/external/openssl/crypto/cms/ |
cms.h | 180 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 184 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 197 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 245 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 246 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 264 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
|
cms_lib.c | 460 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) 473 if (!X509_cmp(cch->d.certificate, cert)) 485 cch->d.certificate = cert; 489 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) 492 r = CMS_add0_cert(cms, cert); 494 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
cms_sd.c | 210 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type) 220 X509_get_issuer_name(cert))) 224 X509_get_serialNumber(cert))) 229 if (!cert->skid) 235 sid->d.subjectKeyIdentifier = ASN1_STRING_dup(cert->skid); 276 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) 282 X509_get_issuer_name(cert)); 286 X509_get_serialNumber(cert)); 290 X509_check_purpose(cert, -1, -1); 291 if (!cert->skid [all...] |
/external/openssl/include/openssl/ |
cms.h | 180 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 184 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 197 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 245 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 246 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 264 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 165 struct x509_certificate *cert; local 174 cert = x509_certificate_parse(buf, len); 175 if (cert == NULL) { 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 194 x509_certificate_free(cert);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
UiccCarrierPrivilegeRules.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate; 84 * DEVICE_APP_ID_REF_DO = TAG_DEVICE_APP_ID_REF_DO + len + sha1 hexstring of cert (20 bytes) 134 return "cert: " + certificateHash + " pkg: " + packageName + 461 X509Certificate cert = (X509Certificate) certFactory.generateCertificate( local 465 return md.digest(cert.getEncoded()); 472 Rlog.e(LOG_TAG, "Cannot compute cert hash");
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainActivity.java | 46 import java.security.cert.CertificateException; 47 import java.security.cert.CertificateFactory; 48 import java.security.cert.X509Certificate; 335 X509Certificate cert; local 338 cert = (X509Certificate)cf.generateCertificate(in); 343 X500Principal subjectPrincipal = cert.getSubjectX500Principal();
|
/external/chromium_org/net/cert/ |
x509_certificate_unittest.cc | 5 #include "net/cert/x509_certificate.h" 17 #include "net/cert/asn1_util.h" 23 #include <cert.h> 48 // Google's cert. 54 // webkit.org's cert. 60 // thawte.com's cert (it's EV-licious!). 192 // Test that the wildcard cert matches properly. 420 scoped_refptr<X509Certificate> cert = local 422 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local 425 EXPECT_TRUE(X509Certificate::GetDEREncoded(cert->os_cert_handle() 440 scoped_refptr<X509Certificate> cert = local 442 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local 518 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local 911 const X509Certificate* cert = certs[i].get(); local [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_srvr.c | 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from, 167 if (s->cert == NULL) 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc, 623 if (s->cert == NULL) 734 { /* else add cert to session */ 735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT); 738 s->session->sess_cert=s->cert; 742 * the 'cert' structure, grab the 'old' one 747 CRYPTO_add(&s->cert->references,1 [all...] |
/external/openssl/ssl/ |
s2_srvr.c | 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from, 167 if (s->cert == NULL) 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc, 623 if (s->cert == NULL) 734 { /* else add cert to session */ 735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT); 738 s->session->sess_cert=s->cert; 742 * the 'cert' structure, grab the 'old' one 747 CRYPTO_add(&s->cert->references,1 [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
X509CertSelectorTest.java | 18 package tests.security.cert; 30 import java.security.cert.CertPath; 31 import java.security.cert.CertPathBuilder; 32 import java.security.cert.CertPathBuilderException; 33 import java.security.cert.CertificateEncodingException; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateExpiredException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.CertificateNotYetValidException; 38 import java.security.cert.CertificateParsingException 1075 TestCert cert = new TestCert(); local [all...] |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/build/tools/releasetools/ |
sign_target_files_apks | 101 for apk, cert in certmap.iteritems(): 102 certmap[apk] = OPTIONS.key_map.get(cert, cert) 105 for apk, cert in OPTIONS.extra_apks.iteritems(): 106 if not cert: 107 cert = "PRESIGNED" 108 certmap[apk] = OPTIONS.key_map.get(cert, cert)
|
/cts/hostsidetests/appsecurity/test-apps/AppAccessData/ |
Android.mk | 28 # although not strictly necessary, sign this app with different cert than CtsAppWithData
|
/cts/hostsidetests/appsecurity/test-apps/InstrumentationAppDiffCert/ |
Android.mk | 28 # sign this app with different cert than CtsTargetInstrumentationApp
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/ |
Android.mk | 28 # sign this app with a different cert than CtsUsePermissionDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareAppCompat/ |
Android.mk | 28 # sign this app with a different cert than CtsUsePermissionDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/SharedUidInstall/ |
Android.mk | 28 # sign this app with a different cert than CtsSharedUidInstallDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/SharedUidInstallDiffCert/ |
Android.mk | 28 # sign this app with a different cert than CtsSharedUidInstall
|
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstall/ |
Android.mk | 28 # sign this app with a different cert than CtsSimpleAppInstallDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstallDiffCert/ |
Android.mk | 28 # sign this app with a different cert than CtsSimpleAppInstall
|
/cts/hostsidetests/appsecurity/test-apps/TargetInstrumentationApp/ |
Android.mk | 28 # sign this app with different cert than CtsInstrumentationAppDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/ |
Android.mk | 29 # sign this app with a different cert than CtsPermissionDeclareApp
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CRLExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CRLException;
|
CertPathBuilderExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertPathBuilderException;
|