Lines Matching defs:usage
383 #define ku_reject(x, usage) \
384 (((x)->ex_flags & EXFLAG_KUSAGE) != 0 && ((x)->ex_kusage & (usage)) == 0)
385 #define xku_reject(x, usage) \
386 (((x)->ex_flags & EXFLAG_XKUSAGE) != 0 && ((x)->ex_xkusage & (usage)) == 0)
387 #define ns_reject(x, usage) \
388 (((x)->ex_flags & EXFLAG_NSCERT) != 0 && ((x)->ex_nscert & (usage)) == 0)
401 ASN1_BIT_STRING *usage;
470 /* Handle (basic) key usage */
471 if ((usage = X509_get_ext_d2i(x, NID_key_usage, &i, NULL)) != NULL) {
473 if (usage->length > 0) {
474 x->ex_kusage = usage->data[0];
475 if (usage->length > 1)
476 x->ex_kusage |= usage->data[1] << 8;
479 ASN1_BIT_STRING_free(usage);
480 /* Check for empty key usage according to RFC 5280 section 4.2.1.3 */
489 /* Handle extended key usage */
524 /* Ignore unknown extended key usage */
669 * If key usage present it must have certSign so tolerate it
731 * Key usage needed for TLS/SSL server: digital signature, encipherment or
861 * Check the optional key usage field:
871 /* Only time stamp key usage is permitted and it's required. */