Searched refs:akid (Results 1 - 18 of 18) sorted by relevance

/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certTime/
H A DextenCooker.cpp619 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local
623 akid->keyIdentifierPresent = randBool();
624 if(akid->keyIdentifierPresent) {
625 randData(&akid->keyIdentifier, 16);
628 akid->generalNamesPresent = randBool();
629 if(akid->generalNamesPresent) {
630 akid->generalNames =
632 memset(akid->generalNames, 0, sizeof(CE_GeneralNames));
633 genNamesCreate(akid->generalNames);
636 if(!akid
686 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local
[all...]
/macosx-10.10.1/postfix-255/postfix/src/tls/
H A Dtls_dane.c1427 /* set_serial - set serial number to match akid or use subject's plus 1 */
1429 static int set_serial(X509 *cert, AUTHORITY_KEYID *akid, X509 *subject) argument
1434 if (akid && akid->serial)
1435 return (X509_set_serialNumber(cert, akid->serial));
1453 static int add_akid(X509 *cert, AUTHORITY_KEYID *akid) argument
1462 * our subject keyid if forced from child's akid. If so, set our
1467 id = (ASN1_STRING *) ((akid && akid->keyid) ? akid
1483 add_skid(X509 *cert, AUTHORITY_KEYID *akid) argument
1496 akid_issuer_name(AUTHORITY_KEYID *akid) argument
1514 set_issuer_name(X509 *cert, AUTHORITY_KEYID *akid) argument
1553 AUTHORITY_KEYID *akid; local
[all...]
H A Dtls_dane.sh51 local akid=$1; shift
53 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true")
63 local akid=$1; shift
67 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true")
146 # Tests that might depend on akid/skid chaining
194 # These tests don't depend in the akid/skid chaining:
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/extenTest/
H A DextenTest.cpp697 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local
701 akid->keyIdentifierPresent = randBool();
702 if(akid->keyIdentifierPresent) {
703 randData(&akid->keyIdentifier, 16);
706 akid->generalNamesPresent = randBool();
707 if(akid->generalNamesPresent) {
708 akid->generalNames =
710 memset(akid->generalNames, 0, sizeof(CE_GeneralNames));
711 genNamesCreate(akid->generalNames);
714 if(!akid
764 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/extenTestTp/
H A DextenTestTp.cpp697 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local
701 akid->keyIdentifierPresent = randBool();
702 if(akid->keyIdentifierPresent) {
703 randData(&akid->keyIdentifier, 16);
706 akid->generalNamesPresent = randBool();
707 if(akid->generalNamesPresent) {
708 akid->generalNames =
710 memset(akid->generalNames, 0, sizeof(CE_GeneralNames));
711 genNamesCreate(akid->generalNames);
714 if(!akid
764 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)arg; local
[all...]
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/
H A Dx_x509.c96 ret->akid = NULL;
114 AUTHORITY_KEYID_free(ret->akid);
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509v3/
H A Dv3_purp.c419 x->akid =X509_get_ext_d2i(x, NID_authority_key_identifier, NULL, NULL);
608 * 2. If akid(subject) exists check it matches issuer
621 if(subject->akid) {
623 if(subject->akid->keyid && issuer->skid &&
624 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) )
627 if(subject->akid->serial &&
629 subject->akid->serial))
632 if(subject->akid->issuer) {
642 gens = subject->akid->issuer;
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/signerAndSubjTp/
H A DsignerAndSubjTp.cpp516 CE_AuthorityKeyID *akid = &extp->extension.authorityKeyID; local
517 memset(akid, 0, sizeof(*akid));
518 akid->generalNamesPresent = CSSM_TRUE;
519 akid->generalNames = &authKeyIdGenNames;
520 akid->serialNumberPresent = CSSM_TRUE;
521 akid->serialNumber.Data = authKeyIdSerial;
522 akid->serialNumber.Length = sizeof(authKeyIdSerial);
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utils/
H A DcuPrintCert.cpp687 const CE_AuthorityKeyID *akid,
690 if(akid->keyIdentifierPresent) {
692 printDataAsHex(&akid->keyIdentifier,
695 if(akid->generalNamesPresent) {
696 printGeneralNames(akid->generalNames, parser);
698 if(akid->serialNumberPresent) {
700 printDataAsHex(&akid->serialNumber, 8);
709 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)cssmExt->value.parsedValue; local
710 printCssmAuthorityKeyId(akid, parser);
686 printCssmAuthorityKeyId( const CE_AuthorityKeyID *akid, OidParser &parser) argument
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DTPCertInfo.cpp634 const CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)ake->value.parsedValue; local
636 if(!akid->keyIdentifierPresent) {
640 if(tpCompareCssmData(skid, &akid->keyIdentifier)) {
644 akid->keyIdentifier.Length,
646 (akid->keyIdentifier.Data) ? *((unsigned long *)akid->keyIdentifier.Data) : 0L);
654 akid->keyIdentifier.Length,
656 (akid->keyIdentifier.Data) ? *((unsigned long *)akid->keyIdentifier.Data) : 0L);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utils/lib/
H A DcuPrintCert.cpp687 const CE_AuthorityKeyID *akid,
690 if(akid->keyIdentifierPresent) {
692 printDataAsHex(&akid->keyIdentifier,
695 if(akid->generalNamesPresent) {
696 printGeneralNames(akid->generalNames, parser);
698 if(akid->serialNumberPresent) {
700 printDataAsHex(&akid->serialNumber, 8);
709 CE_AuthorityKeyID *akid = (CE_AuthorityKeyID *)cssmExt->value.parsedValue; local
710 printCssmAuthorityKeyId(akid, parser);
686 printCssmAuthorityKeyId( const CE_AuthorityKeyID *akid, OidParser &parser) argument
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecTrust.c1347 CFDataRef akid = SecCertificateGetAuthorityKeyID(certificate);
1348 if (akid) {
1349 SecTrustAppendCandidatesWithAuthorityKeyID(akid, node->_candidates);
1396 CFDataRef akid = SecCertificateGetAuthorityKeyID(certificate);
1398 if (akid) {
1399 candidates = (CFTypeRef)CFDictionaryGetValueForKey(skidDict, akid);
1428 CFDataRef akid = SecCertificateGetAuthorityKeyID(certificate);
1429 if (akid) {
1430 SecTrustAppendCandidatesWithAuthorityKeyID(akid, node->_candidates);
H A DSecCertificate.c875 DERAuthorityKeyIdentifier akid; local
880 &akid, sizeof(akid));
882 if (akid.keyIdentifier.length) {
883 certificate->_authorityKeyIdentifier = akid.keyIdentifier;
885 if (akid.authorityCertIssuer.length ||
886 akid.authorityCertSerialNumber.length) {
887 require_quiet(akid.authorityCertIssuer.length &&
888 akid.authorityCertSerialNumber.length, badDER);
890 certificate->_authorityKeyIdentifierIssuer = akid
3061 DERAuthorityKeyIdentifier akid; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/
H A DSecCertificateP.c859 DERAuthorityKeyIdentifier akid; local
864 &akid, sizeof(akid));
866 if (akid.keyIdentifier.length) {
867 certificate->_authorityKeyIdentifier = akid.keyIdentifier;
869 if (akid.authorityCertIssuer.length ||
870 akid.authorityCertSerialNumber.length) {
871 require_quiet(akid.authorityCertIssuer.length &&
872 akid.authorityCertSerialNumber.length, badDER);
874 certificate->_authorityKeyIdentifierIssuer = akid
2918 DERAuthorityKeyIdentifier akid; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecCertificateP.c859 DERAuthorityKeyIdentifier akid; local
864 &akid, sizeof(akid));
866 if (akid.keyIdentifier.length) {
867 certificate->_authorityKeyIdentifier = akid.keyIdentifier;
869 if (akid.authorityCertIssuer.length ||
870 akid.authorityCertSerialNumber.length) {
871 require_quiet(akid.authorityCertIssuer.length &&
872 akid.authorityCertSerialNumber.length, badDER);
874 certificate->_authorityKeyIdentifierIssuer = akid
2918 DERAuthorityKeyIdentifier akid; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecCertificateP.c859 DERAuthorityKeyIdentifier akid; local
864 &akid, sizeof(akid));
866 if (akid.keyIdentifier.length) {
867 certificate->_authorityKeyIdentifier = akid.keyIdentifier;
869 if (akid.authorityCertIssuer.length ||
870 akid.authorityCertSerialNumber.length) {
871 require_quiet(akid.authorityCertIssuer.length &&
872 akid.authorityCertSerialNumber.length, badDER);
874 certificate->_authorityKeyIdentifierIssuer = akid
2918 DERAuthorityKeyIdentifier akid; local
[all...]
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509/
H A Dx509.h294 struct AUTHORITY_KEYID_st *akid; member in struct:x509_st
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/
H A Dx509.h294 struct AUTHORITY_KEYID_st *akid; member in struct:x509_st

Completed in 374 milliseconds