/external/openssl/crypto/ocsp/ |
ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 106 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 165 X509 *signer; local 167 if ((signer = ocsp_find_signer_sk(certs, rid))) 169 *psigner = signer; 173 (signer = ocsp_find_signer_sk(bs->certs, rid))) 175 *psigner = signer; 215 X509 *signer, *sca; local 361 X509 *signer; local 431 X509 *signer; local [all...] |
ocsp_srv.c | 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 215 if (!X509_check_private_key(signer, key)) 223 if(!OCSP_basic_add1_cert(brsp, signer)) 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 247 X509_get_subject_name(signer)))
|
ocsp_cl.c | 144 X509 *signer, 154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 160 if (!X509_check_private_key(signer, key)) 170 if(!OCSP_request_add1_cert(req, signer)) goto err;
|
ocsp.h | 431 X509 *signer, 478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
DSABase.java | 20 protected DSA signer; field in class:DSABase 25 DSA signer, 29 this.signer = signer; 65 BigInteger[] sig = signer.generateSignature(hash); 94 return signer.verifySignature(hash, sig[0], sig[1]);
|
JDKDSASigner.java | 43 private DSA signer; field in class:JDKDSASigner 48 DSA signer) 51 this.signer = signer; 87 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 92 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 97 signer.init(false, param); 134 signer.init(true, param); 162 BigInteger[] sig = signer.generateSignature(hash); 191 return signer.verifySignature(hash, sig[0], sig[1]) [all...] |
/external/chromium/crypto/ |
signature_creator_unittest.cc | 24 scoped_ptr<crypto::SignatureCreator> signer( 26 ASSERT_TRUE(signer.get()); 29 ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8*>(data.c_str()), 33 ASSERT_TRUE(signer->Final(&signature));
|
/external/openssl/crypto/pkcs7/ |
pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer && !(flags & PKCS7_NOINTERN [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/ |
Signature.java | 44 Signature(Digest digest, DSA signer, DSAEncoder encoder) 46 super(digest, signer, encoder); 72 throw new InvalidKeyException("can't recognise key type in ECDSA based signer"); 77 throw new InvalidKeyException("can't recognise key type in ECDSA based signer"); 82 signer.init(false, param); 98 throw new InvalidKeyException("can't recognise key type in ECDSA based signer"); 105 signer.init(true, new ParametersWithRandom(param, random)); 109 signer.init(true, param);
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 178 private static X509Certificate[] createChain(X509Certificate signer, X509Certificate[] candidates) { 180 chain.add(0, signer); 182 // Signer is self-signed 183 if (signer.getSubjectDN().equals(signer.getIssuerDN())){ 187 Principal issuer = signer.getIssuerDN();
|
/external/chromium/chrome/browser/chromeos/login/ |
owner_key_utils.cc | 152 scoped_ptr<crypto::SignatureCreator> signer( 154 if (!signer->Update(reinterpret_cast<const uint8*>(data.c_str()), 158 return signer->Final(OUT_signature);
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 221 Signature signer = Signature.getInstance("SHA1withRSA"); local 222 signer.initSign(privateKey); 223 signer.update(message); 224 return signer.sign();
|
OAuthSignatureMethod.java | 209 OAuthSignatureMethod signer = newMethod(message.getSignatureMethod(), local 211 signer.setTokenSecret(accessor.tokenSecret); 212 return signer;
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 152 .signer(ROOT_CA.getPrivateKey("RSA", "RSA")) 157 .signer(intermediateCa.getPrivateKey("RSA", "RSA")) 164 .signer(intermediateCa.getPrivateKey("RSA", "RSA")) 224 private PrivateKeyEntry signer; field in class:TestKeyStore.Builder 276 public Builder signer(PrivateKeyEntry signer) { method in class:TestKeyStore.Builder 277 this.signer = signer; 327 if (keyAlgorithm.equals("EC_RSA") && signer == null && rootCa == null) { 332 createKeys(keyStore, keyAlgorithm, publicAlias, privateAlias, signer); [all...] |
/external/openssl/apps/ |
smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n") [all...] |
cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 381 else if (!strcmp (*args, "-signer")) 385 /* If previous -signer argument add signer to list */ 429 /* If previous -inkey arument add signer to list */ 434 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 535 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 538 /* Check to see if any final signer needs to be appended */ 552 BIO_printf(bio_err, "No signer certificate specified\n"); 610 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n") [all...] |
ocsp.c | 141 X509 *signer = NULL, *rsigner = NULL; local 301 else if (!strcmp(*args, "-signer")) 580 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n"); 602 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n"); 604 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n"); 710 signer = load_cert(bio_err, signfile, FORMAT_PEM, 711 NULL, e, "signer certificate"); 712 if (!signer) 714 BIO_printf(bio_err, "Error loading signer certificate\n"); 720 NULL, e, "signer certificates") [all...] |
/external/openssl/include/openssl/ |
ocsp.h | 431 X509 *signer, 478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
ts.h | 479 * Include the signer certificate and the other specified certificates in 481 * Only the signer certificates is included by default. 542 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer); 619 /* Verify the signer's certificate and the signature of the response. */ 634 /* Verify if the TSA name field matches the signer certificate. */
|
/external/chromium/chrome/browser/ |
enumerate_modules_model_win.cc | 105 // update the list in PreparePathMappings. Filename, Description/Signer, and 107 // Entries without any Description, Signer info, or Location will never be 683 // Determine the size of the signer info data. 693 // Allocate enough space to hold the signer info. 698 // Obtain the signer info. 707 // Search for the signer certificate. 954 GenerateHash(WideToUTF8(module.digital_signer), &signer); local [all...] |