/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AdaptableX509CertSelector.java | 104 KeyIdentifier akid = (KeyIdentifier)akidext.get( local 106 if (akid != null) { 110 derout.putOctetString(akid.getIdentifier()); 174 // the existing certificate is still valid, even if the AKID extension 180 // AKID need to be respected to seek the exact certificate in case
|
DistributionPointFetcher.java | 375 // cannot recognize indirect CRL without AKID 600 KeyIdentifier akid = (KeyIdentifier)akidext.get( local 602 if (akid != null) { 604 derout.putOctetString(akid.getIdentifier()); 760 // if AKID is unreliable, verify the CRL signature with the cer [all...] |
/external/boringssl/src/crypto/x509v3/ |
v3_purp.c | 499 x->akid =X509_get_ext_d2i(x, NID_authority_key_identifier, NULL, NULL); 504 /* If SKID matches AKID also indicate self signed */ 505 if (X509_check_akid(x, x->akid) == X509_V_OK && 733 * 2. If akid(subject) exists check it matches issuer 747 if(subject->akid) 749 int ret = X509_check_akid(issuer, subject->akid); 764 int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) 767 if(!akid) 771 if(akid->keyid && issuer->skid && 772 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) [all...] |
/external/boringssl/src/crypto/x509/ |
x_x509.c | 104 ret->akid = NULL; 119 AUTHORITY_KEYID_free(ret->akid);
|
x_crl.c | 245 crl->akid = NULL; 263 crl->akid = X509_CRL_get_ext_d2i(crl, 321 if (crl->akid) 322 AUTHORITY_KEYID_free(crl->akid);
|
x509_vfy.c | 108 /* CRL issuer matches CRL AKID */ 1071 /* AKID and IDP must match */ 1202 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) 1217 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) 1238 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) [all...] |
/external/boringssl/src/include/openssl/ |
x509.h | 257 AUTHORITY_KEYID *akid; member in struct:x509_st 426 AUTHORITY_KEYID *akid; member in struct:X509_crl_st [all...] |
x509v3.h | 670 OPENSSL_EXPORT int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid);
|