HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 426 - 450 of 728) sorted by null

<<11121314151617181920>>

  /external/openssl/include/openssl/
cms.h 180 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert,
184 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert);
197 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert);
245 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert);
246 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert);
264 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
  /external/chromium_org/net/cert/
x509_certificate_unittest.cc 5 #include "net/cert/x509_certificate.h"
17 #include "net/cert/asn1_util.h"
23 #include <cert.h>
48 // Google's cert.
54 // webkit.org's cert.
60 // thawte.com's cert (it's EV-licious!).
192 // Test that the wildcard cert matches properly.
494 scoped_refptr<X509Certificate> cert = local
496 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert.get());
499 EXPECT_TRUE(X509Certificate::GetDEREncoded(cert->os_cert_handle()
514 scoped_refptr<X509Certificate> cert = local
592 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local
885 const X509Certificate* cert = certs[i].get(); local
    [all...]
  /external/openssl/crypto/cms/
cms_sd.c 210 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type)
220 X509_get_issuer_name(cert)))
224 X509_get_serialNumber(cert)))
229 if (!cert->skid)
235 sid->d.subjectKeyIdentifier = ASN1_STRING_dup(cert->skid);
276 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert)
282 X509_get_issuer_name(cert));
286 X509_get_serialNumber(cert));
290 X509_check_purpose(cert, -1, -1);
291 if (!cert->skid
    [all...]
  /external/openssl/ssl/
s2_srvr.c 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from,
167 if (s->cert == NULL)
443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)
449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc,
623 if (s->cert == NULL)
734 { /* else add cert to session */
735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT);
738 s->session->sess_cert=s->cert;
742 * the 'cert' structure, grab the 'old' one
747 CRYPTO_add(&s->cert->references,1
    [all...]
  /build/tools/releasetools/
sign_target_files_apks 101 for apk, cert in certmap.iteritems():
102 certmap[apk] = OPTIONS.key_map.get(cert, cert)
105 for apk, cert in OPTIONS.extra_apks.iteritems():
106 if not cert:
107 cert = "PRESIGNED"
108 certmap[apk] = OPTIONS.key_map.get(cert, cert)
  /cts/hostsidetests/appsecurity/test-apps/AppAccessData/
Android.mk 28 # although not strictly necessary, sign this app with different cert than CtsAppWithData
  /cts/hostsidetests/appsecurity/test-apps/InstrumentationAppDiffCert/
Android.mk 28 # sign this app with different cert than CtsTargetInstrumentationApp
  /cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/
Android.mk 28 # sign this app with a different cert than CtsUsePermissionDiffCert
  /cts/hostsidetests/appsecurity/test-apps/PermissionDeclareAppCompat/
Android.mk 28 # sign this app with a different cert than CtsUsePermissionDiffCert
  /cts/hostsidetests/appsecurity/test-apps/SharedUidInstall/
Android.mk 28 # sign this app with a different cert than CtsSharedUidInstallDiffCert
  /cts/hostsidetests/appsecurity/test-apps/SharedUidInstallDiffCert/
Android.mk 28 # sign this app with a different cert than CtsSharedUidInstall
  /cts/hostsidetests/appsecurity/test-apps/SimpleAppInstall/
Android.mk 28 # sign this app with a different cert than CtsSimpleAppInstallDiffCert
  /cts/hostsidetests/appsecurity/test-apps/SimpleAppInstallDiffCert/
Android.mk 28 # sign this app with a different cert than CtsSimpleAppInstall
  /cts/hostsidetests/appsecurity/test-apps/TargetInstrumentationApp/
Android.mk 28 # sign this app with different cert than CtsInstrumentationAppDiffCert
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/
Android.mk 29 # sign this app with a different cert than CtsPermissionDeclareApp
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CRLExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CRLException;
CertPathBuilderExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertPathBuilderException;
CertStoreExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertStoreException;
CertificateEncodingExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertificateEncodingException;
CertificateExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertificateException;
CertificateParsingExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertificateParsingException;
PolicyQualifierInfoTest.java 21 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.PolicyQualifierInfo;
  /external/chromium_org/chrome/browser/net/
chrome_fraudulent_certificate_reporter_unittest.cc 18 #include "net/cert/x509_certificate.h"
33 // Builds an SSLInfo from an invalid cert chain. In this case, the cert is
34 // expired; what matters is that the cert would not pass even a normal
40 info.cert = net::ImportCertFromFile(net::GetTestCertsDirectory(),
48 // Builds an SSLInfo from a "good" cert chain, as defined by IsGoodSSLInfo,
57 info.cert = net::ImportCertFromFile(net::GetTestCertsDirectory(),
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 21 #include "net/cert/pem_tokenizer.h"
22 #include "net/cert/x509_certificate.h"
322 base::DictionaryValue* cert = NULL; local
323 (*it)->GetAsDictionary(&cert);
326 cert->GetStringWithoutPathExpansion(certificate::kGUID, &guid);
328 cert->GetStringWithoutPathExpansion(certificate::kType, &cert_type);
334 cert->GetStringWithoutPathExpansion(certificate::kX509, &x509_data);
452 scoped_refptr<net::X509Certificate> cert = local
454 LOG_IF(ERROR, !cert.get()) << "Couldn't create certificate from X509 data: "
456 return cert;
    [all...]
  /external/chromium_org/content/browser/ssl/
ssl_policy.cc 39 backend_->QueryPolicy(*handler->ssl_info().cert.get(),
177 backend_->AllowCertForHost(*handler->ssl_info().cert.get(),

Completed in 1702 milliseconds

<<11121314151617181920>>