HomeSort by relevance Sort by last modified time
    Searched full:x509 (Results 226 - 250 of 1121) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 53 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
54 import org.bouncycastle.asn1.x509.CRLDistPoint;
55 import org.bouncycastle.asn1.x509.CRLReason;
56 import org.bouncycastle.asn1.x509.DistributionPoint;
57 import org.bouncycastle.asn1.x509.DistributionPointName;
58 import org.bouncycastle.asn1.x509.Extension;
59 import org.bouncycastle.asn1.x509.GeneralName;
60 import org.bouncycastle.asn1.x509.GeneralNames;
61 import org.bouncycastle.asn1.x509.PolicyInformation;
62 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
X509Certificate2Test.java 42 CertificateFactory certFact = CertificateFactory.getInstance("X509");
67 CertificateFactory certFact = CertificateFactory.getInstance("X509");
  /external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/provider/jsse/
JSSETestData.java 53 KeyManagerFactory kmf = KeyManagerFactory.getInstance("X509");
56 TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
X509ExtensionsGenerator.java 1 package org.bouncycastle.asn1.x509;
15 * @deprecated use org.bouncycastle.asn1.x509.ExtensionsGenerator
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
BCRSAPublicKey.java 10 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
11 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
AttributeCertificateHolder.java 1 package org.bouncycastle.x509;
22 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
23 import org.bouncycastle.asn1.x509.GeneralName;
24 import org.bouncycastle.asn1.x509.GeneralNames;
25 import org.bouncycastle.asn1.x509.Holder;
26 import org.bouncycastle.asn1.x509.IssuerSerial;
27 import org.bouncycastle.asn1.x509.ObjectDigestInfo;
63 holder = new org.bouncycastle.asn1.x509.Holder(new IssuerSerial(
  /external/chromium_org/chromeos/test/data/network/
managed_toplevel2.onc 81 "X509": "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"
86 "X509": "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"
managed_toplevel2_with_cert_pems.onc 81 "X509": "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"
86 "X509": "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"
  /external/chromium_org/third_party/openssl/openssl/apps/
crl2p7.c 69 #include <openssl/x509.h>
74 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
97 STACK_OF(X509) *cert_stack=NULL;
295 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
310 /* This loads from a file, a stack of x509/crl/pkey sets */
321 if (xi->x509 != NULL)
323 sk_X509_push(stack,xi->x509);
324 xi->x509=NULL;
verify.c 65 #include <openssl/x509.h>
74 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
267 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
270 X509 *x=NULL;
314 X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
pkcs12.c 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
90 int cert_load(BIO *in, STACK_OF(X509) *sk);
423 X509 *ucert = NULL, *x = NULL;
424 STACK_OF(X509) *certs=NULL;
497 STACK_OF(X509) *morecerts=NULL;
520 STACK_OF(X509) *chain2;
758 X509 *x509; local
801 if (!(x509 = PKCS12_certbag2x509(bag))) return 0
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_info.c 64 #include <openssl/x509.h>
136 if (xi->x509 != NULL)
142 pp=&(xi->x509);
147 if (xi->x509 != NULL)
153 pp=&(xi->x509);
285 if ((xi->x509 != NULL) || (xi->crl != NULL) ||
390 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp,xi->x509) <= 0))
  /external/chromium_org/third_party/tlslite/
README.chromium 16 - patches/ca_request.patch: tlslite/X509.py was changed to obtain the
31 - patches/parse_chain.patch: tlslite/X509CertChain.py and tlslite/X509.py were
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.in 60 certificate_type x509 "my.cert.pem" "my.key.pem";
83 #certificate_type x509 "mycert" "mypriv";
  /external/openssl/apps/
crl2p7.c 69 #include <openssl/x509.h>
74 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
97 STACK_OF(X509) *cert_stack=NULL;
295 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
310 /* This loads from a file, a stack of x509/crl/pkey sets */
321 if (xi->x509 != NULL)
323 sk_X509_push(stack,xi->x509);
324 xi->x509=NULL;
verify.c 65 #include <openssl/x509.h>
74 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
267 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
270 X509 *x=NULL;
314 X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
pkcs12.c 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
90 int cert_load(BIO *in, STACK_OF(X509) *sk);
423 X509 *ucert = NULL, *x = NULL;
424 STACK_OF(X509) *certs=NULL;
497 STACK_OF(X509) *morecerts=NULL;
520 STACK_OF(X509) *chain2;
758 X509 *x509; local
801 if (!(x509 = PKCS12_certbag2x509(bag))) return 0
    [all...]
  /external/openssl/crypto/pem/
pem_info.c 64 #include <openssl/x509.h>
136 if (xi->x509 != NULL)
142 pp=&(xi->x509);
147 if (xi->x509 != NULL)
153 pp=&(xi->x509);
285 if ((xi->x509 != NULL) || (xi->crl != NULL) ||
390 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp,xi->x509) <= 0))
  /external/chromium/net/base/
x509_certificate_openssl.cc 43 STACK_OF(X509)* certs = NULL;
53 X509* x509_cert =
183 NOTREACHED() << "Invalid X509 err " << err;
190 void sk_X509_free_fn(STACK_OF(X509)* st) {
212 // We allow the X509 store to leak, because it is used from a non-joinable
273 // certificate and cache the data within the X509 cert using X509_set_ex_data.
356 X509* cert = d2i_X509(NULL, &d2i_data, length);
433 crypto::ScopedOpenSSL<STACK_OF(X509), sk_X509_free_fn> intermediates(
450 LOG(ERROR) << "X509 Verification error "
461 STACK_OF(X509)* chain = X509_STORE_CTX_get_chain(ctx.get())
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_cert.c 277 if (cert->pkeys[i].x509 != NULL)
279 ret->pkeys[i].x509 = cert->pkeys[i].x509;
280 CRYPTO_add(&ret->pkeys[i].x509->references, 1,
350 if (ret->pkeys[i].x509 != NULL)
351 X509_free(ret->pkeys[i].x509);
392 if (c->pkeys[i].x509 != NULL)
393 X509_free(c->pkeys[i].x509);
477 if (sc->peer_pkeys[i].x509 != NULL)
478 X509_free(sc->peer_pkeys[i].x509);
    [all...]
  /external/openssl/ssl/
ssl_cert.c 261 if (cert->pkeys[i].x509 != NULL)
263 ret->pkeys[i].x509 = cert->pkeys[i].x509;
264 CRYPTO_add(&ret->pkeys[i].x509->references, 1,
330 if (ret->pkeys[i].x509 != NULL)
331 X509_free(ret->pkeys[i].x509);
372 if (c->pkeys[i].x509 != NULL)
373 X509_free(c->pkeys[i].x509);
457 if (sc->peer_pkeys[i].x509 != NULL)
458 X509_free(sc->peer_pkeys[i].x509);
    [all...]
  /build/tools/signapk/test/
run 22 umask 0077 && openssl req -new -x509 -key $@.pk -out $@ -days 1095 \
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/
EDIPartyNameTest.java 22 package org.apache.harmony.security.tests.x509;
26 import org.apache.harmony.security.x509.EDIPartyName;
27 import org.apache.harmony.security.x509.GeneralName;
28 import org.apache.harmony.security.x509.GeneralNames;
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
DefaultCMSSignatureEncryptionAlgorithmFinder.java 10 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
SignerInformationVerifier.java 3 import org.bouncycastle.asn1.x509.AlgorithmIdentifier;

Completed in 520 milliseconds

1 2 3 4 5 6 7 8 91011>>