/external/ltp/testcases/kernel/syscalls/keyctl/ |
D | keyctl05.c | 84 key_serial_t keyid; in test_update_nonupdatable() local 110 keyid = TST_RET; in test_update_nonupdatable() 116 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable() 124 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable() 146 key_serial_t keyid; in test_update_setperm_race() local 157 keyid = TST_RET; in test_update_setperm_race() 164 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race() 173 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
|
/external/boringssl/src/crypto/x509/ |
D | x_x509a.c | 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 113 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 115 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 116 x->aux->keyid = NULL; in X509_keyid_set1() 121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1() 123 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 137 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 140 *len = x->aux->keyid->length; in X509_keyid_get0() 141 return x->aux->keyid->data; in X509_keyid_get0()
|
D | t_x509a.c | 104 if (aux->keyid) { in X509_CERT_AUX_print() 106 for (j = 0; j < aux->keyid->length; j++) in X509_CERT_AUX_print() 107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]); in X509_CERT_AUX_print()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509/ |
D | x_x509a.c | 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 113 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 115 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 116 x->aux->keyid = NULL; in X509_keyid_set1() 121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1() 123 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 137 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 140 *len = x->aux->keyid->length; in X509_keyid_get0() 141 return x->aux->keyid->data; in X509_keyid_get0()
|
D | t_x509a.c | 104 if (aux->keyid) { in X509_CERT_AUX_print() 106 for (j = 0; j < aux->keyid->length; j++) in X509_CERT_AUX_print() 107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]); in X509_CERT_AUX_print()
|
/external/usrsctp/usrsctplib/netinet/ |
D | sctp_auth.h | 71 uint16_t keyid; /* shared key ID */ member 148 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 149 extern void sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 186 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 187 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 188 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 189 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); 190 extern int sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid); 191 extern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid); 192 extern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); [all …]
|
D | sctp_auth.c | 473 new_key->keyid = 0; in sctp_alloc_sharedkey() 499 if (skey->keyid == key_id) in sctp_find_sharedkey() 521 if (new_skey->keyid < skey->keyid) { in sctp_insert_sharedkey() 525 } else if (new_skey->keyid == skey->keyid) { in sctp_insert_sharedkey() 531 new_skey->keyid); in sctp_insert_sharedkey() 536 new_skey->keyid); in sctp_insert_sharedkey() 614 new_skey->keyid = skey->keyid; in sctp_copy_sharedkey() 1180 sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid) argument 1185 if (keyid == stcb->asoc.authinfo.assoc_keyid) { 1189 if (keyid == stcb->asoc.authinfo.recv_keyid) { [all …]
|
/external/boringssl/src/crypto/x509v3/ |
D | v3_akey.c | 97 if (akeyid->keyid) { in STACK_OF() 98 tmp = x509v3_bytes_to_hex(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 124 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 140 keyid = 1; in v2i_AUTHORITY_KEYID() 142 keyid = 2; in v2i_AUTHORITY_KEYID() 163 if (keyid) { in v2i_AUTHORITY_KEYID() 167 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID() 198 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509v3/ |
D | v3_akey.c | 97 if (akeyid->keyid) { in STACK_OF() 98 tmp = x509v3_bytes_to_hex(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 124 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 140 keyid = 1; in v2i_AUTHORITY_KEYID() 142 keyid = 2; in v2i_AUTHORITY_KEYID() 163 if (keyid) { in v2i_AUTHORITY_KEYID() 167 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID() 198 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
/external/ltp/testcases/kernel/syscalls/request_key/ |
D | request_key04.c | 24 key_serial_t keyid; in do_test() local 46 &keyid, sizeof(keyid))); in do_test() 58 &keyid, sizeof(keyid))); in do_test()
|
/external/openssh/regress/ |
D | krl.sh | 57 touch $OBJ/revoked-keyid 61 echo "id: revoked $n" >> $OBJ/revoked-keyid 131 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \ 136 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \ 137 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed" 141 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \ 189 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG" 193 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG" 211 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \ 212 $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
D | SubjectKeyIdentifier.java | 49 byte[] keyid) in SubjectKeyIdentifier() argument 51 this.keyidentifier = Arrays.clone(keyid); in SubjectKeyIdentifier() 55 ASN1OctetString keyid) in SubjectKeyIdentifier() argument 57 this(keyid.getOctets()); in SubjectKeyIdentifier()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/x509/ |
D | SubjectKeyIdentifier.java | 51 byte[] keyid) in SubjectKeyIdentifier() argument 53 this.keyidentifier = Arrays.clone(keyid); in SubjectKeyIdentifier() 57 ASN1OctetString keyid) in SubjectKeyIdentifier() argument 59 this(keyid.getOctets()); in SubjectKeyIdentifier()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/x509/ |
D | SubjectKeyIdentifier.java | 51 byte[] keyid) in SubjectKeyIdentifier() argument 53 this.keyidentifier = Arrays.clone(keyid); in SubjectKeyIdentifier() 57 ASN1OctetString keyid) in SubjectKeyIdentifier() argument 59 this(keyid.getOctets()); in SubjectKeyIdentifier()
|
/external/ltp/testcases/kernel/security/mmc_security/ |
D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/external/python/pyasn1-modules/tests/ |
D | test_rfc6032.py | 59 keyid, rest = der_decode(attrVal0, rfc6032.ContentDecryptKeyID()) 61 assert keyid.prettyPrint() 62 assert der_encode(keyid) == attrVal0 63 assert keyid == b'ptf-kdc-812374'
|
/external/openssh/ |
D | ssh-pkcs11.c | 75 char *keyid; member 210 free(k11->keyid); in pkcs11_k11_free() 382 key_filter[1].pValue = k11->keyid; in pkcs11_get_key() 501 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_rsa_wrap() 502 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_rsa_wrap() 614 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_ecdsa_wrap() 615 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_ecdsa_wrap() 1305 char *label, CK_ULONG bits, CK_BYTE keyid, u_int32_t *err) in pkcs11_rsa_generate_private_key() argument 1338 FILL_ATTR(tpub, npub, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key() 1350 FILL_ATTR(tpriv, npriv, CKA_ID, &keyid, sizeof(keyid)); in pkcs11_rsa_generate_private_key() [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 7 # keyid=<keyid_string> 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
|
/external/tpm2-tss/script/ekca/ |
D | intermed-ca.cnf | 102 authorityKeyIdentifier = keyid:always 114 authorityKeyIdentifier = keyid:always 126 authorityKeyIdentifier = keyid:always 134 authorityKeyIdentifier = keyid:always
|
D | root-ca.cnf | 84 authorityKeyIdentifier = keyid:always 96 authorityKeyIdentifier = keyid:always 104 authorityKeyIdentifier = keyid:always
|
/external/iproute2/ip/ |
D | ipseg6.c | 53 __u32 keyid; member 144 addattr32(&req.n, sizeof(req), SEG6_ATTR_HMACKEYID, opts.keyid); in seg6_do_cmd() 205 if (get_u32(&opts.keyid, *argv, 0) || opts.keyid == 0) in do_seg6()
|
/external/nos/host/generic/nugget/include/ |
D | signed_header.h | 108 if (keyid == -1u) return false; in plausible() 133 printf("hdr.keyid : %08x\n", keyid); in print() 182 uint32_t keyid; // word 7 of RWR member 204 uint32_t keyid; member
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | openssl.cnf | 117 authorityKeyIdentifier=keyid:always,issuer 174 authorityKeyIdentifier=keyid:always 186 authorityKeyIdentifier=keyid,issuer 196 authorityKeyIdentifier=keyid,issuer
|