Searched defs:keyid (Results 1 - 20 of 20) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dencrypt.h88 int (*keyid)(int, unsigned char *, int *); member in struct:__anon144
H A Denc_des.c92 int keyid[2]; /* keyid for each direction */ member in struct:_fb
386 * We only accept a keyid of 0. If we get a keyid of
H A Dencrypt.c164 uchar_t keyid[MAXKEYLEN]; member in struct:key_info
728 encrypt_enc_keyid(uchar_t *keyid, int len) argument
730 encrypt_keyid(&ki[KI_DECRYPT], keyid, len);
734 encrypt_dec_keyid(uchar_t *keyid, int len) argument
736 encrypt_keyid(&ki[KI_ENCRYPT], keyid, len);
740 encrypt_keyid(struct key_info *kp, uchar_t *keyid, int len) argument
757 if (ep->keyid)
758 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen);
761 (memcmp(keyid, k
781 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, int saveit) argument
[all...]
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto_none.c91 none_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument
98 "key id %u is not set (encap)\n", keyid >> 6);
H A Dnet80211_crypto.c414 uint8_t keyid; local
430 keyid = ivp[IEEE80211_WEP_IVLEN];
431 k = &ic->ic_nw_keys[keyid >> 6];
H A Dnet80211_crypto_ccmp.c119 ccmp_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument
136 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
H A Dnet80211_crypto_wep.c52 static int wep_encap(struct ieee80211_key *, mblk_t *, uint8_t keyid);
126 wep_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument
166 ivp[IEEE80211_WEP_IVLEN] = keyid;
H A Dnet80211_crypto_tkip.c137 tkip_encap(struct ieee80211_key *k, mblk_t *mp, uint8_t keyid) argument
160 ivp[3] = keyid | IEEE80211_WEP_EXTIV; /* KeyID | ExtID */
/illumos-gate/usr/src/common/net/wanboot/
H A Dp12auxpars.c166 * keyid - If private key localkeyids friendlynames are to match a
169 * keyid_len- Length of the keyid byte string.
177 * Match based on the value of 'matchty' and the contents of 'keyid'
185 * 'keyid'.
208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, argument
264 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len,
295 * keyid - If private key localkeyids friendlynames are to match a
298 * keyid_len- Length of the keyid byte string.
319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, argument
355 if (keyid
646 ASN1_TYPE *keyid = NULL; local
[all...]
H A Dp12misc.c248 * keyid_len- Length of the keyid byte string.
252 * Note that setting a keyid into a cert which will not be written out as
267 ASN1_TYPE *keyid = NULL; local
282 (keyid = ASN1_TYPE_new()) == NULL) {
287 ASN1_TYPE_set(keyid, V_ASN1_OCTET_STRING, str);
290 attr = type2attrib(keyid, NID_localKeyID);
297 keyid = NULL;
322 if (keyid != NULL)
323 ASN1_TYPE_free(keyid);
343 * >= 0 - The number of characters in the keyid returne
[all...]
/illumos-gate/usr/src/uts/common/sys/usb/clients/usbkbm/
H A Dusbkbm.h110 uint8_t keyid; /* report id of keyboard input */ member in struct:usbkbm_report_format
/illumos-gate/usr/src/lib/libpkg/common/
H A Dp12lib.c234 * keyid - If private key localkeyids friendlynames are to match a
237 * keyid_len- Length of the keyid byte string.
245 * Match based on the value of 'matchty' and the contents of 'keyid'
253 * 'keyid'.
276 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid,
332 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len,
694 if (cert->aux != NULL && cert->aux->keyid != NULL &&
695 cert->aux->keyid->type == V_ASN1_OCTET_STRING) {
696 str = cert->aux->keyid->data;
697 len = cert->aux->keyid
964 ASN1_TYPE *keyid = NULL; local
1541 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
1804 ASN1_TYPE *keyid = NULL; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/
H A Drtquery.c95 static ulong_t keyid; variable
262 keyid = strtoul(p+1, &p, 0);
263 if (keyid > 255 || *p != '\0' ||
399 NA0.au.a_md5.md5_keyid = (int8_t)keyid;
H A Ddefs.h357 uint8_t keyid; member in struct:interface::auth
/illumos-gate/usr/src/uts/common/io/kbtrans/
H A Dkbtrans_streams.c1614 * Here keyid is the keycode of UPARROW, LEFTARROW, or RIGHTARROW
1616 * otherwise it indicates a function key and keyid is the number
1620 kbtrans_vt_compose(struct kbtrans *upper, unsigned short keyid, argument
1630 switch (keyid) {
1645 *bufp++ = keyid +
1677 unsigned short keyid; local
1692 keyid = entry & 0xFF;
1693 if (keyid == ALT) {
1695 } else if (keyid == ALTGRAPH) {
1713 * keyid i
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dtpm_specific.c1045 char *keyid, TSS_UUID *uuid, TSS_HKEY hParent,
1051 find_uuid(keyid, uuid)) {
1258 char *keyid; local
1265 keyid = TPMTOK_PUBLIC_LEAF_KEY_ID;
1270 keyid = TPMTOK_PRIVATE_LEAF_KEY_ID;
1299 ret = add_uuid(keyid, &newuuid);
1044 tss_find_and_load_key(TSS_HCONTEXT hContext, char *keyid, TSS_UUID *uuid, TSS_HKEY hParent, BYTE *hash, TSS_HKEY *hKey) argument
/illumos-gate/usr/src/head/arpa/
H A Dtelnet.h412 unsigned char keyid[TELNET_MAXNUMKEYS]; member in struct:__anon2241
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dntp.h303 uint32_t keyid; member in struct:ntpdata
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c1029 (void) memcpy(p, encr_data.decrypt.keyid, encr_data.decrypt.keyidlen);
1371 (void) memcpy(p, encr_data.encrypt.keyid, encr_data.encrypt.keyidlen);
1384 (int)encr_data.encrypt.keyid[0],
1784 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, boolean_t saveit) argument
1798 "\t(send_keyid) store %d byte %s keyid\n",
1804 (void) memcpy(encr_data.encrypt.keyid, keyid, keylen);
1807 (void) memcpy(encr_data.decrypt.keyid, keyid, keylen);
1811 (void) memcpy(p, keyid, keyle
1911 encrypt_set_keyid_state(uchar_t *keyid, int *keyidlen, int dir) argument
1967 encrypt_keyid(uchar_t *newkeyid, int *keyidlen, uchar_t *keyid, int len, int dir) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c3036 uchar_t *keyid, unsigned int keyidlen)
3053 if (keyidlen > 0 && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) {
3079 uchar_t *keyid, unsigned int keyidlen,
3104 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
3358 unsigned char keyid[EVP_MAX_MD_SIZE]; local
3381 keyid, &keyidlen);
3383 keyid, keyidlen,
3403 cert_authsafe = add_cert_to_safe(xcert, cred, keyid,
3803 ASN1_TYPE *keyid = NULL; local
3807 keyid
3035 add_cert_to_safe(X509 *sslcert, KMF_CREDENTIAL *cred, uchar_t *keyid, unsigned int keyidlen) argument
3078 add_key_to_safe(EVP_PKEY *pkey, KMF_CREDENTIAL *cred, uchar_t *keyid, unsigned int keyidlen, char *label, int label_len) argument
[all...]

Completed in 127 milliseconds