/external/openssl/crypto/x509/ |
x509spki.c | 65 if ((x == NULL) || (x->spkac == NULL)) return(0); 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 71 if ((x == NULL) || (x->spkac == NULL)) 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
x_all.c | 88 a->sig_algor,a->signature,a->spkac,r)); 135 x->signature, x->spkac,pkey,md));
|
x509.h | 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |
/external/chromium_org/net/base/ |
keygen_handler_mac.cc | 152 SignedPublicKeyAndChallenge spkac; local 153 memset(&spkac, 0, sizeof(spkac)); 154 spkac.pkac.spki.algorithm.algorithm = CSSMOID_RSA; 155 spkac.pkac.spki.subjectPublicKey.Length = 157 spkac.pkac.spki.subjectPublicKey.Data = 159 spkac.pkac.challenge_string.Length = challenge_.length(); 160 spkac.pkac.challenge_string.Data = 164 err = SecAsn1EncodeItem(coder, &spkac.pkac, 175 spkac.signature.Data = signature.Data [all...] |
keygen_handler_unittest.cc | 80 std::string spkac; local 81 ASSERT_TRUE(base::Base64Decode(result, &spkac)); 86 ASSERT_GE(spkac.length(), 200U); 87 ASSERT_LE(spkac.length(), 300U); 90 // The value of |result| can be validated by prefixing 'SPKAC=' to it 92 // openssl spkac -verify 105 // The value of |spkac| can be ASN.1-parsed with:
|
keygen_handler_openssl.cc | 28 ASN1_STRING_set(spki.get()->spkac->challenge,
|
keygen_handler_win.cc | 206 std::string spkac; local 208 &spkac)) { 215 base::Base64Encode(spkac, &result);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x_spki.c | 73 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
|
x509spki.c | 63 if ((x == NULL) || (x->spkac == NULL)) return(0); 64 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 69 if ((x == NULL) || (x->spkac == NULL)) 71 return(X509_PUBKEY_get(x->spkac->pubkey));
|
x_all.c | 142 x->signature, x->spkac,pkey,md));
|
/external/openssl/crypto/asn1/ |
x_spki.c | 76 ASN1_SIMPLE(NETSCAPE_SPKI, spkac, NETSCAPE_SPKAC),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey); 90 chal = spki->spkac->challenge;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 71 public NetscapeCertRequest (ASN1Sequence spkac) 83 if (spkac.size() != 3) 85 throw new IllegalArgumentException("invalid SPKAC (size):" 86 + spkac.size()); 89 sigAlg = new AlgorithmIdentifier((ASN1Sequence)spkac 91 sigBits = ((DERBitString)spkac.getObjectAt(2)).getBytes(); 99 ASN1Sequence pkac = (ASN1Sequence)spkac.getObjectAt(0); 283 ASN1EncodableVector spkac = new ASN1EncodableVector(); local 297 spkac.add(new DERSequence(pkac)); 298 spkac.add(sigAlg) [all...] |
/external/openssl/apps/ |
spkac.c | 1 /* apps/spkac.c */ 90 const char *spkac = "SPKAC", *spksect = "default"; local 137 else if (strcmp(*argv,"-spkac") == 0) 140 spkac= *(++argv); 172 BIO_printf(bio_err," -key arg create SPKAC using private key\n"); 175 BIO_printf(bio_err," -spkac arg alternative SPKAC name\n"); 176 BIO_printf(bio_err," -noout don't print SPKAC\n"); 178 BIO_printf(bio_err," -verify verify SPKAC signature\n") [all...] |
/external/openssl/ |
Apps-config-host.mk | 67 apps/spkac.c \
|
Apps-config-target.mk | 67 apps/spkac.c \
|
/external/openssl/include/openssl/ |
x509.h | 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
x509.h | 493 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ member in struct:Netscape_spki_st [all...] |