HomeSort by: relevance | last modified time | path
    Searched refs:akid (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/external/ibm-public/postfix/dist/src/tls/
mkcert.sh 106 local akid="authorityKeyIdentifier = keyid"
108 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
125 local akid="authorityKeyIdentifier = keyid"
127 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
148 local akid="authorityKeyIdentifier = keyid"
150 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
tls_dane.sh 51 local akid=$1; shift
53 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true")
63 local akid=$1; shift
67 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true")
146 # Tests that might depend on akid/skid chaining
194 # These tests don't depend in the akid/skid chaining:
  /src/crypto/external/bsd/openssl.old/dist/test/certs/
mkcert.sh 104 local akid="authorityKeyIdentifier = keyid"
106 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
136 local akid="authorityKeyIdentifier = keyid"
138 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
158 local akid="authorityKeyIdentifier = keyid"
160 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/
v3_purp.c 514 x->akid = X509_get_ext_d2i(x, NID_authority_key_identifier, &i, NULL);
515 if (x->akid == NULL && i != -1)
520 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */
839 * 2. If akid(subject) exists check it matches issuer
869 if (subject->akid) {
870 int ret = X509_check_akid(issuer, subject->akid);
879 int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid)
882 if (!akid)
886 if (akid->keyid && issuer->skid &
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/certs/
mkcert.sh 106 local akid="authorityKeyIdentifier = keyid"
108 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid")
141 local akid="authorityKeyIdentifier = keyid"
143 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid")
167 local akid="authorityKeyIdentifier = keyid"
169 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
  /src/crypto/external/bsd/openssl/dist/test/certs/
mkcert.sh 106 local akid="authorityKeyIdentifier = keyid"
108 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid")
141 local akid="authorityKeyIdentifier = keyid"
143 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid")
167 local akid="authorityKeyIdentifier = keyid"
169 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
v3_purp.c 593 x->akid = X509_get_ext_d2i(x, NID_authority_key_identifier, &i, NULL);
594 if (x->akid == NULL && i != -1)
600 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */
983 * 2. If akid(subject) exists, it matches the respective issuer fields.
1009 /* set issuer->skid and subject->akid */
1014 ret = X509_check_akid(issuer, subject->akid);
1040 int X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid)
1042 if (akid == NULL)
1046 if (akid->keyid && issuer->skid && ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid)
    [all...]
x_x509.c 47 AUTHORITY_KEYID_free(ret->akid);
69 ret->akid = NULL;
88 AUTHORITY_KEYID_free(ret->akid);
v3_conf.c 315 int i, akid = -1, skid = -1; local
322 akid = i;
328 if (skid > akid && akid >= 0) {
329 /* make sure SKID is handled before AKID */
330 if (i == akid)
333 val = sk_CONF_VALUE_value(nval, akid);
x_crl.c 169 AUTHORITY_KEYID_free(crl->akid);
178 crl->akid = NULL;
202 crl->akid = X509_CRL_get_ext_d2i(crl,
205 if (crl->akid == NULL && i != -1)
264 AUTHORITY_KEYID_free(crl->akid);
x509_vfy.c 41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */
686 CB_FAIL_IF(x->akid != NULL
693 /* Check AKID presence acc. to RFC 5280 section 4.2.1.1 */
698 && (x->akid == NULL || x->akid->keyid == NULL),
1301 /* AKID and IDP must match */
1425 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
1437 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
1456 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
2202 /* AKID and IDP must match *
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
v3_purp.c 550 x->akid = X509_get_ext_d2i(x, NID_authority_key_identifier, &i, NULL);
551 if (x->akid == NULL && i != -1)
557 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */
898 * 2. If akid(subject) exists, it matches the respective issuer fields.
923 /* set issuer->skid and subject->akid */
928 ret = X509_check_akid(issuer, subject->akid);
953 int X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid)
955 if (akid == NULL)
959 if (akid->keyid && issuer->skid &
    [all...]
x_x509.c 47 AUTHORITY_KEYID_free(ret->akid);
69 ret->akid = NULL;
88 AUTHORITY_KEYID_free(ret->akid);
x_crl.c 170 AUTHORITY_KEYID_free(crl->akid);
179 crl->akid = NULL;
204 crl->akid = X509_CRL_get_ext_d2i(crl,
207 if (crl->akid == NULL && i != -1)
266 AUTHORITY_KEYID_free(crl->akid);
x509_vfy.c 41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */
560 CB_FAIL_IF(x->akid != NULL
567 /* Check AKID presence acc. to RFC 5280 section 4.2.1.1 */
572 && (x->akid == NULL || x->akid->keyid == NULL), ctx,
1155 /* AKID and IDP must match */
1274 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
1286 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
1305 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
2043 /* AKID and IDP must match *
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
x_x509.c 47 AUTHORITY_KEYID_free(ret->akid);
68 ret->akid = NULL;
86 AUTHORITY_KEYID_free(ret->akid);
x_crl.c 170 AUTHORITY_KEYID_free(crl->akid);
179 crl->akid = NULL;
204 crl->akid = X509_CRL_get_ext_d2i(crl,
207 if (crl->akid == NULL && i != -1)
266 AUTHORITY_KEYID_free(crl->akid);
x509_vfy.c 58 /* CRL issuer matches CRL AKID */
1130 /* AKID and IDP must match */
1254 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
1266 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
1286 if (X509_check_akid(crl_issuer, crl->akid) == X509_V_OK) {
2006 /* AKID and IDP must match */
  /src/crypto/external/bsd/openssl.old/dist/include/crypto/
x509.h 99 AUTHORITY_KEYID *akid; member in struct:X509_crl_st
175 AUTHORITY_KEYID *akid; member in struct:x509_st
  /src/crypto/external/apache2/openssl/dist/crypto/cmp/
cmp_asn.c 688 AUTHORITY_KEYID *akid = NULL;
729 akid = X509_get_ext_d2i(cert, NID_akid, NULL, NULL);
730 if (akid != NULL && gennames_allowed(akid->issuer, only_DN))
731 CRLissuer = akid->issuer;
736 akid = X509_CRL_get_ext_d2i(crl, NID_akid, NULL, NULL);
737 if (akid != NULL && gennames_allowed(akid->issuer, only_DN))
738 CRLissuer = akid->issuer;
750 AUTHORITY_KEYID_free(akid);
    [all...]
  /src/crypto/external/apache2/openssl/dist/include/crypto/
x509.h 110 AUTHORITY_KEYID *akid; member in struct:X509_crl_st
189 AUTHORITY_KEYID *akid; member in struct:x509_st
  /src/crypto/external/bsd/openssl/dist/include/crypto/
x509.h 110 AUTHORITY_KEYID *akid; member in struct:X509_crl_st
189 AUTHORITY_KEYID *akid; member in struct:x509_st
  /src/crypto/external/bsd/openssl/dist/apps/
x509.c 198 ASN1_OBJECT *akid = OBJ_nid2obj(NID_authority_key_identifier); local
206 * Filter out SKID and AKID extensions, which make no sense in a CSR.
210 warn_copying(akid, names);
217 if (OBJ_cmp(obj, skid) != 0 && OBJ_cmp(obj, akid) != 0
830 /* prepare fallback for AKID, but only if issuer cert equals subject cert */
  /src/crypto/external/apache2/openssl/dist/apps/
x509.c 264 ASN1_OBJECT *akid = OBJ_nid2obj(NID_authority_key_identifier); local
272 * Filter out SKID and AKID extensions, which make no sense in a CSR.
276 warn_copying(akid, names);
283 if (OBJ_cmp(obj, skid) != 0 && OBJ_cmp(obj, akid) != 0
929 /* prepare fallback for AKID, but only if issuer cert equals subject cert */
  /src/crypto/external/bsd/openssl.old/dist/include/openssl/
x509v3.h 655 int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid);

Completed in 54 milliseconds

1 2