Home
last modified time | relevance | path

Searched refs:keyid (Results 1 - 25 of 295) sorted by relevance

12345678910>>...12

/third_party/node/deps/npm/node_modules/pacote/lib/
H A Dregistry.js184 this.registryKeys.filter(key => (key.keyid === signature.keyid))[0]
187 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` +
197 `${mani._id} has a registry signature with keyid: ${signature.keyid} ` +
212 `keyid: ${publicKey.keyid} and signature: ${signature.sig}`
215 keyid: publicKey.keyid,
[all...]
/third_party/node/deps/openssl/openssl/apps/lib/
H A Dengine_loader.c29 * org.openssl.engine:{engineid}:{keyid}
39 char *keyid; member
44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument
50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new()
59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free()
71 char *keyid = NULL; in engine_open() local
91 keyid = OPENSSL_strdup(q + 1); in engine_open()
94 if (e != NULL && keyid != NULL) in engine_open()
95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open()
[all...]
/third_party/openssl/apps/lib/
H A Dengine_loader.c29 * org.openssl.engine:{engineid}:{keyid}
39 char *keyid; member
44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid) in OSSL_STORE_LOADER_CTX_new() argument
50 ctx->keyid = keyid; in OSSL_STORE_LOADER_CTX_new()
59 OPENSSL_free(ctx->keyid); in OSSL_STORE_LOADER_CTX_free()
71 char *keyid = NULL; in engine_open() local
91 keyid = OPENSSL_strdup(q + 1); in engine_open()
94 if (e != NULL && keyid != NULL) in engine_open()
95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid); in engine_open()
[all...]
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/witness/tlog/
H A Dentry.js88 const keyid = envelope.signatures[0].keyid;
98 // If the keyid is an empty string, Rekor seems to remove it altogether. We
101 if (keyid.length > 0) {
102 dsse.signatures[0].keyid = keyid;
121 // * keyid is included ONLY if it is NOT an empty string
131 // If the keyid is an empty string, Rekor seems to remove it altogether.
132 if (envelope.signatures[0].keyid.length > 0) {
133 dsse.signatures[0].keyid
[all...]
/third_party/ltp/testcases/kernel/syscalls/keyctl/
H A Dkeyctl05.c86 key_serial_t keyid; in test_update_nonupdatable() local
118 keyid = TST_RET; in test_update_nonupdatable()
124 TEST(keyctl(KEYCTL_SETPERM, keyid, KEY_POS_ALL)); in test_update_nonupdatable()
132 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, plen)); in test_update_nonupdatable()
154 key_serial_t keyid; in test_update_setperm_race() local
165 keyid = TST_RET; in test_update_setperm_race()
172 TEST(keyctl(KEYCTL_SETPERM, keyid, perm)); in test_update_setperm_race()
181 TEST(keyctl(KEYCTL_UPDATE, keyid, payload, sizeof(payload))); in test_update_setperm_race()
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c118 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument
120 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid()
184 int keyid; in get_new_keyid() local
190 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid()
191 if (keyid < cdev->kmap.size) { in get_new_keyid()
192 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid()
194 hws->rxkey = keyid; in get_new_keyid()
196 hws->txkey = keyid; in get_new_keyid()
199 keyid = -1; in get_new_keyid()
202 return keyid; in get_new_keyid()
233 keyid_to_addr(int start_addr, int keyid) keyid_to_addr() argument
366 int keyid; chtls_setkey() local
[all...]
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c118 static int chtls_set_tcb_keyid(struct sock *sk, int keyid) in chtls_set_tcb_keyid() argument
120 return chtls_set_tcb_field(sk, 31, 0xFFFFFFFFULL, keyid); in chtls_set_tcb_keyid()
184 int keyid; in get_new_keyid() local
190 keyid = find_first_zero_bit(cdev->kmap.addr, cdev->kmap.size); in get_new_keyid()
191 if (keyid < cdev->kmap.size) { in get_new_keyid()
192 __set_bit(keyid, cdev->kmap.addr); in get_new_keyid()
194 hws->rxkey = keyid; in get_new_keyid()
196 hws->txkey = keyid; in get_new_keyid()
199 keyid = -1; in get_new_keyid()
202 return keyid; in get_new_keyid()
233 keyid_to_addr(int start_addr, int keyid) keyid_to_addr() argument
366 int keyid; chtls_setkey() local
[all...]
/third_party/ltp/testcases/kernel/syscalls/request_key/
H A Drequest_key04.c24 key_serial_t keyid; in do_test() local
46 &keyid, sizeof(keyid))); in do_test()
58 &keyid, sizeof(keyid))); in do_test()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dv3_akid.c46 if (akeyid->keyid) { in STACK_OF()
47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF()
52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF()
89 * keyid: use the issuers subject keyid, the value 'always' means its is
92 * to only use this if keyid is not present. With the option 'always'
100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID()
123 keyid in v2i_AUTHORITY_KEYID()
[all...]
/third_party/openssl/crypto/x509/
H A Dv3_akid.c46 if (akeyid->keyid) { in STACK_OF()
47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length); in STACK_OF()
52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF()
89 * keyid: use the issuers subject keyid, the value 'always' means its is
92 * to only use this if keyid is not present. With the option 'always'
100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID()
123 keyid in v2i_AUTHORITY_KEYID()
[all...]
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/
H A Denvelope.js31 return { sig: Buffer.alloc(0), keyid: "" };
37 keyid: isSet(object.keyid) ? String(object.keyid) : "",
43 message.keyid !== undefined && (obj.keyid = message.keyid);
/kernel/linux/linux-5.10/drivers/staging/rtl8723bs/core/
H A Drtw_ioctl_set.c578 sint keyid, res; in rtw_set_802_11_add_wep() local
582 keyid = wep->KeyIndex & 0x3fffffff; in rtw_set_802_11_add_wep()
584 if (keyid >= 4) { in rtw_set_802_11_add_wep()
585 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_, ("MgntActrtw_set_802_11_add_wep:keyid>4 =>fail\n")); in rtw_set_802_11_add_wep()
606 ("rtw_set_802_11_add_wep:before memcpy, wep->KeyLength = 0x%x wep->KeyIndex = 0x%x keyid =%x\n", in rtw_set_802_11_add_wep()
607 wep->KeyLength, wep->KeyIndex, keyid)); in rtw_set_802_11_add_wep()
609 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]), &(wep->KeyMaterial), wep->KeyLength); in rtw_set_802_11_add_wep()
611 psecuritypriv->dot11DefKeylen[keyid] = wep->KeyLength; in rtw_set_802_11_add_wep()
613 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep()
616 psecuritypriv->dot11DefKey[keyid] in rtw_set_802_11_add_wep()
[all...]
/kernel/linux/linux-5.10/drivers/staging/rtl8188eu/core/
H A Drtw_ioctl_set.c472 int keyid, res; in rtw_set_802_11_add_wep() local
476 keyid = wep->KeyIndex & 0x3fffffff; in rtw_set_802_11_add_wep()
478 if (keyid >= 4) { in rtw_set_802_11_add_wep()
479 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_, ("MgntActrtw_set_802_11_add_wep:keyid>4 =>fail\n")); in rtw_set_802_11_add_wep()
499 ("%s:before memcpy, wep->KeyLength = 0x%x wep->KeyIndex = 0x%x keyid =%x\n", __func__, in rtw_set_802_11_add_wep()
500 wep->KeyLength, wep->KeyIndex, keyid)); in rtw_set_802_11_add_wep()
502 memcpy(&psecuritypriv->dot11DefKey[keyid].skey[0], in rtw_set_802_11_add_wep()
505 psecuritypriv->dot11DefKeylen[keyid] = wep->KeyLength; in rtw_set_802_11_add_wep()
507 psecuritypriv->dot11PrivacyKeyIndex = keyid; in rtw_set_802_11_add_wep()
511 psecuritypriv->dot11DefKey[keyid] in rtw_set_802_11_add_wep()
[all...]
H A Drtw_pwrctrl.c160 int keyid; in ips_leave() local
179 for (keyid = 0; keyid < 4; keyid++) { in ips_leave()
180 if (pmlmepriv->key_mask & BIT(keyid)) { in ips_leave()
181 if (keyid == psecuritypriv->dot11PrivacyKeyIndex) in ips_leave()
182 result = rtw_set_key(padapter, psecuritypriv, keyid, 1); in ips_leave()
184 result = rtw_set_key(padapter, psecuritypriv, keyid, 0); in ips_leave()
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_crt.c21 unsigned char *keyid,
47 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local
71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex()
79 pkeyid = keyid; in PKCS12_create_ex()
115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex()
160 unsigned char *keyid, in STACK_OF()
172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in STACK_OF()
189 unsigned char *keyid = NULL; in STACK_OF() local
196 keyid in STACK_OF()
[all...]
/third_party/ltp/testcases/kernel/security/mmc_security/
H A Dchange_password.sh46 keyid=$(keyctl request mmc "mmc:key")
47 if [ -z "$keyid" ]; then
68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
H A Dremove_password.sh48 keyid=$(keyctl request mmc "mmc:key")
49 if [ -z "$keyid" ]; then
/third_party/openssl/crypto/pkcs12/
H A Dp12_crt.c41 unsigned char keyid[EVP_MAX_MD_SIZE]; in PKCS12_create_ex() local
62 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex()
70 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex()
101 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in PKCS12_create_ex()
147 unsigned char *keyid; in STACK_OF() local
163 keyid = X509_keyid_get0(cert, &keyidlen); in STACK_OF()
165 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) in STACK_OF()
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_kari.c58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id()
73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id()
114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id()
126 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id()
133 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
134 *keyid in CMS_RecipientEncryptedKey_get0_id()
55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument
113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_kari.c58 ASN1_OCTET_STRING **keyid, in CMS_RecipientInfo_kari_get0_orig_id()
73 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
74 *keyid = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
85 if (keyid) in CMS_RecipientInfo_kari_get0_orig_id()
86 *keyid = oik->d.subjectKeyIdentifier; in CMS_RecipientInfo_kari_get0_orig_id()
114 ASN1_OCTET_STRING **keyid, in CMS_RecipientEncryptedKey_get0_id()
126 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
127 *keyid = NULL; in CMS_RecipientEncryptedKey_get0_id()
133 if (keyid) in CMS_RecipientEncryptedKey_get0_id()
134 *keyid in CMS_RecipientEncryptedKey_get0_id()
55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument
113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument
[all...]
/kernel/linux/linux-5.10/drivers/staging/rtl8712/
H A Drtl871x_ioctl_set.c333 sint keyid; in r8712_set_802_11_add_wep() local
336 keyid = wep->KeyIndex & 0x3fffffff; in r8712_set_802_11_add_wep()
337 if (keyid >= WEP_KEYS) in r8712_set_802_11_add_wep()
350 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial, in r8712_set_802_11_add_wep()
352 psecuritypriv->DefKeylen[keyid] = wep->KeyLength; in r8712_set_802_11_add_wep()
353 psecuritypriv->PrivacyKeyIndex = keyid; in r8712_set_802_11_add_wep()
354 return r8712_set_key(padapter, psecuritypriv, keyid); in r8712_set_802_11_add_wep()
/kernel/linux/linux-6.6/drivers/staging/rtl8712/
H A Drtl871x_ioctl_set.c332 sint keyid; in r8712_set_802_11_add_wep() local
335 keyid = wep->KeyIndex & 0x3fffffff; in r8712_set_802_11_add_wep()
336 if (keyid >= WEP_KEYS) in r8712_set_802_11_add_wep()
349 memcpy(psecuritypriv->DefKey[keyid].skey, &wep->KeyMaterial, in r8712_set_802_11_add_wep()
351 psecuritypriv->DefKeylen[keyid] = wep->KeyLength; in r8712_set_802_11_add_wep()
352 psecuritypriv->PrivacyKeyIndex = keyid; in r8712_set_802_11_add_wep()
353 return r8712_set_key(padapter, psecuritypriv, keyid); in r8712_set_802_11_add_wep()
/kernel/linux/linux-5.10/drivers/nvdimm/
H A Dsecurity.c242 static int security_disable(struct nvdimm *nvdimm, unsigned int keyid) in security_disable() argument
261 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_disable()
275 static int security_update(struct nvdimm *nvdimm, unsigned int keyid, in security_update() argument
296 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_update()
325 static int security_erase(struct nvdimm *nvdimm, unsigned int keyid, in security_erase() argument
352 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_erase()
367 static int security_overwrite(struct nvdimm *nvdimm, unsigned int keyid) in security_overwrite() argument
386 data = nvdimm_get_user_key_payload(nvdimm, keyid, in security_overwrite()
/kernel/linux/linux-5.10/drivers/net/ethernet/mellanox/mlx5/core/en/
H A Dtc_tun_vxlan.c122 if (!enc_keyid.mask->keyid) in mlx5e_tc_tun_parse_vxlan()
137 be32_to_cpu(enc_keyid.mask->keyid)); in mlx5e_tc_tun_parse_vxlan()
139 be32_to_cpu(enc_keyid.key->keyid)); in mlx5e_tc_tun_parse_vxlan()
/kernel/linux/linux-5.10/security/integrity/
H A Ddigsig_asymmetric.c22 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() argument
27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key()
101 key = request_asymmetric_key(keyring, be32_to_cpu(hdr->keyid)); in asymmetric_verify()

Completed in 12 milliseconds

12345678910>>...12