/external/openssl/crypto/ocsp/ |
ocsp.h | 68 #include <openssl/x509.h> 146 STACK_OF(X509) *certs; 308 STACK_OF(X509) *certs; 413 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer); 428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 431 X509 *signer, 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 476 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) [all...] |
/external/openssl/include/openssl/ |
ocsp.h | 68 #include <openssl/x509.h> 146 STACK_OF(X509) *certs; 308 STACK_OF(X509) *certs; 413 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer); 428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 431 X509 *signer, 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 476 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) [all...] |
pkcs12.h | 63 #include <openssl/x509.h> 170 PKCS12_SAFEBAG *PKCS12_x5092certbag(X509 *x509); 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 246 STACK_OF(X509) **ca); 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 248 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert);
|
x509v3.h | 62 #include <openssl/x509.h> 132 X509 *issuer_cert; 133 X509 *subject_cert; 463 const X509 *, int); 575 int NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc); 608 int X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert); 617 char *section, X509 *cert); 635 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject, 677 int X509_check_ca(X509 *x) [all...] |
/external/openssl/crypto/pkcs12/ |
pkcs12.h | 63 #include <openssl/x509.h> 170 PKCS12_SAFEBAG *PKCS12_x5092certbag(X509 *x509); 172 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 246 STACK_OF(X509) **ca); 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 248 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 51 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 52 import org.bouncycastle.asn1.x509.CRLDistPoint; 53 import org.bouncycastle.asn1.x509.CRLNumber; 54 import org.bouncycastle.asn1.x509.CRLReason; 55 import org.bouncycastle.asn1.x509.CertificateList; 56 import org.bouncycastle.asn1.x509.DistributionPoint; 57 import org.bouncycastle.asn1.x509.DistributionPointName; 58 import org.bouncycastle.asn1.x509.GeneralName; 59 import org.bouncycastle.asn1.x509.GeneralNames; 60 import org.bouncycastle.asn1.x509.PolicyInformation [all...] |
JDKDSAPublicKey.java | 7 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 8 import org.bouncycastle.asn1.x509.DSAParameter; 9 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo;
|
X509CRLObject.java | 34 import org.bouncycastle.asn1.x509.CRLDistPoint; 35 import org.bouncycastle.asn1.x509.CRLNumber; 36 import org.bouncycastle.asn1.x509.CertificateList; 37 import org.bouncycastle.asn1.x509.IssuingDistributionPoint; 38 import org.bouncycastle.asn1.x509.TBSCertList; 39 import org.bouncycastle.asn1.x509.X509Extension; 40 import org.bouncycastle.asn1.x509.X509Extensions; 43 import org.bouncycastle.x509.extension.X509ExtensionUtil;
|
/external/openssl/crypto/x509v3/ |
x509v3.h | 62 #include <openssl/x509.h> 132 X509 *issuer_cert; 133 X509 *subject_cert; 463 const X509 *, int); 575 int NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc); 608 int X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert); 617 char *section, X509 *cert); 635 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject, 677 int X509_check_ca(X509 *x) [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_openssl.h | 22 typedef struct x509_st X509; 49 int ClientCertRequestCallback(SSL* ssl, X509** x509, EVP_PKEY** pkey);
|
/external/openssl/patches/ |
jsse.patch | 39 int SSL_use_certificate(SSL *ssl, X509 *x); 41 +int SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain); 42 +STACK_OF(X509) * SSL_get_certificate_chain(SSL *ssl, X509 *x); 115 + STACK_OF(X509) *cert_chain; 354 X509 *x509; 355 + STACK_OF(X509) *cert_chain; 365 +int SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain) 386 +STACK_OF(X509) *SSL_get_certificate_chain(SSL *ssl, X509 *x [all...] |
/libcore/luni/src/main/java/java/security/ |
security.properties | 23 # Favor Harmony's CertificateFactory.X509 over BouncyCastle's 58 ssl.KeyManagerFactory.algorithm=X509 59 ssl.TrustManagerFactory.algorithm=X509
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
GeneralNames.java | 23 package org.apache.harmony.security.x509; 46 * @see org.apache.harmony.security.x509.NameConstraints 47 * @see org.apache.harmony.security.x509.GeneralSubtree
|
GeneralSubtree.java | 23 package org.apache.harmony.security.x509; 50 * @see org.apache.harmony.security.x509.NameConstraints 51 * @see org.apache.harmony.security.x509.GeneralName
|
PolicyConstraints.java | 23 package org.apache.harmony.security.x509; 53 * @see org.apache.harmony.security.x509.GeneralSubtree 54 * @see org.apache.harmony.security.x509.GeneralName
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 87 test_generateCertificate(CertificateFactory.getInstance("X509")); 88 test_generateCertificate(CertificateFactory.getInstance("X509", "BC")); 89 test_generateCertificate(CertificateFactory.getInstance("X509", "DRLCertFactory"));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
X509Certificate2Test.java | 42 CertificateFactory certFact = CertificateFactory.getInstance("X509"); 67 CertificateFactory certFact = CertificateFactory.getInstance("X509");
|
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/provider/jsse/ |
JSSETestData.java | 53 KeyManagerFactory kmf = KeyManagerFactory.getInstance("X509"); 56 TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509");
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
AttributeCertificateHolder.java | 1 package org.bouncycastle.x509; 21 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 22 import org.bouncycastle.asn1.x509.GeneralName; 23 import org.bouncycastle.asn1.x509.GeneralNames; 24 import org.bouncycastle.asn1.x509.Holder; 25 import org.bouncycastle.asn1.x509.IssuerSerial; 26 import org.bouncycastle.asn1.x509.ObjectDigestInfo; 62 holder = new org.bouncycastle.asn1.x509.Holder(new IssuerSerial(
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.in | 60 certificate_type x509 "my.cert.pem" "my.key.pem"; 83 #certificate_type x509 "mycert" "mypriv";
|
/external/openssl/apps/ |
crl2p7.c | 69 #include <openssl/x509.h> 74 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 97 STACK_OF(X509) *cert_stack=NULL; 295 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) 310 /* This loads from a file, a stack of x509/crl/pkey sets */ 321 if (xi->x509 != NULL) 323 sk_X509_push(stack,xi->x509); 324 xi->x509=NULL;
|
pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 90 int cert_load(BIO *in, STACK_OF(X509) *sk); 423 X509 *ucert = NULL, *x = NULL; 424 STACK_OF(X509) *certs=NULL; 497 STACK_OF(X509) *morecerts=NULL; 520 STACK_OF(X509) *chain2; 758 X509 *x509; local 801 if (!(x509 = PKCS12_certbag2x509(bag))) return 0 [all...] |
verify.c | 65 #include <openssl/x509.h> 74 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, 86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 255 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, 258 X509 *x=NULL; 302 X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
|
/external/openssl/crypto/pem/ |
pem_info.c | 64 #include <openssl/x509.h> 136 if (xi->x509 != NULL) 142 pp=&(xi->x509); 147 if (xi->x509 != NULL) 153 pp=&(xi->x509); 285 if ((xi->x509 != NULL) || (xi->crl != NULL) || 390 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp,xi->x509) <= 0))
|
/external/chromium/net/base/ |
x509_certificate_openssl.cc | 43 STACK_OF(X509)* certs = NULL; 53 X509* x509_cert = 183 NOTREACHED() << "Invalid X509 err " << err; 190 void sk_X509_free_fn(STACK_OF(X509)* st) { 212 // We allow the X509 store to leak, because it is used from a non-joinable 273 // certificate and cache the data within the X509 cert using X509_set_ex_data. 356 X509* cert = d2i_X509(NULL, &d2i_data, length); 433 crypto::ScopedOpenSSL<STACK_OF(X509), sk_X509_free_fn> intermediates( 450 LOG(ERROR) << "X509 Verification error " 461 STACK_OF(X509)* chain = X509_STORE_CTX_get_chain(ctx.get()) [all...] |