/external/ltp/testcases/kernel/syscalls/request_key/ |
request_key04.c | 36 key_serial_t keyid; local 58 &keyid, sizeof(keyid))); 70 &keyid, sizeof(keyid)));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 49 byte[] keyid) 51 this.keyidentifier = Arrays.clone(keyid); 55 ASN1OctetString keyid) 57 this(keyid.getOctets());
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 51 byte[] keyid) 53 this.keyidentifier = Arrays.clone(keyid); 57 ASN1OctetString keyid) 59 this(keyid.getOctets());
|
/external/ltp/testcases/kernel/syscalls/keyctl/ |
keyctl05.c | 96 key_serial_t keyid; local 122 keyid = TST_RET; 128 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); 136 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); 158 key_serial_t keyid; local 169 keyid = TST_RET; 176 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); 185 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload)));
|
/external/boringssl/src/crypto/x509v3/ |
v3_akey.c | 97 if (akeyid->keyid) { 98 tmp = x509v3_bytes_to_hex(akeyid->keyid->data, akeyid->keyid->length); 99 X509V3_add_value("keyid", tmp, &extlist); 113 * Currently two options: keyid: use the issuers subject keyid, the value 116 * is to only use this if keyid is not present. With the option 'always' this 124 char keyid = 0, issuer = 0; local 139 if (!strcmp(cnf->name, "keyid")) { 140 keyid = 1 [all...] |
/external/iproute2/ip/ |
ipseg6.c | 36 fprintf(stderr, " ip sr hmac set KEYID ALGO\n"); 53 __u32 keyid; member in struct:__anon24781 144 addattr32(&req.n, sizeof(req), SEG6_ATTR_HMACKEYID, opts.keyid); 205 if (get_u32(&opts.keyid, *argv, 0) || opts.keyid == 0) 206 invarg("hmac KEYID value is invalid", *argv);
|
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.c | 210 const char *keyid; local 345 keyid = ap_sta_wpa_get_keyid(hapd, sta); 346 if (keyid) { 347 ret = os_snprintf(buf + len, buflen - len, "keyid=%s\n", keyid);
|
sta_info.c | 1243 const char *keyid; local [all...] |
ap_config.c | 262 const char *keyid; local 300 keyid = NULL; 311 if (!os_strcmp(name, "keyid")) { 312 keyid = value; 374 if (keyid) { 375 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid)); 376 if ((size_t) len >= sizeof(psk->keyid)) { 378 "PSK keyid too long on line %d in '%s'" [all...] |
ap_config.h | 151 char keyid[KEYID_LEN]; member in struct:hostapd_wpa_psk
|
/external/openssh/ |
ssh-pkcs11.c | 71 char *keyid; member in struct:pkcs11_key 185 free(k11->keyid); 284 key_filter[1].pValue = k11->keyid; 326 k11->keyid = xmalloc(k11->keyid_len); 327 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
monitor.c | 606 u_int keyid; local 611 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || 615 if (keyid > INT_MAX) 636 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) 637 fatal("%s: no hostkey for index %d", __func__, keyid); 661 if ((key = get_hostkey_by_index(keyid)) != NULL) { 666 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && 674 fatal("%s: no hostkey from index %d", __func__, keyid); [all...] |
/external/e2fsprogs/misc/ |
e4crypt.c | 803 long keyid, ret; local 810 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); 811 if (keyid < 0) { 820 printf("Switched invoking process to new session keyring %ld\n", keyid);
|
/external/f2fs-tools/tools/ |
f2fscrypt.c | 844 long keyid, ret; local 851 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); 852 if (keyid < 0) { 861 printf("Switched invoking process to new session keyring %ld\n", keyid);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 297 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/boringssl/src/include/openssl/ |
x509.h | 235 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st [all...] |
x509v3.h | 270 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|