/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | x_x509a.c | 79 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 115 if (!x || !x->aux || !x->aux->keyid) 117 ASN1_OCTET_STRING_free(x->aux->keyid); 118 x->aux->keyid = NULL; 123 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) 125 return ASN1_STRING_set(aux->keyid, id, len); 139 if (!x->aux || !x->aux->keyid) 142 *len = x->aux->keyid->length; 143 return x->aux->keyid [all...] |
H A D | t_x509a.c | 108 if (aux->keyid) { 110 for (i = 0; i < aux->keyid->length; i++) 111 BIO_printf(out, "%s%02X", i ? ":" : "", aux->keyid->data[i]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid [all...] |
H A D | t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | x_x509a.c | 79 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 115 if (!x || !x->aux || !x->aux->keyid) 117 ASN1_OCTET_STRING_free(x->aux->keyid); 118 x->aux->keyid = NULL; 123 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) 125 return ASN1_STRING_set(aux->keyid, id, len); 139 if (!x->aux || !x->aux->keyid) 142 *len = x->aux->keyid->length; 143 return x->aux->keyid [all...] |
H A D | t_x509a.c | 108 if (aux->keyid) { 110 for (i = 0; i < aux->keyid->length; i++) 111 BIO_printf(out, "%s%02X", i ? ":" : "", aux->keyid->data[i]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/ |
H A D | v3_akey.c | 92 if (akeyid->keyid) { 93 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 94 X509V3_add_value("keyid", tmp, &extlist); 109 * keyid: use the issuers subject keyid, the value 'always' means its is 112 * to only use this if keyid is not present. With the option 'always' 120 char keyid = 0, issuer = 0; local 134 if (!strcmp(cnf->name, "keyid")) { 135 keyid [all...] |
H A D | v3_akeya.c | 68 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 92 if (akeyid->keyid) { 93 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 94 X509V3_add_value("keyid", tmp, &extlist); 109 * keyid: use the issuers subject keyid, the value 'always' means its is 112 * to only use this if keyid is not present. With the option 'always' 120 char keyid = 0, issuer = 0; local 134 if (!strcmp(cnf->name, "keyid")) { 135 keyid [all...] |
H A D | v3_akeya.c | 68 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_kiss.c | 70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 75 ASN1_OCTET_STRING **keyid, char *keymatch); 151 ASN1_OCTET_STRING *keyid = NULL; local 168 &keyid, &keymatch)) { 176 if (keyid) M_ASN1_OCTET_STRING_free(keyid); 183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 189 pass, passlen, pkey, cert, ca, keyid, 201 ASN1_OCTET_STRING **keyid, 220 if (*keyid) { 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
H A D | p12_crt.c | 75 unsigned char keyid[EVP_MAX_MD_SIZE]; variable 98 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 181 unsigned char *keyid; local 197 keyid = X509_keyid_get0(cert, &keyidlen); 199 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_crt.c | 89 unsigned char keyid[EVP_MAX_MD_SIZE]; local 120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 156 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 198 unsigned char *keyid; local 214 keyid = X509_keyid_get0(cert, &keyidlen); 216 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 89 unsigned char keyid[EVP_MAX_MD_SIZE]; local 120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 127 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 156 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 198 unsigned char *keyid; local 214 keyid = X509_keyid_get0(cert, &keyidlen); 216 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_kari.c | 105 ASN1_OCTET_STRING **keyid, 120 if (keyid) 121 *keyid = NULL; 132 if (keyid) 133 *keyid = oik->d.subjectKeyIdentifier; 161 ASN1_OCTET_STRING **keyid, 172 if (keyid) 173 *keyid = NULL; 179 if (keyid) 180 *keyid 102 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 160 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument [all...] |
H A D | cms_lib.c | 606 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument 611 return ASN1_OCTET_STRING_cmp(keyid, cert->skid); 637 ASN1_OCTET_STRING *keyid = NULL; local 643 keyid = ASN1_STRING_dup(cert->skid); 644 if (!keyid) { 650 *pkeyid = keyid;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_kari.c | 105 ASN1_OCTET_STRING **keyid, 120 if (keyid) 121 *keyid = NULL; 132 if (keyid) 133 *keyid = oik->d.subjectKeyIdentifier; 161 ASN1_OCTET_STRING **keyid, 172 if (keyid) 173 *keyid = NULL; 179 if (keyid) 180 *keyid 102 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 160 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument [all...] |
H A D | cms_lib.c | 606 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument 611 return ASN1_OCTET_STRING_cmp(keyid, cert->skid); 637 ASN1_OCTET_STRING *keyid = NULL; local 643 keyid = ASN1_STRING_dup(cert->skid); 644 if (!keyid) { 650 *pkeyid = keyid;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/samples/ |
H A D | sandiego.pl | 29 identifier keyid "./keyid.txt"; 110 # "address", "fqdn", "user_fqdn", "keyid"
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/ |
H A D | athr_common.h | 122 u8 keyid; member in struct:athr_wapi_param::__anon15626::__anon15627
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/keys/ |
H A D | keyctl.c | 468 long keyctl_describe_key(key_serial_t keyid, argument 477 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_VIEW); 482 instkey = key_get_instantiation_authkey(keyid); 485 key_ref = lookup_user_key(keyid, 642 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) argument 649 key_ref = lookup_user_key(keyid, 0, 0); 1192 long keyctl_get_security(key_serial_t keyid, argument 1201 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIAL, KEY_VIEW); 1208 instkey = key_get_instantiation_authkey(keyid); 1213 key_ref = lookup_user_key(keyid, KEY_LOOKUP_PARTIA [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/ |
H A D | tkip.c | 234 u8 rc4key[16], keyid, *pos = payload; local 242 keyid = pos[3]; 257 if (!(keyid & (1 << 5))) 260 if ((keyid >> 6) != key->conf.keyidx)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/ripd/ |
H A D | ripd.h | 297 u_char keyid; member in struct:rip_md5_info
|