Home
last modified time | relevance | path

Searched refs:keyid (Results 1 – 25 of 45) sorted by relevance

12

/openbsd/usr.sbin/ospfd/
H A Dauth.c77 ospf_hdr->auth_key.crypt.keyid)) == NULL) { in auth_validate()
79 "interface %s", ospf_hdr->auth_key.crypt.keyid, in auth_validate()
175 crypt.keyid = iface->auth_keyid; in auth_gen()
213 md_list_add(struct auth_md_head *head, u_int8_t keyid, char *key) in md_list_add() argument
217 if ((md = md_list_find(head, keyid)) != NULL) { in md_list_add()
226 md->keyid = keyid; in md_list_add()
242 md->keyid = m->keyid; in md_list_copy()
260 md_list_find(struct auth_md_head *head, u_int8_t keyid) in md_list_find() argument
265 if (m->keyid == keyid) in md_list_find()
/openbsd/lib/libcrypto/x509/
H A Dx509_akey.c102 if (akeyid->keyid != NULL) { in STACK_OF()
103 if ((tmpstr = hex_to_string(akeyid->keyid->data, in STACK_OF()
104 akeyid->keyid->length)) == NULL) in STACK_OF()
152 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
167 keyid = 1; in v2i_AUTHORITY_KEYID()
169 keyid = 2; in v2i_AUTHORITY_KEYID()
190 if (keyid) { in v2i_AUTHORITY_KEYID()
194 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID()
225 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
H A Dx509_akeya.c70 .offset = offsetof(AUTHORITY_KEYID, keyid),
/openbsd/lib/libcrypto/asn1/
H A Dx_x509a.c99 .offset = offsetof(X509_CERT_AUX, keyid),
182 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1()
184 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1()
185 x->aux->keyid = NULL; in X509_keyid_set1()
190 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1()
192 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1()
210 if (!x->aux || !x->aux->keyid) in X509_keyid_get0()
213 *len = x->aux->keyid->length; in X509_keyid_get0()
214 return x->aux->keyid->data; in X509_keyid_get0()
H A Dt_x509a.c111 if (aux->keyid) { in X509_CERT_AUX_print()
113 for (i = 0; i < aux->keyid->length; i++) in X509_CERT_AUX_print()
115 aux->keyid->data[i]); in X509_CERT_AUX_print()
/openbsd/usr.sbin/ripd/
H A Dauth.c46 MD5Update(&md5ctx, (void *)&md->keyid, sizeof(md->keyid)); in auth_calc_modulator()
272 md_list_add(struct auth_md_head *head, u_int8_t keyid, char *key) in md_list_add() argument
279 if ((md = md_list_find(head, keyid)) != NULL) { in md_list_add()
289 md->keyid = keyid; in md_list_add()
308 md->keyid = m->keyid; in md_list_copy()
327 md_list_find(struct auth_md_head *head, u_int8_t keyid) in md_list_find() argument
332 if (m->keyid == keyid) in md_list_find()
H A Dprintconf.c121 printf("\tauth-md %d XXXXXX\n", m->keyid); in print_iface()
/openbsd/regress/usr.bin/ssh/
H A Dkrl.sh57 touch $OBJ/revoked-keyid
61 echo "id: revoked $n" >> $OBJ/revoked-keyid
131 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
136 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
137 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
141 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
189 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
193 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG"
211 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \
212 $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
/openbsd/lib/libcrypto/pkcs12/
H A Dp12_crt.c94 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create() local
116 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create()
124 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create()
153 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create()
195 unsigned char *keyid; in PKCS12_add_cert() local
209 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert()
211 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_add_cert()
/openbsd/lib/libcrypto/cms/
H A Dcms_kari.c101 ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument
115 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
116 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
127 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
128 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id()
162 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, in CMS_RecipientEncryptedKey_get0_id() argument
172 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
173 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id()
179 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
180 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
H A Dcms_lib.c723 cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in cms_keyid_cert_cmp() argument
730 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in cms_keyid_cert_cmp()
760 ASN1_OCTET_STRING *keyid = NULL; in cms_set1_keyid() local
768 keyid = ASN1_STRING_dup(cert_keyid); in cms_set1_keyid()
769 if (!keyid) { in cms_set1_keyid()
774 *pkeyid = keyid; in cms_set1_keyid()
H A Dcms.h217 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno);
268 int CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid,
333 X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid,
339 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm,
H A Dcms_sd.c232 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) in cms_SignerIdentifier_get0_signer_id() argument
240 if (keyid) in cms_SignerIdentifier_get0_signer_id()
241 *keyid = sid->d.subjectKeyIdentifier; in cms_SignerIdentifier_get0_signer_id()
585 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, in CMS_SignerInfo_get0_signer_id() argument
588 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); in CMS_SignerInfo_get0_signer_id()
/openbsd/lib/libc/thread/
H A Drthread_tls.c88 if (rs->keyid == key) in pthread_key_delete()
112 if (rs->keyid == key) in _rthread_findstorage()
119 rs->keyid = key; in _rthread_findstorage()
173 if (rkeys[rs->keyid].destructor) { in _rthread_tls_destructors()
175 rkeys[rs->keyid].destructor; in _rthread_tls_destructors()
/openbsd/regress/lib/libcrypto/CA/
H A Dintermediate.cnf88 authorityKeyIdentifier = keyid:always,issuer
95 authorityKeyIdentifier = keyid:always,issuer
105 authorityKeyIdentifier = keyid,issuer
119 authorityKeyIdentifier = keyid,issuer:always
125 authorityKeyIdentifier=keyid:always
131 authorityKeyIdentifier = keyid,issuer
H A Droot.cnf88 authorityKeyIdentifier = keyid:always,issuer
95 authorityKeyIdentifier = keyid:always,issuer
121 authorityKeyIdentifier = keyid,issuer
131 authorityKeyIdentifier = keyid,issuer:always
137 authorityKeyIdentifier=keyid:always
143 authorityKeyIdentifier = keyid,issuer
/openbsd/usr.bin/ssh/
H A Dssh-pkcs11.c66 char *keyid; member
201 free(k11->keyid); in pkcs11_k11_free()
373 key_filter[1].pValue = k11->keyid; in pkcs11_get_key()
1335 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key()
1347 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key()
1465 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_ecdsa_generate_private_key()
1477 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_ecdsa_generate_private_key()
1792 FILL_ATTR(attrs, nattrs, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_destroy_keypair()
1798 keyid); in pkcs11_destroy_keypair()
1808 FILL_ATTR(attrs, nattrs, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_destroy_keypair()
[all …]
H A Dmonitor.c551 u_int keyid, compat; in mm_answer_sign() local
556 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || in mm_answer_sign()
561 if (keyid > INT_MAX) in mm_answer_sign()
582 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) in mm_answer_sign()
583 fatal_f("no hostkey for index %d", keyid); in mm_answer_sign()
606 if ((key = get_hostkey_by_index(keyid)) != NULL) { in mm_answer_sign()
610 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && in mm_answer_sign()
616 fatal_f("no hostkey from index %d", keyid); in mm_answer_sign()
/openbsd/regress/lib/libssl/certs/
H A Dmake-certs.sh64 authorityKeyIdentifier = keyid:always,issuer
70 authorityKeyIdentifier = keyid:always,issuer
76 authorityKeyIdentifier = keyid:always,issuer
/openbsd/lib/libssl/test/
H A DCAtsa.cnf89 authorityKeyIdentifier=keyid,issuer:always
103 authorityKeyIdentifier=keyid,issuer:always
116 authorityKeyIdentifier=keyid:always,issuer:always
H A DUss.cnf32 authorityKeyIdentifier=keyid,issuer:always
H A DP1ss.cnf36 authorityKeyIdentifier=keyid,issuer:always
H A DP2ss.cnf39 authorityKeyIdentifier=keyid,issuer:always
/openbsd/etc/examples/
H A Dripd.conf10 auth-md-keyid 1
/openbsd/regress/lib/libcrypto/certs/
H A Dmake-certs.sh64 authorityKeyIdentifier = keyid:always,issuer
70 authorityKeyIdentifier = keyid:always,issuer
76 authorityKeyIdentifier = keyid:always,issuer

12