| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_crt.c | 40 unsigned char keyid[EVP_MAX_MD_SIZE]; local 65 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) 73 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 102 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 140 unsigned char *keyid; local 156 keyid = X509_keyid_get0(cert, &keyidlen); 158 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| v3_akey.c | 45 if (akeyid->keyid) { 46 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); 51 if (!X509V3_add_value("keyid", tmp, &extlist)) { 88 * keyid: use the issuers subject keyid, the value 'always' means its is 91 * to only use this if keyid is not present. With the option 'always' 99 char keyid = 0, issuer = 0; local 113 if (strcmp(cnf->name, "keyid") == 0) { 114 keyid = 1 [all...] |
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 29 uint16_t keyid; member in struct:dns_rdata_rrsig
|
| sig_24.h | 30 uint16_t keyid; member in struct:dns_rdata_sig_t
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 30 uint16_t keyid; member in struct:dns_rdata_rrsig
|
| sig_24.h | 31 uint16_t keyid; member in struct:dns_rdata_sig_t
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| v3_akid.c | 46 if (akeyid->keyid) { 47 tmp = i2s_ASN1_OCTET_STRING(NULL, akeyid->keyid); 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, 88 * Three explicit tags may be given, where 'keyid' and 'issuer' may be combined: 90 * 'keyid': use the issuer's subject keyid; the option 'always' means its is 93 * to only use this if 'keyid' is not present. With the option 'always' 100 char keyid = 0, issuer = 0; local 127 if (strcmp(cnf->name, "keyid") == 0 && keyid == 0) [all...] |
| t_x509.c | 320 const unsigned char *alias, *keyid; local 360 keyid = X509_keyid_get0(x, &keyidlen); 361 if (keyid) { 364 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_crt.c | 21 unsigned char *keyid, 47 unsigned char keyid[EVP_MAX_MD_SIZE]; local 71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) 79 pkeyid = keyid; 115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 160 unsigned char *keyid, 172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 189 unsigned char *keyid = NULL; local 196 keyid = X509_keyid_get0(cert, &keyidlen) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| v3_akid.c | 46 if (akeyid->keyid) { 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, 89 * keyid: use the issuers subject keyid, the value 'always' means its is 92 * to only use this if keyid is not present. With the option 'always' 100 char keyid = 0, issuer = 0; local 122 if (strcmp(cnf->name, "keyid") == 0) { 123 keyid = 1 [all...] |
| t_x509.c | 344 const unsigned char *alias, *keyid; local 384 keyid = X509_keyid_get0(x, &keyidlen); 385 if (keyid) { 388 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
|
| /src/lib/libtelnet/ |
| encrypt.h | 89 int (*keyid)(int, unsigned char *, int *); member in struct:__anon553
|
| /src/crypto/external/apache2/openssl/dist/apps/lib/ |
| engine_loader.c | 30 * org.openssl.engine:{engineid}:{keyid} 40 char *keyid; member in struct:ossl_store_loader_ctx_st 45 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) 51 ctx->keyid = keyid; 60 OPENSSL_free(ctx->keyid); 72 char *keyid = NULL; local 90 keyid = OPENSSL_strdup(q + 1); 93 if (e != NULL && keyid != NULL) 94 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_crt.c | 23 unsigned char *keyid, 46 unsigned char keyid[EVP_MAX_MD_SIZE]; local 70 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) 78 pkeyid = keyid; 131 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 193 unsigned char *keyid, 205 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 222 unsigned char *keyid = NULL; local 229 keyid = X509_keyid_get0(cert, &keyidlen) [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/lib/ |
| engine_loader.c | 29 * org.openssl.engine:{engineid}:{keyid} 39 char *keyid; member in struct:ossl_store_loader_ctx_st 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) 50 ctx->keyid = keyid; 59 OPENSSL_free(ctx->keyid); 71 char *keyid = NULL; local 91 keyid = OPENSSL_strdup(q + 1); 94 if (e != NULL && keyid != NULL) 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| tsigconf.c | 41 const char *keyid = NULL; local 62 keyid = cfg_obj_asstring(cfg_map_getname(key)); 74 isc_buffer_constinit(&keynamesrc, keyid, strlen(keyid)); 75 isc_buffer_add(&keynamesrc, strlen(keyid)); 93 keyid, algstr); 135 "configuring key '%s': %s", keyid, isc_result_totext(ret));
|
| /src/sys/net80211/ |
| ieee80211_crypto.c | 545 u_int8_t keyid, *hdr; local 565 keyid = ic->ic_def_txkey; 568 keyid = 0; 589 return (cip->ic_encap(k, m, keyid<<6) ? k : NULL); 609 u_int8_t keyid; local 632 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid); 635 k = &ic->ic_nw_keys[keyid >> 6];
|
| /src/external/bsd/ntp/dist/libntp/ |
| authreadkeys.c | 93 keyid_t keyid; /* stored key ID */ member in struct:keydata 287 next->keyid = keyno; 392 MD5auth_setkey(next->keyid, next->keytype,
|
| /src/external/mpl/bind/dist/lib/dns/ |
| private.c | 368 dns_keytag_t keyid = (private->data[2] | private->data[1] << 8); local 385 snprintf(keybuf, sizeof(keybuf), "key %d/%s", keyid, algbuf);
|
| /src/external/mpl/bind/dist/tests/dns/ |
| private_test.c | 68 dns_keytag_t keyid; member in struct:__anon24212 89 buf[1] = (testcase->keyid & 0xff00) >> 8; 90 buf[2] = (testcase->keyid & 0xff);
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| private.c | 392 dns_keytag_t keyid = (private->data[2] | private->data[1] << 8); local 409 snprintf(keybuf, sizeof(keybuf), "key %d/%s", keyid, algbuf);
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| create.c | 1012 hexdump(stderr, "Encrypting for keyid", id, sizeof(sesskey->key_id)); 1297 uint8_t keyid[PGP_KEY_ID_SIZE]; local 1299 pgp_keyid(keyid, PGP_KEY_ID_SIZE, &seckey->pubkey, PGP_HASH_SHA1); /* XXX - hardcoded */ 1306 pgp_write(output, keyid, 8) &&
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_lib.c | 675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) 681 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); 705 ASN1_OCTET_STRING *keyid = NULL; local 712 keyid = ASN1_STRING_dup(cert_keyid); 713 if (!keyid) { 718 *pkeyid = keyid;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_lib.c | 543 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) 549 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); 573 ASN1_OCTET_STRING *keyid = NULL; local 580 keyid = ASN1_STRING_dup(cert_keyid); 581 if (!keyid) { 586 *pkeyid = keyid;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| t_x509.c | 331 const unsigned char *alias, *keyid; local 371 keyid = X509_keyid_get0(x, &keyidlen); 372 if (keyid) { 375 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
|