Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 25 of 73) sorted by relevance

123

/external/ltp/testcases/kernel/syscalls/keyctl/
Dkeyctl07.c32 key_serial_t key_id; in try_to_read_negative_key() local
62 &key_id, sizeof(key_id))); in try_to_read_negative_key()
65 if (TST_RET != sizeof(key_id)) { in try_to_read_negative_key()
67 TST_RET, sizeof(key_id)); in try_to_read_negative_key()
75 TEST(keyctl(KEYCTL_READ, key_id, buffer, sizeof(buffer))); in try_to_read_negative_key()
/external/u-boot/cmd/
Dethsw.c608 static int keyword_match_gen(enum ethsw_keyword_id key_id, int argc, char
611 static int keyword_match_port(enum ethsw_keyword_id key_id, int argc,
614 static int keyword_match_vlan(enum ethsw_keyword_id key_id, int argc,
617 static int keyword_match_pvid(enum ethsw_keyword_id key_id, int argc,
620 static int keyword_match_mac_addr(enum ethsw_keyword_id key_id, int argc,
623 static int keyword_match_aggr(enum ethsw_keyword_id key_id, int argc,
633 int (*match)(enum ethsw_keyword_id key_id, int argc, char *const argv[],
750 static int keyword_match_gen(enum ethsw_keyword_id key_id, int argc, in keyword_match_gen() argument
754 if (strcmp(argv[*argc_nr], keyword[key_id].keyword_name) == 0) { in keyword_match_gen()
755 parsed_cmd->cmd_to_keywords[*argc_nr] = key_id; in keyword_match_gen()
[all …]
/external/tensorflow/tensorflow/contrib/mpi/
Dmpi_rendezvous_mgr.h153 const std::string key_id = strings::StrCat(key, "_", step_id); in QueueRequest() local
154 recv_tensor_map_[key_id] = std::shared_ptr<MPIRequestTensorCall>(rCall); in QueueRequest()
198 const std::string key_id = strings::StrCat(key, "_", step_id); in GetRecvCall() local
199 if (recv_tensor_map_.find(key_id) == recv_tensor_map_.end()) { in GetRecvCall()
203 *call = recv_tensor_map_[key_id]; in GetRecvCall()
208 const std::string key_id = strings::StrCat(key, "_", step_id); in RemoveRecvCall() local
209 recv_tensor_map_.erase(key_id); in RemoveRecvCall()
/external/u-boot/lib/rsa/
Drsa-sign.c125 char key_id[1024]; in rsa_engine_get_pub_key() local
136 snprintf(key_id, sizeof(key_id), in rsa_engine_get_pub_key()
140 snprintf(key_id, sizeof(key_id), in rsa_engine_get_pub_key()
148 key = ENGINE_load_public_key(engine, key_id, NULL, NULL); in rsa_engine_get_pub_key()
236 char key_id[1024]; in rsa_engine_get_priv_key() local
247 snprintf(key_id, sizeof(key_id), in rsa_engine_get_priv_key()
251 snprintf(key_id, sizeof(key_id), in rsa_engine_get_priv_key()
259 key = ENGINE_load_private_key(engine, key_id, NULL, NULL); in rsa_engine_get_priv_key()
/external/kmod/libkmod/
Dlibkmod-signature.c107 sig_info->key_id = mem + size; in fill_default()
125 unsigned char *key_id; member
136 free(pvt->key_id); in pkcs7_free()
203 ASN1_OCTET_STRING *key_id; in fill_pkcs7() local
238 rc = CMS_SignerInfo_get0_signer_id(si, &key_id, &issuer, &sno); in fill_pkcs7()
261 sig_info->key_id = (const char *)key_id_str; in fill_pkcs7()
280 pvt->key_id = key_id_str; in fill_pkcs7()
/external/openssh/
Dkrl.c66 char *key_id; member
114 return strcmp(a->key_id, b->key_id); in key_id_cmp()
155 free(rki->key_id); in revoked_certs_free()
337 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument
346 KRL_DBG(("%s: revoke %s", __func__, key_id)); in ssh_krl_revoke_cert_by_key_id()
348 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id()
354 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id()
434 key->cert->key_id); in ssh_krl_revoke_key()
688 KRL_DBG(("%s: key ID %s", __func__, rki->key_id)); in revoked_certs_generate()
689 if ((r = sshbuf_put_cstring(sect, rki->key_id)) != 0) in revoked_certs_generate()
[all …]
Dkrl.h52 const struct sshkey *ca_key, const char *key_id);
/external/tensorflow/tensorflow/python/distribute/
Dcross_device_utils.py299 key_id = ','.join(names)
301 if key_id not in self._group_key_table:
304 self._group_key_table[key_id] = new_key
305 return self._group_key_table[key_id]
307 def get_instance_key(self, key_id=None): argument
315 if key_id:
317 if key_id not in self._instance_key_id_to_key_table:
319 self._instance_key_id_to_key_table[key_id] = (
321 return self._instance_key_id_to_key_table[key_id]
/external/tcpdump/
Dprint-ntp.c128 uint32_t key_id; member
306 ND_TCHECK(bp->key_id); in ntp_print()
307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
309 ND_TCHECK(bp->key_id); in ntp_print()
310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
Dprint-lisp.c196 nd_uint16_t key_id; member
239 uint16_t key_id; in lisp_print() local
271 key_id = EXTRACT_16BITS(&lisp_hdr->key_id); in lisp_print()
274 tok2str(auth_type, "unknown-type", key_id))); in lisp_print()
/external/python/oauth2client/oauth2client/
Dcrypt.py74 def make_signed_jwt(signer, payload, key_id=None): argument
88 if key_id is not None:
89 header['kid'] = key_id
/external/perfetto/src/traced/probes/ftrace/test/data/android_seed_N2F62_3.10.49/events/cfg80211/cfg80211_michael_mic_failure/
Dformat13 field:int key_id; offset:40; size:4; signed:1;
16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/cfg80211/cfg80211_michael_mic_failure/
Dformat13 field:int key_id; offset:40; size:4; signed:1;
16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
/external/perfetto/src/traced/probes/ftrace/test/data/android_walleye_OPM5.171019.017.A1_4.4.88/events/cfg80211/cfg80211_michael_mic_failure/
Dformat13 field:int key_id; offset:40; size:4; signed:1;
16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
/external/mesa3d/src/util/tests/hash_table/
Dclear.c31 static uint32_t key_id(const void *key) in key_id() function
85 assert(key_id(entry->key) < size); in main()
/external/python/cpython3/Doc/includes/
Ddbpickle.py36 type_tag, key_id = pid
39 cursor.execute("SELECT * FROM memos WHERE key=?", (str(key_id),))
/external/ltp/testcases/kernel/controllers/memcg/functional/
Dmemcg_process.c52 static int key_id; /* used with opt_shm */ variable
87 key_id = atoi(optarg); in process_options()
233 key = ftok("/dev/null", key_id); in shm()
/external/iproute2/tc/
Dm_tunnel_key.c60 __be32 key_id; in tunnel_key_parse_key_id() local
63 ret = get_be32(&key_id, str, 10); in tunnel_key_parse_key_id()
65 addattr32(n, MAX_MSG, type, key_id); in tunnel_key_parse_key_id()
/external/boringssl/src/crypto/pkcs8/
Dpkcs8_x509.c946 static int add_bag_attributes(CBB *bag, const char *name, const uint8_t *key_id, in add_bag_attributes() argument
984 !CBB_add_bytes(&value, key_id, key_id_len)) { in add_bag_attributes()
993 const uint8_t *key_id, size_t key_id_len) { in add_cert_bag() argument
1015 !add_bag_attributes(&bag, name, key_id, key_id_len) || in add_cert_bag()
1024 const char *name, const uint8_t *key_id, in make_cert_safe_contents() argument
1031 !add_cert_bag(&safe_contents, cert, name, key_id, key_id_len))) { in make_cert_safe_contents()
1147 uint8_t key_id[EVP_MAX_MD_SIZE]; in PKCS12_create() local
1154 !X509_digest(cert, EVP_sha1(), key_id, &key_id_len)) { in PKCS12_create()
1186 if (!make_cert_safe_contents(&data, &len, cert, chain, name, key_id, in PKCS12_create()
1224 !add_bag_attributes(&bag, name, key_id, key_id_len) || in PKCS12_create()
/external/ltp/testcases/kernel/controllers/cpuset/cpuset_memory_test/
Dcpuset_memory_test.c58 static int key_id; /* used with opt_shm */ variable
106 key_id = atoi(optarg); in process_options()
257 key = ftok("/dev/null", key_id); in shm()
/external/epid-sdk/tools/extractkeys/src/
Dmain.c43 unsigned char key_id[8]; ///< 8-byte Key Unique Id(Big Endian) member
52 unsigned char key_id[8]; ///< 8-byte Key Unique Id(Big Endian) member
/external/autotest/frontend/afe/
Dmoblab_rpc_interface.py372 def _is_valid_boto_key(key_id, key_secret, directory): argument
374 _run_bucket_performance_test(key_id, key_secret, directory)
390 key_id = cloud_storage_info[_GS_ACCESS_KEY_ID]
393 key_id, key_secret, cloud_storage_info[_IMAGE_STORAGE_SERVER])
942 def _run_bucket_performance_test(key_id, key_secret, bucket_name, argument
959 '-o', 'Credentials:gs_access_key_id=%s' % key_id,
/external/tensorflow/tensorflow/core/platform/cloud/
Doauth_client.cc155 Status EncodeJwtHeader(StringPiece key_id, string* encoded) { in EncodeJwtHeader() argument
160 root["kid"] = Json::Value(key_id.begin(), key_id.end()); in EncodeJwtHeader()
/external/wpa_supplicant_8/wpa_supplicant/examples/
DopenCryptoki.conf34 key_id="4"
/external/libxcam/modules/ocl/
Dcl_kernel.cpp80 get_string_key_id (const char *str, uint32_t len, uint8_t key_id[8]) in get_string_key_id()
97 memcpy (key_id, key, 8); in get_string_key_id()
101 key_id[i] ^= (uint8_t)str[i]; in get_string_key_id()

123