/third_party/node/deps/npm/node_modules/pacote/lib/ |
H A D | registry.js | 184 this.registryKeys.filter(key => (key.keyid === signature.keyid))[0] 187 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` + 197 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` + 212 `keyid: ${publicKey.keyid} and signature: ${signature.sig}` 215 keyid: publicKey.keyid, [all...] |
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | engine_loader.c | 29 * org.openssl.engine:{engineid}:{keyid} 39 char *keyid; member 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 71 char *keyid = NULL; in engine_open() local 91 keyid = OPENSSL_strdup(q + 1); in engine_open() 94 if (e != NULL && keyid != NULL) in engine_open() 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() [all...] |
/third_party/openssl/apps/lib/ |
H A D | engine_loader.c | 29 * org.openssl.engine:{engineid}:{keyid} 39 char *keyid; member 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 71 char *keyid = NULL; in engine_open() local 91 keyid = OPENSSL_strdup(q + 1); in engine_open() 94 if (e != NULL && keyid != NULL) in engine_open() 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/witness/tlog/ |
H A D | entry.js | 88 const keyid = envelope.signatures[0].keyid; 98 // If the keyid is an empty string, Rekor seems to remove it altogether. We 101 if (keyid.length > 0) { 102 dsse.signatures[0].keyid = keyid; 121 // * keyid is included ONLY if it is NOT an empty string 131 // If the keyid is an empty string, Rekor seems to remove it altogether. 132 if (envelope.signatures[0].keyid.length > 0) { 133 dsse.signatures[0].keyid [all...] |
/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
H A D | keyctl05.c | 86 key_serial_t keyid; in test_update_nonupdatable() local 118 keyid = TST_RET; in test_update_nonupdatable() 124 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable() 132 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable() 154 key_serial_t keyid; in test_update_setperm_race() local 165 keyid = TST_RET; in test_update_setperm_race() 172 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race() 181 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF() 89 * keyid: use the issuers subject keyid, the value 'always' means its is 92 * to only use this if keyid is not present. With the option 'always' 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID() 123 keyid in v2i_AUTHORITY_KEYID() [all...] |
H A D | t_x509.c | 344 const unsigned char *alias, *keyid; in X509_aux_print() local 384 keyid = X509_keyid_get0(x, &keyidlen); in X509_aux_print() 385 if (keyid) { in X509_aux_print() 388 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]); in X509_aux_print()
|
/third_party/openssl/crypto/x509/ |
H A D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF() 89 * keyid: use the issuers subject keyid, the value 'always' means its is 92 * to only use this if keyid is not present. With the option 'always' 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID() 123 keyid in v2i_AUTHORITY_KEYID() [all...] |
H A D | t_x509.c | 346 const unsigned char *alias, *keyid; in X509_aux_print() local 386 keyid = X509_keyid_get0(x, &keyidlen); in X509_aux_print() 387 if (keyid) { in X509_aux_print() 390 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]); in X509_aux_print()
|
/third_party/ltp/testcases/kernel/syscalls/request_key/ |
H A D | request_key04.c | 24 key_serial_t keyid; in do_test() local 46 &keyid, sizeof(keyid))); in do_test() 58 &keyid, sizeof(keyid))); in do_test()
|
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/ |
H A D | envelope.js | 31 return { sig: Buffer.alloc(0), keyid: "" }; 37 keyid: isSet(object.keyid) ? String(object.keyid) : "", 43 message.keyid !== undefined && (obj.keyid = message.keyid);
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 21 unsigned char *keyid, 47 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local 71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 79 pkeyid = keyid; in PKCS12_create_ex() 115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 160 unsigned char *keyid, in STACK_OF() 172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in STACK_OF() 189 unsigned char *keyid = NULL; in STACK_OF() local 196 keyid in STACK_OF() [all...] |
/third_party/ltp/testcases/kernel/security/mmc_security/ |
H A D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
H A D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 41 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local 62 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 70 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 101 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 147 unsigned char *keyid; in STACK_OF() local 163 keyid = X509_keyid_get0(cert, &keyidlen); in STACK_OF() 165 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in STACK_OF()
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid in CMS_RecipientEncryptedKey_get0_id() 55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument 113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument [all...] |
H A D | cms_lib.c | 688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 694 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in ossl_cms_keyid_cert_cmp() 718 ASN1_OCTET_STRING *keyid = NULL; in ossl_cms_set1_keyid() local 725 keyid = ASN1_STRING_dup(cert_keyid); in ossl_cms_set1_keyid() 726 if (!keyid) { in ossl_cms_set1_keyid() 731 *pkeyid = keyid; in ossl_cms_set1_keyid()
|
/third_party/openssl/crypto/cms/ |
H A D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid in CMS_RecipientEncryptedKey_get0_id() 55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument 113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument [all...] |
H A D | cms_lib.c | 675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 681 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); in ossl_cms_keyid_cert_cmp() 705 ASN1_OCTET_STRING *keyid = NULL; in ossl_cms_set1_keyid() local 712 keyid = ASN1_STRING_dup(cert_keyid); in ossl_cms_set1_keyid() 713 if (!keyid) { in ossl_cms_set1_keyid() 718 *pkeyid = keyid; in ossl_cms_set1_keyid()
|
/third_party/node/tools/ |
H A D | release.sh | 46 gpgkey=$(gpg --list-secret-keys --keyid-format SHORT | awk -F'( +|/)' '/^(sec|ssb)/{print $3}') 70 gpgfing=$(gpg --keyid-format 0xLONG --fingerprint "$gpgkey" | grep 'Key fingerprint =' | awk -F' = ' '{print $2}' | tr -d ' ')
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | cms.h | 164 ASN1_OCTET_STRING **keyid, 229 ASN1_OCTET_STRING **keyid, 308 ASN1_OCTET_STRING **keyid, 315 ASN1_OCTET_STRING **keyid,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ap_config.c | 311 const char *keyid; in hostapd_config_read_wpa_psk() local 350 keyid = NULL; in hostapd_config_read_wpa_psk() 361 if (!os_strcmp(name, "keyid")) { in hostapd_config_read_wpa_psk() 362 keyid = value; in hostapd_config_read_wpa_psk() 428 if (keyid) { in hostapd_config_read_wpa_psk() 429 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid)); in hostapd_config_read_wpa_psk() 430 if ((size_t) len >= sizeof(psk->keyid)) { in hostapd_config_read_wpa_psk() 432 "PSK keyid to in hostapd_config_read_wpa_psk() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ap_config.c | 281 const char *keyid; in hostapd_config_read_wpa_psk() local 319 keyid = NULL; in hostapd_config_read_wpa_psk() 330 if (!os_strcmp(name, "keyid")) { in hostapd_config_read_wpa_psk() 331 keyid = value; in hostapd_config_read_wpa_psk() 393 if (keyid) { in hostapd_config_read_wpa_psk() 394 len = os_strlcpy(psk->keyid, keyid, sizeof(psk->keyid)); in hostapd_config_read_wpa_psk() 395 if ((size_t) len >= sizeof(psk->keyid)) { in hostapd_config_read_wpa_psk() 397 "PSK keyid to in hostapd_config_read_wpa_psk() [all...] |
/third_party/python/Lib/msilib/ |
H A D | __init__.py | 279 keyid = self.cab.gen_id(keyfile) 280 self.keyfiles[keyfile] = keyid 282 keyid = None 284 [(component, uuid, self.logical, flags, None, keyid)])
|
/third_party/node/deps/npm/node_modules/@sigstore/bundle/dist/ |
H A D | build.js | 60 keyid: options.keyHint || '',
|