/external/bouncycastle/src/main/java/org/bouncycastle/asn1/pkcs/ |
EncryptionScheme.java | 9 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/ |
X509Principal.java | 11 import org.bouncycastle.asn1.x509.X509Name; 94 * takes an X509 dir name as a string of the format "C=AU,ST=Victoria", or 104 * Takes an X509 dir name as a string of the format "C=AU,ST=Victoria", or 118 * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCRLUtil.java | 16 import org.bouncycastle.x509.ExtendedPKIXParameters; 17 import org.bouncycastle.x509.X509CRLStoreSelector; 18 import org.bouncycastle.x509.X509Store; 98 * {@link org.bouncycastle.x509.X509Store X509Store} objects.
|
PEMUtil.java | 22 _header2 = "-----BEGIN X509 " + type + "-----"; 24 _footer2 = "-----END X509 " + type + "-----";
|
/external/chromium/net/base/ |
x509_openssl_util.h | 21 // A collection of helper functions to fetch data from OpenSSL X509 certificates
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 16 certificate_type x509 "my.cert.pem" "my.key.pem";
|
/external/openssl/crypto/pem/ |
pem_x509.c | 63 #include <openssl/x509.h> 67 IMPLEMENT_PEM_rw(X509, X509, PEM_STRING_X509, X509)
|
/external/quake/tools/ |
packagesharedlib | 11 PRIVATE_CERTIFICATE=$TOP/target/product/security/testkey.x509.pem
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
JSSEProvider.java | 84 * CertificateFactory X509 100 * CertificateFactory X509 115 put("KeyManagerFactory.X509", KeyManagerFactoryImpl.class.getName()); 116 put("TrustManagerFactory.X509", TrustManagerFactoryImpl.class.getName());
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
TimeTest.java | 18 package org.apache.harmony.security.tests.x509; 25 import org.apache.harmony.security.x509.Time;
|
/external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/ |
X509CertificateStructure.java | 1 package org.bouncycastle.asn1.x509; 58 // correct x509 certficate
|
X509DefaultEntryConverter.java | 1 package org.bouncycastle.asn1.x509; 13 * The default converter for X509 DN entries when going from their
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
X509Attribute.java | 1 package org.bouncycastle.x509; 9 import org.bouncycastle.asn1.x509.Attribute;
|
X509CertStoreSelector.java | 1 package org.bouncycastle.x509; 14 * @see org.bouncycastle.x509.X509Store
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
MessageImprint.java | 20 package org.apache.harmony.security.x509.tsp; 26 import org.apache.harmony.security.x509.AlgorithmIdentifier;
|
/packages/apps/CertInstaller/ |
AndroidManifest.xml | 20 <data android:mimeType="application/x-x509-ca-cert" /> 21 <data android:mimeType="application/x-x509-user-cert" />
|
/external/openssl/crypto/pkcs12/ |
p12_utl.c | 121 PKCS12_SAFEBAG *PKCS12_x5092certbag(X509 *x509) 123 return PKCS12_item_pack_safebag(x509, ASN1_ITEM_rptr(X509), 133 X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) 137 return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509));
|
/external/openssl/crypto/pkcs7/ |
sign.c | 61 #include <openssl/x509.h> 69 X509 *x509; local 109 if ((x509=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL) goto err; 117 si=PKCS7_add_signature(p7,x509,pkey,EVP_sha1()); 125 PKCS7_add_certificate(p7,x509);
|
dec.c | 62 #include <openssl/x509.h> 78 X509 *x509; local 125 if ((x509=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL) goto err; 152 p7bio=PKCS7_dataDecode(p7,pkey,detached,x509); 199 /* should be X509 * but we can just have them as char *. */ 203 X509 *err_cert;
|
/external/openssl/android.testssl/ |
server2.pem | 36 -----BEGIN X509 CERTIFICATE----- 49 -----END X509 CERTIFICATE----- 81 -----BEGIN X509 CERTIFICATE----- 95 -----END X509 CERTIFICATE----- 96 -----BEGIN X509 CERTIFICATE----- 110 -----END X509 CERTIFICATE----- 190 -----BEGIN X509 CERTIFICATE----- 204 -----END X509 CERTIFICATE----- 209 -----BEGIN X509 CERTIFICATE----- 223 -----END X509 CERTIFICATE---- [all...] |
/external/openssl/apps/ |
server.pem | 29 -----BEGIN X509 CERTIFICATE----- 42 -----END X509 CERTIFICATE----- 74 -----BEGIN X509 CERTIFICATE----- 88 -----END X509 CERTIFICATE----- 89 -----BEGIN X509 CERTIFICATE----- 103 -----END X509 CERTIFICATE----- 183 -----BEGIN X509 CERTIFICATE----- 197 -----END X509 CERTIFICATE----- 202 -----BEGIN X509 CERTIFICATE----- 216 -----END X509 CERTIFICATE---- [all...] |
server2.pem | 36 -----BEGIN X509 CERTIFICATE----- 49 -----END X509 CERTIFICATE----- 81 -----BEGIN X509 CERTIFICATE----- 95 -----END X509 CERTIFICATE----- 96 -----BEGIN X509 CERTIFICATE----- 110 -----END X509 CERTIFICATE----- 190 -----BEGIN X509 CERTIFICATE----- 204 -----END X509 CERTIFICATE----- 209 -----BEGIN X509 CERTIFICATE----- 223 -----END X509 CERTIFICATE---- [all...] |
/external/openssl/crypto/objects/ |
objects.txt | 660 X500 4 : X509 661 X509 3 : CN : commonName 662 X509 4 : SN : surname 663 X509 5 : : serialNumber 664 X509 6 : C : countryName 665 X509 7 : L : localityName 666 X509 8 : ST : stateOrProvinceName 667 X509 9 : street : streetAddress 668 X509 10 : O : organizationName 669 X509 11 : OU : organizationalUnitNam [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 62 * cases, the key must be X509-encoded (byte[]) or X509-encoded and 66 * by such a consumer can use a X509 certificate containing the consumer's 74 * consumer_cert must be a X509 Certificate containing the consumer's public 128 } else { // public key was null. perhaps they gave us a X509 cert. 152 CertificateFactory fac = CertificateFactory.getInstance("X509"); 160 CertificateFactory fac = CertificateFactory.getInstance("X509");
|
/external/openssl/ssl/ |
s2_clnt.c | 518 s->session->peer = s->session->sess_cert->peer_key->x509; 519 /* peer_key->x509 has been set by ssl2_set_certificate. */ 524 || s->session->peer != s->session->sess_cert->peer_key->x509) 771 /* type eq x509 */ 780 (s->cert->key->x509 == NULL) || 794 X509 *x509=NULL; local 806 i=s->ctx->client_cert_cb(s,&(x509),&(pkey)); 816 if ((i == 1) && (pkey != NULL) && (x509 != NULL)) 819 if ( !SSL_use_certificate(s,x509) || 1031 X509 *x509=NULL; local [all...] |