HomeSort by: relevance | last modified time | path
    Searched defs:keyid (Results 1 - 25 of 74) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
p12_crt.c 40 unsigned char keyid[EVP_MAX_MD_SIZE]; local
65 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen))
73 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
102 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
140 unsigned char *keyid; local
156 keyid = X509_keyid_get0(cert, &keyidlen);
158 if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/
v3_akey.c 45 if (akeyid->keyid) {
46 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length);
51 if (!X509V3_add_value("keyid", tmp, &extlist)) {
88 * keyid: use the issuers subject keyid, the value 'always' means its is
91 * to only use this if keyid is not present. With the option 'always'
99 char keyid = 0, issuer = 0; local
113 if (strcmp(cnf->name, "keyid") == 0) {
114 keyid = 1
    [all...]
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 29 uint16_t keyid; member in struct:dns_rdata_rrsig
sig_24.h 30 uint16_t keyid; member in struct:dns_rdata_sig_t
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 30 uint16_t keyid; member in struct:dns_rdata_rrsig
sig_24.h 31 uint16_t keyid; member in struct:dns_rdata_sig_t
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
v3_akid.c 46 if (akeyid->keyid) {
47 tmp = i2s_ASN1_OCTET_STRING(NULL, akeyid->keyid);
52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL,
88 * Three explicit tags may be given, where 'keyid' and 'issuer' may be combined:
90 * 'keyid': use the issuer's subject keyid; the option 'always' means its is
93 * to only use this if 'keyid' is not present. With the option 'always'
100 char keyid = 0, issuer = 0; local
127 if (strcmp(cnf->name, "keyid") == 0 && keyid == 0)
    [all...]
t_x509.c 320 const unsigned char *alias, *keyid; local
360 keyid = X509_keyid_get0(x, &keyidlen);
361 if (keyid) {
364 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
  /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/
p12_crt.c 21 unsigned char *keyid,
47 unsigned char keyid[EVP_MAX_MD_SIZE]; local
71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen))
79 pkeyid = keyid;
115 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
160 unsigned char *keyid,
172 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
189 unsigned char *keyid = NULL; local
196 keyid = X509_keyid_get0(cert, &keyidlen)
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
v3_akid.c 46 if (akeyid->keyid) {
47 tmp = OPENSSL_buf2hexstr(akeyid->keyid->data, akeyid->keyid->length);
52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL,
89 * keyid: use the issuers subject keyid, the value 'always' means its is
92 * to only use this if keyid is not present. With the option 'always'
100 char keyid = 0, issuer = 0; local
122 if (strcmp(cnf->name, "keyid") == 0) {
123 keyid = 1
    [all...]
t_x509.c 344 const unsigned char *alias, *keyid; local
384 keyid = X509_keyid_get0(x, &keyidlen);
385 if (keyid) {
388 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);
  /src/lib/libtelnet/
encrypt.h 89 int (*keyid)(int, unsigned char *, int *); member in struct:__anon553
  /src/crypto/external/apache2/openssl/dist/apps/lib/
engine_loader.c 30 * org.openssl.engine:{engineid}:{keyid}
40 char *keyid; member in struct:ossl_store_loader_ctx_st
45 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid)
51 ctx->keyid = keyid;
60 OPENSSL_free(ctx->keyid);
72 char *keyid = NULL; local
90 keyid = OPENSSL_strdup(q + 1);
93 if (e != NULL && keyid != NULL)
94 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid);
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/
p12_crt.c 23 unsigned char *keyid,
46 unsigned char keyid[EVP_MAX_MD_SIZE]; local
70 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen))
78 pkeyid = keyid;
131 if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
193 unsigned char *keyid,
205 if (keyid != NULL && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
222 unsigned char *keyid = NULL; local
229 keyid = X509_keyid_get0(cert, &keyidlen)
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/lib/
engine_loader.c 29 * org.openssl.engine:{engineid}:{keyid}
39 char *keyid; member in struct:ossl_store_loader_ctx_st
44 static OSSL_STORE_LOADER_CTX *OSSL_STORE_LOADER_CTX_new(ENGINE *e, char *keyid)
50 ctx->keyid = keyid;
59 OPENSSL_free(ctx->keyid);
71 char *keyid = NULL; local
91 keyid = OPENSSL_strdup(q + 1);
94 if (e != NULL && keyid != NULL)
95 ctx = OSSL_STORE_LOADER_CTX_new(e, keyid);
    [all...]
  /src/external/mpl/bind/dist/bin/named/
tsigconf.c 41 const char *keyid = NULL; local
62 keyid = cfg_obj_asstring(cfg_map_getname(key));
74 isc_buffer_constinit(&keynamesrc, keyid, strlen(keyid));
75 isc_buffer_add(&keynamesrc, strlen(keyid));
93 keyid, algstr);
135 "configuring key '%s': %s", keyid, isc_result_totext(ret));
  /src/sys/net80211/
ieee80211_crypto.c 545 u_int8_t keyid, *hdr; local
565 keyid = ic->ic_def_txkey;
568 keyid = 0;
589 return (cip->ic_encap(k, m, keyid<<6) ? k : NULL);
609 u_int8_t keyid; local
632 m_copydata(m, hdrlen + IEEE80211_WEP_IVLEN, sizeof(keyid), &keyid);
635 k = &ic->ic_nw_keys[keyid >> 6];
  /src/external/bsd/ntp/dist/libntp/
authreadkeys.c 93 keyid_t keyid; /* stored key ID */ member in struct:keydata
287 next->keyid = keyno;
392 MD5auth_setkey(next->keyid, next->keytype,
  /src/external/mpl/bind/dist/lib/dns/
private.c 368 dns_keytag_t keyid = (private->data[2] | private->data[1] << 8); local
385 snprintf(keybuf, sizeof(keybuf), "key %d/%s", keyid, algbuf);
  /src/external/mpl/bind/dist/tests/dns/
private_test.c 68 dns_keytag_t keyid; member in struct:__anon24212
89 buf[1] = (testcase->keyid & 0xff00) >> 8;
90 buf[2] = (testcase->keyid & 0xff);
  /src/external/mpl/dhcp/bind/dist/lib/dns/
private.c 392 dns_keytag_t keyid = (private->data[2] | private->data[1] << 8); local
409 snprintf(keybuf, sizeof(keybuf), "key %d/%s", keyid, algbuf);
  /src/crypto/external/bsd/netpgp/dist/src/lib/
create.c 1012 hexdump(stderr, "Encrypting for keyid", id, sizeof(sesskey->key_id));
1297 uint8_t keyid[PGP_KEY_ID_SIZE]; local
1299 pgp_keyid(keyid, PGP_KEY_ID_SIZE, &seckey->pubkey, PGP_HASH_SHA1); /* XXX - hardcoded */
1306 pgp_write(output, keyid, 8) &&
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_lib.c 675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert)
681 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid);
705 ASN1_OCTET_STRING *keyid = NULL; local
712 keyid = ASN1_STRING_dup(cert_keyid);
713 if (!keyid) {
718 *pkeyid = keyid;
  /src/crypto/external/bsd/openssl.old/dist/crypto/cms/
cms_lib.c 543 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert)
549 return ASN1_OCTET_STRING_cmp(keyid, cert_keyid);
573 ASN1_OCTET_STRING *keyid = NULL; local
580 keyid = ASN1_STRING_dup(cert_keyid);
581 if (!keyid) {
586 *pkeyid = keyid;
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
t_x509.c 331 const unsigned char *alias, *keyid; local
371 keyid = X509_keyid_get0(x, &keyidlen);
372 if (keyid) {
375 BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);

Completed in 43 milliseconds

1 2 3