/external/ltp/testcases/kernel/security/mmc_security/ |
H A D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
H A D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | SubjectKeyIdentifier.java | 49 byte[] keyid) 51 this.keyidentifier = Arrays.clone(keyid); 55 ASN1OctetString keyid) 57 this(keyid.getOctets()); 48 SubjectKeyIdentifier( byte[] keyid) argument 54 SubjectKeyIdentifier( ASN1OctetString keyid) argument
|
/external/boringssl/src/crypto/x509/ |
H A D | x_x509a.c | 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 113 if (!x || !x->aux || !x->aux->keyid) 115 ASN1_OCTET_STRING_free(x->aux->keyid); 116 x->aux->keyid = NULL; 121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) 123 return ASN1_STRING_set(aux->keyid, id, len); 137 if (!x->aux || !x->aux->keyid) 140 *len = x->aux->keyid->length; 141 return x->aux->keyid [all...] |
H A D | t_x509a.c | 104 if (aux->keyid) { 106 for (j = 0; j < aux->keyid->length; j++) 107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]);
|
/external/boringssl/src/crypto/x509v3/ |
H A D | v3_akey.c | 94 if (akeyid->keyid) { 95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 96 X509V3_add_value("keyid", tmp, &extlist); 110 * Currently two options: keyid: use the issuers subject keyid, the value 113 * is to only use this if keyid is not present. With the option 'always' this 121 char keyid = 0, issuer = 0; local 136 if (!strcmp(cnf->name, "keyid")) { 137 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
H A D | v3_purp.c | 836 if (akid->keyid && issuer->skid && 837 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid))
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
H A D | tpmtoken_import_openssl.cnf | 189 authorityKeyIdentifier=keyid,issuer:always 225 authorityKeyIdentifier=keyid:always,issuer:always 258 authorityKeyIdentifier=keyid:always,issuer:always
|
/external/openssh/ |
H A D | ssh-pkcs11.c | 71 char *keyid; member in struct:pkcs11_key 185 free(k11->keyid); 284 key_filter[1].pValue = k11->keyid; 325 k11->keyid = xmalloc(k11->keyid_len); 326 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
H A D | monitor.c | 697 int r, keyid, is_proof = 0; local 702 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || 724 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) 725 fatal("%s: no hostkey for index %d", __func__, keyid); 749 if ((key = get_hostkey_by_index(keyid)) != NULL) { 754 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && 762 fatal("%s: no hostkey from index %d", __func__, keyid);
|
/external/e2fsprogs/misc/ |
H A D | e4crypt.c | 798 long keyid, ret; local 805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); 806 if (keyid < 0) { 815 printf("Switched invoking process to new session keyring %ld\n", keyid);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 294 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 294 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 294 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/boringssl/include/openssl/ |
H A D | x509v3.h | 258 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
H A D | x509.h | 238 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|
/external/boringssl/src/include/openssl/ |
H A D | x509v3.h | 258 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
H A D | x509.h | 238 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|
/external/ipsec-tools/src/racoon/ |
H A D | cftoken.l | 549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 944 keyidx = WPA_GET_LE16(igtk->keyid); 945 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d " 3134 os_memcpy(igd.keyid, buf + 2, 2); 3137 keyidx = WPA_GET_LE16(igd.keyid);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 944 keyidx = WPA_GET_LE16(igtk->keyid); 945 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d " 3134 os_memcpy(igd.keyid, buf + 2, 2); 3137 keyidx = WPA_GET_LE16(igd.keyid);
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 944 keyidx = WPA_GET_LE16(igtk->keyid); 945 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d " 3134 os_memcpy(igd.keyid, buf + 2, 2); 3137 keyidx = WPA_GET_LE16(igd.keyid);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 2640 igtk.keyid[0] = gsm->GN_igtk; 2641 igtk.keyid[1] = 0;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 2640 igtk.keyid[0] = gsm->GN_igtk; 2641 igtk.keyid[1] = 0;
|