/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 9 certificate_type x509 "server.crt" "server.key";
|
racoon.conf-radius | 9 certificate_type x509 "server.crt" "server.key";
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_bsd.go | 7 package x509
|
root_solaris.go | 5 package x509
|
sec1.go | 5 package x509 40 return nil, errors.New("x509: unknown elliptic curve") 57 return nil, errors.New("x509: failed to parse EC private key: " + err.Error()) 60 return nil, fmt.Errorf("x509: unknown EC private key version %d", privKey.Version) 70 return nil, errors.New("x509: unknown elliptic curve") 75 return nil, errors.New("x509: invalid elliptic curve private key value")
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_bsd.go | 7 package x509
|
root_solaris.go | 5 package x509
|
sec1.go | 5 package x509 40 return nil, errors.New("x509: unknown elliptic curve") 57 return nil, errors.New("x509: failed to parse EC private key: " + err.Error()) 60 return nil, fmt.Errorf("x509: unknown EC private key version %d", privKey.Version) 70 return nil, errors.New("x509: unknown elliptic curve") 75 return nil, errors.New("x509: invalid elliptic curve private key value")
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampRespTest.java | 18 package org.apache.harmony.security.tests.x509.tsp; 34 import org.apache.harmony.security.x509.AlgorithmIdentifier; 35 import org.apache.harmony.security.x509.Extension; 36 import org.apache.harmony.security.x509.Extensions; 37 import org.apache.harmony.security.x509.GeneralName; 38 import org.apache.harmony.security.x509.tsp.MessageImprint; 39 import org.apache.harmony.security.x509.tsp.PKIFailureInfo; 40 import org.apache.harmony.security.x509.tsp.PKIStatus; 41 import org.apache.harmony.security.x509.tsp.PKIStatusInfo; 42 import org.apache.harmony.security.x509.tsp.TSTInfo [all...] |
/external/boringssl/src/crypto/x509/ |
by_file.c | 1 /* crypto/x509/by_file.c */ 112 OPENSSL_PUT_ERROR(X509, X509_R_LOADING_DEFAULTS); 133 X509 *x=NULL; 140 OPENSSL_PUT_ERROR(X509, ERR_R_SYS_LIB); 159 OPENSSL_PUT_ERROR(X509, ERR_R_PEM_LIB); 176 OPENSSL_PUT_ERROR(X509, ERR_R_ASN1_LIB); 185 OPENSSL_PUT_ERROR(X509, X509_R_BAD_X509_FILETYPE); 206 OPENSSL_PUT_ERROR(X509, ERR_R_SYS_LIB); 225 OPENSSL_PUT_ERROR(X509, ERR_R_PEM_LIB); 242 OPENSSL_PUT_ERROR(X509, ERR_R_ASN1_LIB) [all...] |
x_x509a.c | 60 #include <openssl/x509.h> 65 * appended to the X509 encoding when the *_X509_AUX routines 66 * are used. This means that the "traditional" X509 routines 69 static X509_CERT_AUX *aux_get(X509 *x); 81 static X509_CERT_AUX *aux_get(X509 *x) 88 int X509_alias_set1(X509 *x, unsigned char *name, int len) 104 int X509_keyid_set1(X509 *x, unsigned char *id, int len) 120 unsigned char *X509_alias_get0(X509 *x, int *len) 127 unsigned char *X509_keyid_get0(X509 *x, int *len) 134 int X509_add1_trust_object(X509 *x, ASN1_OBJECT *obj [all...] |
x509_ext.c | 1 /* crypto/x509/x509_ext.c */ 62 #include <openssl/x509.h> 112 int X509_get_ext_count(X509 *x) 117 int X509_get_ext_by_NID(X509 *x, int nid, int lastpos) 122 int X509_get_ext_by_OBJ(X509 *x, ASN1_OBJECT *obj, int lastpos) 127 int X509_get_ext_by_critical(X509 *x, int crit, int lastpos) 132 X509_EXTENSION *X509_get_ext(X509 *x, int loc) 137 X509_EXTENSION *X509_delete_ext(X509 *x, int loc) 142 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc) 147 void *X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx [all...] |
x509_trs.c | 66 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 67 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 68 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 70 static int obj_trust(int id, X509 *x, int flags); 71 static int (*default_trust)(int id, X509 *x, int flags) = obj_trust; 99 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 101 int (*oldtrust)(int , X509 *, int); 108 int X509_check_trust(X509 *x, int id, int flags) 159 OPENSSL_PUT_ERROR(X509, X509_R_INVALID_TRUST) [all...] |
/cts/tests/tests/security/tools/ |
format_cert.sh | 29 # openssl x509 -in cert_file -subject_hash_old -noout 35 subject_hash=$("$OPENSSL" x509 -in "$in_file" -inform $in_form -subject_hash_old \ 39 subject_hash=$("$OPENSSL" x509 -in "$in_file" -inform $in_form -subject_hash_old \ 54 "$OPENSSL" x509 -in "$in_file" -inform $in_form -outform pem > "$out_file" && \ 55 "$OPENSSL" x509 -in "$in_file" -inform $in_form -noout -text -fingerprint \
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 17 "crypto/x509" 18 "crypto/x509/pkix" 53 return &pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(k)} 55 b, err := x509.MarshalECPrivateKey(k) 113 template := x509.Certificate{ 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, 122 ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, 137 template.KeyUsage |= x509.KeyUsageCertSig [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 17 "crypto/x509" 18 "crypto/x509/pkix" 53 return &pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(k)} 55 b, err := x509.MarshalECPrivateKey(k) 113 template := x509.Certificate{ 121 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, 122 ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, 137 template.KeyUsage |= x509.KeyUsageCertSig [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
AuthorityKeyIdentifierStructure.java | 1 package org.bouncycastle.x509.extension; 11 import org.bouncycastle.asn1.x509.AuthorityKeyIdentifier; 12 import org.bouncycastle.asn1.x509.Extension; 13 import org.bouncycastle.asn1.x509.GeneralName; 14 import org.bouncycastle.asn1.x509.GeneralNames; 15 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; 16 import org.bouncycastle.asn1.x509.X509Extension;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 22 package org.apache.harmony.security.tests.x509; 37 import org.apache.harmony.security.x509.AlgorithmIdentifier; 38 import org.apache.harmony.security.x509.Certificate; 39 import org.apache.harmony.security.x509.EDIPartyName; 40 import org.apache.harmony.security.x509.Extension; 41 import org.apache.harmony.security.x509.Extensions; 42 import org.apache.harmony.security.x509.GeneralName; 43 import org.apache.harmony.security.x509.GeneralNames; 44 import org.apache.harmony.security.x509.NameConstraints; 45 import org.apache.harmony.security.x509.ORAddress [all...] |
CertificatePoliciesTest.java | 22 package org.apache.harmony.security.tests.x509; 27 import org.apache.harmony.security.x509.CertificatePolicies; 28 import org.apache.harmony.security.x509.PolicyInformation;
|
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 27 openssl x509 -extfile "$DIR/default.cnf" -days 3650 -extensions usr_cert -req -signkey "$DIR/privkey.pem" -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > "$DIR/cert-rsa.der" 35 openssl x509 -in "$DIR/cert-rsa.der" -inform d -noout -startdate -enddate > "$DIR/cert-rsa-dates.txt" 38 openssl x509 -in "$DIR/cert-rsa.der" -inform d -noout -serial > "$DIR/cert-rsa-serial.txt" 40 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions keyUsage_extraLong_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-keyUsage-extraLong.der" 42 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions extendedKeyUsage_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-extendedKeyUsage.der" 44 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions ca_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-ca.der" 46 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions userWithPathLen_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-userWithPathLen.der" 48 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions caWithPathLen_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-caWithPathLen.der" 50 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions alt_other_cert -req -signkey "$DIR/privkey.pem" -outform d > "$DIR/cert-alt-other.der" 52 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch | openssl x509 -extfile "$DIR/default.cnf" -extensions alt_email_cert -req -signkey "$DIR/privkey.pem" -outform d (…) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 1 package org.bouncycastle.x509; 28 import org.bouncycastle.asn1.x509.AlgorithmIdentifier; 29 import org.bouncycastle.asn1.x509.Certificate; 30 import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; 31 import org.bouncycastle.asn1.x509.TBSCertificate; 32 import org.bouncycastle.asn1.x509.Time; 33 import org.bouncycastle.asn1.x509.V3TBSCertificateGenerator; 34 import org.bouncycastle.asn1.x509.X509ExtensionsGenerator; 35 import org.bouncycastle.asn1.x509.X509Name; 38 import org.bouncycastle.x509.extension.X509ExtensionUtil [all...] |
/external/bouncycastle/ |
bouncycastle.config | 20 org/bouncycastle/asn1/x509/qualified \ 21 org/bouncycastle/asn1/x509/sigi \ 48 org/bouncycastle/x509/examples \ 112 org/bouncycastle/asn1/isismtt/x509/AdditionalInformationSyntax.java \ 113 org/bouncycastle/asn1/isismtt/x509/AdmissionSyntax.java \ 114 org/bouncycastle/asn1/isismtt/x509/Admissions.java \ 115 org/bouncycastle/asn1/isismtt/x509/DeclarationOfMajority.java \ 116 org/bouncycastle/asn1/isismtt/x509/MonetaryLimit.java \ 117 org/bouncycastle/asn1/isismtt/x509/NamingAuthority.java \ 118 org/bouncycastle/asn1/isismtt/x509/ProcurationSyntax.java [all...] |
/external/boringssl/src/include/openssl/ |
x509_vfy.h | 59 #include <openssl/x509.h> 60 /* openssl/x509.h ends up #include-ing this file at about the only 124 X509 *x509; member in union:x509_object_st::__anon6733 196 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 197 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ 199 int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ 201 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL * [all...] |
/external/boringssl/src/crypto/x509v3/ |
v3_purp.c | 81 static void x509v3_cache_extensions(X509 *x); 83 static int check_ssl_ca(const X509 *x); 84 static int check_purpose_ssl_client(const X509_PURPOSE *xp, const X509 *x, int ca); 85 static int check_purpose_ssl_server(const X509_PURPOSE *xp, const X509 *x, int ca); 86 static int check_purpose_ns_ssl_server(const X509_PURPOSE *xp, const X509 *x, int ca); 87 static int purpose_smime(const X509 *x, int ca); 88 static int check_purpose_smime_sign(const X509_PURPOSE *xp, const X509 *x, int ca); 89 static int check_purpose_smime_encrypt(const X509_PURPOSE *xp, const X509 *x, int ca); 90 static int check_purpose_crl_sign(const X509_PURPOSE *xp, const X509 *x, int ca); 91 static int check_purpose_timestamp_sign(const X509_PURPOSE *xp, const X509 *x, int ca) [all...] |
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 33 -x509 \ 40 && openssl x509 \ 72 && openssl x509 \
|