HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 876 - 900 of 1180) sorted by null

<<31323334353637383940>>

  /prebuilts/sdk/13/
android.jar 
  /prebuilts/sdk/16/
android.jar 
  /prebuilts/sdk/8/
android.jar 
  /external/chromium_org/third_party/openssl/openssl/apps/
pkcs12.c 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
517 /* If chaining get chain from user cert */
827 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
836 X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
874 X509 *cert; local
877 CRYPTO_push_info("cert_load(): reading one cert");
879 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
884 sk_X509_push(sk, cert);
886 CRYPTO_push_info("cert_load(): reading one cert");
apps.c 743 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
779 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
790 BIO *cert; local
792 if ((cert=BIO_new(BIO_s_file())) == NULL)
805 BIO_set_fp(cert,stdin,BIO_NOCLOSE);
809 if (BIO_read_filename(cert,file) <= 0)
819 x=d2i_X509_bio(cert,NULL);
823 nx=ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509),cert,NULL);
834 x=nx->cert;
835 nx->cert = NULL
    [all...]
  /external/openssl/apps/
pkcs12.c 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
524 /* If chaining get chain from user cert */
834 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
843 X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
881 X509 *cert; local
884 CRYPTO_push_info("cert_load(): reading one cert");
886 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
891 sk_X509_push(sk, cert);
893 CRYPTO_push_info("cert_load(): reading one cert");
apps.c 743 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
779 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
790 BIO *cert; local
792 if ((cert=BIO_new(BIO_s_file())) == NULL)
805 BIO_set_fp(cert,stdin,BIO_NOCLOSE);
809 if (BIO_read_filename(cert,file) <= 0)
819 x=d2i_X509_bio(cert,NULL);
823 nx=ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509),cert,NULL);
834 x=nx->cert;
835 nx->cert = NULL
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 491 const u8 *cert, size_t cert_len)
495 if (cert == NULL) {
504 wpa_printf(MSG_INFO, "IKEV2: No Cert Encoding field");
508 cert_encoding = cert[0];
509 cert++;
512 wpa_printf(MSG_DEBUG, "IKEV2: Cert Encoding %d", cert_encoding);
513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
688 * HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,]
1144 /* build IKE_SA_AUTH: HDR, SK {IDr, [CERT,] AUTH} *
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 559 const u8 *cert, size_t cert_len)
563 if (cert == NULL) {
572 wpa_printf(MSG_INFO, "IKEV2: No Cert Encoding field");
576 cert_encoding = cert[0];
577 cert++;
580 wpa_printf(MSG_DEBUG, "IKEV2: Cert Encoding %d", cert_encoding);
581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
760 * HDR, SK {IDr, [CERT,] [CERTREQ,] [NFID,] AUTH}
1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} *
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_read.c 220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
278 * opaque ASN.1Cert<2^24-1>;
281 * ASN.1Cert certificate_list<1..2^24-1>;
347 cert = x509_certificate_parse(pos, cert_len);
348 if (cert == NULL) {
358 chain = cert;
360 last->next = cert;
361 last = cert;
tlsv1_server_read.c 297 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
355 * opaque ASN.1Cert<2^24-1>;
358 * ASN.1Cert certificate_list<1..2^24-1>;
422 cert = x509_certificate_parse(pos, cert_len);
423 if (cert == NULL) {
432 chain = cert;
434 last->next = cert;
435 last = cert;
  /prebuilts/sdk/11/
android.jar 
  /prebuilts/sdk/5/
android.jar 
  /prebuilts/sdk/9/
android.jar 
  /external/openssl/ssl/
s3_srvr.c 238 if (s->cert == NULL)
493 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
495 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
513 if (/* don't request cert unless asked for it: */
516 * don't request cert during re-negotiation: */
519 /* never request cert in anonymous ciphersuites
526 /* never request cert in Kerberos ciphersuites */
532 /* no cert request */
651 * a client cert, it can be verified
1636 CERT *cert; local
    [all...]
d1_clnt.c 490 /* EAY EAY EAY need to check for DH fix cert
492 /* For TLS, cert_req is set to 2, so a cert chain
1193 /* we get them from the cert */
    [all...]
  /cts/tests/tests/webkit/src/android/webkit/cts/
WebViewSslTest.java 42 import java.security.cert.CertificateFactory;
43 import java.security.cert.X509Certificate;
62 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650
503 SslCertificate cert = mWebView.getCertificate(); local
541 SslCertificate cert = mWebView.getCertificate(); local
842 X509Certificate cert = (X509Certificate) certFactory.generateCertificate( local
    [all...]
  /prebuilts/devtools/tools/lib/
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_clnt.c 490 /* EAY EAY EAY need to check for DH fix cert
492 /* For TLS, cert_req is set to 2, so a cert chain
1185 /* we get them from the cert */
    [all...]
  /prebuilts/sdk/10/
android.jar 
  /prebuilts/sdk/7/
android.jar 
  /external/chromium_org/third_party/libaddressinput/src/java/
android.jar 
  /prebuilts/sdk/20/
android.jar 
  /prebuilts/tools/common/api-versions/android-1/
android.jar 

Completed in 411 milliseconds

<<31323334353637383940>>