Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 25 of 120) sorted by relevance

12345

/external/ltp/testcases/kernel/syscalls/keyctl/
Dkeyctl07.c20 key_serial_t key_id; in try_to_read_negative_key() local
50 &key_id, sizeof(key_id))); in try_to_read_negative_key()
53 if (TST_RET != sizeof(key_id)) { in try_to_read_negative_key()
55 TST_RET, sizeof(key_id)); in try_to_read_negative_key()
63 TEST(keyctl(KEYCTL_READ, key_id, buffer, sizeof(buffer))); in try_to_read_negative_key()
/external/libwebm/webm_parser/tests/
Dcontent_encryption_parser_test.cc39 EXPECT_FALSE(content_encryption.key_id.is_present()); in TEST_F()
40 EXPECT_EQ(std::vector<std::uint8_t>{}, content_encryption.key_id.value()); in TEST_F()
65 EXPECT_TRUE(content_encryption.key_id.is_present()); in TEST_F()
66 EXPECT_EQ(std::vector<std::uint8_t>{}, content_encryption.key_id.value()); in TEST_F()
97 EXPECT_TRUE(content_encryption.key_id.is_present()); in TEST_F()
98 EXPECT_EQ(std::vector<std::uint8_t>{0x00}, content_encryption.key_id.value()); in TEST_F()
/external/marisa-trie/bindings/ruby/
Dsample.rb20 print(agent.query_str(), ": ", agent.key_id(), "\n")
24 print(agent.query_str(), ": ", agent.key_id(), "\n")
55 print(agent.query_str(), ": ", agent.key_str(), " (", agent.key_id(), ")\n")
60 print(agent.query_str(), ": ", agent.key_str(), " (", agent.key_id(), ")\n")
/external/marisa-trie/lib/marisa/grimoire/trie/
Dhistory.h32 void set_key_id(std::size_t key_id) { in set_key_id() argument
33 MARISA_DEBUG_IF(key_id > MARISA_UINT32_MAX, MARISA_SIZE_ERROR); in set_key_id()
34 key_id_ = (UInt32)key_id; in set_key_id()
49 std::size_t key_id() const { in key_id() function
/external/marisa-trie/bindings/perl/
Dsample.pl20 print($agent->query_str(), ": ", $agent->key_id(), "\n");
24 print($agent->query_str(), ": ", $agent->key_id(), "\n");
55 $agent->key_id(), ")\n");
61 $agent->key_id(), ")\n");
/external/marisa-trie/bindings/python/
Dsample.py20 print("%s: %d" % (agent.query_str(), agent.key_id()))
24 print("%s: %d" % (agent.query_str(), agent.key_id()))
53 print("%s: %s (%d)" % (agent.query_str(), agent.key_str(), agent.key_id()))
57 print("%s: %s (%d)" % (agent.query_str(), agent.key_str(), agent.key_id()))
/external/marisa-trie/tools/
Dmarisa-reverse-lookup.cc52 std::size_t key_id; in reverse_lookup() local
53 while (std::cin >> key_id) { in reverse_lookup()
55 agent.set_query(key_id); in reverse_lookup()
62 << key_id << std::endl; in reverse_lookup()
/external/perfetto/src/trace_processor/importers/json/
Djson_utils.cc190 auto key_id = storage->InternString(key); in AddJsonValueToArgs() local
196 inserter->AddArg(flat_key_id, key_id, Variadic::Integer(value.asInt64())); in AddJsonValueToArgs()
199 inserter->AddArg(flat_key_id, key_id, in AddJsonValueToArgs()
203 inserter->AddArg(flat_key_id, key_id, Variadic::Real(value.asDouble())); in AddJsonValueToArgs()
206 inserter->AddArg(flat_key_id, key_id, in AddJsonValueToArgs()
211 inserter->AddArg(flat_key_id, key_id, Variadic::Boolean(value.asBool())); in AddJsonValueToArgs()
/external/openssh/
Dkrl.c68 char *key_id; member
117 return strcmp(a->key_id, b->key_id); in key_id_cmp()
159 free(rki->key_id); in revoked_certs_free()
346 const char *key_id) in ssh_krl_revoke_cert_by_key_id() argument
355 KRL_DBG(("%s: revoke %s", __func__, key_id)); in ssh_krl_revoke_cert_by_key_id()
357 (rki->key_id = strdup(key_id)) == NULL) { in ssh_krl_revoke_cert_by_key_id()
363 free(rki->key_id); in ssh_krl_revoke_cert_by_key_id()
465 key->cert->key_id); in ssh_krl_revoke_key()
719 KRL_DBG(("%s: key ID %s", __func__, rki->key_id)); in revoked_certs_generate()
720 if ((r = sshbuf_put_cstring(sect, rki->key_id)) != 0) in revoked_certs_generate()
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/trust_token/
Dtrust_token.c159 uint32_t key_id; in TRUST_TOKEN_CLIENT_add_key() local
160 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_CLIENT_add_key()
166 key_s->id = key_id; in TRUST_TOKEN_CLIENT_add_key()
223 uint32_t key_id; in STACK_OF() local
225 !CBS_get_u32(&in, &key_id)) { in STACK_OF()
233 if (ctx->keys[i].id == key_id) { in STACK_OF()
251 ctx->method->unblind(&key->key, ctx->pretokens, &in, count, key_id); in STACK_OF()
374 uint32_t key_id; in TRUST_TOKEN_ISSUER_add_key() local
375 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_ISSUER_add_key()
382 key_s->id = key_id; in TRUST_TOKEN_ISSUER_add_key()
[all …]
Dinternal.h95 CBS *cbs, size_t count, uint32_t key_id);
124 CBS *cbs, size_t count, uint32_t key_id);
185 size_t count, uint32_t key_id);
/external/boringssl/src/crypto/trust_token/
Dtrust_token.c182 uint32_t key_id; in TRUST_TOKEN_CLIENT_add_key() local
183 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_CLIENT_add_key()
189 key_s->id = key_id; in TRUST_TOKEN_CLIENT_add_key()
249 uint32_t key_id; in STACK_OF() local
251 !CBS_get_u32(&in, &key_id)) { in STACK_OF()
259 if (ctx->keys[i].id == key_id) { in STACK_OF()
277 ctx->method->unblind(&key->key, ctx->pretokens, &in, count, key_id); in STACK_OF()
413 uint32_t key_id; in TRUST_TOKEN_ISSUER_add_key() local
414 if (!CBS_get_u32(&cbs, &key_id) || in TRUST_TOKEN_ISSUER_add_key()
421 key_s->id = key_id; in TRUST_TOKEN_ISSUER_add_key()
[all …]
Dinternal.h107 CBS *cbs, size_t count, uint32_t key_id);
132 CBS *cbs, size_t count, uint32_t key_id);
167 CBS *cbs, size_t count, uint32_t key_id);
224 size_t count, uint32_t key_id);
/external/tcpdump/
Dprint-ntp.c128 uint32_t key_id; member
306 ND_TCHECK(bp->key_id); in ntp_print()
307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
309 ND_TCHECK(bp->key_id); in ntp_print()
310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
Dprint-lisp.c196 nd_uint16_t key_id; member
239 uint16_t key_id; in lisp_print() local
271 key_id = EXTRACT_16BITS(&lisp_hdr->key_id); in lisp_print()
274 tok2str(auth_type, "unknown-type", key_id))); in lisp_print()
/external/kmod/libkmod/
Dlibkmod-signature.c107 sig_info->key_id = mem + size; in fill_default()
125 unsigned char *key_id; member
136 free(pvt->key_id); in pkcs7_free()
262 sig_info->key_id = (const char *)key_id_str; in fill_pkcs7()
281 pvt->key_id = key_id_str; in fill_pkcs7()
/external/python/oauth2client/oauth2client/
Dcrypt.py74 def make_signed_jwt(signer, payload, key_id=None): argument
88 if key_id is not None:
89 header['kid'] = key_id
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/cfg80211/cfg80211_michael_mic_failure/
Dformat13 field:int key_id; offset:40; size:4; signed:1;
16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
/external/perfetto/src/traced/probes/ftrace/test/data/android_seed_N2F62_3.10.49/events/cfg80211/cfg80211_michael_mic_failure/
Dformat13 field:int key_id; offset:40; size:4; signed:1;
16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
/external/marisa-trie/lib/marisa/
Dagent.cc28 void Agent::set_query(std::size_t key_id) { in set_query() argument
32 query_.set_id(key_id); in set_query()
/external/perfetto/src/traced/probes/ftrace/test/data/android_walleye_OPM5.171019.017.A1_4.4.88/events/cfg80211/cfg80211_michael_mic_failure/
Dformat13 field:int key_id; offset:40; size:4; signed:1;
16 …, key id: %d, tsc: %pm", REC->name, REC->ifindex, (REC->addr), REC->key_type, REC->key_id, REC->tsc
/external/mesa3d/src/util/tests/hash_table/
Dclear.c35 static uint32_t key_id(const void *key) in key_id() function
87 assert(key_id(entry->key) < SIZE); in main()
/external/python/cpython3/Doc/includes/
Ddbpickle.py36 type_tag, key_id = pid
39 cursor.execute("SELECT * FROM memos WHERE key=?", (str(key_id),))
/external/ltp/testcases/kernel/controllers/memcg/functional/
Dmemcg_process.c36 static int key_id; /* used with opt_shm */ variable
71 key_id = atoi(optarg); in process_options()
217 key = ftok("/dev/null", key_id); in shm()
/external/iproute2/tc/
Dm_tunnel_key.c60 __be32 key_id; in tunnel_key_parse_key_id() local
63 ret = get_be32(&key_id, str, 10); in tunnel_key_parse_key_id()
65 addattr32(n, MAX_MSG, type, key_id); in tunnel_key_parse_key_id()

12345