/external/syzkaller/sys/linux/ |
D | key.txt | 11 # key of type "keyring". Note: for now we include KEY_SPEC_REQKEY_AUTH_KEY here 12 # since it should be listed somewhere, though it's not actually a keyring. 13 resource keyring[key]: KEY_SPEC_THREAD_KEYRING, KEY_SPEC_PROCESS_KEYRING, KEY_SPEC_SESSION_KEYRING,… 18 …]], desc ptr[in, key_desc], payload buffer[in, opt], paylen len[payload], keyring keyring[opt]) key 19 add_key$keyring(type ptr[in, string["keyring"]], desc ptr[in, key_desc], payload const[0], paylen c… 20 …]], desc ptr[in, key_desc], payload buffer[in], paylen len[payload], keyring keyring[opt]) user_key 21 …r[in, string[key_type]], desc ptr[in, key_desc], callout ptr[in, string], keyring keyring[opt]) key 27 keyctl$clear(code const[KEYCTL_CLEAR], keyring keyring) 28 keyctl$link(code const[KEYCTL_LINK], key key, keyring keyring) 29 keyctl$unlink(code const[KEYCTL_UNLINK], key key, keyring keyring) [all …]
|
/external/python/oauth2client/tests/contrib/ |
D | test_keyring_storage.py | 20 import keyring 64 with mock.patch.object(keyring, 'get_password', 82 with mock.patch.object(keyring, 'set_password', 98 with mock.patch.object(keyring, 'set_password', 105 with mock.patch.object(keyring, 'get_password', 114 with mock.patch.object(keyring, 'get_password', 138 with mock.patch.object(keyring, 'get_password', 141 with mock.patch.object(keyring, 'set_password', 153 with mock.patch.object(keyring, 'get_password',
|
/external/python/oauth2client/oauth2client/contrib/ |
D | keyring_storage.py | 22 import keyring 72 content = keyring.get_password(self._service_name, self._user_name) 89 keyring.set_password(self._service_name, self._user_name, 98 keyring.set_password(self._service_name, self._user_name, '')
|
/external/strace/tests-mx32/ |
D | request_key.c | 53 int32_t keyring, const char *keyring_str) in do_request_key() argument 55 long rc = syscall(__NR_request_key, type, desc, info, keyring); in do_request_key() 64 printf("%d", keyring); in do_request_key() 120 uint32_t keyring; in main() member 137 keyrings[l].keyring, in main()
|
D | add_key.c | 53 size_t plen, int32_t keyring, const char *keyring_str) in do_add_key() argument 55 long rc = syscall(__NR_add_key, type, desc, payload, plen, keyring); in do_add_key() 65 printf("%d", keyring); in do_add_key() 123 uint32_t keyring; in main() member 141 keyrings[l].keyring, in main()
|
/external/strace/tests/ |
D | request_key.c | 53 int32_t keyring, const char *keyring_str) in do_request_key() argument 55 long rc = syscall(__NR_request_key, type, desc, info, keyring); in do_request_key() 64 printf("%d", keyring); in do_request_key() 120 uint32_t keyring; in main() member 137 keyrings[l].keyring, in main()
|
D | add_key.c | 53 size_t plen, int32_t keyring, const char *keyring_str) in do_add_key() argument 55 long rc = syscall(__NR_add_key, type, desc, payload, plen, keyring); in do_add_key() 65 printf("%d", keyring); in do_add_key() 123 uint32_t keyring; in main() member 141 keyrings[l].keyring, in main()
|
/external/strace/tests-m32/ |
D | request_key.c | 53 int32_t keyring, const char *keyring_str) in do_request_key() argument 55 long rc = syscall(__NR_request_key, type, desc, info, keyring); in do_request_key() 64 printf("%d", keyring); in do_request_key() 120 uint32_t keyring; in main() member 137 keyrings[l].keyring, in main()
|
D | add_key.c | 53 size_t plen, int32_t keyring, const char *keyring_str) in do_add_key() argument 55 long rc = syscall(__NR_add_key, type, desc, payload, plen, keyring); in do_add_key() 65 printf("%d", keyring); in do_add_key() 123 uint32_t keyring; in main() member 141 keyrings[l].keyring, in main()
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 98 key_serial_t keyring) in add_key() argument 101 plen, keyring); in add_key() 503 static int get_keyring_id(const char *keyring) in get_keyring_id() argument 514 if (keyring == NULL) in get_keyring_id() 517 if (strcmp(keyring, keyrings[x].name) == 0) { in get_keyring_id() 521 x = strtoul(keyring, &end, 10); in get_keyring_id() 546 static void insert_key_into_keyring(const char *keyring, struct salt *salt) in insert_key_into_keyring() argument 548 int keyring_id = get_keyring_id(keyring); in insert_key_into_keyring() 555 printf("Invalid keyring [%s].\n", keyring); in insert_key_into_keyring() 570 printf("Keyring [%s] is not available.\n", keyring); in insert_key_into_keyring() [all …]
|
/external/f2fs-tools/tools/ |
D | f2fscrypt.c | 148 key_serial_t keyring) in add_key() argument 151 plen, keyring); in add_key() 549 static int get_keyring_id(const char *keyring) in get_keyring_id() argument 571 if (keyring == NULL) in get_keyring_id() 575 if (strcmp(keyring, keyrings[x].name) == 0) { in get_keyring_id() 579 x = strtoul(keyring, &end, 10); in get_keyring_id() 604 static void insert_key_into_keyring(const char *keyring, struct salt *salt) in insert_key_into_keyring() argument 606 int keyring_id = get_keyring_id(keyring); in insert_key_into_keyring() 613 printf("Invalid keyring [%s].\n", keyring); in insert_key_into_keyring() 628 printf("Keyring [%s] is not available.\n", keyring); in insert_key_into_keyring() [all …]
|
/external/python/setuptools/setuptools/command/ |
D | upload.py | 30 keyring = __import__('keyring') 31 return keyring.get_password(self.repository, self.username)
|
/external/fsverity-utils/ |
D | README.md | 72 ".fs-verity" kernel keyring. Here's an example: 81 # Load the certificate into the fs-verity keyring: 82 keyctl padd asymmetric '' %keyring:.fs-verity < cert.der 84 # Optionally, lock the keyring so that no more keys can be added 86 keyctl restrict_keyring %keyring:.fs-verity 101 has been signed by one of the certificates in the keyring.
|
/external/syzkaller/pkg/report/testdata/linux/report/ |
D | 78 | 3 [ 82.818367] BUG: spinlock bad magic on CPU#0, ^keyring*�vmnet/20513 5 [ 82.833579] CPU: 0 PID: 20513 Comm: ^keyring*�vmnet Not tainted 4.4.70+ #9
|
/external/python/oauth2client/docs/ |
D | requirements.txt | 3 keyring
|
/external/curl/packages/OS400/ |
D | README.OS400 | 48 - By a keyring file pathname and (optionally) certificate label. 51 To address an SSL context by keyring and certificate label, use CURLOPT_CAINFO 52 to set-up the keyring pathname, CURLOPT_SSLCERT to define the certificate label 53 (omitting it will cause the default certificate in keyring to be used) and 54 CURLOPT_KEYPASSWD to give the keyring password. If SSL is used without 55 defining any of these options, the default (i.e.: system) keyring is used for
|
/external/python/oauth2client/ |
D | tox.ini | 17 keyring 81 keyring
|
/external/autotest/client/site_tests/login_SavePassword/ |
D | control | 18 been saved to the keyring.
|
D | control.nopassword | 18 ensure that a key named "password" is not saved in the keyring.
|
/external/grpc-grpc/tools/dockerfile/grpc_artifact_android_ndk/ |
D | Dockerfile | 19 RUN apt-get update && apt-get install -y debian-keyring && apt-key update
|
/external/grpc-grpc/tools/dockerfile/grpc_artifact_linux_x86/ |
D | Dockerfile | 19 RUN apt-get update && apt-get install debian-keyring && apt-key update
|
/external/grpc-grpc/tools/dockerfile/grpc_artifact_linux_x64/ |
D | Dockerfile | 19 RUN apt-get update && apt-get install debian-keyring && apt-key update
|
/external/e2fsprogs/doc/RelNotes/ |
D | v1.43.5.txt | 67 Fix some error handling in e4crypt when operating on keyring ID's.
|
/external/python/google-api-python-client/ |
D | CHANGELOG | 87 - Remove unused keyring test dependency. (#496) 360 - Add a keyring based Storage.
|
/external/llvm/docs/ |
D | GettingStarted.rst | 350 % wget https://ftp.gnu.org/gnu/gnu-keyring.gpg 351 …% signature_invalid=`gpg --verify --no-default-keyring --keyring ./gnu-keyring.gpg gcc-4.8.2.tar.b…
|