Home
last modified time | relevance | path

Searched refs:keyid (Results 1 – 25 of 44) sorted by relevance

12

/external/boringssl/src/crypto/x509/
Dx_x509a.c77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
113 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1()
115 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1()
116 x->aux->keyid = NULL; in X509_keyid_set1()
121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1()
123 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1()
137 if (!x->aux || !x->aux->keyid) in X509_keyid_get0()
140 *len = x->aux->keyid->length; in X509_keyid_get0()
141 return x->aux->keyid->data; in X509_keyid_get0()
Dt_x509a.c104 if (aux->keyid) { in X509_CERT_AUX_print()
106 for (j = 0; j < aux->keyid->length; j++) in X509_CERT_AUX_print()
107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]); in X509_CERT_AUX_print()
/external/boringssl/src/crypto/x509v3/
Dv3_akey.c94 if (akeyid->keyid) { in STACK_OF()
95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF()
121 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
137 keyid = 1; in v2i_AUTHORITY_KEYID()
139 keyid = 2; in v2i_AUTHORITY_KEYID()
160 if (keyid) { in v2i_AUTHORITY_KEYID()
164 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID()
195 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
Dv3_akeya.c67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
/external/openssh/regress/
Dkrl.sh48 touch $OBJ/revoked-keyid
52 echo "id: revoked $n" >> $OBJ/revoked-keyid
103 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
108 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
109 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
113 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
157 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
161 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG"
179 $OBJ/krl-ca $OBJ/krl-serial $OBJ/krl-keyid \
180 $OBJ/krl-serial-wild $OBJ/krl-keyid-wild; do
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
DSubjectKeyIdentifier.java49 byte[] keyid) in SubjectKeyIdentifier() argument
51 this.keyidentifier = Arrays.clone(keyid); in SubjectKeyIdentifier()
55 ASN1OctetString keyid) in SubjectKeyIdentifier() argument
57 this(keyid.getOctets()); in SubjectKeyIdentifier()
/external/ltp/testcases/kernel/security/mmc_security/
Dchange_password.sh46 keyid=$(keyctl request mmc "mmc:key")
47 if [ -z "$keyid" ]; then
68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
Dremove_password.sh48 keyid=$(keyctl request mmc "mmc:key")
49 if [ -z "$keyid" ]; then
/external/wpa_supplicant_8/hs20/server/ca/
Dopenssl.cnf117 authorityKeyIdentifier=keyid:always,issuer
174 authorityKeyIdentifier=keyid:always
186 authorityKeyIdentifier=keyid,issuer
196 authorityKeyIdentifier=keyid,issuer
/external/tcpdump/tests/
Dtcp-auth-heapoverflow.out2 …808464432:808476696, ack 808464432, win 12336, urg 12336, options [tcp-ao keyid 48 rnextkeyid 48 m…
/external/openssh/
Dssh-pkcs11.c71 char *keyid; member
185 free(k11->keyid); in pkcs11_rsa_finish()
284 key_filter[1].pValue = k11->keyid; in pkcs11_rsa_private_encrypt()
326 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_rsa_wrap()
327 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_rsa_wrap()
Dmonitor.c606 u_int keyid; in mm_answer_sign() local
611 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || in mm_answer_sign()
615 if (keyid > INT_MAX) in mm_answer_sign()
636 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) in mm_answer_sign()
637 fatal("%s: no hostkey for index %d", __func__, keyid); in mm_answer_sign()
661 if ((key = get_hostkey_by_index(keyid)) != NULL) { in mm_answer_sign()
666 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && in mm_answer_sign()
674 fatal("%s: no hostkey from index %d", __func__, keyid); in mm_answer_sign()
/external/curl/tests/certs/
DServer-localhost-sv.prm7 authorityKeyIdentifier = keyid
DServer-localhost.nn-sv.prm7 authorityKeyIdentifier = keyid
DServer-localhost0h-sv.prm8 authorityKeyIdentifier = keyid
DServer-localhost.nn-sv.pem7 authorityKeyIdentifier = keyid
81 keyid:12:CA:BA:4B:46:04:A7:75:8A:2C:E8:0E:54:94:BC:12:65:A6:7B:CE
DServer-localhost-sv.pem7 authorityKeyIdentifier = keyid
81 keyid:12:CA:BA:4B:46:04:A7:75:8A:2C:E8:0E:54:94:BC:12:65:A6:7B:CE
DServer-localhost0h-sv.pem8 authorityKeyIdentifier = keyid
82 keyid:12:CA:BA:4B:46:04:A7:75:8A:2C:E8:0E:54:94:BC:12:65:A6:7B:CE
/external/python/cpython2/Lib/msilib/
D__init__.py279 keyid = self.cab.gen_id(self.absolute, keyfile)
280 self.keyfiles[keyfile] = keyid
282 keyid = None
284 [(component, uuid, self.logical, flags, None, keyid)])
/external/e2fsprogs/misc/
De4crypt.c798 long keyid, ret; in do_new_session() local
805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); in do_new_session()
806 if (keyid < 0) { in do_new_session()
815 printf("Switched invoking process to new session keyring %ld\n", keyid); in do_new_session()
/external/f2fs-tools/tools/
Df2fscrypt.c837 long keyid, ret; in do_new_session() local
844 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); in do_new_session()
845 if (keyid < 0) { in do_new_session()
854 printf("Switched invoking process to new session keyring %ld\n", keyid); in do_new_session()
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
Dtpmtoken_import_openssl.cnf189 authorityKeyIdentifier=keyid,issuer:always
225 authorityKeyIdentifier=keyid:always,issuer:always
258 authorityKeyIdentifier=keyid:always,issuer:always
/external/python/cpython2/Tools/msi/
Dmsilib.py474 keyid = self.cab.gen_id(self.absolute, keyfile)
475 self.keyfiles[keyfile] = keyid
477 keyid = None
479 [(component, uuid, self.logical, flags, None, keyid)])
/external/conscrypt/openjdk/src/test/resources/
Dcert.pem29 keyid:5F:9D:88:0D:C8:73:E6:54:D4:F8:0D:D8:E6:B0:C1:24:B4:47:C3:55
Dca-cert.pem29 keyid:5F:9D:88:0D:C8:73:E6:54:D4:F8:0D:D8:E6:B0:C1:24:B4:47:C3:55

12