| /src/external/ibm-public/postfix/dist/src/tls/ |
| mkcert.sh | 106 local akid="authorityKeyIdentifier = keyid" 108 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 125 local akid="authorityKeyIdentifier = keyid" 127 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 148 local akid="authorityKeyIdentifier = keyid" 150 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| tls_dane.sh | 51 local akid=$1; shift 53 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true") 63 local akid=$1; shift 67 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true") 146 # Tests that might depend on akid/skid chaining 194 # These tests don't depend in the akid/skid chaining:
|
| /src/crypto/external/bsd/openssl.old/dist/test/certs/ |
| mkcert.sh | 104 local akid="authorityKeyIdentifier = keyid" 106 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 136 local akid="authorityKeyIdentifier = keyid" 138 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 158 local akid="authorityKeyIdentifier = keyid" 160 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| v3_purp.c | 514 x->akid = X509_get_ext_d2i(x, NID_authority_key_identifier, &i, NULL); 515 if (x->akid == NULL && i != -1) 520 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ 839 * 2. If akid(subject) exists check it matches issuer 869 if (subject->akid) { 870 int ret = X509_check_akid(issuer, subject->akid); 879 int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) 882 if (!akid) 886 if (akid->keyid && issuer->skid & [all...] |
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| mkcert.sh | 106 local akid="authorityKeyIdentifier = keyid" 108 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 141 local akid="authorityKeyIdentifier = keyid" 143 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 167 local akid="authorityKeyIdentifier = keyid" 169 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| mkcert.sh | 106 local akid="authorityKeyIdentifier = keyid" 108 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 141 local akid="authorityKeyIdentifier = keyid" 143 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 167 local akid="authorityKeyIdentifier = keyid" 169 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| v3_purp.c | 593 x->akid = X509_get_ext_d2i(x, NID_authority_key_identifier, &i, NULL); 594 if (x->akid == NULL && i != -1) 600 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ 983 * 2. If akid(subject) exists, it matches the respective issuer fields. 1009 /* set issuer->skid and subject->akid */ 1014 ret = X509_check_akid(issuer, subject->akid); 1040 int X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid) 1042 if (akid == NULL) 1046 if (akid->keyid && issuer->skid && ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) [all...] |
| x_x509.c | 47 AUTHORITY_KEYID_free(ret->akid); 69 ret->akid = NULL; 88 AUTHORITY_KEYID_free(ret->akid);
|
| v3_conf.c | 315 int i, akid = -1, skid = -1; local 322 akid = i; 328 if (skid > akid && akid >= 0) { 329 /* make sure SKID is handled before AKID */ 330 if (i == akid) 333 val = sk_CONF_VALUE_value(nval, akid);
|
| x_crl.c | 169 AUTHORITY_KEYID_free(crl->akid); 178 crl->akid = NULL; 202 crl->akid = X509_CRL_get_ext_d2i(crl, 205 if (crl->akid == NULL && i != -1) 264 AUTHORITY_KEYID_free(crl->akid);
|
| x509_vfy.c | 41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */ 686 CB_FAIL_IF(x->akid != NULL 693 /* Check AKID presence acc. to RFC 5280 section 4.2.1.1 */ 698 && (x->akid == NULL || x->akid->keyid == NULL), 1301 /* AKID and IDP must match */ 1425 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 1437 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 1456 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 2202 /* AKID and IDP must match * [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| v3_purp.c | 550 x->akid = X509_get_ext_d2i(x, NID_authority_key_identifier, &i, NULL); 551 if (x->akid == NULL && i != -1) 557 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ 898 * 2. If akid(subject) exists, it matches the respective issuer fields. 923 /* set issuer->skid and subject->akid */ 928 ret = X509_check_akid(issuer, subject->akid); 953 int X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid) 955 if (akid == NULL) 959 if (akid->keyid && issuer->skid & [all...] |
| x_x509.c | 47 AUTHORITY_KEYID_free(ret->akid); 69 ret->akid = NULL; 88 AUTHORITY_KEYID_free(ret->akid);
|
| x_crl.c | 170 AUTHORITY_KEYID_free(crl->akid); 179 crl->akid = NULL; 204 crl->akid = X509_CRL_get_ext_d2i(crl, 207 if (crl->akid == NULL && i != -1) 266 AUTHORITY_KEYID_free(crl->akid);
|
| x509_vfy.c | 41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */ 560 CB_FAIL_IF(x->akid != NULL 567 /* Check AKID presence acc. to RFC 5280 section 4.2.1.1 */ 572 && (x->akid == NULL || x->akid->keyid == NULL), ctx, 1155 /* AKID and IDP must match */ 1274 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 1286 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 1305 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 2043 /* AKID and IDP must match * [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x_x509.c | 47 AUTHORITY_KEYID_free(ret->akid); 68 ret->akid = NULL; 86 AUTHORITY_KEYID_free(ret->akid);
|
| x_crl.c | 170 AUTHORITY_KEYID_free(crl->akid); 179 crl->akid = NULL; 204 crl->akid = X509_CRL_get_ext_d2i(crl, 207 if (crl->akid == NULL && i != -1) 266 AUTHORITY_KEYID_free(crl->akid);
|
| x509_vfy.c | 58 /* CRL issuer matches CRL AKID */ 1130 /* AKID and IDP must match */ 1254 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 1266 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 1286 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) { 2006 /* AKID and IDP must match */
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| x509.h | 99 AUTHORITY_KEYID *akid; member in struct:X509_crl_st 175 AUTHORITY_KEYID *akid; member in struct:x509_st
|
| /src/crypto/external/apache2/openssl/dist/crypto/cmp/ |
| cmp_asn.c | 688 AUTHORITY_KEYID *akid = NULL; 729 akid = X509_get_ext_d2i(cert, NID_akid, NULL, NULL); 730 if (akid != NULL && gennames_allowed(akid->issuer, only_DN)) 731 CRLissuer = akid->issuer; 736 akid = X509_CRL_get_ext_d2i(crl, NID_akid, NULL, NULL); 737 if (akid != NULL && gennames_allowed(akid->issuer, only_DN)) 738 CRLissuer = akid->issuer; 750 AUTHORITY_KEYID_free(akid); [all...] |
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| x509.h | 110 AUTHORITY_KEYID *akid; member in struct:X509_crl_st 189 AUTHORITY_KEYID *akid; member in struct:x509_st
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| x509.h | 110 AUTHORITY_KEYID *akid; member in struct:X509_crl_st 189 AUTHORITY_KEYID *akid; member in struct:x509_st
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| x509.c | 198 ASN1_OBJECT *akid = OBJ_nid2obj(NID_authority_key_identifier); local 206 * Filter out SKID and AKID extensions, which make no sense in a CSR. 210 warn_copying(akid, names); 217 if (OBJ_cmp(obj, skid) != 0 && OBJ_cmp(obj, akid) != 0 830 /* prepare fallback for AKID, but only if issuer cert equals subject cert */
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| x509.c | 264 ASN1_OBJECT *akid = OBJ_nid2obj(NID_authority_key_identifier); local 272 * Filter out SKID and AKID extensions, which make no sense in a CSR. 276 warn_copying(akid, names); 283 if (OBJ_cmp(obj, skid) != 0 && OBJ_cmp(obj, akid) != 0 929 /* prepare fallback for AKID, but only if issuer cert equals subject cert */
|
| /src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| x509v3.h | 655 int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid);
|