/external/boringssl/src/crypto/x509/ |
D | x_x509a.c | 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 113 if (!x || !x->aux || !x->aux->keyid) in X509_keyid_set1() 115 ASN1_OCTET_STRING_free(x->aux->keyid); in X509_keyid_set1() 116 x->aux->keyid = NULL; in X509_keyid_set1() 121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) in X509_keyid_set1() 123 return ASN1_STRING_set(aux->keyid, id, len); in X509_keyid_set1() 137 if (!x->aux || !x->aux->keyid) in X509_keyid_get0() 140 *len = x->aux->keyid->length; in X509_keyid_get0() 141 return x->aux->keyid->data; in X509_keyid_get0()
|
D | t_x509a.c | 104 if (aux->keyid) { in X509_CERT_AUX_print() 106 for (j = 0; j < aux->keyid->length; j++) in X509_CERT_AUX_print() 107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]); in X509_CERT_AUX_print()
|
/external/boringssl/src/crypto/x509v3/ |
D | v3_akey.c | 94 if (akeyid->keyid) { in STACK_OF() 95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 121 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 137 keyid = 1; in v2i_AUTHORITY_KEYID() 139 keyid = 2; in v2i_AUTHORITY_KEYID() 160 if (keyid) { in v2i_AUTHORITY_KEYID() 164 if (keyid == 2 && !ikeyid) { in v2i_AUTHORITY_KEYID() 195 akeyid->keyid = ikeyid; in v2i_AUTHORITY_KEYID()
|
D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
D | SubjectKeyIdentifier.java | 49 byte[] keyid) in SubjectKeyIdentifier() argument 51 this.keyidentifier = Arrays.clone(keyid); in SubjectKeyIdentifier() 55 ASN1OctetString keyid) in SubjectKeyIdentifier() argument 57 this(keyid.getOctets()); in SubjectKeyIdentifier()
|
/external/ltp/testcases/kernel/security/mmc_security/ |
D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | openssl.cnf | 117 authorityKeyIdentifier=keyid:always,issuer 174 authorityKeyIdentifier=keyid:always 186 authorityKeyIdentifier=keyid,issuer 196 authorityKeyIdentifier=keyid,issuer
|
D | openssl-root.cnf | 119 authorityKeyIdentifier=keyid:always
|
/external/openssh/ |
D | ssh-pkcs11.c | 71 char *keyid; member 185 free(k11->keyid); in pkcs11_rsa_finish() 284 key_filter[1].pValue = k11->keyid; in pkcs11_rsa_private_encrypt() 325 k11->keyid = xmalloc(k11->keyid_len); in pkcs11_rsa_wrap() 326 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len); in pkcs11_rsa_wrap()
|
D | monitor.c | 697 int r, keyid, is_proof = 0; in mm_answer_sign() local 702 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || in mm_answer_sign() 724 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) in mm_answer_sign() 725 fatal("%s: no hostkey for index %d", __func__, keyid); in mm_answer_sign() 749 if ((key = get_hostkey_by_index(keyid)) != NULL) { in mm_answer_sign() 754 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && in mm_answer_sign() 762 fatal("%s: no hostkey from index %d", __func__, keyid); in mm_answer_sign()
|
/external/curl/tests/certs/ |
D | Server-localhost-sv.prm | 7 authorityKeyIdentifier = keyid
|
D | Server-localhost.nn-sv.prm | 7 authorityKeyIdentifier = keyid
|
D | Server-localhost0h-sv.prm | 8 authorityKeyIdentifier = keyid
|
D | Server-localhost.nn-sv.pem | 7 authorityKeyIdentifier = keyid 81 keyid:12:CA:BA:4B:46:04:A7:75:8A:2C:E8:0E:54:94:BC:12:65:A6:7B:CE
|
D | Server-localhost-sv.pem | 7 authorityKeyIdentifier = keyid 81 keyid:12:CA:BA:4B:46:04:A7:75:8A:2C:E8:0E:54:94:BC:12:65:A6:7B:CE
|
D | Server-localhost0h-sv.pem | 8 authorityKeyIdentifier = keyid 82 keyid:12:CA:BA:4B:46:04:A7:75:8A:2C:E8:0E:54:94:BC:12:65:A6:7B:CE
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 798 long keyid, ret; in do_new_session() local 805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); in do_new_session() 806 if (keyid < 0) { in do_new_session() 815 printf("Switched invoking process to new session keyring %ld\n", keyid); in do_new_session()
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
D | tpmtoken_import_openssl.cnf | 189 authorityKeyIdentifier=keyid,issuer:always 225 authorityKeyIdentifier=keyid:always,issuer:always 258 authorityKeyIdentifier=keyid:always,issuer:always
|
/external/conscrypt/openjdk/src/test/resources/ |
D | cert.pem | 29 keyid:5F:9D:88:0D:C8:73:E6:54:D4:F8:0D:D8:E6:B0:C1:24:B4:47:C3:55
|
D | ca-cert.pem | 29 keyid:5F:9D:88:0D:C8:73:E6:54:D4:F8:0D:D8:E6:B0:C1:24:B4:47:C3:55
|
D | cert-ct-embedded.pem | 29 keyid:5F:9D:88:0D:C8:73:E6:54:D4:F8:0D:D8:E6:B0:C1:24:B4:47:C3:55
|
/external/autotest/client/site_tests/security_OpenSSLRegressions/src/ |
D | cert.pem | 34 keyid:EC:CB:48:85:6F:F6:87:56:D9:69:3A:7E:F6:34:AF:AB:77:40:02:1B
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/src/ |
D | cert.pem | 34 keyid:0B:41:3C:F3:D9:83:ED:B9:F6:7D:77:04:B4:0D:C7:BD:48:A6:57:ED
|
/external/autotest/client/site_tests/platform_AccurateTime/src/ |
D | cert.pem | 34 keyid:0B:41:3C:F3:D9:83:ED:B9:F6:7D:77:04:B4:0D:C7:BD:48:A6:57:ED
|