/openbsd/usr.sbin/ospfd/ |
H A D | auth.c | 77 ospf_hdr->auth_key.crypt.keyid)) == NULL) { in auth_validate() 79 "interface %s", ospf_hdr->auth_key.crypt.keyid, in auth_validate() 175 crypt.keyid = iface->auth_keyid; in auth_gen() 213 md_list_add(struct auth_md_head *head, u_int8_t keyid, char *key) in md_list_add() argument 217 if ((md = md_list_find(head, keyid)) != NULL) { in md_list_add() 226 md->keyid = keyid; in md_list_add() 242 md->keyid = m->keyid; in md_list_copy() 260 md_list_find(struct auth_md_head *head, u_int8_t keyid) in md_list_find() argument 265 if (m->keyid == keyid) in md_list_find()
|
/openbsd/lib/libcrypto/x509/ |
H A D | x509_akey.c | 102 if (akeyid->keyid != NULL) { in STACK_OF() 103 if ((tmpstr = hex_to_string(akeyid->keyid->data, in STACK_OF() 104 akeyid->keyid->length)) == NULL) in STACK_OF() 152 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 167 keyid = 1; in v2i_AUTHORITY_KEYID() 169 keyid = 2; in v2i_AUTHORITY_KEYID() 190 if (keyid) { in v2i_AUTHORITY_KEYID() 194 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID() 225 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
H A D | x509_akeya.c | 70 .offset = offsetof(AUTHORITY_KEYID, keyid),
|
/openbsd/lib/libcrypto/asn1/ |
H A D | x_x509a.c | 99 .offset = offsetof(X509_CERT_AUX, keyid), 182 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 184 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 185 x->aux->keyid = NULL; in X509_keyid_set1() 190 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1() 192 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 210 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 213 *len = x->aux->keyid->length; in X509_keyid_get0() 214 return x->aux->keyid->data; in X509_keyid_get0()
|
H A D | t_x509a.c | 111 if (aux->keyid) { in X509_CERT_AUX_print() 113 for (i = 0; i < aux->keyid->length; i++) in X509_CERT_AUX_print() 115 aux->keyid->data[i]); in X509_CERT_AUX_print()
|
/openbsd/usr.sbin/ripd/ |
H A D | auth.c | 46 MD5Update(&md5ctx, (void *)&md->keyid, sizeof(md->keyid)); in auth_calc_modulator() 272 md_list_add(struct auth_md_head *head, u_int8_t keyid, char *key) in md_list_add() argument 279 if ((md = md_list_find(head, keyid)) != NULL) { in md_list_add() 289 md->keyid = keyid; in md_list_add() 308 md->keyid = m->keyid; in md_list_copy() 327 md_list_find(struct auth_md_head *head, u_int8_t keyid) in md_list_find() argument 332 if (m->keyid == keyid) in md_list_find()
|
H A D | printconf.c | 121 printf("\tauth-md %d XXXXXX\n", m->keyid); in print_iface()
|
/openbsd/regress/usr.bin/ssh/ |
H A D | krl.sh | 57 touch $OBJ/revoked-keyid 61 echo "id: revoked $n" >> $OBJ/revoked-keyid 131 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 136 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \ 137 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed" 141 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \ 189 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 193 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG" 211 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \ 212 $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
|
/openbsd/lib/libcrypto/pkcs12/ |
H A D | p12_crt.c | 94 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create() local 116 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create() 124 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 153 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 195 unsigned char *keyid; in PKCS12_add_cert() local 209 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert() 211 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_add_cert()
|
/openbsd/lib/libcrypto/cms/ |
H A D | cms_kari.c | 101 ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument 115 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 116 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 127 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 128 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 162 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, in CMS_RecipientEncryptedKey_get0_id() argument 172 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 173 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 179 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 180 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
|
H A D | cms_lib.c | 723 cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in cms_keyid_cert_cmp() argument 730 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in cms_keyid_cert_cmp() 760 ASN1_OCTET_STRING *keyid = NULL; in cms_set1_keyid() local 768 keyid = ASN1_STRING_dup(cert_keyid); in cms_set1_keyid() 769 if (!keyid) { in cms_set1_keyid() 774 *pkeyid = keyid; in cms_set1_keyid()
|
H A D | cms.h | 217 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno); 268 int CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, 333 X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, 339 ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm,
|
H A D | cms_sd.c | 232 ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) in cms_SignerIdentifier_get0_signer_id() argument 240 if (keyid) in cms_SignerIdentifier_get0_signer_id() 241 *keyid = sid->d.subjectKeyIdentifier; in cms_SignerIdentifier_get0_signer_id() 585 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, in CMS_SignerInfo_get0_signer_id() argument 588 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); in CMS_SignerInfo_get0_signer_id()
|
/openbsd/lib/libc/thread/ |
H A D | rthread_tls.c | 88 if (rs->keyid == key) in pthread_key_delete() 112 if (rs->keyid == key) in _rthread_findstorage() 119 rs->keyid = key; in _rthread_findstorage() 173 if (rkeys[rs->keyid].destructor) { in _rthread_tls_destructors() 175 rkeys[rs->keyid].destructor; in _rthread_tls_destructors()
|
/openbsd/regress/lib/libcrypto/CA/ |
H A D | intermediate.cnf | 88 authorityKeyIdentifier = keyid:always,issuer 95 authorityKeyIdentifier = keyid:always,issuer 105 authorityKeyIdentifier = keyid,issuer 119 authorityKeyIdentifier = keyid,issuer:always 125 authorityKeyIdentifier=keyid:always 131 authorityKeyIdentifier = keyid,issuer
|
H A D | root.cnf | 88 authorityKeyIdentifier = keyid:always,issuer 95 authorityKeyIdentifier = keyid:always,issuer 121 authorityKeyIdentifier = keyid,issuer 131 authorityKeyIdentifier = keyid,issuer:always 137 authorityKeyIdentifier=keyid:always 143 authorityKeyIdentifier = keyid,issuer
|
/openbsd/usr.bin/ssh/ |
H A D | ssh-pkcs11.c | 66 char *keyid; member 201 free(k11->keyid); in pkcs11_k11_free() 373 key_filter[1].pValue = k11->keyid; in pkcs11_get_key() 1335 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key() 1347 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key() 1465 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_ecdsa_generate_private_key() 1477 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_ecdsa_generate_private_key() 1792 FILL_ATTR(attrs, nattrs, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_destroy_keypair() 1798 keyid); in pkcs11_destroy_keypair() 1808 FILL_ATTR(attrs, nattrs, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_destroy_keypair() [all …]
|
H A D | monitor.c | 551 u_int keyid, compat; in mm_answer_sign() local 556 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || in mm_answer_sign() 561 if (keyid > INT_MAX) in mm_answer_sign() 582 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) in mm_answer_sign() 583 fatal_f("no hostkey for index %d", keyid); in mm_answer_sign() 606 if ((key = get_hostkey_by_index(keyid)) != NULL) { in mm_answer_sign() 610 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && in mm_answer_sign() 616 fatal_f("no hostkey from index %d", keyid); in mm_answer_sign()
|
/openbsd/regress/lib/libssl/certs/ |
H A D | make-certs.sh | 64 authorityKeyIdentifier = keyid:always,issuer 70 authorityKeyIdentifier = keyid:always,issuer 76 authorityKeyIdentifier = keyid:always,issuer
|
/openbsd/lib/libssl/test/ |
H A D | CAtsa.cnf | 89 authorityKeyIdentifier=keyid,issuer:always 103 authorityKeyIdentifier=keyid,issuer:always 116 authorityKeyIdentifier=keyid:always,issuer:always
|
H A D | Uss.cnf | 32 authorityKeyIdentifier=keyid,issuer:always
|
H A D | P1ss.cnf | 36 authorityKeyIdentifier=keyid,issuer:always
|
H A D | P2ss.cnf | 39 authorityKeyIdentifier=keyid,issuer:always
|
/openbsd/etc/examples/ |
H A D | ripd.conf | 10 auth-md-keyid 1
|
/openbsd/regress/lib/libcrypto/certs/ |
H A D | make-certs.sh | 64 authorityKeyIdentifier = keyid:always,issuer 70 authorityKeyIdentifier = keyid:always,issuer 76 authorityKeyIdentifier = keyid:always,issuer
|