/external/openssl/include/openssl/ |
cms.h | 180 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 184 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 197 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 245 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 246 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 264 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
|
/external/chromium_org/net/cert/ |
x509_certificate_unittest.cc | 5 #include "net/cert/x509_certificate.h" 17 #include "net/cert/asn1_util.h" 23 #include <cert.h> 48 // Google's cert. 54 // webkit.org's cert. 60 // thawte.com's cert (it's EV-licious!). 192 // Test that the wildcard cert matches properly. 494 scoped_refptr<X509Certificate> cert = local 496 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert.get()); 499 EXPECT_TRUE(X509Certificate::GetDEREncoded(cert->os_cert_handle() 514 scoped_refptr<X509Certificate> cert = local 592 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local 885 const X509Certificate* cert = certs[i].get(); local [all...] |
/external/openssl/crypto/cms/ |
cms_sd.c | 210 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type) 220 X509_get_issuer_name(cert))) 224 X509_get_serialNumber(cert))) 229 if (!cert->skid) 235 sid->d.subjectKeyIdentifier = ASN1_STRING_dup(cert->skid); 276 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) 282 X509_get_issuer_name(cert)); 286 X509_get_serialNumber(cert)); 290 X509_check_purpose(cert, -1, -1); 291 if (!cert->skid [all...] |
/external/openssl/ssl/ |
s2_srvr.c | 128 static int ssl_rsa_private_decrypt(CERT *c, int len, unsigned char *from, 167 if (s->cert == NULL) 443 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) 449 i=ssl_rsa_private_decrypt(s->cert,s->s2->tmp.enc, 623 if (s->cert == NULL) 734 { /* else add cert to session */ 735 CRYPTO_add(&s->cert->references,1,CRYPTO_LOCK_SSL_CERT); 738 s->session->sess_cert=s->cert; 742 * the 'cert' structure, grab the 'old' one 747 CRYPTO_add(&s->cert->references,1 [all...] |
/build/tools/releasetools/ |
sign_target_files_apks | 101 for apk, cert in certmap.iteritems(): 102 certmap[apk] = OPTIONS.key_map.get(cert, cert) 105 for apk, cert in OPTIONS.extra_apks.iteritems(): 106 if not cert: 107 cert = "PRESIGNED" 108 certmap[apk] = OPTIONS.key_map.get(cert, cert)
|
/cts/hostsidetests/appsecurity/test-apps/AppAccessData/ |
Android.mk | 28 # although not strictly necessary, sign this app with different cert than CtsAppWithData
|
/cts/hostsidetests/appsecurity/test-apps/InstrumentationAppDiffCert/ |
Android.mk | 28 # sign this app with different cert than CtsTargetInstrumentationApp
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/ |
Android.mk | 28 # sign this app with a different cert than CtsUsePermissionDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareAppCompat/ |
Android.mk | 28 # sign this app with a different cert than CtsUsePermissionDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/SharedUidInstall/ |
Android.mk | 28 # sign this app with a different cert than CtsSharedUidInstallDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/SharedUidInstallDiffCert/ |
Android.mk | 28 # sign this app with a different cert than CtsSharedUidInstall
|
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstall/ |
Android.mk | 28 # sign this app with a different cert than CtsSimpleAppInstallDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstallDiffCert/ |
Android.mk | 28 # sign this app with a different cert than CtsSimpleAppInstall
|
/cts/hostsidetests/appsecurity/test-apps/TargetInstrumentationApp/ |
Android.mk | 28 # sign this app with different cert than CtsInstrumentationAppDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/ |
Android.mk | 29 # sign this app with a different cert than CtsPermissionDeclareApp
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CRLExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CRLException;
|
CertPathBuilderExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertPathBuilderException;
|
CertStoreExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertStoreException;
|
CertificateEncodingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateEncodingException;
|
CertificateExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateException;
|
CertificateParsingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateParsingException;
|
PolicyQualifierInfoTest.java | 21 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.PolicyQualifierInfo;
|
/external/chromium_org/chrome/browser/net/ |
chrome_fraudulent_certificate_reporter_unittest.cc | 18 #include "net/cert/x509_certificate.h" 33 // Builds an SSLInfo from an invalid cert chain. In this case, the cert is 34 // expired; what matters is that the cert would not pass even a normal 40 info.cert = net::ImportCertFromFile(net::GetTestCertsDirectory(), 48 // Builds an SSLInfo from a "good" cert chain, as defined by IsGoodSSLInfo, 57 info.cert = net::ImportCertFromFile(net::GetTestCertsDirectory(),
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 21 #include "net/cert/pem_tokenizer.h" 22 #include "net/cert/x509_certificate.h" 322 base::DictionaryValue* cert = NULL; local 323 (*it)->GetAsDictionary(&cert); 326 cert->GetStringWithoutPathExpansion(certificate::kGUID, &guid); 328 cert->GetStringWithoutPathExpansion(certificate::kType, &cert_type); 334 cert->GetStringWithoutPathExpansion(certificate::kX509, &x509_data); 452 scoped_refptr<net::X509Certificate> cert = local 454 LOG_IF(ERROR, !cert.get()) << "Couldn't create certificate from X509 data: " 456 return cert; [all...] |
/external/chromium_org/content/browser/ssl/ |
ssl_policy.cc | 39 backend_->QueryPolicy(*handler->ssl_info().cert.get(), 177 backend_->AllowCertForHost(*handler->ssl_info().cert.get(),
|