/prebuilts/go/linux-x86/src/crypto/x509/ |
root.go | 5 package x509
|
root_nacl.go | 5 package x509
|
root_nocgo_darwin.go | 7 package x509
|
pkcs8.go | 5 package x509 8 "crypto/x509/pkix" 35 return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error()) 47 return nil, errors.New("x509: failed to parse EC private key embedded in PKCS#8: " + err.Error()) 52 return nil, fmt.Errorf("x509: PKCS#8 wrapping contained private key with unknown algorithm: %v", privKey.Algo.Algorithm)
|
/system/ca-certificates/ |
README.cacerts | 4 openssl x509 -subject_hash_old -in filename
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampReqTest.java | 18 package org.apache.harmony.security.tests.x509.tsp; 26 import org.apache.harmony.security.x509.AlgorithmIdentifier; 27 import org.apache.harmony.security.x509.Extension; 28 import org.apache.harmony.security.x509.Extensions; 29 import org.apache.harmony.security.x509.tsp.MessageImprint; 30 import org.apache.harmony.security.x509.tsp.TimeStampReq; 36 * @tests 'org.apache.harmony.security.x509.tsp.TimeStampReq.getEncoded()'
|
PKIStatusInfoTest.java | 18 package org.apache.harmony.security.tests.x509.tsp; 24 import org.apache.harmony.security.x509.tsp.PKIFailureInfo; 25 import org.apache.harmony.security.x509.tsp.PKIStatus; 26 import org.apache.harmony.security.x509.tsp.PKIStatusInfo; 34 * @tests 'org.apache.harmony.security.x509.tsp.PKIStatusInfo.getEncoded()'
|
TSTInfoTest.java | 18 package org.apache.harmony.security.tests.x509.tsp; 28 import org.apache.harmony.security.x509.AlgorithmIdentifier; 29 import org.apache.harmony.security.x509.Extension; 30 import org.apache.harmony.security.x509.Extensions; 31 import org.apache.harmony.security.x509.GeneralName; 32 import org.apache.harmony.security.x509.tsp.MessageImprint; 33 import org.apache.harmony.security.x509.tsp.TSTInfo; 39 * @tests 'org.apache.harmony.security.x509.tsp.TSTInfo.getEncoded()'
|
/external/curl/tests/certs/scripts/ |
genroot.sh | 49 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL.ca-cacert -sha1 " 51 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL-ca.cacert -sha1 53 echo "openssl x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert " 54 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert 56 echo "openssl x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der " 57 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der 59 echo "openssl x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt " 61 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt 63 echo "openssl x509 -noout -text -in $PREFIX-ca.cacert -nameopt multiline" 64 $OPENSSL x509 -noout -text -in $PREFIX-ca.cacert -nameopt multilin [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pkcs8.go | 5 package x509 8 "crypto/x509/pkix" 35 return nil, errors.New("x509: failed to parse RSA private key embedded in PKCS#8: " + err.Error()) 47 return nil, errors.New("x509: failed to parse EC private key embedded in PKCS#8: " + err.Error()) 52 return nil, fmt.Errorf("x509: PKCS#8 wrapping contained private key with unknown algorithm: %v", privKey.Algo.Algorithm)
|
/external/boringssl/src/include/openssl/ |
x509.h | 264 } /* X509 */; 266 DECLARE_STACK_OF(X509) 267 DECLARE_ASN1_SET_OF(X509) 274 int (*check_trust)(struct x509_trust_st *, X509 *, int); 283 X509 *forward; 284 X509 *reverse; 465 X509 *x509; member in struct:X509_info_st 479 * Pat Richard <patr@x509.com> and are used to manipulate 499 STACK_OF(X509) *certs [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HostnameVerifierTest.java | 47 X509Certificate x509; local 49 x509 = (X509Certificate) cf.generateCertificate(in); 50 mySSLSession session = new mySSLSession(new X509Certificate[] {x509}); 58 x509 = (X509Certificate) cf.generateCertificate(in); 59 session = new mySSLSession(new X509Certificate[] {x509}); 64 x509 = (X509Certificate) cf.generateCertificate(in); 65 session = new mySSLSession(new X509Certificate[] {x509}); 72 x509 = (X509Certificate) cf.generateCertificate(in); 73 session = new mySSLSession(new X509Certificate[] {x509}); 86 x509 = (X509Certificate) cf.generateCertificate(in) 143 X509Certificate x509 = (X509Certificate) cf.generateCertificate(in); local 157 X509Certificate x509 = (X509Certificate) cf.generateCertificate(in); local 180 X509Certificate x509 = (X509Certificate) cf.generateCertificate(in); local 208 X509Certificate x509 = (X509Certificate) cf.generateCertificate(in); local 241 X509Certificate x509 = (X509Certificate) cf.generateCertificate(in); local 278 X509Certificate x509 = (X509Certificate) cf.generateCertificate(in); local [all...] |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48-sources.jar | |
/prebuilts/tools/common/offline-m2/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48-sources.jar | |
/external/boringssl/src/crypto/x509/ |
x_all.c | 64 #include <openssl/x509.h> 67 int X509_verify(X509 *a, EVP_PKEY *r) 81 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 88 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) 135 X509 *d2i_X509_fp(FILE *fp, X509 **x509) 137 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509); 140 int i2d_X509_fp(FILE *fp, X509 *x509 [all...] |
/external/libweave/examples/provider/ |
event_http_server.cc | 85 std::unique_ptr<X509, decltype(&X509_free)> x509{X509_new(), &X509_free}; 86 CHECK(x509); variable 90 GenerateX509(x509.get(), pkey.get()); 92 CHECK_EQ(1, SSL_CTX_use_certificate(ctx.get(), x509.get())) << GetSslError(); 107 void HttpServerImpl::GenerateX509(X509* x509, EVP_PKEY* pkey) { 108 CHECK(x509) << GetSslError(); 110 X509_set_version(x509, 2); 112 X509_gmtime_adj(X509_get_notBefore(x509), 0) [all...] |
/prebuilts/devtools/tools/lib/ |
bcpkix-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.48/ |
bcpkix-jdk15on-1.48.jar | |
/prebuilts/tools/common/offline-m2/org/bouncycastle/bcpkix-jdk15on/1.48/ |
bcpkix-jdk15on-1.48.jar | |
/external/boringssl/src/ssl/ |
ssl_rsa.c | 64 #include <openssl/x509.h> 69 static int ssl_set_cert(CERT *c, X509 *x509); 76 int SSL_use_certificate(SSL *ssl, X509 *x) { 91 X509 *x509 = d2i_X509(NULL, &p, (long)der_len); local 92 if (x509 == NULL || p != der + der_len) { 94 X509_free(x509); 98 int ret = SSL_use_certificate(ssl, x509); 99 X509_free(x509); 247 X509 *x509 = d2i_X509(NULL, &p, (long)der_len); local [all...] |
/external/boringssl/ |
sources.mk | 202 src/crypto/x509/a_digest.c\ 203 src/crypto/x509/a_sign.c\ 204 src/crypto/x509/a_strex.c\ 205 src/crypto/x509/a_verify.c\ 206 src/crypto/x509/asn1_gen.c\ 207 src/crypto/x509/by_dir.c\ 208 src/crypto/x509/by_file.c\ 209 src/crypto/x509/i2d_pr.c\ 210 src/crypto/x509/pkcs7.c\ 211 src/crypto/x509/t_crl.c [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 198 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/jcajce/ |
JcaBasicOCSPRespBuilder.java | 5 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V1CertificateGenerator.java | 1 package org.bouncycastle.x509; 26 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 27 import org.bouncycastle.asn1.x509.Certificate; 28 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; 29 import org.bouncycastle.asn1.x509.TBSCertificate; 30 import org.bouncycastle.asn1.x509.Time; 31 import org.bouncycastle.asn1.x509.V1TBSCertificateGenerator; 32 import org.bouncycastle.asn1.x509.X509Name; 177 * generate an X509 certificate, based on the current issuer and subject 196 * generate an X509 certificate, based on the current issuer and subjec [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.h | 36 PoloChallengeResponse(X509* client_cert, X509* server_cert); 52 X509* client_cert; 53 X509* server_cert;
|