/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certTime/ |
H A D | extenCooker.cpp | 619 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local 623 akid->keyIdentifierPresent = randBool(); 624 if(akid->keyIdentifierPresent) { 625 randData(&akid->keyIdentifier, 16); 628 akid->generalNamesPresent = randBool(); 629 if(akid->generalNamesPresent) { 630 akid->generalNames = 632 memset(akid->generalNames, 0, sizeof(CE_GeneralNames)); 633 genNamesCreate(akid->generalNames); 636 if(!akid 686 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local [all...] |
/macosx-10.10.1/postfix-255/postfix/src/tls/ |
H A D | tls_dane.c | 1427 /* set_serial - set serial number to match akid or use subject's plus 1 */ 1429 static int set_serial(X509 *cert, AUTHORITY_KEYID *akid, X509 *subject) argument 1434 if (akid && akid->serial) 1435 return (X509_set_serialNumber(cert, akid->serial)); 1453 static int add_akid(X509 *cert, AUTHORITY_KEYID *akid) argument 1462 * our subject keyid if forced from child's akid. If so, set our 1467 id = (ASN1_STRING *) ((akid && akid->keyid) ? akid 1483 add_skid(X509 *cert, AUTHORITY_KEYID *akid) argument 1496 akid_issuer_name(AUTHORITY_KEYID *akid) argument 1514 set_issuer_name(X509 *cert, AUTHORITY_KEYID *akid) argument 1553 AUTHORITY_KEYID *akid; local [all...] |
H A D | tls_dane.sh | 51 local akid=$1; shift 53 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true") 63 local akid=$1; shift 67 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true") 146 # Tests that might depend on akid/skid chaining 194 # These tests don't depend in the akid/skid chaining:
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/extenTest/ |
H A D | extenTest.cpp | 697 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local 701 akid->keyIdentifierPresent = randBool(); 702 if(akid->keyIdentifierPresent) { 703 randData(&akid->keyIdentifier, 16); 706 akid->generalNamesPresent = randBool(); 707 if(akid->generalNamesPresent) { 708 akid->generalNames = 710 memset(akid->generalNames, 0, sizeof(CE_GeneralNames)); 711 genNamesCreate(akid->generalNames); 714 if(!akid 764 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/extenTestTp/ |
H A D | extenTestTp.cpp | 697 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local 701 akid->keyIdentifierPresent = randBool(); 702 if(akid->keyIdentifierPresent) { 703 randData(&akid->keyIdentifier, 16); 706 akid->generalNamesPresent = randBool(); 707 if(akid->generalNamesPresent) { 708 akid->generalNames = 710 memset(akid->generalNames, 0, sizeof(CE_GeneralNames)); 711 genNamesCreate(akid->generalNames); 714 if(!akid 764 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local [all...] |
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_x509.c | 96 ret->akid = NULL; 114 AUTHORITY_KEYID_free(ret->akid);
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509v3/ |
H A D | v3_purp.c | 419 x->akid =X509_get_ext_d2i(x, NID_authority_key_identifier, NULL, NULL); 608 * 2. If akid(subject) exists check it matches issuer 621 if(subject->akid) { 623 if(subject->akid->keyid && issuer->skid && 624 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) ) 627 if(subject->akid->serial && 629 subject->akid->serial)) 632 if(subject->akid->issuer) { 642 gens = subject->akid->issuer;
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/signerAndSubjTp/ |
H A D | signerAndSubjTp.cpp | 516 CE_AuthorityKeyID *akid = &extp->extension.authorityKeyID; local 517 memset(akid, 0, sizeof(*akid)); 518 akid->generalNamesPresent = CSSM_TRUE; 519 akid->generalNames = &authKeyIdGenNames; 520 akid->serialNumberPresent = CSSM_TRUE; 521 akid->serialNumber.Data = authKeyIdSerial; 522 akid->serialNumber.Length = sizeof(authKeyIdSerial);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utils/ |
H A D | cuPrintCert.cpp | 687 const CE_AuthorityKeyID *akid, 690 if(akid->keyIdentifierPresent) { 692 printDataAsHex(&akid->keyIdentifier, 695 if(akid->generalNamesPresent) { 696 printGeneralNames(akid->generalNames, parser); 698 if(akid->serialNumberPresent) { 700 printDataAsHex(&akid->serialNumber, 8); 709 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)cssmExt->value.parsedValue; local 710 printCssmAuthorityKeyId(akid, parser); 686 printCssmAuthorityKeyId( const CE_AuthorityKeyID *akid, OidParser &parser) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | TPCertInfo.cpp | 634 const CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)ake->value.parsedValue; local 636 if(!akid->keyIdentifierPresent) { 640 if(tpCompareCssmData(skid, &akid->keyIdentifier)) { 644 akid->keyIdentifier.Length, 646 (akid->keyIdentifier.Data) ? *((unsigned long *)akid->keyIdentifier.Data) : 0L); 654 akid->keyIdentifier.Length, 656 (akid->keyIdentifier.Data) ? *((unsigned long *)akid->keyIdentifier.Data) : 0L);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utils/lib/ |
H A D | cuPrintCert.cpp | 687 const CE_AuthorityKeyID *akid, 690 if(akid->keyIdentifierPresent) { 692 printDataAsHex(&akid->keyIdentifier, 695 if(akid->generalNamesPresent) { 696 printGeneralNames(akid->generalNames, parser); 698 if(akid->serialNumberPresent) { 700 printDataAsHex(&akid->serialNumber, 8); 709 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)cssmExt->value.parsedValue; local 710 printCssmAuthorityKeyId(akid, parser); 686 printCssmAuthorityKeyId( const CE_AuthorityKeyID *akid, OidParser &parser) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecTrust.c | 1347 CFDataRef akid = SecCertificateGetAuthorityKeyID(certificate); 1348 if (akid) { 1349 SecTrustAppendCandidatesWithAuthorityKeyID(akid, node->_candidates); 1396 CFDataRef akid = SecCertificateGetAuthorityKeyID(certificate); 1398 if (akid) { 1399 candidates = (CFTypeRef)CFDictionaryGetValueForKey(skidDict, akid); 1428 CFDataRef akid = SecCertificateGetAuthorityKeyID(certificate); 1429 if (akid) { 1430 SecTrustAppendCandidatesWithAuthorityKeyID(akid, node->_candidates);
|
H A D | SecCertificate.c | 875 DERAuthorityKeyIdentifier akid; local 880 &akid, sizeof(akid)); 882 if (akid.keyIdentifier.length) { 883 certificate->_authorityKeyIdentifier = akid.keyIdentifier; 885 if (akid.authorityCertIssuer.length || 886 akid.authorityCertSerialNumber.length) { 887 require_quiet(akid.authorityCertIssuer.length && 888 akid.authorityCertSerialNumber.length, badDER); 890 certificate->_authorityKeyIdentifierIssuer = akid 3061 DERAuthorityKeyIdentifier akid; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecCertificateP.c | 859 DERAuthorityKeyIdentifier akid; local 864 &akid, sizeof(akid)); 866 if (akid.keyIdentifier.length) { 867 certificate->_authorityKeyIdentifier = akid.keyIdentifier; 869 if (akid.authorityCertIssuer.length || 870 akid.authorityCertSerialNumber.length) { 871 require_quiet(akid.authorityCertIssuer.length && 872 akid.authorityCertSerialNumber.length, badDER); 874 certificate->_authorityKeyIdentifierIssuer = akid 2918 DERAuthorityKeyIdentifier akid; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificateP.c | 859 DERAuthorityKeyIdentifier akid; local 864 &akid, sizeof(akid)); 866 if (akid.keyIdentifier.length) { 867 certificate->_authorityKeyIdentifier = akid.keyIdentifier; 869 if (akid.authorityCertIssuer.length || 870 akid.authorityCertSerialNumber.length) { 871 require_quiet(akid.authorityCertIssuer.length && 872 akid.authorityCertSerialNumber.length, badDER); 874 certificate->_authorityKeyIdentifierIssuer = akid 2918 DERAuthorityKeyIdentifier akid; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificateP.c | 859 DERAuthorityKeyIdentifier akid; local 864 &akid, sizeof(akid)); 866 if (akid.keyIdentifier.length) { 867 certificate->_authorityKeyIdentifier = akid.keyIdentifier; 869 if (akid.authorityCertIssuer.length || 870 akid.authorityCertSerialNumber.length) { 871 require_quiet(akid.authorityCertIssuer.length && 872 akid.authorityCertSerialNumber.length, badDER); 874 certificate->_authorityKeyIdentifierIssuer = akid 2918 DERAuthorityKeyIdentifier akid; local [all...] |
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509/ |
H A D | x509.h | 294 struct AUTHORITY_KEYID_st *akid; member in struct:x509_st
|
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | x509.h | 294 struct AUTHORITY_KEYID_st *akid; member in struct:x509_st
|