRING_dup(cert_keyid); in cms_set1_keyid()
713 if (!keyid) { in cms_set1_keyid()
718 *pkeyid = keyid; in cms_set1_keyid()
H A Dcms_sd.c227 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) in cms_SignerIdentifier_get0_signer_id() argument
235 if (keyid) in cms_SignerIdentifier_get0_signer_id()
236 *keyid = sid->d.subjectKeyIdentifier; in cms_SignerIdentifier_get0_signer_id()
521 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, in CMS_SignerInfo_get0_signer_id() argument
524 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); in CMS_SignerInfo_get0_signer_id()
H A Dcms_lcl.h430 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno);
441 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert);
/dragonfly/usr.sbin/dntpd/
H A Dntpreq.c78 msg->keyid = ntohl(msg->keyid); in ntp_ntoh()
91 msg->keyid = htonl(msg->keyid); in ntp_hton()
H A Dntp.h114 u_int32_t keyid; member
/dragonfly/sys/netproto/802_11/wlan/
H A Dieee80211_crypto_none.c106 uint8_t keyid; in none_encap() local
108 keyid = ieee80211_crypto_get_keyid(vap, k); in none_encap()
115 "key id %u is not set (encap)", keyid); in none_encap()
H A Dieee80211_crypto.c595 uint8_t keyid; in ieee80211_crypto_decap() local
613 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid); in ieee80211_crypto_decap()
616 k = &vap->iv_nw_keys[keyid >> 6]; in ieee80211_crypto_decap()
/dragonfly/sys/sys/
H A Ddmsg.h614 uint64_t keyid; member
622 uint64_t keyid; member
632 uint64_t keyid; member
642 uint64_t keyid; member
652 uint64_t keyid; member
/dragonfly/sys/dev/disk/xdisk/
H A Dxdisk.c114 uint64_t keyid; member
909 msg->any.blk_read.keyid = sc->keyid; in xa_start()
918 msg->any.blk_write.keyid = sc->keyid; in xa_start()
929 msg->any.blk_flush.keyid = sc->keyid; in xa_start()
938 msg->any.blk_freeblks.keyid = sc->keyid; in xa_start()
/dragonfly/contrib/file/magic/Magdir/
H A Dpgp107 >3 belong x keyid: %08X
124 >4 belong x keyid: %08X
141 >4 belong x keyid: %08X
158 >4 belong x keyid: %08X
175 >4 belong x keyid: %08X
192 >4 belong x keyid: %08X
207 >4 belong x keyid: %08X
222 >4 belong x keyid: %08X
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dap_config.c281 const char *keyid; in hostapd_config_read_wpa_psk() local
319 keyid = NULL; in hostapd_config_read_wpa_psk()
331 keyid = value; in hostapd_config_read_wpa_psk()
393 if (keyid) { in hostapd_config_read_wpa_psk()
394 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid)); in hostapd_config_read_wpa_psk()
395 if ((size_t) len >= sizeof(psk->keyid)) { in hostapd_config_read_wpa_psk()
H A Dsta_info.c1211 if (!psk || !psk->keyid[0]) in ap_sta_wpa_get_keyid()
1214 return psk->keyid; in ap_sta_wpa_get_keyid()
1256 const char *keyid; in ap_sta_set_authorized() local
1271 keyid = ap_sta_wpa_get_keyid(hapd, sta); in ap_sta_set_authorized()
1272 if (keyid) { in ap_sta_set_authorized()
1274 " keyid=%s", keyid); in ap_sta_set_authorized()
/dragonfly/crypto/libressl/include/openssl/
H A Dcms.h213 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno);
264 int CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid,
331 X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid,
337 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm,
/dragonfly/sys/netproto/802_11/wlan_wep/
H A Dieee80211_crypto_wep.c134 uint8_t keyid; in wep_setiv() local
136 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; in wep_setiv()
178 ivp[3] = keyid; in wep_setiv()
/dragonfly/sbin/routed/rtquery/
H A Drtquery.c87 u_long keyid; variable
233 keyid = strtoul(p+1,&p,0); in main()
234 if (keyid > 255 || *p != '\0') in main()
366 NA0.au.a_md5.md5_keyid = (int8_t)keyid; in query_loop()
/dragonfly/crypto/openssh/
H A Dmonitor.c615 u_int keyid, compat; in mm_answer_sign() local
620 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || in mm_answer_sign()
625 if (keyid > INT_MAX) in mm_answer_sign()
646 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) in mm_answer_sign()
647 fatal_f("no hostkey for index %d", keyid); in mm_answer_sign()
670 if ((key = get_hostkey_by_index(keyid)) != NULL) { in mm_answer_sign()
674 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && in mm_answer_sign()
680 fatal_f("no hostkey from index %d", keyid); in mm_answer_sign()
/dragonfly/sys/netproto/802_11/wlan_ccmp/
H A Dieee80211_crypto_ccmp.c150 uint8_t keyid; in ccmp_setiv() local
152 keyid = ieee80211_crypto_get_keyid(vap, k) << 6; in ccmp_setiv()
158 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */ in ccmp_setiv()

12