/external/boringssl/src/ssl/ |
tls_method.c | 266 static void ssl_noop_x509_clear(CERT *cert) {} 267 static void ssl_noop_x509_free(CERT *cert) {} 268 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} 269 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} 270 static void ssl_noop_x509_flush_cached_chain(CERT *cert) { [all...] |
ssl_cert.c | 135 CERT *ssl_cert_new(const SSL_X509_METHOD *x509_method) { 136 CERT *ret = OPENSSL_malloc(sizeof(CERT)); 141 OPENSSL_memset(ret, 0, sizeof(CERT)); 152 CERT *ssl_cert_dup(CERT *cert) { 153 CERT *ret = OPENSSL_malloc(sizeof(CERT)); 158 OPENSSL_memset(ret, 0, sizeof(CERT)); [all...] |
ssl_x509.c | 208 X509 *cert = sk_X509_value(session->x509_chain, i); local 209 if (!sk_X509_push(session->x509_chain_without_leaf, cert)) { 214 X509_up_ref(cert); 400 /* ssl_cert_set_chain sets elements 1.. of |cert->chain| to the serialised 402 * which case no change to |cert->chain| is made. It preverses the existing 403 * leaf from |cert->chain|, if any. */ 404 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { 407 if (cert->chain != NULL) { 413 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain, 0) [all...] |
internal.h | 1861 struct cert_st \/* CERT *\/ *cert; member in struct:ssl_st [all...] |
ssl_privkey.c | 75 static int ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) { 81 if (cert->chain != NULL && 82 sk_CRYPTO_BUFFER_value(cert->chain, 0) != NULL && 84 !ssl_cert_check_private_key(cert, pkey)) { 88 EVP_PKEY_free(cert->privatekey); 90 cert->privatekey = pkey; 113 ret = ssl_set_pkey(ssl->cert, pkey); 125 return ssl_set_pkey(ssl->cert, pkey); 166 ret = ssl_set_pkey(ctx->cert, pkey) [all...] |
tls13_both.c | 466 CERT *cert = ssl->cert; local 467 CRYPTO_BUFFER *leaf_buf = sk_CRYPTO_BUFFER_value(cert->chain, 0); 477 if (hs->scts_requested && ssl->cert->signed_cert_timestamp_list != NULL) { 483 CRYPTO_BUFFER_data(ssl->cert->signed_cert_timestamp_list), 484 CRYPTO_BUFFER_len(ssl->cert->signed_cert_timestamp_list)) || 492 ssl->cert->ocsp_response != NULL) { 499 CRYPTO_BUFFER_data(ssl->cert->ocsp_response), 500 CRYPTO_BUFFER_len(ssl->cert->ocsp_response)) | [all...] |
ssl_lib.c | 260 ret->cert = ssl_cert_new(method->x509_method); 261 if (ret->cert == NULL) { 339 ssl_cert_free(ctx->cert); 382 ssl->cert = ssl_cert_dup(ctx->cert); 383 if (ssl->cert == NULL) { 480 ssl_cert_free(ssl->cert); [all...] |
t1_lib.c | 3307 CERT *cert = ssl->cert; local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/ |
rdatatype.py | 67 CERT = 37 129 'CERT' : CERT,
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/ |
CERT.py | 52 class CERT(dns.rdata.Rdata): 53 """CERT record 69 super(CERT, self).__init__(rdclass, rdtype)
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509Certificate2Test.java | 18 package tests.security.cert; 20 import org.apache.harmony.security.tests.support.cert.TestUtils; 26 import java.security.cert.CertificateException; 27 import java.security.cert.CertificateFactory; 28 import java.security.cert.CertificateParsingException; 29 import java.security.cert.X509Certificate; 30 import java.security.cert.X509Extension; 100 private static String CERT = 277 MyX509Certificate cert = new MyX509Certificate() { local 285 assertEquals(new X500Principal("CN=Z"), cert.getIssuerX500Principal()) 290 MyX509Certificate cert = new MyX509Certificate() { local 303 X509Certificate cert = generateCert(CERT_CORRECT); local 509 X509Certificate cert = (X509Certificate) cf.generateCertificate(bais); local [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 3 import org.apache.harmony.security.tests.support.cert.MyCertificate; 17 import java.security.cert.Certificate; 18 import java.security.cert.CertificateException; 31 public static final Certificate CERT = new MyCertificate("certtype", 56 aliases.put("certalias", CERT); 83 public String engineGetCertificateAlias(Certificate cert) { 84 if (cert == null) { 89 if (alias.getValue() == cert) { 186 public void engineSetCertificateEntry(String alias, Certificate cert) 190 throw new KeyStoreException("alias is not a cert entry") [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 7 import org.apache.harmony.security.tests.support.cert.MyCertificate; 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateException; 250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT); 258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT); 566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);
|
/build/soong/third_party/zip/ |
reader_test.go | 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF", 739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
|
/prebuilts/go/darwin-x86/src/archive/zip/ |
reader_test.go | 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF", 739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
|
/prebuilts/go/linux-x86/src/archive/zip/ |
reader_test.go | 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF", 739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
|
/prebuilts/tools/common/m2/repository/itext/itext/2.0.8/ |
itext-2.0.8.jar | |