/third_party/node/deps/npm/node_modules/pacote/lib/ |
H A D | registry.js | 184 this.registryKeys.filter(key => (key.keyid === signature.keyid))[0] 187 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` + 197 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` + 212 `keyid: ${publicKey.keyid} and signature: ${signature.sig}` 215 keyid: publicKey.keyid, [all...] |
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | engine_loader.c | 29 * org.openssl.engine:{engineid}:{keyid} 39 char *keyid; member 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 71 char *keyid = NULL; in engine_open() local 91 keyid = OPENSSL_strdup(q + 1); in engine_open() 94 if (e != NULL && keyid != NULL) in engine_open() 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() [all...] |
/third_party/openssl/apps/lib/ |
H A D | engine_loader.c | 29 * org.openssl.engine:{engineid}:{keyid} 39 char *keyid; member 44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument 50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new() 59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free() 71 char *keyid = NULL; in engine_open() local 91 keyid = OPENSSL_strdup(q + 1); in engine_open() 94 if (e != NULL && keyid != NULL) in engine_open() 95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open() [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/witness/tlog/ |
H A D | entry.js | 88 const keyid = envelope.signatures[0].keyid; 98 // If the keyid is an empty string, Rekor seems to remove it altogether. We 101 if (keyid.length > 0) { 102 dsse.signatures[0].keyid = keyid; 121 // * keyid is included ONLY if it is NOT an empty string 131 // If the keyid is an empty string, Rekor seems to remove it altogether. 132 if (envelope.signatures[0].keyid.length > 0) { 133 dsse.signatures[0].keyid [all...] |
/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
H A D | keyctl05.c | 86 key_serial_t keyid; in test_update_nonupdatable() local 118 keyid = TST_RET; in test_update_nonupdatable() 124 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable() 132 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable() 154 key_serial_t keyid; in test_update_setperm_race() local 165 keyid = TST_RET; in test_update_setperm_race() 172 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race() 181 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 118 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument 120 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid() 184 int keyid; in get_new_keyid() local 190 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid() 191 if (keyid < cdev->kmap.size) { in get_new_keyid() 192 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid() 194 hws->rxkey = keyid; in get_new_keyid() 196 hws->txkey = keyid; in get_new_keyid() 199 keyid = -1; in get_new_keyid() 202 return keyid; in get_new_keyid() 233 keyid_to_addr(int start_addr, int keyid) keyid_to_addr() argument 366 int keyid; chtls_setkey() local [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 118 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument 120 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid() 184 int keyid; in get_new_keyid() local 190 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid() 191 if (keyid < cdev->kmap.size) { in get_new_keyid() 192 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid() 194 hws->rxkey = keyid; in get_new_keyid() 196 hws->txkey = keyid; in get_new_keyid() 199 keyid = -1; in get_new_keyid() 202 return keyid; in get_new_keyid() 233 keyid_to_addr(int start_addr, int keyid) keyid_to_addr() argument 366 int keyid; chtls_setkey() local [all...] |
/third_party/ltp/testcases/kernel/syscalls/request_key/ |
H A D | request_key04.c | 24 key_serial_t keyid; in do_test() local 46 &keyid, sizeof(keyid))); in do_test() 58 &keyid, sizeof(keyid))); in do_test()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF() 89 * keyid: use the issuers subject keyid, the value 'always' means its is 92 * to only use this if keyid is not present. With the option 'always' 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID() 123 keyid in v2i_AUTHORITY_KEYID() [all...] |
/third_party/openssl/crypto/x509/ |
H A D | v3_akid.c | 46 if (akeyid->keyid) { in STACK_OF() 47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF() 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF() 89 * keyid: use the issuers subject keyid, the value 'always' means its is 92 * to only use this if keyid is not present. With the option 'always' 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID() 123 keyid in v2i_AUTHORITY_KEYID() [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/ |
H A D | envelope.js | 31 return { sig: Buffer.alloc(0), keyid: "" }; 37 keyid: isSet(object.keyid) ? String(object.keyid) : "", 43 message.keyid !== undefined && (obj.keyid = message.keyid);
|
/kernel/linux/linux-5.10/drivers/staging/rtl8723bs/core/ |
H A D | rtw_ioctl_set.c | 578 sint keyid, res; in rtw_set_802_11_add_wep() local 582 keyid = wep->KeyIndex & 0x3fffffff; in rtw_set_802_11_add_wep() 584 if (keyid >= 4) { in rtw_set_802_11_add_wep() 585 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_, ("MgntActrtw_set_802_11_add_wep:keyid>4 =>fail\n")); in rtw_set_802_11_add_wep() 606 ("rtw_set_802_11_add_wep:before memcpy, wep->KeyLength = 0x%x wep->KeyIndex = 0x%x keyid =%x\n", in rtw_set_802_11_add_wep() 607 wep->KeyLength, wep->KeyIndex, keyid)); in rtw_set_802_11_add_wep() 609 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->KeyMaterial), wep->KeyLength); in rtw_set_802_11_add_wep() 611 psecuritypriv->dot11DefKeylen[keyid] = wep->KeyLength; in rtw_set_802_11_add_wep() 613 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep() 616 psecuritypriv->dot11DefKey[keyid] in rtw_set_802_11_add_wep() [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8188eu/core/ |
H A D | rtw_ioctl_set.c | 472 int keyid, res; in rtw_set_802_11_add_wep() local 476 keyid = wep->KeyIndex & 0x3fffffff; in rtw_set_802_11_add_wep() 478 if (keyid >= 4) { in rtw_set_802_11_add_wep() 479 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_, ("MgntActrtw_set_802_11_add_wep:keyid>4 =>fail\n")); in rtw_set_802_11_add_wep() 499 ("%s:before memcpy, wep->KeyLength = 0x%x wep->KeyIndex = 0x%x keyid =%x\n", __func__, in rtw_set_802_11_add_wep() 500 wep->KeyLength, wep->KeyIndex, keyid)); in rtw_set_802_11_add_wep() 502 memcpy(&psecuritypriv->dot11DefKey[keyid].skey[0], in rtw_set_802_11_add_wep() 505 psecuritypriv->dot11DefKeylen[keyid] = wep->KeyLength; in rtw_set_802_11_add_wep() 507 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep() 511 psecuritypriv->dot11DefKey[keyid] in rtw_set_802_11_add_wep() [all...] |
H A D | rtw_pwrctrl.c | 160 int keyid; in ips_leave() local 179 for (keyid = 0; keyid < 4; keyid++) { in ips_leave() 180 if (pmlmepriv->key_mask & BIT(keyid)) { in ips_leave() 181 if (keyid == psecuritypriv->dot11PrivacyKeyIndex) in ips_leave() 182 result = rtw_set_key(padapter, psecuritypriv, keyid, 1); in ips_leave() 184 result = rtw_set_key(padapter, psecuritypriv, keyid, 0); in ips_leave()
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 21 unsigned char *keyid, 47 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local 71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 79 pkeyid = keyid; in PKCS12_create_ex() 115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 160 unsigned char *keyid, in STACK_OF() 172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in STACK_OF() 189 unsigned char *keyid = NULL; in STACK_OF() local 196 keyid in STACK_OF() [all...] |
/third_party/ltp/testcases/kernel/security/mmc_security/ |
H A D | change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
H A D | remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 41 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local 62 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 70 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 101 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex() 147 unsigned char *keyid; in STACK_OF() local 163 keyid = X509_keyid_get0(cert, &keyidlen); in STACK_OF() 165 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in STACK_OF()
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid in CMS_RecipientEncryptedKey_get0_id() 55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument 113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_kari.c | 58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id() 73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id() 86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id() 114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id() 126 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id() 133 if (keyid) in CMS_RecipientEncryptedKey_get0_id() 134 *keyid in CMS_RecipientEncryptedKey_get0_id() 55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument 113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8712/ |
H A D | rtl871x_ioctl_set.c | 333 sint keyid; in r8712_set_802_11_add_wep() local 336 keyid = wep->KeyIndex & 0x3fffffff; in r8712_set_802_11_add_wep() 337 if (keyid >= WEP_KEYS) in r8712_set_802_11_add_wep() 350 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial, in r8712_set_802_11_add_wep() 352 psecuritypriv->DefKeylen[keyid] = wep->KeyLength; in r8712_set_802_11_add_wep() 353 psecuritypriv->PrivacyKeyIndex = keyid; in r8712_set_802_11_add_wep() 354 return r8712_set_key(padapter, psecuritypriv, keyid); in r8712_set_802_11_add_wep()
|
/kernel/linux/linux-6.6/drivers/staging/rtl8712/ |
H A D | rtl871x_ioctl_set.c | 332 sint keyid; in r8712_set_802_11_add_wep() local 335 keyid = wep->KeyIndex & 0x3fffffff; in r8712_set_802_11_add_wep() 336 if (keyid >= WEP_KEYS) in r8712_set_802_11_add_wep() 349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial, in r8712_set_802_11_add_wep() 351 psecuritypriv->DefKeylen[keyid] = wep->KeyLength; in r8712_set_802_11_add_wep() 352 psecuritypriv->PrivacyKeyIndex = keyid; in r8712_set_802_11_add_wep() 353 return r8712_set_key(padapter, psecuritypriv, keyid); in r8712_set_802_11_add_wep()
|
/kernel/linux/linux-5.10/drivers/nvdimm/ |
H A D | security.c | 242 static int security_disable(struct nvdimm *nvdimm, unsigned int keyid) in security_disable() argument 261 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_disable() 275 static int security_update(struct nvdimm *nvdimm, unsigned int keyid, in security_update() argument 296 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_update() 325 static int security_erase(struct nvdimm *nvdimm, unsigned int keyid, in security_erase() argument 352 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_erase() 367 static int security_overwrite(struct nvdimm *nvdimm, unsigned int keyid) in security_overwrite() argument 386 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_overwrite()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | tc_tun_vxlan.c | 122 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_vxlan() 137 be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_vxlan() 139 be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_vxlan()
|
/kernel/linux/linux-5.10/security/integrity/ |
H A D | digsig_asymmetric.c | 22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument 27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key() 101 key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid)); in asymmetric_verify()
|