/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | x509v3.h | 61 unsigned long key_usage; member in struct:x509_certificate
|
H A D | x509v3.c | 725 cert->key_usage = asn1_bit_string_to_long(hdr.payload, hdr.length); 727 wpa_printf(MSG_DEBUG, "X509: KeyUsage 0x%lx", cert->key_usage); 1554 !(cert->key_usage & X509_KEY_USAGE_KEY_CERT_SIGN)) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.h | 77 unsigned long key_usage; member in struct:x509_certificate
|
H A D | x509v3.c | 754 cert->key_usage = asn1_bit_string_to_long(hdr.payload, hdr.length); 756 wpa_printf(MSG_DEBUG, "X509: KeyUsage 0x%lx", cert->key_usage); 1811 !(cert->key_usage & X509_KEY_USAGE_KEY_CERT_SIGN)) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.h | 77 unsigned long key_usage; member in struct:x509_certificate
|
H A D | x509v3.c | 754 cert->key_usage = asn1_bit_string_to_long(hdr.payload, hdr.length); 756 wpa_printf(MSG_DEBUG, "X509: KeyUsage 0x%lx", cert->key_usage); 1811 !(cert->key_usage & X509_KEY_USAGE_KEY_CERT_SIGN)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.h | 77 unsigned long key_usage; member in struct:x509_certificate
|
H A D | x509v3.c | 754 cert->key_usage = asn1_bit_string_to_long(hdr.payload, hdr.length); 756 wpa_printf(MSG_DEBUG, "X509: KeyUsage 0x%lx", cert->key_usage); 1811 !(cert->key_usage & X509_KEY_USAGE_KEY_CERT_SIGN)) {
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 228 int key_usage, int iter, 238 if(key_usage && !PKCS8_add_keyusage(p8, key_usage))
|
H A D | pkcs12.h | 253 int key_usage, int iter, variable
|
/external/chromium/chrome/common/net/ |
H A D | x509_certificate_model_nss.cc | 150 SECItem key_usage; local 151 key_usage.data = NULL; 153 if (CERT_FindKeyUsageExtension(cert_handle, &key_usage) == SECSuccess) { 154 key_usage_str = psm::ProcessKeyUsageBitString(&key_usage, ','); 155 PORT_Free(key_usage.data);
|
/external/chromium/crypto/ |
H A D | rsa_private_key_nss.cc | 229 const unsigned int key_usage = KU_KEY_ENCIPHERMENT | KU_DATA_ENCIPHERMENT | local 233 key_usage, &result->key_, NULL);
|
/external/chromium/net/socket/ |
H A D | ssl_server_socket_nss.cc | 320 const unsigned int key_usage = KU_KEY_ENCIPHERMENT | KU_DIGITAL_SIGNATURE; local 323 key_usage, &private_key, NULL);
|
H A D | ssl_client_socket_win.cc | 309 BYTE key_usage; local 311 &key_usage, 1)) { 312 if (!(key_usage & CERT_DIGITAL_SIGNATURE_KEY_USAGE))
|
H A D | ssl_client_socket_nss.cc | 220 BYTE key_usage; local 222 &key_usage, 1)) { 223 if (!(key_usage & CERT_DIGITAL_SIGNATURE_KEY_USAGE))
|
/external/chromium/net/base/ |
H A D | x509_certificate_mac.cc | 1142 const CE_KeyUsage* key_usage = NULL; local 1148 key_usage = reinterpret_cast<const CE_KeyUsage*>(ext->value.parsedValue); 1164 if (key_usage && !((*key_usage) & CE_KU_DigitalSignature))
|
/external/openssl/include/openssl/ |
H A D | pkcs12.h | 253 int key_usage, int iter, variable
|