HomeSort by relevance Sort by last modified time
    Searched refs:keyid (Results 1 - 25 of 27) sorted by null

1 2

  /external/openssl/crypto/asn1/
x_x509a.c 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
112 if (!x || !x->aux || !x->aux->keyid)
114 ASN1_OCTET_STRING_free(x->aux->keyid);
115 x->aux->keyid = NULL;
119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0;
120 return ASN1_STRING_set(aux->keyid, id, len);
132 if(!x->aux || !x->aux->keyid) return NULL;
133 if(len) *len = x->aux->keyid->length;
134 return x->aux->keyid->data
    [all...]
t_x509a.c 101 if(aux->keyid) {
103 for(i = 0; i < aux->keyid->length; i++)
106 aux->keyid->data[i]);
  /external/openssl/crypto/x509v3/
v3_akey.c 87 if(akeyid->keyid) {
88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
89 X509V3_add_value("keyid", tmp, &extlist);
104 * keyid: use the issuers subject keyid, the value 'always' means its is
107 * to only use this if keyid is not present. With the option 'always'
114 char keyid=0, issuer=0; local
129 if(!strcmp(cnf->name, "keyid"))
131 keyid = 1
    [all...]
v3_akeya.c 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
v3_purp.c 733 if(akid->keyid && issuer->skid &&
734 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
x509v3.h 261 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
  /external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 56 byte[] keyid)
58 this.keyidentifier=keyid;
62 ASN1OctetString keyid)
64 this.keyidentifier=keyid.getOctets();
  /external/openssl/crypto/pkcs12/
p12_crt.c 88 unsigned char keyid[EVP_MAX_MD_SIZE]; local
111 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
150 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
192 unsigned char *keyid; local
208 keyid = X509_keyid_get0(cert, &keyidlen);
210 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
  /external/openssl/android.testssl/
Uss.cnf 32 authorityKeyIdentifier=keyid,issuer:always
CAss.cnf 73 authorityKeyIdentifier=keyid:always,issuer:always
  /external/openssl/apps/
openssl.cnf 195 authorityKeyIdentifier=keyid,issuer
234 authorityKeyIdentifier=keyid:always,issuer
267 authorityKeyIdentifier=keyid:always
300 authorityKeyIdentifier=keyid,issuer
  /external/chromium/net/base/
dnssec_chain_verifier.h 83 uint16 keyid,
dnssec_keyset.cc 40 uint16 keyid = DNSKEYToKeyID(dnskey); local
45 keyids_.push_back(keyid);
62 // keyid uint16
79 uint16 keyid = static_cast<uint16>(sigdata[14]) << 8 | local
151 // Check the signature with each trusted key which has a matching keyid.
154 if (keyids_[i] != keyid)
dnssec_chain_verifier.cc 35 uint16 keyid
510 // keyid: the key's id
516 uint16 keyid,
539 output[0] = static_cast<uint8>(keyid >> 8);
540 output[1] = static_cast<uint8>(keyid);
551 // for the root zone only, the keyid of the entry key is prepended to the data.
745 uint16 keyid = DNSSECKeySet::DNSKEYToKeyID(next_entry_key);
753 keyid, algorithm)) {
  /external/chromium/chrome/browser/importer/
nss_decryptor_system_nss.cc 86 SECItem keyid; member in struct:SDRResult
94 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, keyid) },
202 key = PK11_FindFixedKey(slot, type, &sdrResult.keyid, cx);
  /external/openssh/
ssh-pkcs11.c 69 char *keyid; member in struct:pkcs11_key
183 if (k11->keyid)
184 xfree(k11->keyid);
276 key_filter[1].pValue = k11->keyid;
317 k11->keyid = xmalloc(k11->keyid_len);
318 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
monitor.c 683 int keyid; local
687 keyid = buffer_get_int(m);
704 if ((key = get_hostkey_by_index(keyid)) == NULL)
705 fatal("%s: no hostkey from index %d", __func__, keyid);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 257 u8 keyid[2]; member in struct:wpa_igtk_kde
  /external/wpa_supplicant_8/src/common/
wpa_common.h 259 u8 keyid[2]; member in struct:wpa_igtk_kde
  /external/openssl/include/openssl/
x509v3.h 261 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
x509.h 275 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
    [all...]
  /external/ipsec-tools/src/racoon/
cftoken.l 549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c     [all...]
  /external/openssl/crypto/x509/
x509.h 275 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.c 701 * KeyID[bits 0-1], Tx [bit 2], Reserved [bits 3-7]
752 keyidx = WPA_GET_LE16(igtk->keyid);
753 wpa_printf(MSG_DEBUG, "WPA: IGTK keyid %d "
759 wpa_printf(MSG_WARNING, "WPA: Invalid IGTK KeyID %d",
    [all...]

Completed in 774 milliseconds

1 2