Searched refs:keyid (Results 1 - 25 of 28) sorted by relevance

12

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dx_x509a.c78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
112 if (!x || !x->aux || !x->aux->keyid)
114 ASN1_OCTET_STRING_free(x->aux->keyid);
115 x->aux->keyid = NULL;
119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0;
120 return ASN1_STRING_set(aux->keyid, id, len);
132 if(!x->aux || !x->aux->keyid) return NULL;
133 if(len) *len = x->aux->keyid->length;
134 return x->aux->keyid
[all...]
H A Dt_x509a.c101 if(aux->keyid) {
103 for(i = 0; i < aux->keyid->length; i++)
106 aux->keyid->data[i]);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/x509v3/
H A Dv3_akey.c85 if(akeyid->keyid) {
86 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
87 X509V3_add_value("keyid", tmp, &extlist);
102 * keyid: use the issuers subject keyid, the value 'always' means its is
105 * to only use this if keyid is not present. With the option 'always'
112 char keyid=0, issuer=0; local
125 if(!strcmp(cnf->name, "keyid")) {
126 keyid
[all...]
H A Dv3_akeya.c67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
H A Dv3_purp.c595 if(subject->akid->keyid && issuer->skid &&
596 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) )
H A Dx509v3.h238 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/
H A Dv3_akey.c87 if(akeyid->keyid) {
88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
89 X509V3_add_value("keyid", tmp, &extlist);
104 * keyid: use the issuers subject keyid, the value 'always' means its is
107 * to only use this if keyid is not present. With the option 'always'
114 char keyid=0, issuer=0; local
129 if(!strcmp(cnf->name, "keyid"))
131 keyid
[all...]
H A Dv3_akeya.c67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
H A Dv3_purp.c621 if(subject->akid->keyid && issuer->skid &&
622 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) )
H A Dx509v3.h237 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_kiss.c70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
75 ASN1_OCTET_STRING **keyid, char *keymatch);
151 ASN1_OCTET_STRING *keyid = NULL; local
168 &keyid, &keymatch)) {
176 if (keyid) M_ASN1_OCTET_STRING_free(keyid);
183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
189 pass, passlen, pkey, cert, ca, keyid,
201 ASN1_OCTET_STRING **keyid,
220 if (*keyid) {
199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
H A Dp12_crt.c75 unsigned char keyid[EVP_MAX_MD_SIZE]; local
99 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
100 if(!PKCS12_add_localkeyid(bag, keyid, keyidlen)) return NULL;
139 if(!PKCS12_add_localkeyid (bag, keyid, keyidlen)) return NULL;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_kiss.c70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
75 ASN1_OCTET_STRING **keyid, char *keymatch);
151 ASN1_OCTET_STRING *keyid = NULL; local
168 &keyid, &keymatch)) {
176 if (keyid) M_ASN1_OCTET_STRING_free(keyid);
183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
189 pass, passlen, pkey, cert, ca, keyid,
201 ASN1_OCTET_STRING **keyid,
220 if (*keyid) {
199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
H A Dp12_crt.c75 unsigned char keyid[EVP_MAX_MD_SIZE]; variable
98 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
181 unsigned char *keyid; local
197 keyid = X509_keyid_get0(cert, &keyidlen);
199 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/asn1/
H A Dt_x509a.c101 if(aux->keyid) {
103 for(i = 0; i < aux->keyid->length; i++)
106 aux->keyid->data[i]);
H A Dx_x509a.c78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
103 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0;
104 return ASN1_STRING_set(aux->keyid, id, len);
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/mac80211/
H A Dtkip.c244 u8 rc4key[16], keyid, *pos = payload; local
251 keyid = pos[3];
266 if (!(keyid & (1 << 5)))
269 if ((keyid >> 6) != key->keyidx)
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/ripd/
H A Dripd.h297 u_char keyid; member in struct:rip_md5_info
H A Dripd.c789 md5->keyid, md5->auth_len);
947 key = key_lookup_for_accept (keychain, md5->keyid);
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/security/keys/
H A Dkeyctl.c441 long keyctl_describe_key(key_serial_t keyid, argument
450 key_ref = lookup_user_key(NULL, keyid, 0, 1, KEY_VIEW);
455 instkey = key_get_instantiation_authkey(keyid);
458 key_ref = lookup_user_key(NULL, keyid,
615 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) argument
622 key_ref = lookup_user_key(NULL, keyid, 0, 0, 0);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/
H A Dpkcs12.c438 unsigned char keyid[EVP_MAX_MD_SIZE]; local
470 X509_digest(ucert, EVP_sha1(), keyid, &keyidlen);
549 PKCS12_add_localkeyid(bag, keyid, keyidlen);
595 PKCS12_add_localkeyid (bag, keyid, keyidlen);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A Dmpi.h131 u32 _gcry_mpi_get_keyid( gcry_mpi_t a, u32 *keyid );
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/
H A Dx509v3.h238 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dx509v3.h237 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/x509/
H A Dx509.h249 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st

Completed in 213 milliseconds

12