/build/make/tools/signapk/test/ |
run | 25 cert := out/key1.pem macro 26 out/signed-$(package): $(package) $(cert) 30 -key $(cert).pk -cert $(cert) -tempdir out
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
UnknownStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
CertificateStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
OCSPException.java | 1 package org.bouncycastle.cert.ocsp;
|
Req.java | 1 package org.bouncycastle.cert.ocsp;
|
RevokedStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
OCSPRespBuilder.java | 1 package org.bouncycastle.cert.ocsp;
|
OCSPUtils.java | 1 package org.bouncycastle.cert.ocsp; 13 import org.bouncycastle.cert.X509CertificateHolder;
|
RespData.java | 1 package org.bouncycastle.cert.ocsp;
|
RespID.java | 1 package org.bouncycastle.cert.ocsp;
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-2109/ |
poc.c | 29 X509 *cert; variable 37 cert = d2i_X509_bio(in, NULL); // x509 should be present on all Android systems 39 if(cert != NULL){ 40 X509_free(cert);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
CertException.java | 1 package org.bouncycastle.cert; 4 * General checked Exception thrown in the cert package and its sub-packages.
|
CertIOException.java | 1 package org.bouncycastle.cert; 6 * General IOException thrown in the cert package and its sub-packages.
|
X509v3CertificateBuilder.java | 1 package org.bouncycastle.cert; 177 Certificate cert = certHolder.toASN1Structure(); local 179 Extension extension = cert.getTBSCertificate().getExtensions().getExtension(oid);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
JcaX509CertificateHolder.java | 1 package org.bouncycastle.cert.jcajce; 3 import java.security.cert.CertificateEncodingException; 4 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.X509CertificateHolder; 18 * @param cert certificate to be used a the source for the holder creation. 21 public JcaX509CertificateHolder(X509Certificate cert) 24 super(Certificate.getInstance(cert.getEncoded()));
|
JcaCertStore.java | 1 package org.bouncycastle.cert.jcajce; 4 import java.security.cert.CertificateEncodingException; 5 import java.security.cert.X509Certificate; 11 import org.bouncycastle.cert.X509CertificateHolder; 45 X509Certificate cert = (X509Certificate)o; local 49 list.add(new X509CertificateHolder(cert.getEncoded()));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/jcajce/ |
JcaCertificateID.java | 1 package org.bouncycastle.cert.ocsp.jcajce; 4 import java.security.cert.CertificateEncodingException; 5 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 8 import org.bouncycastle.cert.ocsp.CertificateID; 9 import org.bouncycastle.cert.ocsp.OCSPException;
|
JcaBasicOCSPRespBuilder.java | 1 package org.bouncycastle.cert.ocsp.jcajce; 6 import org.bouncycastle.cert.ocsp.BasicOCSPRespBuilder; 7 import org.bouncycastle.cert.ocsp.OCSPException;
|
JcaRespID.java | 1 package org.bouncycastle.cert.ocsp.jcajce; 9 import org.bouncycastle.cert.ocsp.OCSPException; 10 import org.bouncycastle.cert.ocsp.RespID;
|
/external/wpa_supplicant_8/hs20/server/www/ |
remediation.php | 37 $cert = $user['methods'] == "TLS" || strncmp($username, "cert-", 5) == 0; variable 39 if ($cert) {
|
/external/curl/docs/examples/ |
sessioninfo.c | 58 gnutls_x509_crt_t cert; local 61 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) { 63 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) { 65 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) { 72 gnutls_x509_crt_deinit(cert);
|
usercertinmem.c | 46 X509 *cert = NULL; local 129 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); 130 if(cert == NULL) { 135 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); 168 if(cert) 169 X509_free(cert);
|
/external/ipsec-tools/src/racoon/ |
dnssec.c | 62 cert_t *cert = NULL; local 105 "not supported multiple CERT RR.\n"); 114 "not supported CERT RR type %d.\n", res->ci_type); 118 /* create cert holder */ 119 cert = oakley_newcert(); 120 if (cert == NULL) { 122 "failed to get cert buffer.\n"); 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 128 "failed to get cert buffer.\n") [all...] |
/external/curl/tests/unit/ |
unit1651.c | 38 /* cert captured from gdb when connecting to curl.haxx.se on October 26 40 static unsigned char cert[] = { variable 350 const char *beg = (const char *)&cert[0]; 351 const char *end = (const char *)&cert[sizeof(cert)]; 370 char backup = cert[i]; 371 cert[i] = (unsigned char)byte&0xff; 373 cert[i] = backup;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 14 struct x509_certificate *cert; member in struct:tlsv1_credentials 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|