HomeSort by relevance Sort by last modified time
    Searched refs:CERT (Results 1 - 25 of 26) sorted by null

1 2

  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_cert.c 163 static void ssl_cert_set_default_md(CERT *cert)
167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1();
170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
178 CERT *ssl_cert_new(void)
180 CERT *ret;
182 ret=(CERT *)OPENSSL_malloc(sizeof(CERT));
    [all...]
ssl_locl.h 292 #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */
293 #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */
294 #define SSL_kEDH 0x00000008L /* tmp DH key no DH cert */
296 #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */
297 #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */
521 } CERT;
    [all...]
ssl2.h 155 #define CERT char
ssl_rsa.c 67 static int ssl_set_cert(CERT *c, X509 *x509);
68 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey);
76 if (!ssl_cert_inst(&ssl->cert))
81 return(ssl_set_cert(ssl->cert,x));
162 if (!ssl_cert_inst(&ssl->cert))
176 ret=ssl_set_pkey(ssl->cert,pkey);
182 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
304 if (!ssl_cert_inst(&ssl->cert))
309 ret=ssl_set_pkey(ssl->cert,pkey);
386 if (!ssl_cert_inst(&ctx->cert))
    [all...]
s2_srvr.c 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from,
167 if (s->cert == NULL)
443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)
449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc,
623 if (s->cert == NULL)
734 { /* else add cert to session */
735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT);
738 s->session->sess_cert=s->cert;
742 * the 'cert' structure, grab the 'old' one
747 CRYPTO_add(&s->cert->references,1
    [all...]
ssl_lib.c 302 if (ctx->cert != NULL)
305 * the CERT, not its contents; only when setting new
311 * Now we don't look at the SSL_CTX's CERT after having
314 s->cert = ssl_cert_dup(ctx->cert);
315 if (s->cert == NULL)
319 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */
388 if (s->cert != NULL)
389 ssl_cert_free(s->cert);
563 if (s->cert != NULL) ssl_cert_free(s->cert)
    [all...]
s3_lib.c 3456 CERT *cert; local
3704 CERT *cert; local
3819 CERT *cert; local
    [all...]
d1_srvr.c 183 if (s->cert == NULL)
478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
499 if (/* don't request cert unless asked for it: */
502 * don't request cert during re-negotiation: */
505 /* never request cert in anonymous ciphersuites
512 /* never request cert in Kerberos ciphersuites */
518 /* no cert request */
600 /* could be sent for a DH cert, even if we
647 * a client cert, it can be verified */
1046 CERT *cert; local
    [all...]
t1_lib.c     [all...]
s3_srvr.c 237 if (s->cert == NULL)
487 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
489 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
507 if (/* don't request cert unless asked for it: */
510 * don't request cert during re-negotiation: */
513 /* never request cert in anonymous ciphersuites
520 /* never request cert in Kerberos ciphersuites */
526 /* no cert request */
645 * a client cert, it can be verified
1606 CERT *cert; local
    [all...]
  /external/openssl/ssl/
ssl_cert.c 163 CERT *ssl_cert_new(void)
165 CERT *ret;
167 ret=(CERT *)OPENSSL_malloc(sizeof(CERT));
173 memset(ret,0,sizeof(CERT));
180 CERT *ssl_cert_dup(CERT *cert)
182 CERT *ret;
185 ret = (CERT *)OPENSSL_malloc(sizeof(CERT))
    [all...]
ssl_locl.h 292 #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */
293 #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */
294 #define SSL_kEDH 0x00000008L /* tmp DH key no DH cert */
296 #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */
297 #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */
519 } CERT;
    [all...]
ssl2.h 155 #define CERT char
ssl_rsa.c 67 static int ssl_set_cert(CERT *c, X509 *x509);
68 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey);
76 if (!ssl_cert_inst(&ssl->cert))
81 return(ssl_set_cert(ssl->cert,x));
162 if (!ssl_cert_inst(&ssl->cert))
176 ret=ssl_set_pkey(ssl->cert,pkey);
182 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
304 if (!ssl_cert_inst(&ssl->cert))
309 ret=ssl_set_pkey(ssl->cert,pkey);
386 if (!ssl_cert_inst(&ctx->cert))
    [all...]
s2_srvr.c 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from,
167 if (s->cert == NULL)
443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)
449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc,
623 if (s->cert == NULL)
734 { /* else add cert to session */
735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT);
738 s->session->sess_cert=s->cert;
742 * the 'cert' structure, grab the 'old' one
747 CRYPTO_add(&s->cert->references,1
    [all...]
ssl_lib.c 302 if (ctx->cert != NULL)
305 * the CERT, not its contents; only when setting new
311 * Now we don't look at the SSL_CTX's CERT after having
314 s->cert = ssl_cert_dup(ctx->cert);
315 if (s->cert == NULL)
319 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */
399 if (s->cert != NULL)
400 ssl_cert_free(s->cert);
574 if (s->cert != NULL) ssl_cert_free(s->cert)
    [all...]
s3_lib.c 3469 CERT *cert; local
3717 CERT *cert; local
3832 CERT *cert; local
    [all...]
d1_srvr.c 183 if (s->cert == NULL)
478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
499 if (/* don't request cert unless asked for it: */
502 * don't request cert during re-negotiation: */
505 /* never request cert in anonymous ciphersuites
512 /* never request cert in Kerberos ciphersuites */
518 /* no cert request */
600 /* could be sent for a DH cert, even if we
647 * a client cert, it can be verified */
1046 CERT *cert; local
    [all...]
  /external/smack/src/org/xbill/DNS/
Type.java 124 public static final int CERT = 37;
263 types.add(CERT, "CERT", new CERTRecord());
CERTRecord.java 111 private byte [] cert; field in class:CERTRecord
121 * Creates a CERT Record from the given data
125 * @param cert Binary data representing the certificate
129 int alg, byte [] cert)
131 super(name, Type.CERT, dclass, ttl);
135 this.cert = cert;
143 cert = in.readByteArray();
158 cert = st.getBase64();
172 if (cert != null)
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
X509Certificate2Test.java 18 package tests.security.cert;
20 import org.apache.harmony.security.tests.support.cert.TestUtils;
26 import java.security.cert.CertificateException;
27 import java.security.cert.CertificateFactory;
28 import java.security.cert.CertificateParsingException;
29 import java.security.cert.X509Certificate;
30 import java.security.cert.X509Extension;
100 private static String CERT =
277 MyX509Certificate cert = new MyX509Certificate() { local
285 assertEquals(new X500Principal("CN=Z"), cert.getIssuerX500Principal())
290 MyX509Certificate cert = new MyX509Certificate() { local
303 X509Certificate cert = generateCert(CERT_CORRECT); local
506 X509Certificate cert = (X509Certificate) cf.generateCertificate(bais); local
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestKeyStoreSpi.java 3 import org.apache.harmony.security.tests.support.cert.MyCertificate;
17 import java.security.cert.Certificate;
18 import java.security.cert.CertificateException;
31 public static final Certificate CERT = new MyCertificate("certtype",
56 aliases.put("certalias", CERT);
83 public String engineGetCertificateAlias(Certificate cert) {
84 if (cert == null) {
89 if (alias.getValue() == cert) {
186 public void engineSetCertificateEntry(String alias, Certificate cert)
190 throw new KeyStoreException("alias is not a cert entry")
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
ssl2.h 155 #define CERT char
  /external/openssl/include/openssl/
ssl2.h 155 #define CERT char
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore4Test.java 7 import org.apache.harmony.security.tests.support.cert.MyCertificate;
25 import java.security.cert.Certificate;
26 import java.security.cert.CertificateException;
250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT);
258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT);
566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);

Completed in 1238 milliseconds

1 2