/external/openssl/ssl/ |
ssl_cert.c | 163 CERT *ssl_cert_new(void) 165 CERT *ret; 167 ret=(CERT *)OPENSSL_malloc(sizeof(CERT)); 173 memset(ret,0,sizeof(CERT)); 181 CERT *ssl_cert_dup(CERT *cert) 183 CERT *ret; 186 ret = (CERT *)OPENSSL_malloc(sizeof(CERT)) [all...] |
ssl_locl.h | 283 #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */ 284 #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */ 285 #define SSL_kEDH 0x00000008L /* tmp DH key no DH cert */ 287 #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */ 288 #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */ 494 } CERT; [all...] |
ssl2.h | 155 #define CERT char
|
ssl_rsa.c | 67 static int ssl_set_cert(CERT *c, X509 *x509); 68 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey); 76 if (!ssl_cert_inst(&ssl->cert)) 81 return(ssl_set_cert(ssl->cert,x)); 162 if (!ssl_cert_inst(&ssl->cert)) 176 ret=ssl_set_pkey(ssl->cert,pkey); 182 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey) 304 if (!ssl_cert_inst(&ssl->cert)) 309 ret=ssl_set_pkey(ssl->cert,pkey); 386 if (!ssl_cert_inst(&ctx->cert)) [all...] |
s2_srvr.c | 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from, 167 if (s->cert == NULL) 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc, 623 if (s->cert == NULL) 734 { /* else add cert to session */ 735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT); 738 s->session->sess_cert=s->cert; 742 * the 'cert' structure, grab the 'old' one 747 CRYPTO_add(&s->cert->references,1 [all...] |
s3_lib.c | 2561 CERT *cert; local 2747 CERT *cert; local 2845 CERT *cert; local [all...] |
ssl_lib.c | 299 if (ctx->cert != NULL) 302 * the CERT, not its contents; only when setting new 308 * Now we don't look at the SSL_CTX's CERT after having 311 s->cert = ssl_cert_dup(ctx->cert); 312 if (s->cert == NULL) 316 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */ 385 if (s->cert != NULL) 386 ssl_cert_free(s->cert); 560 if (s->cert != NULL) ssl_cert_free(s->cert) [all...] |
d1_srvr.c | 172 if (s->cert == NULL) 400 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 402 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 421 if (/* don't request cert unless asked for it: */ 424 * don't request cert during re-negotiation: */ 427 /* never request cert in anonymous ciphersuites 434 /* never request cert in Kerberos ciphersuites */ 440 /* no cert request */ 492 /* could be sent for a DH cert, even if we 526 * a client cert, it can be verified */ 898 CERT *cert; local [all...] |
s3_srvr.c | 208 if (s->cert == NULL) 416 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 418 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 436 if (/* don't request cert unless asked for it: */ 439 * don't request cert during re-negotiation: */ 442 /* never request cert in anonymous ciphersuites 449 /* never request cert in Kerberos ciphersuites */ 455 /* no cert request */ 560 * a client cert, it can be verified 1481 CERT *cert; local [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 3 import org.apache.harmony.security.tests.support.cert.MyCertificate; 17 import java.security.cert.Certificate; 18 import java.security.cert.CertificateException; 31 public static final Certificate CERT = new MyCertificate("certtype", 56 aliases.put("certalias", CERT); 83 public String engineGetCertificateAlias(Certificate cert) { 84 if (cert == null) { 89 if (alias.getValue() == cert) { 186 public void engineSetCertificateEntry(String alias, Certificate cert) 190 throw new KeyStoreException("alias is not a cert entry") [all...] |
/external/openssl/include/openssl/ |
ssl2.h | 155 #define CERT char
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 7 import org.apache.harmony.security.tests.support.cert.MyCertificate; 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateException; 250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT); 258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT); 566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);
|