/third_party/node/deps/npm/node_modules/pacote/lib/ |
D | registry.js | 184 this.registryKeys.filter(key => (key.keyid === signature.keyid))[0] 187 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` + 197 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` + 212 `keyid: ${publicKey.keyid} and signature: ${signature.sig}` 215 keyid: publicKey.keyid, property 244 const keyid = bundle.dsseEnvelope.signatures[0].keyid 251 keyid, 256 const attestationKeyIds = bundles.map((b) => b.keyid).filter((k) => !!k) 258 .filter(key => attestationKeyIds.includes(key.keyid)) 265 for (const { predicateType, bundle, keyid, signature, statement } of bundles) { property [all …]
|
/third_party/openssl/apps/lib/ |
D | engine_loader.c | 39 char *keyid; member 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 71 char *keyid = NULL; in engine_open() local 91 keyid = OPENSSL_strdup(q + 1); in engine_open() 94 if (e != NULL && keyid != NULL) in engine_open() 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() 98 OPENSSL_free(keyid); in engine_open() 127 ENGINE_load_private_key(ctx->e, ctx->keyid, in engine_load() [all …]
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
D | engine_loader.c | 39 char *keyid; member 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 71 char *keyid = NULL; in engine_open() local 91 keyid = OPENSSL_strdup(q + 1); in engine_open() 94 if (e != NULL && keyid != NULL) in engine_open() 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() 98 OPENSSL_free(keyid); in engine_open() 127 ENGINE_load_private_key(ctx->e, ctx->keyid, in engine_load() [all …]
|
/third_party/openssl/crypto/x509/ |
D | x_x509a.c | 30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 71 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 73 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 74 x->aux->keyid = NULL; in X509_keyid_set1() 79 if (aux->keyid == NULL in X509_keyid_set1() 80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL) in X509_keyid_set1() 82 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 96 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 99 *len = x->aux->keyid->length; in X509_keyid_get0() 100 return x->aux->keyid->data; in X509_keyid_get0()
|
D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 123 keyid = 1; in v2i_AUTHORITY_KEYID() 125 keyid = 2; in v2i_AUTHORITY_KEYID() 157 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID() 174 if ((keyid == 2 || issuer == 0) in v2i_AUTHORITY_KEYID() 206 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
D | x_x509a.c | 30 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 71 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 73 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 74 x->aux->keyid = NULL; in X509_keyid_set1() 79 if (aux->keyid == NULL in X509_keyid_set1() 80 && (aux->keyid = ASN1_OCTET_STRING_new()) == NULL) in X509_keyid_set1() 82 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 96 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 99 *len = x->aux->keyid->length; in X509_keyid_get0() 100 return x->aux->keyid->data; in X509_keyid_get0()
|
D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 123 keyid = 1; in v2i_AUTHORITY_KEYID() 125 keyid = 2; in v2i_AUTHORITY_KEYID() 157 if (keyid == 2 || (keyid == 1 && !ss)) { in v2i_AUTHORITY_KEYID() 174 if ((keyid == 2 || issuer == 0) in v2i_AUTHORITY_KEYID() 206 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
D | keyctl05.c | 86 key_serial_t keyid; in test_update_nonupdatable() local 118 keyid = TST_RET; in test_update_nonupdatable() 124 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable() 132 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable() 154 key_serial_t keyid; in test_update_setperm_race() local 165 keyid = TST_RET; in test_update_setperm_race() 172 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race() 181 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
|
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/witness/tlog/ |
D | entry.js | 88 const keyid = envelope.signatures[0].keyid; 101 if (keyid.length > 0) { 102 dsse.signatures[0].keyid = keyid; 132 if (envelope.signatures[0].keyid.length > 0) { 133 dsse.signatures[0].keyid = envelope.signatures[0].keyid;
|
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/ |
D | envelope.js | 31 return { sig: Buffer.alloc(0), keyid: "" }; 37 keyid: isSet(object.keyid) ? String(object.keyid) : "", 43 message.keyid !== undefined && (obj.keyid = message.keyid);
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
D | p12_crt.c | 21 unsigned char *keyid, 47 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local 71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 79 pkeyid = keyid; in PKCS12_create_ex() 115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 160 unsigned char *keyid, in pkcs12_add_cert_bag() argument 172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in pkcs12_add_cert_bag() 189 unsigned char *keyid = NULL; in PKCS12_add_cert() local 196 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert() 198 return pkcs12_add_cert_bag(pbags, cert, name, namelen, keyid, keyidlen); in PKCS12_add_cert()
|
/third_party/ltp/testcases/kernel/syscalls/request_key/ |
D | request_key04.c | 24 key_serial_t keyid; in do_test() local 46 &keyid, sizeof(keyid))); in do_test() 58 &keyid, sizeof(keyid))); in do_test()
|
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
D | signature.js | 20 keyid: this.keyID, 25 const { keyid, sig } = data; 26 if (typeof keyid !== 'string') { 33 keyID: keyid,
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_crt.c | 41 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local 62 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 70 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 101 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 147 unsigned char *keyid; in PKCS12_add_cert() local 163 keyid = X509_keyid_get0(cert, &keyidlen); in PKCS12_add_cert() 165 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_add_cert()
|
/third_party/ltp/testcases/kernel/security/mmc_security/ |
D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() argument 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() argument 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
|
/third_party/openssl/crypto/cms/ |
D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() argument 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() argument 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid = rid->d.rKeyId->subjectKeyIdentifier; in CMS_RecipientEncryptedKey_get0_id()
|
/third_party/openssl/test/ |
D | ca-and-certs.cnf | 36 authorityKeyIdentifier = keyid,issuer:always 42 authorityKeyIdentifier = keyid:always 48 authorityKeyIdentifier = keyid:always 86 authorityKeyIdentifier = keyid:always,issuer:always
|
/third_party/openssl/demos/certs/ |
D | ca.cnf | 43 authorityKeyIdentifier=keyid 52 authorityKeyIdentifier=keyid 65 authorityKeyIdentifier=keyid 75 authorityKeyIdentifier=keyid:always
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hostapd.wpa_psk | 7 # keyid=<keyid_string> 13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hostapd.wpa_psk | 7 # keyid=<keyid_string> 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
|
/third_party/openssl/test/smime-certs/ |
D | ca.cnf | 43 authorityKeyIdentifier=keyid 55 authorityKeyIdentifier=keyid 65 authorityKeyIdentifier=keyid:always
|
/third_party/mbedtls/tests/data_files/ |
D | authorityKeyId_subjectKeyId.conf | 11 authorityKeyIdentifier = keyid:always,issuer:always 17 authorityKeyIdentifier = keyid:always
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
D | extension.rs | 371 keyid: Option<bool>, field 386 keyid: None, in new() 398 pub fn keyid(&mut self, always: bool) -> &mut AuthorityKeyIdentifier { in keyid() method 399 self.keyid = Some(always); in keyid() 417 match self.keyid { in build()
|