Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 25 of 33) sorted by relevance

12

/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/
Dlayer1.py158 def create_grant(self, key_id, grantee_principal, argument
209 'KeyId': key_id,
306 def describe_key(self, key_id): argument
317 params = {'KeyId': key_id, }
321 def disable_key(self, key_id): argument
331 params = {'KeyId': key_id, }
335 def disable_key_rotation(self, key_id): argument
345 params = {'KeyId': key_id, }
349 def enable_key(self, key_id): argument
360 params = {'KeyId': key_id, }
[all …]
/external/tcpdump/
Dprint-ntp.c128 uint32_t key_id; member
306 ND_TCHECK(bp->key_id); in ntp_print()
307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
309 ND_TCHECK(bp->key_id); in ntp_print()
310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
Dprint-rsvp.c297 uint8_t key_id[6]; member
1653 EXTRACT_16BITS(obj_ptr.rsvp_obj_integrity->key_id), in rsvp_obj_print()
1654 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->key_id+2), in rsvp_obj_print()
Dprint-isoclns.c2084 u_short packet_len,pdu_len, key_id; in isis_print() local
2684 key_id = EXTRACT_16BITS((tptr+1)); in isis_print()
2685 ND_PRINT((ndo, "%u, password: ", key_id)); in isis_print()
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/
Dtest_kms.py41 self.service_connection.encrypt(key_id='foo', plaintext=data)
52 self.service_connection.encrypt(key_id='foo', plaintext=data)
/external/wpa_supplicant_8/wpa_supplicant/examples/
DopenCryptoki.conf34 key_id="4"
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/kms/
Dtest_kms.py40 key_id='nonexistant_key',
/external/dbus/dbus/
Ddbus-keyring.h46 int key_id,
Ddbus-keyring.c1008 int key_id, in _dbus_keyring_get_hex_key() argument
1015 key_id); in _dbus_keyring_get_hex_key()
/external/wpa_supplicant_8/src/eap_peer/
Deap_config.h532 char *key_id; member
Deap_tls_common.c106 params->key_id = config->key_id; in eap_tls_params_from_conf1()
129 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl.c1069 EVP_PKEY * EVP_PKEY_from_keystore(const char *key_id);
1073 const char *pin, const char *key_id, in tls_engine_init() argument
1080 if (!key_id) in tls_engine_init()
1083 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1087 key_id, in tls_engine_init()
1125 if (key_id) { in tls_engine_init()
1137 key_id, NULL, in tls_engine_init()
1144 key_id, in tls_engine_init()
3934 const char *key_id = params->key_id; in tls_connection_set_params() local
3956 if (!key_id && params->private_key && can_pkcs11 && in tls_connection_set_params()
[all …]
Dtls.h180 const char *key_id; member
/external/wpa_supplicant_8/src/common/
Dwpa_common.h181 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member
196 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1588 key_id="id_45"
Dconfig_winreg.c902 STR(key_id); in wpa_config_write_network()
/external/iw/
Devent.c200 __u8 key_id = nla_get_u8(attrs[NL80211_ATTR_KEY_IDX]); in parse_mic_failure() local
201 printf(" Key Id %d", key_id); in parse_mic_failure()
/external/iproute2/tc/
Dtc_bpf.c1418 uint32_t map_id, key_id; in bpf_fill_prog_arrays() local
1429 ret = sscanf(data.sec_name, "%i/%i", &map_id, &key_id); in bpf_fill_prog_arrays()
1441 ret = bpf_map_update(ctx->map_fds[idx], &key_id, in bpf_fill_prog_arrays()
/external/ipsec-tools/src/racoon/
Doakley.c1813 extern EVP_PKEY* EVP_PKEY_from_keystore(const char *key_id);
1831 const char *key_id; in keystore_sign() local
1832 if (sscanf(path, pname, &key_id) != 1) { in keystore_sign()
1838 evp = ENGINE_load_private_key(engine, key_id, NULL, NULL); in keystore_sign()
1840 evp = EVP_PKEY_from_keystore(key_id); in keystore_sign()
/external/libvpx/libvpx/third_party/libwebm/
Dmkvparser.hpp221 unsigned char* key_id; member
Dmkvparser.cpp4082 key_id(NULL), in ContentEncryption()
4092 delete[] key_id; in ~ContentEncryption()
4368 delete[] encryption->key_id; in ParseEncryptionEntry()
4369 encryption->key_id = NULL; in ParseEncryptionEntry()
4387 encryption->key_id = buf; in ParseEncryptionEntry()
/external/libvpx/libwebm/mkvparser/
Dmkvparser.h219 unsigned char* key_id; member
Dmkvparser.cc4081 key_id(NULL), in ContentEncryption()
4091 delete[] key_id; in ~ContentEncryption()
4367 delete[] encryption->key_id; in ParseEncryptionEntry()
4368 encryption->key_id = NULL; in ParseEncryptionEntry()
4386 encryption->key_id = buf; in ParseEncryptionEntry()
/external/conscrypt/src/main/java/org/conscrypt/
DNativeCrypto.java73 …public static native long ENGINE_load_private_key(long e, String key_id) throws InvalidKeyExceptio… in ENGINE_load_private_key() argument
/external/wpa_supplicant_8/src/drivers/
Ddriver_nl80211_event.c905 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); in mlme_event_michael_mic_failure() local
906 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id); in mlme_event_michael_mic_failure()

12