/external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | SubjectKeyIdentifier.java | 56 byte[] keyid) 58 this.keyidentifier=keyid; 62 ASN1OctetString keyid) 64 this.keyidentifier=keyid.getOctets(); 55 SubjectKeyIdentifier( byte[] keyid) argument 61 SubjectKeyIdentifier( ASN1OctetString keyid) argument
|
/external/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 87 if(akeyid->keyid) { 88 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 89 X509V3_add_value("keyid", tmp, &extlist); 104 * keyid: use the issuers subject keyid, the value 'always' means its is 107 * to only use this if keyid is not present. With the option 'always' 114 char keyid=0, issuer=0; local 129 if(!strcmp(cnf->name, "keyid")) 131 keyid [all...] |
H A D | x509v3.h | 261 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 88 unsigned char keyid[EVP_MAX_MD_SIZE]; local 111 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 119 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 150 if(keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) 192 unsigned char *keyid; local 208 keyid = X509_keyid_get0(cert, &keyidlen); 210 if(keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen))
|
/external/chromium/chrome/browser/importer/ |
H A D | nss_decryptor_system_nss.cc | 86 SECItem keyid; member in struct:SDRResult 94 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, keyid) }, 202 key = PK11_FindFixedKey(slot, type, &sdrResult.keyid, cx);
|
/external/chromium/net/base/ |
H A D | dnssec_unittest.cc | 41 uint16 keyid = DNSSECKeySet::DNSKEYToKeyID( local 44 ASSERT_EQ(19036u, keyid);
|
H A D | dnssec_keyset.cc | 40 uint16 keyid = DNSKEYToKeyID(dnskey); local 45 keyids_.push_back(keyid); 62 // keyid uint16 79 uint16 keyid = static_cast<uint16>(sigdata[14]) << 8 | local 151 // Check the signature with each trusted key which has a matching keyid. 154 if (keyids_[i] != keyid)
|
H A D | dnssec_chain_verifier.cc | 35 uint16 keyid 510 // keyid: the key's id 516 uint16 keyid, 539 output[0] = static_cast<uint8>(keyid >> 8); 540 output[1] = static_cast<uint8>(keyid); 551 // for the root zone only, the keyid of the entry key is prepended to the data. 745 uint16 keyid = DNSSECKeySet::DNSKEYToKeyID(next_entry_key); 753 keyid, algorithm)) { 512 DigestKey(base::StringPiece* out, const base::StringPiece& name, const base::StringPiece& dnskey, uint8 digest_type, uint16 keyid, uint8 algorithm) argument
|
/external/openssh/ |
H A D | ssh-pkcs11.c | 69 char *keyid; member in struct:pkcs11_key 183 if (k11->keyid) 184 xfree(k11->keyid); 276 key_filter[1].pValue = k11->keyid; 317 k11->keyid = xmalloc(k11->keyid_len); 318 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
H A D | monitor.c | 683 int keyid; local 687 keyid = buffer_get_int(m); 704 if ((key = get_hostkey_by_index(keyid)) == NULL) 705 fatal("%s: no hostkey from index %d", __func__, keyid);
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 257 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 259 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 259 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 259 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 275 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|
/external/openssl/include/openssl/ |
H A D | x509.h | 275 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
|
H A D | x509v3.h | 261 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|