/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 112 if (!x || !x->aux || !x->aux->keyid) 114 ASN1_OCTET_STRING_free(x->aux->keyid); 115 x->aux->keyid = NULL; 119 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 120 return ASN1_STRING_set(aux->keyid, id, len); 132 if(!x->aux || !x->aux->keyid) return NULL; 133 if(len) *len = x->aux->keyid->length; 134 return x->aux->keyid [all...] |
H A D | t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 85 if(akeyid->keyid) { 86 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 87 X509V3_add_value("keyid", tmp, &extlist); 102 * keyid: use the issuers subject keyid, the value 'always' means its is 105 * to only use this if keyid is not present. With the option 'always' 112 char keyid=0, issuer=0; local 125 if(!strcmp(cnf->name, "keyid")) { 126 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
H A D | v3_purp.c | 595 if(subject->akid->keyid && issuer->skid && 596 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) )
|
H A D | x509v3.h | 238 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid [all...] |
H A D | v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
H A D | v3_purp.c | 621 if(subject->akid->keyid && issuer->skid && 622 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) )
|
H A D | x509v3.h | 237 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 75 ASN1_OCTET_STRING **keyid, char *keymatch); 151 ASN1_OCTET_STRING *keyid = NULL; local 168 &keyid, &keymatch)) { 176 if (keyid) M_ASN1_OCTET_STRING_free(keyid); 183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 189 pass, passlen, pkey, cert, ca, keyid, 201 ASN1_OCTET_STRING **keyid, 220 if (*keyid) { 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
H A D | p12_crt.c | 75 unsigned char keyid[EVP_MAX_MD_SIZE]; local 99 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 100 if(!PKCS12_add_localkeyid(bag, keyid, keyidlen)) return NULL; 139 if(!PKCS12_add_localkeyid (bag, keyid, keyidlen)) return NULL;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_kiss.c | 70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 75 ASN1_OCTET_STRING **keyid, char *keymatch); 151 ASN1_OCTET_STRING *keyid = NULL; local 168 &keyid, &keymatch)) { 176 if (keyid) M_ASN1_OCTET_STRING_free(keyid); 183 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, 189 pass, passlen, pkey, cert, ca, keyid, 201 ASN1_OCTET_STRING **keyid, 220 if (*keyid) { 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
H A D | p12_crt.c | 75 unsigned char keyid[EVP_MAX_MD_SIZE]; variable 98 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 106 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 142 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 181 unsigned char *keyid; local 197 keyid = X509_keyid_get0(cert, &keyidlen); 199 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/asn1/ |
H A D | t_x509a.c | 101 if(aux->keyid) { 103 for(i = 0; i < aux->keyid->length; i++) 106 aux->keyid->data[i]);
|
H A D | x_x509a.c | 78 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 103 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 104 return ASN1_STRING_set(aux->keyid, id, len);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/mac80211/ |
H A D | tkip.c | 244 u8 rc4key[16], keyid, *pos = payload; local 251 keyid = pos[3]; 266 if (!(keyid & (1 << 5))) 269 if ((keyid >> 6) != key->keyidx)
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/ripd/ |
H A D | ripd.h | 297 u_char keyid; member in struct:rip_md5_info
|
H A D | ripd.c | 789 md5->keyid, md5->auth_len); 947 key = key_lookup_for_accept (keychain, md5->keyid);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/security/keys/ |
H A D | keyctl.c | 441 long keyctl_describe_key(key_serial_t keyid, argument 450 key_ref = lookup_user_key(NULL, keyid, 0, 1, KEY_VIEW); 455 instkey = key_get_instantiation_authkey(keyid); 458 key_ref = lookup_user_key(NULL, keyid, 615 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) argument 622 key_ref = lookup_user_key(NULL, keyid, 0, 0, 0);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/ |
H A D | pkcs12.c | 438 unsigned char keyid[EVP_MAX_MD_SIZE]; local 470 X509_digest(ucert, EVP_sha1(), keyid, &keyidlen); 549 PKCS12_add_localkeyid(bag, keyid, keyidlen); 595 PKCS12_add_localkeyid (bag, keyid, keyidlen);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | mpi.h | 131 u32 _gcry_mpi_get_keyid( gcry_mpi_t a, u32 *keyid );
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/ |
H A D | x509v3.h | 238 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | x509v3.h | 237 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/x509/ |
H A D | x509.h | 249 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|