/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
D | keyctl05.c | 86 key_serial_t keyid; in test_update_nonupdatable() local 118 keyid = TST_RET; in test_update_nonupdatable() 124 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable() 132 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable() 154 key_serial_t keyid; in test_update_setperm_race() local 165 keyid = TST_RET; in test_update_setperm_race() 172 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race() 181 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_auth.h | 71 uint16_t keyid; /* shared key ID */ member 148 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 149 extern void sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 186 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 187 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 188 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 189 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); 190 extern int sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid); 191 extern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid); 192 extern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); [all …]
|
D | sctp_auth.c | 473 new_key->keyid = 0; in sctp_alloc_sharedkey() 499 if (skey->keyid == key_id) in sctp_find_sharedkey() 521 if (new_skey->keyid < skey->keyid) { in sctp_insert_sharedkey() 525 } else if (new_skey->keyid == skey->keyid) { in sctp_insert_sharedkey() 531 new_skey->keyid); in sctp_insert_sharedkey() 536 new_skey->keyid); in sctp_insert_sharedkey() 610 new_skey->keyid = skey->keyid; in sctp_copy_sharedkey() 1176 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) argument 1181 if (keyid == stcb->asoc.authinfo.assoc_keyid) { 1185 if (keyid == stcb->asoc.authinfo.recv_keyid) { [all …]
|
/third_party/openssl/crypto/x509/ |
D | x_x509a.c | 30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 71 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 73 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 74 x->aux->keyid = NULL; in X509_keyid_set1() 79 if (aux->keyid == NULL in X509_keyid_set1() 80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL) in X509_keyid_set1() 82 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 96 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 99 *len = x->aux->keyid->length; in X509_keyid_get0() 100 return x->aux->keyid->data; in X509_keyid_get0()
|
D | t_x509.c | 331 const unsigned char *alias, *keyid; in X509_aux_print() local 371 keyid = X509_keyid_get0(x, &keyidlen); in X509_aux_print() 372 if (keyid) { in X509_aux_print() 375 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]); in X509_aux_print()
|
/third_party/openssl/crypto/x509v3/ |
D | v3_akey.c | 45 if (akeyid->keyid) { in STACK_OF() 46 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 99 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 114 keyid = 1; in v2i_AUTHORITY_KEYID() 116 keyid = 2; in v2i_AUTHORITY_KEYID() 138 if (keyid) { in v2i_AUTHORITY_KEYID() 142 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID() 177 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
/third_party/ltp/testcases/kernel/syscalls/request_key/ |
D | request_key04.c | 24 key_serial_t keyid; in do_test() local 46 &keyid, sizeof(keyid))); in do_test() 58 &keyid, sizeof(keyid))); in do_test()
|
/third_party/boost/boost/vmd/detail/ |
D | match_identifier_common.hpp | 14 #define BOOST_VMD_DETAIL_MATCH_IDENTIFIER_OP_CREATE_ID_RESULT(id,keyid) \ argument 20 keyid, \ 30 #define BOOST_VMD_DETAIL_MATCH_IDENTIFIER_OP_CMP_IDS(id,keyid) \ argument 33 BOOST_VMD_DETAIL_MATCH_IDENTIFIER_OP_CREATE_ID_RESULT(id,keyid) \
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_crt.c | 40 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create() local 65 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create() 73 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 102 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create() 140 unsigned char *keyid; in PKCS12_add_cert() local 156 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert() 158 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_add_cert()
|
/third_party/ltp/testcases/kernel/security/mmc_security/ |
D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/third_party/openssl/crypto/cms/ |
D | cms_kari.c | 54 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() argument 69 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 70 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 81 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 82 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 110 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() argument 121 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 122 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 128 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 129 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
|
D | cms_lib.c | 543 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in cms_keyid_cert_cmp() argument 549 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in cms_keyid_cert_cmp() 573 ASN1_OCTET_STRING *keyid = NULL; in cms_set1_keyid() local 580 keyid = ASN1_STRING_dup(cert_keyid); in cms_set1_keyid() 581 if (!keyid) { in cms_set1_keyid() 586 *pkeyid = keyid; in cms_set1_keyid()
|
/third_party/openssl/test/ |
D | Uss.cnf | 26 authorityKeyIdentifier=keyid,issuer:always 32 authorityKeyIdentifier=keyid:always 38 authorityKeyIdentifier=keyid:always
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hostapd.wpa_psk | 7 # keyid=<keyid_string> 13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
|
/third_party/openssl/demos/certs/ |
D | ca.cnf | 44 authorityKeyIdentifier=keyid 56 authorityKeyIdentifier=keyid 69 authorityKeyIdentifier=keyid 79 authorityKeyIdentifier=keyid:always
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hostapd.wpa_psk | 7 # keyid=<keyid_string> 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
|
/third_party/openssl/test/smime-certs/ |
D | ca.cnf | 41 authorityKeyIdentifier=keyid 53 authorityKeyIdentifier=keyid 63 authorityKeyIdentifier=keyid:always
|
/third_party/openssl/demos/certs/apps/ |
D | apps.cnf | 55 authorityKeyIdentifier=keyid 65 authorityKeyIdentifier=keyid:always
|
/third_party/node/tools/ |
D | release.sh | 44 gpgkey=$(gpg --list-secret-keys --keyid-format SHORT | awk -F'( +|/)' '/^(sec|ssb)/{print $3}') 68 gpgfing=$(gpg --keyid-format 0xLONG --fingerprint "$gpgkey" | grep 'Key fingerprint =' | awk -F' = …
|
/third_party/mbedtls/tests/data_files/ |
D | server1.crt.openssl.v3_ext | 4 authorityKeyIdentifier=keyid
|
D | server1.cert_type.crt.openssl.v3_ext | 4 authorityKeyIdentifier=keyid
|
D | cli.opensslconf | 3 authorityKeyIdentifier=keyid:always,issuer:always
|
D | server1.key_usage.crt.openssl.v3_ext | 4 authorityKeyIdentifier=keyid
|
/third_party/mbedtls/tests/data_files/dir-maxpath/ |
D | int.opensslconf | 3 authorityKeyIdentifier=keyid:always,issuer:always
|