Searched refs:keyid (Results 1 - 25 of 32) sorted by relevance

12

/external/ltp/testcases/kernel/security/mmc_security/
H A Dchange_password.sh46 keyid=$(keyctl request mmc "mmc:key")
47 if [ -z "$keyid" ]; then
68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
H A Dremove_password.sh48 keyid=$(keyctl request mmc "mmc:key")
49 if [ -z "$keyid" ]; then
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
H A DSubjectKeyIdentifier.java49 byte[] keyid)
51 this.keyidentifier = Arrays.clone(keyid);
55 ASN1OctetString keyid)
57 this(keyid.getOctets());
48 SubjectKeyIdentifier( byte[] keyid) argument
54 SubjectKeyIdentifier( ASN1OctetString keyid) argument
/external/boringssl/src/crypto/x509/
H A Dx_x509a.c77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
113 if (!x || !x->aux || !x->aux->keyid)
115 ASN1_OCTET_STRING_free(x->aux->keyid);
116 x->aux->keyid = NULL;
121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new()))
123 return ASN1_STRING_set(aux->keyid, id, len);
137 if (!x->aux || !x->aux->keyid)
140 *len = x->aux->keyid->length;
141 return x->aux->keyid
[all...]
H A Dt_x509a.c104 if (aux->keyid) {
106 for (j = 0; j < aux->keyid->length; j++)
107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]);
/external/boringssl/src/crypto/x509v3/
H A Dv3_akey.c94 if (akeyid->keyid) {
95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
96 X509V3_add_value("keyid", tmp, &extlist);
110 * Currently two options: keyid: use the issuers subject keyid, the value
113 * is to only use this if keyid is not present. With the option 'always' this
121 char keyid = 0, issuer = 0; local
136 if (!strcmp(cnf->name, "keyid")) {
137 keyid
[all...]
H A Dv3_akeya.c67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
H A Dv3_purp.c836 if (akid->keyid && issuer->skid &&
837 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid))
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
H A Dtpmtoken_import_openssl.cnf189 authorityKeyIdentifier=keyid,issuer:always
225 authorityKeyIdentifier=keyid:always,issuer:always
258 authorityKeyIdentifier=keyid:always,issuer:always
/external/openssh/
H A Dssh-pkcs11.c71 char *keyid; member in struct:pkcs11_key
185 free(k11->keyid);
284 key_filter[1].pValue = k11->keyid;
325 k11->keyid = xmalloc(k11->keyid_len);
326 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
H A Dmonitor.c697 int r, keyid, is_proof = 0; local
702 if ((r = sshbuf_get_u32(m, &keyid)) != 0 ||
724 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
725 fatal("%s: no hostkey for index %d", __func__, keyid);
749 if ((key = get_hostkey_by_index(keyid)) != NULL) {
754 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
762 fatal("%s: no hostkey from index %d", __func__, keyid);
/external/e2fsprogs/misc/
H A De4crypt.c798 long keyid, ret; local
805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL);
806 if (keyid < 0) {
815 printf("Switched invoking process to new session keyring %ld\n", keyid);
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.h294 u8 keyid[2]; member in struct:wpa_igtk_kde
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.h294 u8 keyid[2]; member in struct:wpa_igtk_kde
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.h294 u8 keyid[2]; member in struct:wpa_igtk_kde
/external/boringssl/include/openssl/
H A Dx509v3.h258 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
H A Dx509.h238 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
/external/boringssl/src/include/openssl/
H A Dx509v3.h258 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
H A Dx509.h238 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
/external/ipsec-tools/src/racoon/
H A Dcftoken.l549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c944 keyidx = WPA_GET_LE16(igtk->keyid);
945 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d "
3134 os_memcpy(igd.keyid, buf + 2, 2);
3137 keyidx = WPA_GET_LE16(igd.keyid);
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c944 keyidx = WPA_GET_LE16(igtk->keyid);
945 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d "
3134 os_memcpy(igd.keyid, buf + 2, 2);
3137 keyidx = WPA_GET_LE16(igd.keyid);
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c944 keyidx = WPA_GET_LE16(igtk->keyid);
945 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d "
3134 os_memcpy(igd.keyid, buf + 2, 2);
3137 keyidx = WPA_GET_LE16(igd.keyid);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c2640 igtk.keyid[0] = gsm->GN_igtk;
2641 igtk.keyid[1] = 0;
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.c2640 igtk.keyid[0] = gsm->GN_igtk;
2641 igtk.keyid[1] = 0;

Completed in 3371 milliseconds

12