/external/openssl/crypto/x509/ |
x509spki.c | 65 if ((x == NULL) || (x->spkac == NULL)) return(0); 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 71 if ((x == NULL) || (x->spkac == NULL)) 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
x_all.c | 88 a->sig_algor,a->signature,a->spkac,r)); 113 x->signature, x->spkac,pkey,md));
|
x509.h | 538 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |
/external/openssl/crypto/asn1/ |
x_spki.c | 76 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey); 90 chal = spki->spkac->challenge;
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 71 public NetscapeCertRequest (ASN1Sequence spkac) 83 if (spkac.size() != 3) 85 throw new IllegalArgumentException("invalid SPKAC (size):" 86 + spkac.size()); 89 sigAlg = new AlgorithmIdentifier((ASN1Sequence)spkac 91 sigBits = ((DERBitString)spkac.getObjectAt(2)).getBytes(); 99 ASN1Sequence pkac = (ASN1Sequence)spkac.getObjectAt(0); 276 ASN1EncodableVector spkac = new ASN1EncodableVector(); local 290 spkac.add(new DERSequence(pkac)); 291 spkac.add(sigAlg) [all...] |
/external/openssl/apps/ |
spkac.c | 1 /* apps/spkac.c */ 90 const char *spkac = "SPKAC", *spksect = "default"; local 137 else if (strcmp(*argv,"-spkac") == 0) 140 spkac= *(++argv); 172 BIO_printf(bio_err," -key arg create SPKAC using private key\n"); 175 BIO_printf(bio_err," -spkac arg alternative SPKAC name\n"); 176 BIO_printf(bio_err," -noout don't print SPKAC\n"); 178 BIO_printf(bio_err," -verify verify SPKAC signature\n") [all...] |
Android.mk | 51 spkac.c \
|
/external/openssl/patches/ |
apps_Android.mk | 51 spkac.c \
|
/external/openssl/include/openssl/ |
x509.h | 538 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |