HomeSort by relevance Sort by last modified time
    Searched refs:keyid (Results 1 - 19 of 19) sorted by null

  /external/openssl/crypto/asn1/
x_x509a.c 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
112 if (!x || !x->aux || !x->aux->keyid)
114 ASN1_OCTET_STRING_free(x->aux->keyid);
115 x->aux->keyid = NULL;
119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0;
120 return ASN1_STRING_set(aux->keyid, id, len);
132 if(!x->aux || !x->aux->keyid) return NULL;
133 if(len) *len = x->aux->keyid->length;
134 return x->aux->keyid->data
    [all...]
t_x509a.c 101 if(aux->keyid) {
103 for(i = 0; i < aux->keyid->length; i++)
106 aux->keyid->data[i]);
  /external/openssl/crypto/x509v3/
v3_akey.c 87 if(akeyid->keyid) {
88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
89 X509V3_add_value("keyid", tmp, &extlist);
104 * keyid: use the issuers subject keyid, the value 'always' means its is
107 * to only use this if keyid is not present. With the option 'always'
114 char keyid=0, issuer=0; local
129 if(!strcmp(cnf->name, "keyid"))
131 keyid = 1
    [all...]
v3_akeya.c 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
v3_purp.c 733 if(akid->keyid && issuer->skid &&
734 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
x509v3.h 261 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
  /external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 56 byte[] keyid)
58 this.keyidentifier=keyid;
62 ASN1OctetString keyid)
64 this.keyidentifier=keyid.getOctets();
  /external/openssl/crypto/pkcs12/
p12_crt.c 88 unsigned char keyid[EVP_MAX_MD_SIZE]; local
111 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
150 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
192 unsigned char *keyid; local
208 keyid = X509_keyid_get0(cert, &keyidlen);
210 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
  /external/openssl/android.testssl/
Uss.cnf 32 authorityKeyIdentifier=keyid,issuer:always
CAss.cnf 73 authorityKeyIdentifier=keyid:always,issuer:always
  /external/openssl/apps/
openssl-vms.cnf 195 authorityKeyIdentifier=keyid,issuer
234 authorityKeyIdentifier=keyid:always,issuer
267 authorityKeyIdentifier=keyid:always
300 authorityKeyIdentifier=keyid,issuer
openssl.cnf 195 authorityKeyIdentifier=keyid,issuer
234 authorityKeyIdentifier=keyid:always,issuer
267 authorityKeyIdentifier=keyid:always
300 authorityKeyIdentifier=keyid,issuer
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 257 u8 keyid[2]; member in struct:wpa_igtk_kde
  /external/openssl/include/openssl/
x509v3.h 261 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
x509.h 274 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
    [all...]
  /external/ipsec-tools/src/racoon/
cftoken.l 549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
  /external/openssl/crypto/x509/
x509.h 274 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.c 701 * KeyID[bits 0-1], Tx [bit 2], Reserved [bits 3-7]
752 keyidx = WPA_GET_LE16(igtk->keyid);
753 wpa_printf(MSG_DEBUG, "WPA: IGTK keyid %d "
759 wpa_printf(MSG_WARNING, "WPA: Invalid IGTK KeyID %d",
    [all...]
  /external/wpa_supplicant/
wpa.c 194 u8 keyid[2]; member in struct:wpa_igtk_kde
    [all...]

Completed in 1194 milliseconds