/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TSTInfoTest.java | 18 package org.apache.harmony.security.tests.x509.tsp; 28 import org.apache.harmony.security.x509.AlgorithmIdentifier; 29 import org.apache.harmony.security.x509.Extension; 30 import org.apache.harmony.security.x509.Extensions; 31 import org.apache.harmony.security.x509.GeneralName; 32 import org.apache.harmony.security.x509.tsp.MessageImprint; 33 import org.apache.harmony.security.x509.tsp.TSTInfo; 39 * @tests 'org.apache.harmony.security.x509.tsp.TSTInfo.getEncoded()'
|
TimeStampRespTest.java | 18 package org.apache.harmony.security.tests.x509.tsp; 34 import org.apache.harmony.security.x509.AlgorithmIdentifier; 35 import org.apache.harmony.security.x509.Extension; 36 import org.apache.harmony.security.x509.Extensions; 37 import org.apache.harmony.security.x509.GeneralName; 38 import org.apache.harmony.security.x509.tsp.MessageImprint; 39 import org.apache.harmony.security.x509.tsp.PKIFailureInfo; 40 import org.apache.harmony.security.x509.tsp.PKIStatus; 41 import org.apache.harmony.security.x509.tsp.PKIStatusInfo; 42 import org.apache.harmony.security.x509.tsp.TSTInfo [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslidentity.h | 32 #include <openssl/x509.h> 70 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 86 X509* x509() const { return x509_; } function in class:talk_base::OpenSSLCertificate 91 explicit OpenSSLCertificate(X509* x509) : x509_(x509) { 96 X509* x509_;
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
X509V1CertificateGenerator.java | 1 package org.bouncycastle.x509; 29 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 30 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; 31 import org.bouncycastle.asn1.x509.TBSCertificateStructure; 32 import org.bouncycastle.asn1.x509.Time; 33 import org.bouncycastle.asn1.x509.V1TBSCertificateGenerator; 34 import org.bouncycastle.asn1.x509.X509CertificateStructure; 35 import org.bouncycastle.asn1.x509.X509Name; 181 * generate an X509 certificate, based on the current issuer and subject 200 * generate an X509 certificate, based on the current issuer and subjec [all...] |
X509V3CertificateGenerator.java | 1 package org.bouncycastle.x509; 29 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 30 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; 31 import org.bouncycastle.asn1.x509.TBSCertificateStructure; 32 import org.bouncycastle.asn1.x509.Time; 33 import org.bouncycastle.asn1.x509.V3TBSCertificateGenerator; 34 import org.bouncycastle.asn1.x509.X509CertificateStructure; 35 import org.bouncycastle.asn1.x509.X509ExtensionsGenerator; 36 import org.bouncycastle.asn1.x509.X509Name; 39 import org.bouncycastle.x509.extension.X509ExtensionUtil [all...] |
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 9 certificate_type x509 "server.crt" "server.key";
|
racoon.conf-radius | 9 certificate_type x509 "server.crt" "server.key";
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE [all...] |
/external/openssl/crypto/asn1/ |
x_x509a.c | 63 #include <openssl/x509.h> 67 * appended to the X509 encoding when the *_X509_AUX routines 68 * are used. This means that the "traditional" X509 routines 72 static X509_CERT_AUX *aux_get(X509 *x); 84 static X509_CERT_AUX *aux_get(X509 *x) 91 int X509_alias_set1(X509 *x, unsigned char *name, int len) 107 int X509_keyid_set1(X509 *x, unsigned char *id, int len) 123 unsigned char *X509_alias_get0(X509 *x, int *len) 130 unsigned char *X509_keyid_get0(X509 *x, int *len) 137 int X509_add1_trust_object(X509 *x, ASN1_OBJECT *obj [all...] |
/development/tools/ |
make_key | 24 Creates <name>.pk8 key and <name>.x509.pem cert. Cert contains the 30 if [[ -e $1.pk8 || -e $1.x509.pem ]]; then 31 echo "$1.pk8 and/or $1.x509.pem already exist; please delete them first" 54 openssl req -new -x509 -sha1 -key ${two} -out $1.x509.pem \
|
/external/openssl/crypto/x509/ |
x509_ext.c | 1 /* crypto/x509/x509_ext.c */ 65 #include <openssl/x509.h> 115 int X509_get_ext_count(X509 *x) 120 int X509_get_ext_by_NID(X509 *x, int nid, int lastpos) 125 int X509_get_ext_by_OBJ(X509 *x, ASN1_OBJECT *obj, int lastpos) 130 int X509_get_ext_by_critical(X509 *x, int crit, int lastpos) 135 X509_EXTENSION *X509_get_ext(X509 *x, int loc) 140 X509_EXTENSION *X509_delete_ext(X509 *x, int loc) 145 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc) 150 void *X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx [all...] |
x509_lu.c | 1 /* crypto/x509/x509_lu.c */ 62 #include <openssl/x509.h> 166 ret=X509_subject_name_cmp((*a)->data.x509,(*b)->data.x509); 218 X509_free(a->data.x509); 334 int X509_STORE_add_cert(X509_STORE *ctx, X509 *x) 347 obj->data.x509=x; 405 CRYPTO_add(&a->data.x509->references,1,CRYPTO_LOCK_X509); 418 X509_free(a->data.x509); 430 X509 x509_s [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/x509/extension/ |
AuthorityKeyIdentifierStructure.java | 1 package org.bouncycastle.x509.extension; 12 import org.bouncycastle.asn1.x509.AuthorityKeyIdentifier; 13 import org.bouncycastle.asn1.x509.GeneralName; 14 import org.bouncycastle.asn1.x509.GeneralNames; 15 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; 16 import org.bouncycastle.asn1.x509.X509Extension; 17 import org.bouncycastle.asn1.x509.X509Extensions;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 22 package org.apache.harmony.security.tests.x509; 37 import org.apache.harmony.security.x509.AlgorithmIdentifier; 38 import org.apache.harmony.security.x509.Certificate; 39 import org.apache.harmony.security.x509.EDIPartyName; 40 import org.apache.harmony.security.x509.Extension; 41 import org.apache.harmony.security.x509.Extensions; 42 import org.apache.harmony.security.x509.GeneralName; 43 import org.apache.harmony.security.x509.GeneralNames; 44 import org.apache.harmony.security.x509.NameConstraints; 45 import org.apache.harmony.security.x509.ORAddress [all...] |
CertificatePoliciesTest.java | 22 package org.apache.harmony.security.tests.x509; 27 import org.apache.harmony.security.x509.CertificatePolicies; 28 import org.apache.harmony.security.x509.PolicyInformation;
|
GeneralNamesTest.java | 22 package org.apache.harmony.security.tests.x509; 27 import org.apache.harmony.security.x509.GeneralName; 28 import org.apache.harmony.security.x509.GeneralNames;
|
ORAddressTest.java | 22 package org.apache.harmony.security.tests.x509; 24 import org.apache.harmony.security.x509.GeneralName; 25 import org.apache.harmony.security.x509.GeneralNames; 26 import org.apache.harmony.security.x509.ORAddress;
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ 125 STACK_OF(X509) *cert; /* [ 0 ] */ 153 STACK_OF(X509) *cert; /* [ 0 ] */ 314 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, 318 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509); 319 int PKCS7_add_crl(PKCS7 *p7, X509_CRL *x509); 324 X509 *x509); [all...] |
pk7_lib.c | 62 #include <openssl/x509.h> 295 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509) 298 STACK_OF(X509) **sk; 321 CRYPTO_add(&x509->references,1,CRYPTO_LOCK_X509); 322 if (!sk_X509_push(*sk,x509)) 324 X509_free(x509); 366 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, 375 X509_get_issuer_name(x509))) [all...] |
/external/openssl/include/openssl/ |
pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ 125 STACK_OF(X509) *cert; /* [ 0 ] */ 153 STACK_OF(X509) *cert; /* [ 0 ] */ 314 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, 318 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509); 319 int PKCS7_add_crl(PKCS7 *p7, X509_CRL *x509); 324 X509 *x509); [all...] |
/device/samsung/toro/self-extractors/samsung/staging/ |
reassemble-apks.sh | 17 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/toro/proprietary/BIP.unsigned.apk vendor/samsung/toro/proprietary/BIP.apk 19 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/toro/proprietary/IMSFramework.unsigned.apk vendor/samsung/toro/proprietary/IMSFramework.apk 21 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/toro/proprietary/RTN.unsigned.apk vendor/samsung/toro/proprietary/RTN.apk 23 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/toro/proprietary/SDM.unsigned.apk vendor/samsung/toro/proprietary/SDM.apk 25 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/toro/proprietary/SPG.unsigned.apk vendor/samsung/toro/proprietary/SPG.apk 27 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/toro/proprietary/SyncMLSvc.unsigned.apk vendor/samsung/toro/proprietary/SyncMLSvc.apk
|
/external/openssl/ssl/ |
ssl_rsa.c | 64 #include <openssl/x509.h> 67 static int ssl_set_cert(CERT *c, X509 *x509); 69 int SSL_use_certificate(SSL *ssl, X509 *x) 90 X509 *x=NULL; 136 X509 *x; 193 if (c->pkeys[i].x509 != NULL) 196 pktmp = X509_get_pubkey(c->pkeys[i].x509); 209 if (!X509_check_private_key(c->pkeys[i].x509,pkey)) 211 X509_free(c->pkeys[i].x509); [all...] |
/external/qemu/ |
vnc-tls.h | 32 #include <gnutls/x509.h> 49 /* Paths to x509 certs/keys */ 62 /* Client's Distinguished Name from the x509 cert */
|
/device/samsung/crespo4g/self-extractors/samsung/staging/ |
reassemble-apks.sh | 17 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/crespo4g/proprietary/WiMAXHiddenMenu.unsigned.apk vendor/samsung/crespo4g/proprietary/WiMAXHiddenMenu.apk 19 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/crespo4g/proprietary/SprintMenu.unsigned.apk vendor/samsung/crespo4g/proprietary/SprintMenu.apk 21 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/crespo4g/proprietary/SystemUpdateUI.unsigned.apk vendor/samsung/crespo4g/proprietary/SystemUpdateUI.apk 23 java -jar $(find out/host -name signapk.jar) build/target/product/security/platform.x509.pem build/target/product/security/platform.pk8 vendor/samsung/crespo4g/proprietary/WiMAXSettings.unsigned.apk vendor/samsung/crespo4g/proprietary/WiMAXSettings.apk
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
X509CRLEntryImplTest.java | 29 import org.apache.harmony.security.x509.Extension; 30 import org.apache.harmony.security.x509.Extensions; 31 import org.apache.harmony.security.x509.ReasonCode; 32 import org.apache.harmony.security.x509.TBSCertList;
|