HomeSort by relevance Sort by last modified time
    Searched refs:spkac (Results 1 - 25 of 25) sorted by null

  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509spki.c 65 if ((x == NULL) || (x->spkac == NULL)) return(0);
66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey));
71 if ((x == NULL) || (x->spkac == NULL))
73 return(X509_PUBKEY_get(x->spkac->pubkey));
x_all.c 88 a->sig_algor,a->signature,a->spkac,r));
133 x->signature, x->spkac,pkey,md));
x509.h 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st
    [all...]
  /external/openssl/crypto/x509/
x509spki.c 65 if ((x == NULL) || (x->spkac == NULL)) return(0);
66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey));
71 if ((x == NULL) || (x->spkac == NULL))
73 return(X509_PUBKEY_get(x->spkac->pubkey));
x_all.c 88 a->sig_algor,a->signature,a->spkac,r));
133 x->signature, x->spkac,pkey,md));
x509.h 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st
    [all...]
  /external/chromium/net/base/
keygen_handler_mac.cc 151 SignedPublicKeyAndChallenge spkac; local
152 memset(&spkac, 0, sizeof(spkac));
153 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA;
154 spkac.pkac.spki.subjectPublicKey.Length =
156 spkac.pkac.spki.subjectPublicKey.Data =
158 spkac.pkac.challenge_string.Length = challenge_.length();
159 spkac.pkac.challenge_string.Data =
163 err = SecAsn1EncodeItem(coder, &spkac.pkac,
174 spkac.signature.Data = signature.Data
    [all...]
keygen_handler_unittest.cc 46 std::string spkac; local
47 ASSERT_TRUE(base::Base64Decode(result, &spkac));
52 ASSERT_GE(spkac.length(), 200U);
53 ASSERT_LE(spkac.length(), 300U);
56 // The value of |result| can be validated by prefixing 'SPKAC=' to it
58 // openssl spkac -verify
71 // The value of |spkac| can be ASN.1-parsed with:
keygen_handler_openssl.cc 27 ASN1_STRING_set(spki.get()->spkac->challenge,
keygen_handler_win.cc 205 std::string spkac; local
207 &spkac)) {
214 if (!base::Base64Encode(spkac, &result)) {
  /external/chromium_org/net/base/
keygen_handler_mac.cc 152 SignedPublicKeyAndChallenge spkac; local
153 memset(&spkac, 0, sizeof(spkac));
154 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA;
155 spkac.pkac.spki.subjectPublicKey.Length =
157 spkac.pkac.spki.subjectPublicKey.Data =
159 spkac.pkac.challenge_string.Length = challenge_.length();
160 spkac.pkac.challenge_string.Data =
164 err = SecAsn1EncodeItem(coder, &spkac.pkac,
175 spkac.signature.Data = signature.Data
    [all...]
keygen_handler_unittest.cc 47 std::string spkac; local
48 ASSERT_TRUE(base::Base64Decode(result, &spkac));
53 ASSERT_GE(spkac.length(), 200U);
54 ASSERT_LE(spkac.length(), 300U);
57 // The value of |result| can be validated by prefixing 'SPKAC=' to it
59 // openssl spkac -verify
72 // The value of |spkac| can be ASN.1-parsed with:
keygen_handler_openssl.cc 27 ASN1_STRING_set(spki.get()->spkac->challenge,
keygen_handler_win.cc 205 std::string spkac; local
207 &spkac)) {
214 if (!base::Base64Encode(spkac, &result)) {
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
x_spki.c 76 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
t_spki.c 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm);
83 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
90 chal = spki->spkac->challenge;
  /external/openssl/crypto/asn1/
x_spki.c 76 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
t_spki.c 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm);
83 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
90 chal = spki->spkac->challenge;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 71 public NetscapeCertRequest (ASN1Sequence spkac)
83 if (spkac.size() != 3)
85 throw new IllegalArgumentException("invalid SPKAC (size):"
86 + spkac.size());
89 sigAlg = new AlgorithmIdentifier((ASN1Sequence)spkac
91 sigBits = ((DERBitString)spkac.getObjectAt(2)).getBytes();
99 ASN1Sequence pkac = (ASN1Sequence)spkac.getObjectAt(0);
283 ASN1EncodableVector spkac = new ASN1EncodableVector(); local
297 spkac.add(new DERSequence(pkac));
298 spkac.add(sigAlg)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
spkac.c 1 /* apps/spkac.c */
90 const char *spkac = "SPKAC", *spksect = "default"; local
137 else if (strcmp(*argv,"-spkac") == 0)
140 spkac= *(++argv);
172 BIO_printf(bio_err," -key arg create SPKAC using private key\n");
175 BIO_printf(bio_err," -spkac arg alternative SPKAC name\n");
176 BIO_printf(bio_err," -noout don't print SPKAC\n");
178 BIO_printf(bio_err," -verify verify SPKAC signature\n")
    [all...]
  /external/openssl/apps/
spkac.c 1 /* apps/spkac.c */
90 const char *spkac = "SPKAC", *spksect = "default"; local
137 else if (strcmp(*argv,"-spkac") == 0)
140 spkac= *(++argv);
172 BIO_printf(bio_err," -key arg create SPKAC using private key\n");
175 BIO_printf(bio_err," -spkac arg alternative SPKAC name\n");
176 BIO_printf(bio_err," -noout don't print SPKAC\n");
178 BIO_printf(bio_err," -verify verify SPKAC signature\n")
    [all...]
  /external/chromium_org/third_party/openssl/openssl/
Apps-config.mk 77 apps/spkac.c \
  /external/openssl/
Apps-config.mk 77 apps/spkac.c \
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
x509.h 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st
    [all...]
  /external/openssl/include/openssl/
x509.h 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st
    [all...]

Completed in 2192 milliseconds