/external/ltp/testcases/kernel/security/mmc_security/ |
H A D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
H A D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/external/ltp/testcases/kernel/syscalls/keyctl/ |
H A D | keyctl05.c | 99 key_serial_t keyid; local 125 keyid = TEST_RETURN; 131 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); 139 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); 161 key_serial_t keyid; local 172 keyid = TEST_RETURN; 179 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); 188 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload)));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | SubjectKeyIdentifier.java | 49 byte[] keyid) 51 this.keyidentifier = Arrays.clone(keyid); 55 ASN1OctetString keyid) 57 this(keyid.getOctets()); 48 SubjectKeyIdentifier( byte[] keyid) argument 54 SubjectKeyIdentifier( ASN1OctetString keyid) argument
|
/external/boringssl/src/crypto/x509/ |
H A D | x_x509a.c | 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 113 if (!x || !x->aux || !x->aux->keyid) 115 ASN1_OCTET_STRING_free(x->aux->keyid); 116 x->aux->keyid = NULL; 121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) 123 return ASN1_STRING_set(aux->keyid, id, len); 137 if (!x->aux || !x->aux->keyid) 140 *len = x->aux->keyid->length; 141 return x->aux->keyid [all...] |
H A D | t_x509a.c | 104 if (aux->keyid) { 106 for (j = 0; j < aux->keyid->length; j++) 107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]);
|
/external/boringssl/src/crypto/x509v3/ |
H A D | v3_akey.c | 94 if (akeyid->keyid) { 95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 96 X509V3_add_value("keyid", tmp, &extlist); 110 * Currently two options: keyid: use the issuers subject keyid, the value 113 * is to only use this if keyid is not present. With the option 'always' this 121 char keyid = 0, issuer = 0; local 136 if (!strcmp(cnf->name, "keyid")) { 137 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
H A D | v3_purp.c | 836 if (akid->keyid && issuer->skid && 837 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid))
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
H A D | tpmtoken_import_openssl.cnf | 189 authorityKeyIdentifier=keyid,issuer:always 225 authorityKeyIdentifier=keyid:always,issuer:always 258 authorityKeyIdentifier=keyid:always,issuer:always
|
/external/nos/host/generic/nugget/include/ |
H A D | signed_header.h | 86 printf("hdr.keyid : %08x\n", keyid); 132 uint32_t keyid; // word 7 of RWR 155 uint32_t keyid;
|
/external/iproute2/ip/ |
H A D | ipseg6.c | 53 __u32 keyid; member in struct:__anon8825 144 addattr32(&req.n, sizeof(req), SEG6_ATTR_HMACKEYID, opts.keyid); 205 if (get_u32(&opts.keyid, *argv, 0) || opts.keyid == 0)
|
H A D | ipmacsec.c | 790 SPRINT_BUF(keyid); 801 keyid, sizeof(keyid))); 859 SPRINT_BUF(keyid); 870 keyid, sizeof(keyid)));
|
/external/python/cpython2/Lib/msilib/ |
H A D | __init__.py | 279 keyid = self.cab.gen_id(self.absolute, keyfile) 280 self.keyfiles[keyfile] = keyid 282 keyid = None 284 [(component, uuid, self.logical, flags, None, keyid)])
|
/external/python/cpython3/Lib/msilib/ |
H A D | __init__.py | 278 keyid = self.cab.gen_id(self.absolute, keyfile) 279 self.keyfiles[keyfile] = keyid 281 keyid = None 283 [(component, uuid, self.logical, flags, None, keyid)])
|
/external/e2fsprogs/misc/ |
H A D | e4crypt.c | 798 long keyid, ret; local 805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); 806 if (keyid < 0) { 815 printf("Switched invoking process to new session keyring %ld\n", keyid);
|
/external/f2fs-tools/tools/ |
H A D | f2fscrypt.c | 842 long keyid, ret; local 849 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); 850 if (keyid < 0) { 859 printf("Switched invoking process to new session keyring %ld\n", keyid);
|
/external/python/cpython2/Tools/msi/ |
H A D | msilib.py | 474 keyid = self.cab.gen_id(self.absolute, keyfile) 475 self.keyfiles[keyfile] = keyid 477 keyid = None 479 [(component, uuid, self.logical, flags, None, keyid)])
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 292 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 292 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 292 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/boringssl/include/openssl/ |
H A D | x509v3.h | 270 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
H A D | x509.h | 235 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|
/external/boringssl/src/include/openssl/ |
H A D | x509v3.h | 270 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/external/ipsec-tools/src/racoon/ |
H A D | cftoken.l | 549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
|