HomeSort by relevance Sort by last modified time
    Searched refs:signer (Results 1 - 20 of 20) sorted by null

  /external/openssl/crypto/ocsp/
ocsp_vfy.c 78 X509 *signer, *x; local
82 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
93 skey = X509_get_pubkey(signer);
106 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL);
108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs);
165 X509 *signer; local
167 if ((signer = ocsp_find_signer_sk(certs, rid)))
169 *psigner = signer;
173 (signer = ocsp_find_signer_sk(bs->certs, rid)))
175 *psigner = signer;
215 X509 *signer, *sca; local
361 X509 *signer; local
431 X509 *signer; local
    [all...]
ocsp_srv.c 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
215 if (!X509_check_private_key(signer, key))
223 if(!OCSP_basic_add1_cert(brsp, signer))
237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
247 X509_get_subject_name(signer)))
ocsp_cl.c 144 X509 *signer,
154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer)))
160 if (!X509_check_private_key(signer, key))
170 if(!OCSP_request_add1_cert(req, signer)) goto err;
ocsp.h 431 X509 *signer,
478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
DSABase.java 20 protected DSA signer; field in class:DSABase
25 DSA signer,
29 this.signer = signer;
65 BigInteger[] sig = signer.generateSignature(hash);
94 return signer.verifySignature(hash, sig[0], sig[1]);
JDKDSASigner.java 43 private DSA signer; field in class:JDKDSASigner
48 DSA signer)
51 this.signer = signer;
87 throw new InvalidKeyException("can't recognise key type in DSA based signer");
92 throw new InvalidKeyException("can't recognise key type in DSA based signer");
97 signer.init(false, param);
134 signer.init(true, param);
162 BigInteger[] sig = signer.generateSignature(hash);
191 return signer.verifySignature(hash, sig[0], sig[1])
    [all...]
  /external/chromium/crypto/
signature_creator_unittest.cc 24 scoped_ptr<crypto::SignatureCreator> signer(
26 ASSERT_TRUE(signer.get());
29 ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8*>(data.c_str()),
33 ASSERT_TRUE(signer->Final(&signature));
  /external/openssl/crypto/pkcs7/
pk7_smime.c 270 X509 *signer; local
321 signer = sk_X509_value (signers, k);
323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer,
331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) {
407 signer = sk_X509_value (signers, i);
408 j=PKCS7_signatureVerify(p7bio,p7,si, signer);
436 X509 *signer; local
467 signer = NULL;
469 if (certs) signer = X509_find_by_issuer_and_serial (certs,
471 if (!signer && !(flags & PKCS7_NOINTERN
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/
Signature.java 44 Signature(Digest digest, DSA signer, DSAEncoder encoder)
46 super(digest, signer, encoder);
72 throw new InvalidKeyException("can't recognise key type in ECDSA based signer");
77 throw new InvalidKeyException("can't recognise key type in ECDSA based signer");
82 signer.init(false, param);
98 throw new InvalidKeyException("can't recognise key type in ECDSA based signer");
105 signer.init(true, new ParametersWithRandom(param, random));
109 signer.init(true, param);
  /libcore/luni/src/main/java/org/apache/harmony/security/utils/
JarUtils.java 178 private static X509Certificate[] createChain(X509Certificate signer, X509Certificate[] candidates) {
180 chain.add(0, signer);
182 // Signer is self-signed
183 if (signer.getSubjectDN().equals(signer.getIssuerDN())){
187 Principal issuer = signer.getIssuerDN();
  /external/chromium/chrome/browser/chromeos/login/
owner_key_utils.cc 152 scoped_ptr<crypto::SignatureCreator> signer(
154 if (!signer->Update(reinterpret_cast<const uint8*>(data.c_str()),
158 return signer->Final(OUT_signature);
  /external/oauth/core/src/main/java/net/oauth/signature/
RSA_SHA1.java 221 Signature signer = Signature.getInstance("SHA1withRSA"); local
222 signer.initSign(privateKey);
223 signer.update(message);
224 return signer.sign();
OAuthSignatureMethod.java 209 OAuthSignatureMethod signer = newMethod(message.getSignatureMethod(), local
211 signer.setTokenSecret(accessor.tokenSecret);
212 return signer;
  /libcore/support/src/test/java/libcore/java/security/
TestKeyStore.java 152 .signer(ROOT_CA.getPrivateKey("RSA", "RSA"))
157 .signer(intermediateCa.getPrivateKey("RSA", "RSA"))
164 .signer(intermediateCa.getPrivateKey("RSA", "RSA"))
224 private PrivateKeyEntry signer; field in class:TestKeyStore.Builder
276 public Builder signer(PrivateKeyEntry signer) { method in class:TestKeyStore.Builder
277 this.signer = signer;
327 if (keyAlgorithm.equals("EC_RSA") && signer == null && rootCa == null) {
332 createKeys(keyStore, keyAlgorithm, publicAlias, privateAlias, signer);
    [all...]
  /external/openssl/apps/
smime.c 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
254 else if (!strcmp (*args, "-signer"))
258 /* If previous -signer argument add signer to list */
296 /* If previous -inkey arument add signer to list */
301 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
383 /* Check to see if any final signer needs to be appended */
386 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
402 BIO_printf(bio_err, "No signer certificate specified\n");
459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n")
    [all...]
cms.c 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
381 else if (!strcmp (*args, "-signer"))
385 /* If previous -signer argument add signer to list */
429 /* If previous -inkey arument add signer to list */
434 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
535 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
538 /* Check to see if any final signer needs to be appended */
552 BIO_printf(bio_err, "No signer certificate specified\n");
610 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n")
    [all...]
ocsp.c 141 X509 *signer = NULL, *rsigner = NULL; local
301 else if (!strcmp(*args, "-signer"))
580 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n");
602 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n");
604 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n");
710 signer = load_cert(bio_err, signfile, FORMAT_PEM,
711 NULL, e, "signer certificate");
712 if (!signer)
714 BIO_printf(bio_err, "Error loading signer certificate\n");
720 NULL, e, "signer certificates")
    [all...]
  /external/openssl/include/openssl/
ocsp.h 431 X509 *signer,
478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
ts.h 479 * Include the signer certificate and the other specified certificates in
481 * Only the signer certificates is included by default.
542 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
619 /* Verify the signer's certificate and the signature of the response. */
634 /* Verify if the TSA name field matches the signer certificate. */
  /external/chromium/chrome/browser/
enumerate_modules_model_win.cc 105 // update the list in PreparePathMappings. Filename, Description/Signer, and
107 // Entries without any Description, Signer info, or Location will never be
683 // Determine the size of the signer info data.
693 // Allocate enough space to hold the signer info.
698 // Obtain the signer info.
707 // Search for the signer certificate.
954 GenerateHash(WideToUTF8(module.digital_signer), &signer); local
    [all...]

Completed in 494 milliseconds