Searched refs:keyid (Results 1 - 25 of 57) sorted by relevance

123

/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tkey/ns1/
H A Dsetup.sh23 keyid=`echo $keyname | $PERL -p -e 's/^.*\+0*//;'`
25 perl -p -e "s/KEYID/$keyid/;" < named.conf.in > named.conf
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/rdata/generic/
H A Drrsig_46.h34 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
H A Dsig_24.h35 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
H A Drrsig_46.c375 RETERR(uint16_tobuffer(sig->keyid, target));
443 sig->keyid = uint16_fromregion(&sr);
H A Dsig_24.c406 RETERR(uint16_tobuffer(sig->keyid, target));
474 sig->keyid = uint16_fromregion(&sr);
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ns1/
H A Dsign.sh69 # Save keyid for managed key id test.
71 keyid=`expr $keyname : 'K.+001+\(.*\)'`
72 keyid=`expr $keyid + 0`
73 echo "$keyid" > managed.key.id
/macosx-10.9.5/ntp-88/libntp/
H A Dauthkeys.c26 keyid_t keyid; /* key identifier */ member in struct:savekey
37 * keyid. We make this fairly big for potentially busy servers.
41 #define KEYHASH(keyid) ((keyid) & HASHMASK)
98 if (keyno == sk->keyid)
122 if (keyno == sk->keyid)
153 if (keyno == sk->keyid) {
180 cache_keyid = sk->keyid;
228 if (keyno == sk->keyid)
292 sk->keyid
[all...]
/macosx-10.9.5/bind9-45.100/bind9/bin/named/
H A Dtsigconf.c46 const char *keyid = NULL; local
69 keyid = cfg_obj_asstring(cfg_map_getname(key));
81 isc_buffer_init(&keynamesrc, keyid, strlen(keyid));
82 isc_buffer_add(&keynamesrc, strlen(keyid));
97 keyid, algstr);
134 "configuring key '%s': %s", keyid,
H A Dcontrolconf.c713 controlkey_t *keyid, *next; local
722 for (keyid = ISC_LIST_HEAD(*keyids); keyid != NULL; keyid = next) {
723 next = ISC_LIST_NEXT(keyid, link);
725 result = cfgkeylist_find(keylist, keyid->keyname, &keydef);
730 keyid->keyname, socktext);
731 ISC_LIST_UNLINK(*keyids, keyid, link);
732 free_controlkey(keyid, mctx);
754 algstr, keyid
808 controlkey_t *keyid = NULL; local
[all...]
/macosx-10.9.5/libtelnet-13/
H A Dencrypt.c180 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
190 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len);
711 encrypt_enc_keyid(unsigned char *keyid, int len) argument
713 encrypt_keyid(&ki[1], keyid, len);
717 encrypt_dec_keyid(unsigned char *keyid, int len) argument
719 encrypt_keyid(&ki[0], keyid, len);
723 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
743 if (ep->keyid)
744 (void)(*ep->keyid)(dir, kp->keyid,
767 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h94 int (*keyid)(int, unsigned char *, int *); member in struct:__anon9730
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/
H A Dencrypt.c167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info
733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument
750 if (ep->keyid)
751 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
753 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) {
758 memcpy(kp->keyid,keyid, len);
759 if (ep->keyid)
772 encrypt_enc_keyid(unsigned char *keyid, int len) argument
777 encrypt_dec_keyid(unsigned char *keyid, int len) argument
783 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument
[all...]
H A Dencrypt.h87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon726
H A Denc_des.c85 int keyid[2]; member in struct:fb
92 char *keyid; member in struct:keyidlist
413 * We only accept a keyid of 0. If we get a keyid of
/macosx-10.9.5/OpenSSH-186/openssh/regress/
H A Dkrl.sh47 touch $OBJ/revoked-keyid
50 echo "id: revoked $n" >> $OBJ/revoked-keyid
100 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
104 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub $OBJ/revoked-keyid \
139 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
144 # keys all serial keyid certs CA
153 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid ; do
157 # keys all serial keyid cert
[all...]
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_x509crl.rb123 ["authorityKeyIdentifier", "keyid:always", false],
128 ["authorityKeyIdentifier", "keyid:always", false],
143 keyid = OpenSSL::TestUtils.get_subject_key_id(cert)
144 assert_match(/^keyid:#{keyid}/, exts[1].value)
159 keyid = OpenSSL::TestUtils.get_subject_key_id(cert)
160 assert_match(/^keyid:#{keyid}/, exts[1].value)
/macosx-10.9.5/ntp-88/scripts/monitoring/
H A Dntp.pl26 $keyid=0;
69 return ($keyid,$keyid = $id)[$[];
/macosx-10.9.5/apache-786.1/httpd/modules/generators/
H A Dmod_autoindex.c1250 request_rec *r, char keyid,
1281 p->key = apr_toupper(keyid);
1301 request_rec *r, char keyid,
1364 p->key = apr_toupper(keyid);
1406 if (keyid == K_LAST_MOD) {
1501 apr_int32_t autoindex_opts, char keyid,
1578 emit_link(r, "Name", K_NAME, keyid, direction,
1582 emit_link(r, "Last modified", K_LAST_MOD, keyid, direction,
1588 emit_link(r, "Size", K_SIZE, keyid, direction,
1594 emit_link(r, "Description", K_DESC, keyid, directio
1248 make_parent_entry(apr_int32_t autoindex_opts, autoindex_config_rec *d, request_rec *r, char keyid, char direction) argument
1298 make_autoindex_entry(const apr_finfo_t *dirent, int autoindex_opts, autoindex_config_rec *d, request_rec *r, char keyid, char direction, const char *pattern) argument
1499 output_directories(struct ent **ar, int n, autoindex_config_rec *d, request_rec *r, apr_int32_t autoindex_opts, char keyid, char direction, const char *colargs) argument
1999 char keyid; local
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dssh-pkcs11.c69 char *keyid; member in struct:pkcs11_key
183 if (k11->keyid)
184 xfree(k11->keyid);
276 key_filter[1].pValue = k11->keyid;
317 k11->keyid = xmalloc(k11->keyid_len);
318 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
/macosx-10.9.5/ntp-88/include/
H A Dntp_request.h97 * The version number, mode and keyid have the same function and are
102 * it is required that a request be authenticated, the keyid should be
138 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt
148 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt_tail
155 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid))
279 #define REQ_REQUEST_KEY 32 /* define a new request keyid */
280 #define REQ_CONTROL_KEY 33 /* define a new control keyid */
383 keyid_t keyid; /* peer.keyid */ member in struct:info_peer
581 keyid_t keyid; /* ke member in struct:old_conf_peer
593 keyid_t keyid; /* key to use for this association */ member in struct:conf_peer
[all...]
/macosx-10.9.5/ntp-88/ntpd/
H A Dntp_intres.c100 #define ce_keyid ce_config.keyid
177 keyid_t req_keyid; /* request keyid */
212 keyid_t keyid; member in struct:ntp_res_c_pkt
278 msyslog(LOG_ERR, "invalid request keyid %08x",
495 keyid_t keyid,
506 minpoll, maxpoll, flags, ttl, keyid, keystr);
524 ce->ce_keyid = keyid;
525 if (keyid) {
785 size_t total_len; /* req_len plus keyid & digest */
863 pkeyid = &reqpkt.keyid;
485 addentry( char *name, int no_needed, int type, int mode, int version, int minpoll, int maxpoll, u_int flags, int ttl, keyid_t keyid, char *keystr ) argument
[all...]
H A Dntp_crypto.c201 keyid_t keyid; /* key identifer */ local
235 memcpy(&keyid, dgst, 4);
236 keyid = ntohl(keyid);
243 private, keyid, lifetime));
245 return (keyid);
272 keyid_t keyid = 0; /* next key ID */ local
294 keyid = ntp_random() & 0xffffffff;
295 if (keyid <= NTP_MAXKEY)
298 if (authhavekey(keyid))
[all...]
H A Dntp_request.c188 * Authentication keyid used to authenticate requests. Zero means we
584 || ntohl(tailinpkt->keyid) != info_auth_keyid) {
585 DPRINTF(5, ("failed auth %d info_auth_keyid %u pkt keyid %u maclen %u\n",
588 ntohl(tailinpkt->keyid), mac_len));
591 "process_private: failed auth %d info_auth_keyid %u pkt keyid %u maclen %u\n",
594 ntohl(tailinpkt->keyid), mac_len);
905 ip->keyid = pp->keyid;
1416 temp_cp.maxpoll, fl, temp_cp.ttl, temp_cp.keyid,
2455 * set_request_keyid - set the keyid use
2464 keyid_t keyid; local
2492 keyid_t keyid; local
[all...]
/macosx-10.9.5/ntp-88/sntp/
H A Dnetworking.h72 keyid_t keyid; member in struct:speer
/macosx-10.9.5/Security-55471.14.18/sec/Security/
H A Dp12import.c235 CFDataRef keyid = CFDataCreate(kCFAllocatorDefault, local_key_id.Data, local_key_id.Length); local
236 if (keyid) {
237 CFDictionarySetValue(attr_dict, kSecImportItemKeyID, keyid);
238 CFRelease(keyid);

Completed in 284 milliseconds

123