HomeSort by relevance Sort by last modified time
    Searched defs:keyid (Results 1 - 17 of 17) sorted by null

  /external/ltp/testcases/kernel/syscalls/request_key/
request_key04.c 36 key_serial_t keyid; local
58 &keyid, sizeof(keyid)));
70 &keyid, sizeof(keyid)));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 49 byte[] keyid)
51 this.keyidentifier = Arrays.clone(keyid);
55 ASN1OctetString keyid)
57 this(keyid.getOctets());
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 51 byte[] keyid)
53 this.keyidentifier = Arrays.clone(keyid);
57 ASN1OctetString keyid)
59 this(keyid.getOctets());
  /external/ltp/testcases/kernel/syscalls/keyctl/
keyctl05.c 96 key_serial_t keyid; local
122 keyid = TST_RET;
128 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL));
136 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen));
158 key_serial_t keyid; local
169 keyid = TST_RET;
176 TEST(keyctl(KEYCTL_SETPERM, keyid, perm));
185 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload)));
  /external/boringssl/src/crypto/x509v3/
v3_akey.c 97 if (akeyid->keyid) {
98 tmp = x509v3_bytes_to_hex(akeyid->keyid->data, akeyid->keyid->length);
99 X509V3_add_value("keyid", tmp, &extlist);
113 * Currently two options: keyid: use the issuers subject keyid, the value
116 * is to only use this if keyid is not present. With the option 'always' this
124 char keyid = 0, issuer = 0; local
139 if (!strcmp(cnf->name, "keyid")) {
140 keyid = 1
    [all...]
  /external/iproute2/ip/
ipseg6.c 36 fprintf(stderr, " ip sr hmac set KEYID ALGO\n");
53 __u32 keyid; member in struct:__anon24781
144 addattr32(&req.n, sizeof(req), SEG6_ATTR_HMACKEYID, opts.keyid);
205 if (get_u32(&opts.keyid, *argv, 0) || opts.keyid == 0)
206 invarg("hmac KEYID value is invalid", *argv);
  /external/wpa_supplicant_8/src/ap/
ctrl_iface_ap.c 210 const char *keyid; local
345 keyid = ap_sta_wpa_get_keyid(hapd, sta);
346 if (keyid) {
347 ret = os_snprintf(buf + len, buflen - len, "keyid=%s\n", keyid);
sta_info.c 1243 const char *keyid; local
    [all...]
ap_config.c 262 const char *keyid; local
300 keyid = NULL;
311 if (!os_strcmp(name, "keyid")) {
312 keyid = value;
374 if (keyid) {
375 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid));
376 if ((size_t) len >= sizeof(psk->keyid)) {
378 "PSK keyid too long on line %d in '%s'"
    [all...]
ap_config.h 151 char keyid[KEYID_LEN]; member in struct:hostapd_wpa_psk
  /external/openssh/
ssh-pkcs11.c 71 char *keyid; member in struct:pkcs11_key
185 free(k11->keyid);
284 key_filter[1].pValue = k11->keyid;
326 k11->keyid = xmalloc(k11->keyid_len);
327 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
monitor.c 606 u_int keyid; local
611 if ((r = sshbuf_get_u32(m, &keyid)) != 0 ||
615 if (keyid > INT_MAX)
636 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
637 fatal("%s: no hostkey for index %d", __func__, keyid);
661 if ((key = get_hostkey_by_index(keyid)) != NULL) {
666 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
674 fatal("%s: no hostkey from index %d", __func__, keyid);
    [all...]
  /external/e2fsprogs/misc/
e4crypt.c 803 long keyid, ret; local
810 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL);
811 if (keyid < 0) {
820 printf("Switched invoking process to new session keyring %ld\n", keyid);
  /external/f2fs-tools/tools/
f2fscrypt.c 844 long keyid, ret; local
851 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL);
852 if (keyid < 0) {
861 printf("Switched invoking process to new session keyring %ld\n", keyid);
  /external/wpa_supplicant_8/src/common/
wpa_common.h 297 u8 keyid[2]; member in struct:wpa_igtk_kde
  /external/boringssl/src/include/openssl/
x509.h 235 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
    [all...]
x509v3.h 270 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st

Completed in 631 milliseconds