/external/boringssl/src/ssl/ |
tls_method.cc | 229 static void ssl_noop_x509_clear(CERT *cert) {} 230 static void ssl_noop_x509_free(CERT *cert) {} 231 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} 232 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} 233 static void ssl_noop_x509_flush_cached_chain(CERT *cert) { [all...] |
ssl_cert.cc | 134 CERT *ssl_cert_new(const SSL_X509_METHOD *x509_method) { 135 CERT *ret = (CERT *)OPENSSL_malloc(sizeof(CERT)); 140 OPENSSL_memset(ret, 0, sizeof(CERT)); 151 CERT *ssl_cert_dup(CERT *cert) { 152 CERT *ret = (CERT *)OPENSSL_malloc(sizeof(CERT)) [all...] |
ssl_x509.cc | 208 X509 *cert = sk_X509_value(session->x509_chain, i); local 209 if (!sk_X509_push(session->x509_chain_without_leaf, cert)) { 214 X509_up_ref(cert); 400 /* ssl_cert_set_chain sets elements 1.. of |cert->chain| to the serialised 402 * which case no change to |cert->chain| is made. It preverses the existing 403 * leaf from |cert->chain|, if any. */ 404 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { 407 if (cert->chain != NULL) { 413 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain, 0) [all...] |
internal.h | 1975 struct cert_st \/* CERT *\/ *cert; member in struct:ssl_st [all...] |
ssl_privkey.cc | 77 static int ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) { 83 if (cert->chain != NULL && 84 sk_CRYPTO_BUFFER_value(cert->chain, 0) != NULL && 86 !ssl_cert_check_private_key(cert, pkey)) { 90 EVP_PKEY_free(cert->privatekey); 92 cert->privatekey = pkey; 115 ret = ssl_set_pkey(ssl->cert, pkey); 137 return ssl_set_pkey(ssl->cert, pkey); 178 ret = ssl_set_pkey(ctx->cert, pkey) [all...] |
tls13_both.cc | 473 CERT *cert = ssl->cert; local 474 CRYPTO_BUFFER *leaf_buf = sk_CRYPTO_BUFFER_value(cert->chain, 0); 484 if (hs->scts_requested && ssl->cert->signed_cert_timestamp_list != NULL) { 490 CRYPTO_BUFFER_data(ssl->cert->signed_cert_timestamp_list), 491 CRYPTO_BUFFER_len(ssl->cert->signed_cert_timestamp_list)) || 499 ssl->cert->ocsp_response != NULL) { 506 CRYPTO_BUFFER_data(ssl->cert->ocsp_response), 507 CRYPTO_BUFFER_len(ssl->cert->ocsp_response)) | [all...] |
ssl_lib.cc | 259 ret->cert = ssl_cert_new(method->x509_method); 260 if (ret->cert == NULL) { 341 ssl_cert_free(ctx->cert); 386 ssl->cert = ssl_cert_dup(ctx->cert); 387 if (ssl->cert == NULL) { 487 ssl_cert_free(ssl->cert); 848 ctx->cert->enable_early_data = !!enabled; 860 ssl->cert->enable_early_data = !!enabled; [all...] |
t1_lib.cc | 3261 CERT *cert = ssl->cert; local [all...] |
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
CarrierKeyDownloadMgrTest.java | 66 private static final String CERT = "-----BEGIN CERTIFICATE-----\r\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\r\n-----END CERTIFICATE-----"; 69 private String mJsonStr = "{ \"carrier-keys\": [ { \"certificate\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"certificate\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}"; 71 private String mJsonStr1 = "{ \"carrier-keys\": [ { \"public-key\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"public-key\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}"; 155 ByteArrayInputStream certBytes = new ByteArrayInputStream(CERT.getBytes()); 179 ByteArrayInputStream certBytes = new ByteArrayInputStream(CERT.getBytes());
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509Certificate2Test.java | 18 package tests.security.cert; 20 import org.apache.harmony.security.tests.support.cert.TestUtils; 26 import java.security.cert.CertificateException; 27 import java.security.cert.CertificateFactory; 28 import java.security.cert.CertificateParsingException; 29 import java.security.cert.X509Certificate; 30 import java.security.cert.X509Extension; 100 private static String CERT = 277 MyX509Certificate cert = new MyX509Certificate() { local 285 assertEquals(new X500Principal("CN=Z"), cert.getIssuerX500Principal()) 290 MyX509Certificate cert = new MyX509Certificate() { local 303 X509Certificate cert = generateCert(CERT_CORRECT); local 509 X509Certificate cert = (X509Certificate) cf.generateCertificate(bais); local [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 3 import org.apache.harmony.security.tests.support.cert.MyCertificate; 17 import java.security.cert.Certificate; 18 import java.security.cert.CertificateException; 31 public static final Certificate CERT = new MyCertificate("certtype", 56 aliases.put("certalias", CERT); 83 public String engineGetCertificateAlias(Certificate cert) { 84 if (cert == null) { 89 if (alias.getValue() == cert) { 186 public void engineSetCertificateEntry(String alias, Certificate cert) 190 throw new KeyStoreException("alias is not a cert entry") [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 7 import org.apache.harmony.security.tests.support.cert.MyCertificate; 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateException; 250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT); 258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT); 566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);
|
/build/soong/third_party/zip/ |
reader_test.go | 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF", 739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
|
/prebuilts/go/darwin-x86/src/archive/zip/ |
reader_test.go | 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF", 739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
|
/prebuilts/go/linux-x86/src/archive/zip/ |
reader_test.go | 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF", 739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
|
/prebuilts/tools/common/m2/repository/itext/itext/2.0.8/ |
itext-2.0.8.jar | |