/prebuilts/sdk/13/ |
android.jar | |
/prebuilts/sdk/16/ |
android.jar | |
/prebuilts/sdk/8/ |
android.jar | |
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 517 /* If chaining get chain from user cert */ 827 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) 836 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 874 X509 *cert; local 877 CRYPTO_push_info("cert_load(): reading one cert"); 879 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 884 sk_X509_push(sk, cert); 886 CRYPTO_push_info("cert_load(): reading one cert");
|
apps.c | 743 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 779 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 790 BIO *cert; local 792 if ((cert=BIO_new(BIO_s_file())) == NULL) 805 BIO_set_fp(cert,stdin,BIO_NOCLOSE); 809 if (BIO_read_filename(cert,file) <= 0) 819 x=d2i_X509_bio(cert,NULL); 823 nx=ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509),cert,NULL); 834 x=nx->cert; 835 nx->cert = NULL [all...] |
/external/openssl/apps/ |
pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 524 /* If chaining get chain from user cert */ 834 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) 843 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 881 X509 *cert; local 884 CRYPTO_push_info("cert_load(): reading one cert"); 886 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 891 sk_X509_push(sk, cert); 893 CRYPTO_push_info("cert_load(): reading one cert");
|
apps.c | 743 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 779 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 790 BIO *cert; local 792 if ((cert=BIO_new(BIO_s_file())) == NULL) 805 BIO_set_fp(cert,stdin,BIO_NOCLOSE); 809 if (BIO_read_filename(cert,file) <= 0) 819 x=d2i_X509_bio(cert,NULL); 823 nx=ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509),cert,NULL); 834 x=nx->cert; 835 nx->cert = NULL [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 491 const u8 *cert, size_t cert_len) 495 if (cert == NULL) { 504 wpa_printf(MSG_INFO, "IKEV2: No Cert Encoding field"); 508 cert_encoding = cert[0]; 509 cert++; 512 wpa_printf(MSG_DEBUG, "IKEV2: Cert Encoding %d", cert_encoding); 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 688 * HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] 1144 /* build IKE_SA_AUTH: HDR, SK {IDr, [CERT,] AUTH} * [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 559 const u8 *cert, size_t cert_len) 563 if (cert == NULL) { 572 wpa_printf(MSG_INFO, "IKEV2: No Cert Encoding field"); 576 cert_encoding = cert[0]; 577 cert++; 580 wpa_printf(MSG_DEBUG, "IKEV2: Cert Encoding %d", cert_encoding); 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 760 * HDR, SK {IDr, [CERT,] [CERTREQ,] [NFID,] AUTH} 1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} * [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 278 * opaque ASN.1Cert<2^24-1>; 281 * ASN.1Cert certificate_list<1..2^24-1>; 347 cert = x509_certificate_parse(pos, cert_len); 348 if (cert == NULL) { 358 chain = cert; 360 last->next = cert; 361 last = cert;
|
tlsv1_server_read.c | 297 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 355 * opaque ASN.1Cert<2^24-1>; 358 * ASN.1Cert certificate_list<1..2^24-1>; 422 cert = x509_certificate_parse(pos, cert_len); 423 if (cert == NULL) { 432 chain = cert; 434 last->next = cert; 435 last = cert;
|
/prebuilts/sdk/11/ |
android.jar | |
/prebuilts/sdk/5/ |
android.jar | |
/prebuilts/sdk/9/ |
android.jar | |
/external/openssl/ssl/ |
s3_srvr.c | 238 if (s->cert == NULL) 493 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 495 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 513 if (/* don't request cert unless asked for it: */ 516 * don't request cert during re-negotiation: */ 519 /* never request cert in anonymous ciphersuites 526 /* never request cert in Kerberos ciphersuites */ 532 /* no cert request */ 651 * a client cert, it can be verified 1636 CERT *cert; local [all...] |
d1_clnt.c | 490 /* EAY EAY EAY need to check for DH fix cert 492 /* For TLS, cert_req is set to 2, so a cert chain 1193 /* we get them from the cert */ [all...] |
/cts/tests/tests/webkit/src/android/webkit/cts/ |
WebViewSslTest.java | 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 62 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 503 SslCertificate cert = mWebView.getCertificate(); local 541 SslCertificate cert = mWebView.getCertificate(); local 842 X509Certificate cert = (X509Certificate) certFactory.generateCertificate( local [all...] |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_clnt.c | 490 /* EAY EAY EAY need to check for DH fix cert 492 /* For TLS, cert_req is set to 2, so a cert chain 1185 /* we get them from the cert */ [all...] |
/prebuilts/sdk/10/ |
android.jar | |
/prebuilts/sdk/7/ |
android.jar | |
/external/chromium_org/third_party/libaddressinput/src/java/ |
android.jar | |
/prebuilts/sdk/20/ |
android.jar | |
/prebuilts/tools/common/api-versions/android-1/ |
android.jar | |