/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x_x509a.c | 75 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 109 if (!x || !x->aux || !x->aux->keyid) 111 ASN1_OCTET_STRING_free(x->aux->keyid); 112 x->aux->keyid = NULL; 116 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 117 return ASN1_STRING_set(aux->keyid, id, len); 129 if(!x->aux || !x->aux->keyid) return NULL; 130 if(len) *len = x->aux->keyid->length; 131 return x->aux->keyid->data [all...] |
t_x509a.c | 100 if(aux->keyid) { 102 for(j = 0; j < aux->keyid->length; j++) 105 aux->keyid->data[j]);
|
/external/openssl/crypto/asn1/ |
x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid->data [all...] |
t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/ |
v3_akey.c | 89 if(akeyid->keyid) { 90 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 91 X509V3_add_value("keyid", tmp, &extlist); 106 * keyid: use the issuers subject keyid, the value 'always' means its is 109 * to only use this if keyid is not present. With the option 'always' 116 char keyid=0, issuer=0; local 132 if(!strcmp(cnf->name, "keyid")) 134 keyid = 1 [all...] |
v3_akeya.c | 66 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
v3_purp.c | 736 if(akid->keyid && issuer->skid && 737 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
|
/external/openssl/crypto/x509v3/ |
v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid = 1 [all...] |
v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
v3_purp.c | 733 if(akid->keyid && issuer->skid && 734 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 52 byte[] keyid) 54 this.keyidentifier = keyid; 58 ASN1OctetString keyid) 60 this.keyidentifier = keyid.getOctets();
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.h | 69 uint16_t keyid; /* shared key ID */ member in struct:sctp_shared_key 95 uint16_t active_keyid; /* active send keyid */ 96 uint16_t assoc_keyid; /* current send keyid (cached) */ 97 uint16_t recv_keyid; /* last recv keyid (cached) */ 146 extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid); 147 extern void sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid, 186 extern void sctp_clear_cachedkeys(struct sctp_tcb *stcb, uint16_t keyid); 187 extern void sctp_clear_cachedkeys_ep(struct sctp_inpcb *inp, uint16_t keyid); 188 extern int sctp_delete_sharedkey(struct sctp_tcb *stcb, uint16_t keyid); 189 extern int sctp_delete_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid); [all...] |
sctp_auth.c | 471 new_key->keyid = 0; 497 if (skey->keyid == key_id) 519 if (new_skey->keyid < skey->keyid) { 523 } else if (new_skey->keyid == skey->keyid) { 529 new_skey->keyid); 534 new_skey->keyid); 612 new_skey->keyid = skey->keyid; [all...] |
/external/openssl/crypto/pkcs12/ |
p12_crt.c | 88 unsigned char keyid[EVP_MAX_MD_SIZE]; local 122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 130 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 161 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 203 unsigned char *keyid; local 219 keyid = X509_keyid_get0(cert, &keyidlen); 221 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/external/openssl/android.testssl/ |
Uss.cnf | 32 authorityKeyIdentifier=keyid,issuer:always
|
CAss.cnf | 73 authorityKeyIdentifier=keyid:always,issuer:always
|
/external/openssl/apps/ |
openssl.cnf | 195 authorityKeyIdentifier=keyid,issuer 234 authorityKeyIdentifier=keyid:always,issuer 267 authorityKeyIdentifier=keyid:always 300 authorityKeyIdentifier=keyid,issuer
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 659 byte[] keyId, byte[] input, byte[] iv); 662 byte[] keyId, byte[] input, byte[] iv); 665 byte[] keyId, byte[] message); 668 byte[] keyId, byte[] message, byte[] signature); 709 * @param keyid specifies which key to use 713 public byte[] encrypt(byte[] keyid, byte[] input, byte[] iv) { 714 return encryptNative(mDrm, mSessionId, keyid, input, iv); 720 * @param keyid specifies which key to use 724 public byte[] decrypt(byte[] keyid, byte[] input, byte[] iv) { 725 return decryptNative(mDrm, mSessionId, keyid, input, iv) [all...] |
/external/chromium_org/chrome/utility/importer/ |
nss_decryptor_system_nss.cc | 89 SECItem keyid; member in struct:SDRResult 97 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, keyid) }, 205 key = PK11_FindFixedKey(slot, type, &sdrResult.keyid, cx);
|
/external/openssl/crypto/cms/ |
cms_sd.c | 256 ASN1_OCTET_STRING **keyid, 268 if (keyid) 269 *keyid = sid->d.subjectKeyIdentifier; 544 ASN1_OCTET_STRING **keyid, 547 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno);
|
cms.h | 202 ASN1_OCTET_STRING **keyid, 262 ASN1_OCTET_STRING **keyid,
|
cms_env.c | 261 ASN1_OCTET_STRING **keyid, 274 keyid, issuer, sno);
|
cms_lcl.h | 441 ASN1_OCTET_STRING **keyid,
|
/external/openssl/include/openssl/ |
cms.h | 202 ASN1_OCTET_STRING **keyid, 262 ASN1_OCTET_STRING **keyid,
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_openssl.cc | 703 if (value.get()->keyid && ASN1_STRING_length(value.get()->keyid) > 0) { 706 base::ASCIIToUTF16(ProcessRawAsn1String(value.get()->keyid))); [all...] |