| /src/external/ibm-public/postfix/dist/src/tls/ |
| mkcert.sh | 105 local skid="subjectKeyIdentifier = hash" 108 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 124 local skid="subjectKeyIdentifier = hash" 127 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 147 local skid="subjectKeyIdentifier = hash" 150 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| tls_dane.sh | 50 local skid=$1; shift 53 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true") 62 local skid=$1; shift 67 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = CA:true") 146 # Tests that might depend on akid/skid chaining 194 # These tests don't depend in the akid/skid chaining:
|
| /src/sys/arch/hpcarm/dev/ |
| sacc_hpcarm.c | 78 uint32_t skid; local 104 skid = bus_space_read_4(sc->sc_iot, sc->sc_ioh, SACCSBI_SKID); 107 (skid & 0xf0) >> 4, skid & 0xf);
|
| /src/crypto/external/bsd/openssl.old/dist/test/certs/ |
| mkcert.sh | 103 local skid="subjectKeyIdentifier = hash" 106 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 135 local skid="subjectKeyIdentifier = hash" 138 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 157 local skid="subjectKeyIdentifier = hash" 160 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| mkcert.sh | 105 local skid="subjectKeyIdentifier = hash" 108 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 140 local skid="subjectKeyIdentifier = hash" 143 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 166 local skid="subjectKeyIdentifier = hash" 169 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| mkcert.sh | 105 local skid="subjectKeyIdentifier = hash" 108 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 140 local skid="subjectKeyIdentifier = hash" 143 exts=$(printf "%s\n%s\n%s\n" "$bcon" "$ku" "$skid" "$akid") 166 local skid="subjectKeyIdentifier = hash" 169 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid")
|
| /src/sys/arch/evbarm/lubbock/ |
| sacc_obio.c | 104 uint32_t skid, tmp; local 137 skid = bus_space_read_4(sc->sc_iot, sc->sc_ioh, SACCSBI_SKID); 140 (skid & 0xf0) >> 4, skid & 0xf);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cmp/ |
| cmp_vfy.c | 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 177 const ASN1_OCTET_STRING *skid) 181 if (skid == NULL) 190 if (ASN1_OCTET_STRING_cmp(ckid, skid) == 0) { 200 if ((str = OPENSSL_buf2hexstr(skid->data, skid->length)) != NULL) 455 const ASN1_OCTET_STRING *skid = msg->header->senderKID; local 503 skid_str = skid == NULL ? NULL 504 : OPENSSL_buf2hexstr(skid->data, skid->length) [all...] |
| /src/sys/arch/arm/sa11x0/ |
| sa1111.c | 76 uint32_t skid; local 81 skid = bus_space_read_4(sa->sa_iot, ioh, SACCSBI_SKID); 84 if ((skid & 0xffffff00) != 0x690cc200)
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| x_x509.c | 46 ASN1_OCTET_STRING_free(ret->skid); 68 ret->skid = NULL; 87 ASN1_OCTET_STRING_free(ret->skid);
|
| v3_conf.c | 315 int i, akid = -1, skid = -1; local 324 skid = i; 328 if (skid > akid && akid >= 0) { 329 /* make sure SKID is handled before AKID */ 331 val = sk_CONF_VALUE_value(nval, skid); 332 else if (i == skid)
|
| v3_purp.c | 589 x->skid = X509_get_ext_d2i(x, NID_subject_key_identifier, &i, NULL); 590 if (x->skid == NULL && i != -1) 600 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ 1009 /* set issuer->skid and subject->akid */ 1046 if (akid->keyid && issuer->skid && ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid)) 1104 return x->skid;
|
| x509_vfy.c | 689 CB_FAIL_IF(x->skid != NULL 701 /* Check SKID presence acc. to RFC 5280 section 4.2.1.2 */ 702 CB_FAIL_IF((x->ex_flags & EXFLAG_CA) != 0 && x->skid == NULL,
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x_x509.c | 46 ASN1_OCTET_STRING_free(ret->skid); 68 ret->skid = NULL; 87 ASN1_OCTET_STRING_free(ret->skid);
|
| v3_purp.c | 546 x->skid = X509_get_ext_d2i(x, NID_subject_key_identifier, &i, NULL); 547 if (x->skid == NULL && i != -1) 557 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ 923 /* set issuer->skid and subject->akid */ 959 if (akid->keyid && issuer->skid && 960 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid)) 1023 return x->skid;
|
| x509_vfy.c | 563 CB_FAIL_IF(x->skid != NULL 574 /* Check SKID presence acc. to RFC 5280 section 4.2.1.2 */ 575 CB_FAIL_IF((x->ex_flags & EXFLAG_CA) != 0 && x->skid == NULL,
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x_x509.c | 46 ASN1_OCTET_STRING_free(ret->skid); 67 ret->skid = NULL; 85 ASN1_OCTET_STRING_free(ret->skid);
|
| /src/crypto/external/apache2/openssl/dist/crypto/cmp/ |
| cmp_vfy.c | 195 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 198 const ASN1_OCTET_STRING *skid) 202 if (skid == NULL) 211 if (ASN1_OCTET_STRING_cmp(ckid, skid) == 0) { 221 if ((str = i2s_ASN1_OCTET_STRING(NULL, skid)) != NULL) 463 const ASN1_OCTET_STRING *skid = msg->header->senderKID; local 512 skid_str = skid == NULL ? NULL : i2s_ASN1_OCTET_STRING(NULL, skid);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| v3_purp.c | 511 x->skid = X509_get_ext_d2i(x, NID_subject_key_identifier, &i, NULL); 512 if (x->skid == NULL && i != -1) 520 if (X509_check_akid(x, x->akid) == X509_V_OK /* SKID matches AKID */ 886 if (akid->keyid && issuer->skid && 887 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid)) 950 return x->skid;
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| x509.h | 174 ASN1_OCTET_STRING *skid; member in struct:x509_st
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| x509.h | 188 ASN1_OCTET_STRING *skid; member in struct:x509_st
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| x509.h | 188 ASN1_OCTET_STRING *skid; member in struct:x509_st
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| x509.c | 197 ASN1_OBJECT *skid = OBJ_nid2obj(NID_subject_key_identifier); local 206 * Filter out SKID and AKID extensions, which make no sense in a CSR. 209 warn_copying(skid, names); 217 if (OBJ_cmp(obj, skid) != 0 && OBJ_cmp(obj, akid) != 0
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| x509.c | 263 ASN1_OBJECT *skid = OBJ_nid2obj(NID_subject_key_identifier); local 272 * Filter out SKID and AKID extensions, which make no sense in a CSR. 275 warn_copying(skid, names); 283 if (OBJ_cmp(obj, skid) != 0 && OBJ_cmp(obj, akid) != 0
|