/dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 51 byte[] keyid) 53 this.keyidentifier=keyid; 57 ASN1OctetString keyid) 59 this.keyidentifier=keyid.getOctets();
|
/external/openssl/crypto/x509v3/ |
v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid = 1 [all...] |
/packages/inputmethods/PinyinIME/src/com/android/inputmethod/pinyin/ |
SkbTemplate.java | 40 int keyId; 177 public void addDefaultKey(int keyId, SoftKey softKey) { 181 keyRecord.keyId = keyId; 187 if (mKeyRecords.get(pos).keyId >= keyId) break; 193 public SoftKey getDefaultKey(int keyId) { 198 if (keyRecord.keyId < keyId) { 202 if (keyRecord.keyId == keyId) [all...] |
/external/openssl/crypto/pkcs12/ |
p12_kiss.c | 70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 75 ASN1_OCTET_STRING **keyid, char *keymatch); 151 ASN1_OCTET_STRING *keyid = NULL; local 168 &keyid, &keymatch)) { 176 if (keyid) M_ASN1_OCTET_STRING_free(keyid); 183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 189 pass, passlen, pkey, cert, ca, keyid, 201 ASN1_OCTET_STRING **keyid, 220 if (*keyid) { [all...] |
p12_crt.c | 92 unsigned char keyid[EVP_MAX_MD_SIZE]; local 122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 130 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 161 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 203 unsigned char *keyid; local 219 keyid = X509_keyid_get0(cert, &keyidlen); 221 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/external/icu4c/common/ |
servslkf.cpp | 68 UnicodeString keyID; 69 lkey.currentID(keyID); 70 if (_id == keyID) {
|
/external/openssl/crypto/asn1/ |
x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid->data [all...] |
t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/external/openssl/android.testssl/ |
Uss.cnf | 32 authorityKeyIdentifier=keyid,issuer:always
|
CAss.cnf | 73 authorityKeyIdentifier=keyid:always,issuer:always
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
rsn.h | 96 typedef TI_STATUS (*rsn_setDefaultKeyId_t)(rsn_t *pMainSec, TI_UINT8 keyId); 204 TI_STATUS rsn_setDefaultKeyId(rsn_t *pMainSec, TI_UINT8 keyId);
|
keyTypes.h | 65 TI_UINT32 keyId; /**< Decoded key Id */
|
keyDeriveTkip.c | 116 key.keyIndex = (TI_UINT8)pEncodedKey->keyId; 130 if (pEncodedKey->keyId & 0x10000000) 183 key.keyIndex = (TI_UINT8)pEncodedKey->keyId;
|
keyDeriveWep.c | 123 key.keyIndex = (TI_UINT8)pEncodedKey->keyId; 161 key.keyIndex = (TI_UINT8)pEncodedKey->keyId; 202 key.keyIndex = (TI_UINT8)pEncodedKey->keyId;
|
mainSecSm.c | 86 TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, TI_UINT8 keyId); 381 TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, TI_UINT8 keyId) 390 status = pMainSec->pParent->setDefaultKeyId(pMainSec->pParent, keyId);
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
rsn.h | 96 typedef TI_STATUS (*rsn_setDefaultKeyId_t)(rsn_t *pMainSec, TI_UINT8 keyId); 199 TI_STATUS rsn_setDefaultKeyId(rsn_t *pMainSec, TI_UINT8 keyId);
|
keyTypes.h | 65 TI_UINT32 keyId; /**< Decoded key Id */
|
keyDeriveTkip.c | 116 key.keyIndex = (TI_UINT8)pEncodedKey->keyId; 130 if (pEncodedKey->keyId & 0x10000000) 183 key.keyIndex = (TI_UINT8)pEncodedKey->keyId;
|
keyDeriveWep.c | 123 key.keyIndex = (TI_UINT8)pEncodedKey->keyId; 161 key.keyIndex = (TI_UINT8)pEncodedKey->keyId; 202 key.keyIndex = (TI_UINT8)pEncodedKey->keyId;
|
mainSecSm.c | 86 TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, TI_UINT8 keyId); 380 TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, TI_UINT8 keyId) 389 status = pMainSec->pParent->setDefaultKeyId(pMainSec->pParent, keyId);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
keyDeriveTkip.c | 117 key.keyIndex = (UINT8)pEncodedKey->keyId; 131 if (pEncodedKey->keyId & 0x10000000) 184 key.keyIndex = (UINT8)pEncodedKey->keyId;
|
keyDeriveWep.c | 125 key.keyIndex = (UINT8)pEncodedKey->keyId; 163 key.keyIndex = (UINT8)pEncodedKey->keyId; 204 key.keyIndex = (UINT8)pEncodedKey->keyId;
|
mainSecSm.c | 94 TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, UINT8 keyId); 373 TI_STATUS mainSec_setDefaultKeyId(struct _mainSec_t *pMainSec, UINT8 keyId) 382 status = pMainSec->pParent->setDefaultKeyId(pMainSec->pParent, keyId);
|
/external/openssl/apps/ |
openssl-vms.cnf | 191 authorityKeyIdentifier=keyid,issuer 227 authorityKeyIdentifier=keyid:always,issuer:always 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always
|
openssl.cnf | 191 authorityKeyIdentifier=keyid,issuer 227 authorityKeyIdentifier=keyid:always,issuer:always 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always
|