/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/ |
D | layer1.py | 158 def create_grant(self, key_id, grantee_principal, argument 209 'KeyId': key_id, 306 def describe_key(self, key_id): argument 317 params = {'KeyId': key_id, } 321 def disable_key(self, key_id): argument 331 params = {'KeyId': key_id, } 335 def disable_key_rotation(self, key_id): argument 345 params = {'KeyId': key_id, } 349 def enable_key(self, key_id): argument 360 params = {'KeyId': key_id, } [all …]
|
/external/tcpdump/ |
D | print-ntp.c | 128 uint32_t key_id; member 306 ND_TCHECK(bp->key_id); in ntp_print() 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print() 309 ND_TCHECK(bp->key_id); in ntp_print() 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); in ntp_print()
|
D | print-rsvp.c | 297 uint8_t key_id[6]; member 1653 EXTRACT_16BITS(obj_ptr.rsvp_obj_integrity->key_id), in rsvp_obj_print() 1654 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->key_id+2), in rsvp_obj_print()
|
D | print-isoclns.c | 2084 u_short packet_len,pdu_len, key_id; in isis_print() local 2684 key_id = EXTRACT_16BITS((tptr+1)); in isis_print() 2685 ND_PRINT((ndo, "%u, password: ", key_id)); in isis_print()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/ |
D | test_kms.py | 41 self.service_connection.encrypt(key_id='foo', plaintext=data) 52 self.service_connection.encrypt(key_id='foo', plaintext=data)
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | openCryptoki.conf | 34 key_id="4"
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/kms/ |
D | test_kms.py | 40 key_id='nonexistant_key',
|
/external/dbus/dbus/ |
D | dbus-keyring.h | 46 int key_id,
|
D | dbus-keyring.c | 1008 int key_id, in _dbus_keyring_get_hex_key() argument 1015 key_id); in _dbus_keyring_get_hex_key()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_config.h | 532 char *key_id; member
|
D | eap_tls_common.c | 106 params->key_id = config->key_id; in eap_tls_params_from_conf1() 129 params->key_id = config->key2_id; in eap_tls_params_from_conf2()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 1069 EVP_PKEY * EVP_PKEY_from_keystore(const char *key_id); 1073 const char *pin, const char *key_id, in tls_engine_init() argument 1080 if (!key_id) in tls_engine_init() 1083 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init() 1087 key_id, in tls_engine_init() 1125 if (key_id) { in tls_engine_init() 1137 key_id, NULL, in tls_engine_init() 1144 key_id, in tls_engine_init() 3934 const char *key_id = params->key_id; in tls_connection_set_params() local 3956 if (!key_id && params->private_key && can_pkcs11 && in tls_connection_set_params() [all …]
|
D | tls.h | 180 const char *key_id; member
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 181 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member 196 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1588 key_id="id_45"
|
D | config_winreg.c | 902 STR(key_id); in wpa_config_write_network()
|
/external/iw/ |
D | event.c | 200 __u8 key_id = nla_get_u8(attrs[NL80211_ATTR_KEY_IDX]); in parse_mic_failure() local 201 printf(" Key Id %d", key_id); in parse_mic_failure()
|
/external/iproute2/tc/ |
D | tc_bpf.c | 1418 uint32_t map_id, key_id; in bpf_fill_prog_arrays() local 1429 ret = sscanf(data.sec_name, "%i/%i", &map_id, &key_id); in bpf_fill_prog_arrays() 1441 ret = bpf_map_update(ctx->map_fds[idx], &key_id, in bpf_fill_prog_arrays()
|
/external/ipsec-tools/src/racoon/ |
D | oakley.c | 1813 extern EVP_PKEY* EVP_PKEY_from_keystore(const char *key_id); 1831 const char *key_id; in keystore_sign() local 1832 if (sscanf(path, pname, &key_id) != 1) { in keystore_sign() 1838 evp = ENGINE_load_private_key(engine, key_id, NULL, NULL); in keystore_sign() 1840 evp = EVP_PKEY_from_keystore(key_id); in keystore_sign()
|
/external/libvpx/libvpx/third_party/libwebm/ |
D | mkvparser.hpp | 221 unsigned char* key_id; member
|
D | mkvparser.cpp | 4082 key_id(NULL), in ContentEncryption() 4092 delete[] key_id; in ~ContentEncryption() 4368 delete[] encryption->key_id; in ParseEncryptionEntry() 4369 encryption->key_id = NULL; in ParseEncryptionEntry() 4387 encryption->key_id = buf; in ParseEncryptionEntry()
|
/external/libvpx/libwebm/mkvparser/ |
D | mkvparser.h | 219 unsigned char* key_id; member
|
D | mkvparser.cc | 4081 key_id(NULL), in ContentEncryption() 4091 delete[] key_id; in ~ContentEncryption() 4367 delete[] encryption->key_id; in ParseEncryptionEntry() 4368 encryption->key_id = NULL; in ParseEncryptionEntry() 4386 encryption->key_id = buf; in ParseEncryptionEntry()
|
/external/conscrypt/src/main/java/org/conscrypt/ |
D | NativeCrypto.java | 73 …public static native long ENGINE_load_private_key(long e, String key_id) throws InvalidKeyExceptio… in ENGINE_load_private_key() argument
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211_event.c | 905 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); in mlme_event_michael_mic_failure() local 906 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id); in mlme_event_michael_mic_failure()
|