/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tkey/ns1/ |
H A D | setup.sh | 23 keyid=`echo $keyname | $PERL -p -e 's/^.*\+0*//;'` 25 perl -p -e "s/KEYID/$keyid/;" < named.conf.in > named.conf
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 34 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 35 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
|
H A D | rrsig_46.c | 375 RETERR(uint16_tobuffer(sig->keyid, target)); 443 sig->keyid = uint16_fromregion(&sr);
|
H A D | sig_24.c | 406 RETERR(uint16_tobuffer(sig->keyid, target)); 474 sig->keyid = uint16_fromregion(&sr);
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ns1/ |
H A D | sign.sh | 69 # Save keyid for managed key id test. 71 keyid=`expr $keyname : 'K.+001+\(.*\)'` 72 keyid=`expr $keyid + 0` 73 echo "$keyid" > managed.key.id
|
/macosx-10.9.5/ntp-88/libntp/ |
H A D | authkeys.c | 26 keyid_t keyid; /* key identifier */ member in struct:savekey 37 * keyid. We make this fairly big for potentially busy servers. 41 #define KEYHASH(keyid) ((keyid) & HASHMASK) 98 if (keyno == sk->keyid) 122 if (keyno == sk->keyid) 153 if (keyno == sk->keyid) { 180 cache_keyid = sk->keyid; 228 if (keyno == sk->keyid) 292 sk->keyid [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/named/ |
H A D | tsigconf.c | 46 const char *keyid = NULL; local 69 keyid = cfg_obj_asstring(cfg_map_getname(key)); 81 isc_buffer_init(&keynamesrc, keyid, strlen(keyid)); 82 isc_buffer_add(&keynamesrc, strlen(keyid)); 97 keyid, algstr); 134 "configuring key '%s': %s", keyid,
|
H A D | controlconf.c | 713 controlkey_t *keyid, *next; local 722 for (keyid = ISC_LIST_HEAD(*keyids); keyid != NULL; keyid = next) { 723 next = ISC_LIST_NEXT(keyid, link); 725 result = cfgkeylist_find(keylist, keyid->keyname, &keydef); 730 keyid->keyname, socktext); 731 ISC_LIST_UNLINK(*keyids, keyid, link); 732 free_controlkey(keyid, mctx); 754 algstr, keyid 808 controlkey_t *keyid = NULL; local [all...] |
/macosx-10.9.5/libtelnet-13/ |
H A D | encrypt.c | 180 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 190 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len); 711 encrypt_enc_keyid(unsigned char *keyid, int len) argument 713 encrypt_keyid(&ki[1], keyid, len); 717 encrypt_dec_keyid(unsigned char *keyid, int len) argument 719 encrypt_keyid(&ki[0], keyid, len); 723 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 743 if (ep->keyid) 744 (void)(*ep->keyid)(dir, kp->keyid, 767 encrypt_send_keyid(int dir, const char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 94 int (*keyid)(int, unsigned char *, int *); member in struct:__anon9730
|
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/ |
H A D | encrypt.c | 167 unsigned char keyid[MAXKEYLEN]; member in struct:key_info 733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) argument 750 if (ep->keyid) 751 (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen); 753 } else if ((len != kp->keylen) || (memcmp(keyid,kp->keyid,len) != 0)) { 758 memcpy(kp->keyid,keyid, len); 759 if (ep->keyid) 772 encrypt_enc_keyid(unsigned char *keyid, int len) argument 777 encrypt_dec_keyid(unsigned char *keyid, int len) argument 783 encrypt_send_keyid(int dir, unsigned char *keyid, int keylen, int saveit) argument [all...] |
H A D | encrypt.h | 87 int (*keyid) (int, unsigned char *, int *); member in struct:__anon726
|
H A D | enc_des.c | 85 int keyid[2]; member in struct:fb 92 char *keyid; member in struct:keyidlist 413 * We only accept a keyid of 0. If we get a keyid of
|
/macosx-10.9.5/OpenSSH-186/openssh/regress/ |
H A D | krl.sh | 47 touch $OBJ/revoked-keyid 50 echo "id: revoked $n" >> $OBJ/revoked-keyid 100 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 104 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub $OBJ/revoked-keyid \ 139 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 144 # keys all serial keyid certs CA 153 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid ; do 157 # keys all serial keyid cert [all...] |
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_x509crl.rb | 123 ["authorityKeyIdentifier", "keyid:always", false], 128 ["authorityKeyIdentifier", "keyid:always", false], 143 keyid = OpenSSL::TestUtils.get_subject_key_id(cert) 144 assert_match(/^keyid:#{keyid}/, exts[1].value) 159 keyid = OpenSSL::TestUtils.get_subject_key_id(cert) 160 assert_match(/^keyid:#{keyid}/, exts[1].value)
|
/macosx-10.9.5/ntp-88/scripts/monitoring/ |
H A D | ntp.pl | 26 $keyid=0; 69 return ($keyid,$keyid = $id)[$[];
|
/macosx-10.9.5/apache-786.1/httpd/modules/generators/ |
H A D | mod_autoindex.c | 1250 request_rec *r, char keyid, 1281 p->key = apr_toupper(keyid); 1301 request_rec *r, char keyid, 1364 p->key = apr_toupper(keyid); 1406 if (keyid == K_LAST_MOD) { 1501 apr_int32_t autoindex_opts, char keyid, 1578 emit_link(r, "Name", K_NAME, keyid, direction, 1582 emit_link(r, "Last modified", K_LAST_MOD, keyid, direction, 1588 emit_link(r, "Size", K_SIZE, keyid, direction, 1594 emit_link(r, "Description", K_DESC, keyid, directio 1248 make_parent_entry(apr_int32_t autoindex_opts, autoindex_config_rec *d, request_rec *r, char keyid, char direction) argument 1298 make_autoindex_entry(const apr_finfo_t *dirent, int autoindex_opts, autoindex_config_rec *d, request_rec *r, char keyid, char direction, const char *pattern) argument 1499 output_directories(struct ent **ar, int n, autoindex_config_rec *d, request_rec *r, apr_int32_t autoindex_opts, char keyid, char direction, const char *colargs) argument 1999 char keyid; local [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | ssh-pkcs11.c | 69 char *keyid; member in struct:pkcs11_key 183 if (k11->keyid) 184 xfree(k11->keyid); 276 key_filter[1].pValue = k11->keyid; 317 k11->keyid = xmalloc(k11->keyid_len); 318 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
/macosx-10.9.5/ntp-88/include/ |
H A D | ntp_request.h | 97 * The version number, mode and keyid have the same function and are 102 * it is required that a request be authenticated, the keyid should be 138 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt 148 keyid_t keyid; /* (optional) encryption key */ member in struct:req_pkt_tail 155 #define REQ_LEN_NOMAC (offsetof(struct req_pkt, keyid)) 279 #define REQ_REQUEST_KEY 32 /* define a new request keyid */ 280 #define REQ_CONTROL_KEY 33 /* define a new control keyid */ 383 keyid_t keyid; /* peer.keyid */ member in struct:info_peer 581 keyid_t keyid; /* ke member in struct:old_conf_peer 593 keyid_t keyid; /* key to use for this association */ member in struct:conf_peer [all...] |
/macosx-10.9.5/ntp-88/ntpd/ |
H A D | ntp_intres.c | 100 #define ce_keyid ce_config.keyid 177 keyid_t req_keyid; /* request keyid */ 212 keyid_t keyid; member in struct:ntp_res_c_pkt 278 msyslog(LOG_ERR, "invalid request keyid %08x", 495 keyid_t keyid, 506 minpoll, maxpoll, flags, ttl, keyid, keystr); 524 ce->ce_keyid = keyid; 525 if (keyid) { 785 size_t total_len; /* req_len plus keyid & digest */ 863 pkeyid = &reqpkt.keyid; 485 addentry( char *name, int no_needed, int type, int mode, int version, int minpoll, int maxpoll, u_int flags, int ttl, keyid_t keyid, char *keystr ) argument [all...] |
H A D | ntp_crypto.c | 201 keyid_t keyid; /* key identifer */ local 235 memcpy(&keyid, dgst, 4); 236 keyid = ntohl(keyid); 243 private, keyid, lifetime)); 245 return (keyid); 272 keyid_t keyid = 0; /* next key ID */ local 294 keyid = ntp_random() & 0xffffffff; 295 if (keyid <= NTP_MAXKEY) 298 if (authhavekey(keyid)) [all...] |
H A D | ntp_request.c | 188 * Authentication keyid used to authenticate requests. Zero means we 584 || ntohl(tailinpkt->keyid) != info_auth_keyid) { 585 DPRINTF(5, ("failed auth %d info_auth_keyid %u pkt keyid %u maclen %u\n", 588 ntohl(tailinpkt->keyid), mac_len)); 591 "process_private: failed auth %d info_auth_keyid %u pkt keyid %u maclen %u\n", 594 ntohl(tailinpkt->keyid), mac_len); 905 ip->keyid = pp->keyid; 1416 temp_cp.maxpoll, fl, temp_cp.ttl, temp_cp.keyid, 2455 * set_request_keyid - set the keyid use 2464 keyid_t keyid; local 2492 keyid_t keyid; local [all...] |
/macosx-10.9.5/ntp-88/sntp/ |
H A D | networking.h | 72 keyid_t keyid; member in struct:speer
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | p12import.c | 235 CFDataRef keyid = CFDataCreate(kCFAllocatorDefault, local_key_id.Data, local_key_id.Length); local 236 if (keyid) { 237 CFDictionarySetValue(attr_dict, kSecImportItemKeyID, keyid); 238 CFRelease(keyid);
|