OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:x509
(Results
226 - 250
of
1121
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java
53
import org.bouncycastle.asn1.
x509
.AlgorithmIdentifier;
54
import org.bouncycastle.asn1.
x509
.CRLDistPoint;
55
import org.bouncycastle.asn1.
x509
.CRLReason;
56
import org.bouncycastle.asn1.
x509
.DistributionPoint;
57
import org.bouncycastle.asn1.
x509
.DistributionPointName;
58
import org.bouncycastle.asn1.
x509
.Extension;
59
import org.bouncycastle.asn1.
x509
.GeneralName;
60
import org.bouncycastle.asn1.
x509
.GeneralNames;
61
import org.bouncycastle.asn1.
x509
.PolicyInformation;
62
import org.bouncycastle.asn1.
x509
.SubjectPublicKeyInfo
[
all
...]
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
X509Certificate2Test.java
42
CertificateFactory certFact = CertificateFactory.getInstance("
X509
");
67
CertificateFactory certFact = CertificateFactory.getInstance("
X509
");
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/provider/jsse/
JSSETestData.java
53
KeyManagerFactory kmf = KeyManagerFactory.getInstance("
X509
");
56
TrustManagerFactory tmf = TrustManagerFactory.getInstance("
X509
");
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
X509ExtensionsGenerator.java
1
package org.bouncycastle.asn1.
x509
;
15
* @deprecated use org.bouncycastle.asn1.
x509
.ExtensionsGenerator
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
BCRSAPublicKey.java
10
import org.bouncycastle.asn1.
x509
.AlgorithmIdentifier;
11
import org.bouncycastle.asn1.
x509
.SubjectPublicKeyInfo;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
AttributeCertificateHolder.java
1
package org.bouncycastle.
x509
;
22
import org.bouncycastle.asn1.
x509
.AlgorithmIdentifier;
23
import org.bouncycastle.asn1.
x509
.GeneralName;
24
import org.bouncycastle.asn1.
x509
.GeneralNames;
25
import org.bouncycastle.asn1.
x509
.Holder;
26
import org.bouncycastle.asn1.
x509
.IssuerSerial;
27
import org.bouncycastle.asn1.
x509
.ObjectDigestInfo;
63
holder = new org.bouncycastle.asn1.
x509
.Holder(new IssuerSerial(
/external/chromium_org/chromeos/test/data/network/
managed_toplevel2.onc
81
"
X509
": "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"
86
"
X509
": "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"
managed_toplevel2_with_cert_pems.onc
81
"
X509
": "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"
86
"
X509
": "MIICijCCAfOgAwIBAgIJAPYTFSuNYH3DMA0GCSqGSIb3DQEBBQUAMF0xCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxFjAUBgNVBAMMDW15LmRvbWFpbi5jb20wIBcNMTIxMTI5MTIxOTMwWhgPMjExMjExMDUxMjE5MzBaMF0xCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxFjAUBgNVBAMMDW15LmRvbWFpbi5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMGU4ZFREFcUB5M6CNmgR6m2HHI6qL8dLBFH3jVe+FIUWyrF3UtBQrhPtD7tC+3qsoRHDquHo3oVedOG2B22hQ3TUTvkO2YmL0pv9RsaRRbhYD8YqqpmWPq94nZNF13y007LwJLuwLU/8kikrNgmnT7meWVSAcLYLsbgjYaZmn2XAgMBAAGjUDBOMB0GA1UdDgQWBBTX5f2mCM32pbNdXrsKmRHeZlcxOjAfBgNVHSMEGDAWgBTX5f2mCM32pbNdXrsKmRHeZlcxOjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBQUAA4GBAGUj0fZr2UzZjacnGhHf9x9FeQt8VALyASCw4JQyxbhB8YHjKS+IF80X8OkDiJrjkM6IOBTtyG0n0ozEgTL9m5NqWuAB2+SPkRpDgabI6mIUR/l1tkQarKCdKzYQ3+oggkiHiHXl2uC4sutgsyt54KQaQxx04+9z2WRt9yI6I1NW"
/external/chromium_org/third_party/openssl/openssl/apps/
crl2p7.c
69
#include <openssl/
x509
.h>
74
static int add_certs_from_file(STACK_OF(
X509
) *stack, char *certfile);
97
STACK_OF(
X509
) *cert_stack=NULL;
295
static int add_certs_from_file(STACK_OF(
X509
) *stack, char *certfile)
310
/* This loads from a file, a stack of
x509
/crl/pkey sets */
321
if (xi->
x509
!= NULL)
323
sk_X509_push(stack,xi->
x509
);
324
xi->
x509
=NULL;
verify.c
65
#include <openssl/
x509
.h>
74
STACK_OF(
X509
) *uchain, STACK_OF(
X509
) *tchain,
86
STACK_OF(
X509
) *untrusted = NULL, *trusted = NULL;
267
STACK_OF(
X509
) *uchain, STACK_OF(
X509
) *tchain,
270
X509
*x=NULL;
314
X509
*current_cert = X509_STORE_CTX_get_current_cert(ctx);
pkcs12.c
82
int get_cert_chain (
X509
*cert, X509_STORE *store, STACK_OF(
X509
) **chain);
90
int cert_load(BIO *in, STACK_OF(
X509
) *sk);
423
X509
*ucert = NULL, *x = NULL;
424
STACK_OF(
X509
) *certs=NULL;
497
STACK_OF(
X509
) *morecerts=NULL;
520
STACK_OF(
X509
) *chain2;
758
X509
*
x509
;
local
801
if (!(
x509
= PKCS12_certbag2x509(bag))) return 0
[
all
...]
/external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_info.c
64
#include <openssl/
x509
.h>
136
if (xi->
x509
!= NULL)
142
pp=&(xi->
x509
);
147
if (xi->
x509
!= NULL)
153
pp=&(xi->
x509
);
285
if ((xi->
x509
!= NULL) || (xi->crl != NULL) ||
390
if ((xi->
x509
!= NULL) && (PEM_write_bio_X509(bp,xi->
x509
) <= 0))
/external/chromium_org/third_party/tlslite/
README.chromium
16
- patches/ca_request.patch: tlslite/
X509
.py was changed to obtain the
31
- patches/parse_chain.patch: tlslite/X509CertChain.py and tlslite/
X509
.py were
/external/ipsec-tools/src/racoon/samples/
racoon.conf.in
60
certificate_type
x509
"my.cert.pem" "my.key.pem";
83
#certificate_type
x509
"mycert" "mypriv";
/external/openssl/apps/
crl2p7.c
69
#include <openssl/
x509
.h>
74
static int add_certs_from_file(STACK_OF(
X509
) *stack, char *certfile);
97
STACK_OF(
X509
) *cert_stack=NULL;
295
static int add_certs_from_file(STACK_OF(
X509
) *stack, char *certfile)
310
/* This loads from a file, a stack of
x509
/crl/pkey sets */
321
if (xi->
x509
!= NULL)
323
sk_X509_push(stack,xi->
x509
);
324
xi->
x509
=NULL;
verify.c
65
#include <openssl/
x509
.h>
74
STACK_OF(
X509
) *uchain, STACK_OF(
X509
) *tchain,
86
STACK_OF(
X509
) *untrusted = NULL, *trusted = NULL;
267
STACK_OF(
X509
) *uchain, STACK_OF(
X509
) *tchain,
270
X509
*x=NULL;
314
X509
*current_cert = X509_STORE_CTX_get_current_cert(ctx);
pkcs12.c
82
int get_cert_chain (
X509
*cert, X509_STORE *store, STACK_OF(
X509
) **chain);
90
int cert_load(BIO *in, STACK_OF(
X509
) *sk);
423
X509
*ucert = NULL, *x = NULL;
424
STACK_OF(
X509
) *certs=NULL;
497
STACK_OF(
X509
) *morecerts=NULL;
520
STACK_OF(
X509
) *chain2;
758
X509
*
x509
;
local
801
if (!(
x509
= PKCS12_certbag2x509(bag))) return 0
[
all
...]
/external/openssl/crypto/pem/
pem_info.c
64
#include <openssl/
x509
.h>
136
if (xi->
x509
!= NULL)
142
pp=&(xi->
x509
);
147
if (xi->
x509
!= NULL)
153
pp=&(xi->
x509
);
285
if ((xi->
x509
!= NULL) || (xi->crl != NULL) ||
390
if ((xi->
x509
!= NULL) && (PEM_write_bio_X509(bp,xi->
x509
) <= 0))
/external/chromium/net/base/
x509_certificate_openssl.cc
43
STACK_OF(
X509
)* certs = NULL;
53
X509
* x509_cert =
183
NOTREACHED() << "Invalid
X509
err " << err;
190
void sk_X509_free_fn(STACK_OF(
X509
)* st) {
212
// We allow the
X509
store to leak, because it is used from a non-joinable
273
// certificate and cache the data within the
X509
cert using X509_set_ex_data.
356
X509
* cert = d2i_X509(NULL, &d2i_data, length);
433
crypto::ScopedOpenSSL<STACK_OF(
X509
), sk_X509_free_fn> intermediates(
450
LOG(ERROR) << "
X509
Verification error "
461
STACK_OF(
X509
)* chain = X509_STORE_CTX_get_chain(ctx.get())
[
all
...]
/external/chromium_org/third_party/openssl/openssl/ssl/
ssl_cert.c
277
if (cert->pkeys[i].
x509
!= NULL)
279
ret->pkeys[i].
x509
= cert->pkeys[i].
x509
;
280
CRYPTO_add(&ret->pkeys[i].
x509
->references, 1,
350
if (ret->pkeys[i].
x509
!= NULL)
351
X509_free(ret->pkeys[i].
x509
);
392
if (c->pkeys[i].
x509
!= NULL)
393
X509_free(c->pkeys[i].
x509
);
477
if (sc->peer_pkeys[i].
x509
!= NULL)
478
X509_free(sc->peer_pkeys[i].
x509
);
[
all
...]
/external/openssl/ssl/
ssl_cert.c
261
if (cert->pkeys[i].
x509
!= NULL)
263
ret->pkeys[i].
x509
= cert->pkeys[i].
x509
;
264
CRYPTO_add(&ret->pkeys[i].
x509
->references, 1,
330
if (ret->pkeys[i].
x509
!= NULL)
331
X509_free(ret->pkeys[i].
x509
);
372
if (c->pkeys[i].
x509
!= NULL)
373
X509_free(c->pkeys[i].
x509
);
457
if (sc->peer_pkeys[i].
x509
!= NULL)
458
X509_free(sc->peer_pkeys[i].
x509
);
[
all
...]
/build/tools/signapk/test/
run
22
umask 0077 && openssl req -new -
x509
-key $@.pk -out $@ -days 1095 \
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/
EDIPartyNameTest.java
22
package org.apache.harmony.security.tests.
x509
;
26
import org.apache.harmony.security.
x509
.EDIPartyName;
27
import org.apache.harmony.security.
x509
.GeneralName;
28
import org.apache.harmony.security.
x509
.GeneralNames;
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
DefaultCMSSignatureEncryptionAlgorithmFinder.java
10
import org.bouncycastle.asn1.
x509
.AlgorithmIdentifier;
SignerInformationVerifier.java
3
import org.bouncycastle.asn1.
x509
.AlgorithmIdentifier;
Completed in 520 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>