/external/chromium/net/base/ |
x509_certificate.cc | 15 // Returns true if this cert fingerprint is the null (all zero) fingerprint. 16 // We use this as a bogus fingerprint value. 17 bool IsNullFingerprint(const X509Certificate::Fingerprint& fingerprint) { 18 for (size_t i = 0; i < arraysize(fingerprint.data); ++i) { 19 if (fingerprint.data[i] != 0) 28 const Fingerprint& lhs, 29 const Fingerprint& rhs) const { 61 // must not already contain a certificate with the same fingerprint [all...] |
ev_root_ca_metadata.h | 38 bool GetPolicyOID(const X509Certificate::Fingerprint& fingerprint, 50 typedef std::map<X509Certificate::Fingerprint, PolicyOID, 53 // Maps an EV root CA cert's SHA-1 fingerprint to its EV policy OID.
|
x509_certificate_unittest.cc | 33 // For fingerprint 34 // $ openssl x509 -inform DER -fingerprint -noout < /tmp/host.der 112 const X509Certificate::Fingerprint& fingerprint = google_cert->fingerprint(); local 114 EXPECT_EQ(google_fingerprint[i], fingerprint.data[i]); 168 const X509Certificate::Fingerprint& fingerprint = webkit_cert->fingerprint(); local 170 EXPECT_EQ(webkit_fingerprint[i], fingerprint.data[i]) 224 const X509Certificate::Fingerprint& fingerprint = thawte_cert->fingerprint(); local 256 const X509Certificate::Fingerprint& fingerprint = local 284 const X509Certificate::Fingerprint& fingerprint = local [all...] |
x509_certificate.h | 39 // SHA-1 fingerprint (160 bits) of a certificate. 40 struct Fingerprint { 41 bool Equals(const Fingerprint& other) const { 49 : public std::binary_function<Fingerprint, Fingerprint, bool> { 51 bool operator() (const Fingerprint& lhs, const Fingerprint& rhs) const; 127 std::set<Fingerprint, FingerprintLessThan> allowed_; 130 std::set<Fingerprint, FingerprintLessThan> denied_; 199 // The fingerprint of this certificate 200 const Fingerprint& fingerprint() const { return fingerprint_; } function in class:net::X509Certificate [all...] |
ev_root_ca_metadata.cc | 21 // The SHA-1 fingerprint of the root CA certificate, used as a unique 23 X509Certificate::Fingerprint fingerprint; member in struct:net::EVMetadata 224 const X509Certificate::Fingerprint& fingerprint, 226 PolicyOidMap::const_iterator iter = ev_policy_.find(fingerprint); 257 ev_policy_[metadata.fingerprint] = policy; 263 ev_policy_[metadata.fingerprint] = metadata.policy_oid;
|
x509_certificate_nss.cc | 603 X509Certificate::Fingerprint fingerprint = 606 if (!metadata->GetPolicyOID(fingerprint, &ev_policy_tag)) 633 X509Certificate::Fingerprint X509Certificate::CalculateFingerprint( 635 Fingerprint sha1;
|
x509_certificate_win.cc | 709 Fingerprint fingerprint = CalculateFingerprint(root_cert); local 711 if (!metadata->GetPolicyOID(fingerprint, &ev_policy_oid)) 746 X509Certificate::Fingerprint X509Certificate::CalculateFingerprint( 752 Fingerprint sha1;
|
/cts/tests/tests/os/src/android/os/cts/ |
BuildVersionTest.java | 41 * Verifies {@link Build.FINGERPRINT} follows expected format: 49 final String fingerprint = Build.FINGERPRINT; local 50 Log.i(LOG_TAG, String.format("Testing fingerprint %s", fingerprint)); 52 assertEquals("Build fingerprint must not include whitespace", -1, 53 fingerprint.indexOf(' ')); 54 final String[] fingerprintSegs = fingerprint.split("/"); 55 assertEquals("Build fingerprint does not match expected format", 6, fingerprintSegs.length);
|
/external/dropbear/ |
signkey.h | 61 buffer * line, char ** fingerprint);
|
cli-kex.c | 123 fprintf(stderr, "\nHost '%s' key accepted unconditionally.\n(fingerprint %s)\n", 129 fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(fingerprint %s)\nDo you want to continue connecting? (y/n)\n", 216 char * fingerprint = NULL; local 273 line, &fingerprint); 282 the fingerprint strings here, but we're exiting anyway */ 284 "Fingerprint is %s\n" 289 fingerprint ? fingerprint : "UNKNOWN");
|
signkey.c | 310 #else /* use SHA1 rather than MD5 for fingerprint */ 346 /* This will return a freshly malloced string, containing a fingerprint 435 /* If fingerprint is non-NULL, it will be set to a malloc()ed fingerprint 439 buffer * line, char ** fingerprint) { 461 if (fingerprint) { 462 *fingerprint = sign_key_fingerprint(buf_getptr(decodekey, decodekeylen),
|
/external/openssl/apps/ |
crl.c | 84 " -fingerprint - print the crl fingerprint\n", 111 int fingerprint = 0, crlnumber = 0; local 208 else if (strcmp(*argv,"-fingerprint") == 0) 209 fingerprint= ++num; 324 if (fingerprint == i) 335 BIO_printf(bio_out,"%s Fingerprint=",
|
x509.c | 119 " -fingerprint - print the certificate fingerprint\n", 200 int fingerprint=0; local 423 else if (strcmp(*argv,"-fingerprint") == 0) 424 fingerprint= ++num; 920 else if (fingerprint == i) 935 BIO_printf(STDout,"%s Fingerprint=", [all...] |
/frameworks/base/cmds/dumpstate/ |
dumpstate.c | 45 char build[PROPERTY_VALUE_MAX], fingerprint[PROPERTY_VALUE_MAX]; local 50 property_get("ro.build.fingerprint", fingerprint, "(unknown)");
|
/system/core/debuggerd/ |
debuggerd.c | 121 char fingerprint[PROPERTY_VALUE_MAX]; local 123 property_get("ro.build.fingerprint", fingerprint, "unknown"); 125 _LOG(tfd, false, "Build fingerprint: '%s'\n", fingerprint);
|
/external/chromium/net/http/ |
http_network_transaction.cc | [all...] |