/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509spki.c | 65 if ((x == NULL) || (x->spkac == NULL)) return(0); 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 71 if ((x == NULL) || (x->spkac == NULL)) 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
x_all.c | 88 a->sig_algor,a->signature,a->spkac,r)); 133 x->signature, x->spkac,pkey,md));
|
x509.h | 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |
/external/openssl/crypto/x509/ |
x509spki.c | 65 if ((x == NULL) || (x->spkac == NULL)) return(0); 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 71 if ((x == NULL) || (x->spkac == NULL)) 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
x_all.c | 88 a->sig_algor,a->signature,a->spkac,r)); 133 x->signature, x->spkac,pkey,md));
|
x509.h | 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |
/external/chromium/net/base/ |
keygen_handler_mac.cc | 151 SignedPublicKeyAndChallenge spkac; local 152 memset(&spkac, 0, sizeof(spkac)); 153 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA; 154 spkac.pkac.spki.subjectPublicKey.Length = 156 spkac.pkac.spki.subjectPublicKey.Data = 158 spkac.pkac.challenge_string.Length = challenge_.length(); 159 spkac.pkac.challenge_string.Data = 163 err = SecAsn1EncodeItem(coder, &spkac.pkac, 174 spkac.signature.Data = signature.Data [all...] |
keygen_handler_unittest.cc | 46 std::string spkac; local 47 ASSERT_TRUE(base::Base64Decode(result, &spkac)); 52 ASSERT_GE(spkac.length(), 200U); 53 ASSERT_LE(spkac.length(), 300U); 56 // The value of |result| can be validated by prefixing 'SPKAC=' to it 58 // openssl spkac -verify 71 // The value of |spkac| can be ASN.1-parsed with:
|
keygen_handler_openssl.cc | 27 ASN1_STRING_set(spki.get()->spkac->challenge,
|
keygen_handler_win.cc | 205 std::string spkac; local 207 &spkac)) { 214 if (!base::Base64Encode(spkac, &result)) {
|
/external/chromium_org/net/base/ |
keygen_handler_mac.cc | 152 SignedPublicKeyAndChallenge spkac; local 153 memset(&spkac, 0, sizeof(spkac)); 154 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA; 155 spkac.pkac.spki.subjectPublicKey.Length = 157 spkac.pkac.spki.subjectPublicKey.Data = 159 spkac.pkac.challenge_string.Length = challenge_.length(); 160 spkac.pkac.challenge_string.Data = 164 err = SecAsn1EncodeItem(coder, &spkac.pkac, 175 spkac.signature.Data = signature.Data [all...] |
keygen_handler_unittest.cc | 47 std::string spkac; local 48 ASSERT_TRUE(base::Base64Decode(result, &spkac)); 53 ASSERT_GE(spkac.length(), 200U); 54 ASSERT_LE(spkac.length(), 300U); 57 // The value of |result| can be validated by prefixing 'SPKAC=' to it 59 // openssl spkac -verify 72 // The value of |spkac| can be ASN.1-parsed with:
|
keygen_handler_openssl.cc | 27 ASN1_STRING_set(spki.get()->spkac->challenge,
|
keygen_handler_win.cc | 205 std::string spkac; local 207 &spkac)) { 214 if (!base::Base64Encode(spkac, &result)) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
x_spki.c | 76 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey); 90 chal = spki->spkac->challenge;
|
/external/openssl/crypto/asn1/ |
x_spki.c | 76 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey); 90 chal = spki->spkac->challenge;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 71 public NetscapeCertRequest (ASN1Sequence spkac) 83 if (spkac.size() != 3) 85 throw new IllegalArgumentException("invalid SPKAC (size):" 86 + spkac.size()); 89 sigAlg = new AlgorithmIdentifier((ASN1Sequence)spkac 91 sigBits = ((DERBitString)spkac.getObjectAt(2)).getBytes(); 99 ASN1Sequence pkac = (ASN1Sequence)spkac.getObjectAt(0); 283 ASN1EncodableVector spkac = new ASN1EncodableVector(); local 297 spkac.add(new DERSequence(pkac)); 298 spkac.add(sigAlg) [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
spkac.c | 1 /* apps/spkac.c */ 90 const char *spkac = "SPKAC", *spksect = "default"; local 137 else if (strcmp(*argv,"-spkac") == 0) 140 spkac= *(++argv); 172 BIO_printf(bio_err," -key arg create SPKAC using private key\n"); 175 BIO_printf(bio_err," -spkac arg alternative SPKAC name\n"); 176 BIO_printf(bio_err," -noout don't print SPKAC\n"); 178 BIO_printf(bio_err," -verify verify SPKAC signature\n") [all...] |
/external/openssl/apps/ |
spkac.c | 1 /* apps/spkac.c */ 90 const char *spkac = "SPKAC", *spksect = "default"; local 137 else if (strcmp(*argv,"-spkac") == 0) 140 spkac= *(++argv); 172 BIO_printf(bio_err," -key arg create SPKAC using private key\n"); 175 BIO_printf(bio_err," -spkac arg alternative SPKAC name\n"); 176 BIO_printf(bio_err," -noout don't print SPKAC\n"); 178 BIO_printf(bio_err," -verify verify SPKAC signature\n") [all...] |
/external/chromium_org/third_party/openssl/openssl/ |
Apps-config.mk | 77 apps/spkac.c \
|
/external/openssl/ |
Apps-config.mk | 77 apps/spkac.c \
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
x509.h | 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |
/external/openssl/include/openssl/ |
x509.h | 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |