HomeSort by relevance Sort by last modified time
    Searched refs:CERT (Results 1 - 18 of 18) sorted by null

  /external/boringssl/src/ssl/
tls_method.cc 130 static void ssl_noop_x509_clear(CERT *cert) {}
131 static void ssl_noop_x509_free(CERT *cert) {}
132 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {}
133 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {}
134 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {
    [all...]
ssl_cert.cc 138 CERT *ssl_cert_new(const SSL_X509_METHOD *x509_method) {
139 CERT *ret = (CERT *)OPENSSL_malloc(sizeof(CERT));
144 OPENSSL_memset(ret, 0, sizeof(CERT));
155 CERT *ssl_cert_dup(CERT *cert) {
156 CERT *ret = (CERT *)OPENSSL_malloc(sizeof(CERT))
    [all...]
ssl_x509.cc 203 // ssl_cert_set_chain sets elements 1.. of |cert->chain| to the serialised
205 // which case no change to |cert->chain| is made. It preverses the existing
206 // leaf from |cert->chain|, if any.
207 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) {
210 if (cert->chain != NULL) {
216 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain, 0);
241 sk_CRYPTO_BUFFER_pop_free(cert->chain, CRYPTO_BUFFER_free);
242 cert->chain = new_chain.release();
247 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert)
557 X509 *cert = sk_X509_value(session->x509_chain, i); local
    [all...]
internal.h 2022 CERT *cert; member in struct:bssl::SSLContext
2548 CERT *cert; member in struct:bssl::SSLConnection
    [all...]
ssl_privkey.cc 79 static int ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) {
85 if (cert->chain != NULL &&
86 sk_CRYPTO_BUFFER_value(cert->chain, 0) != NULL &&
88 !ssl_cert_check_private_key(cert, pkey)) {
92 EVP_PKEY_free(cert->privatekey);
94 cert->privatekey = pkey;
139 return ssl->cert->privatekey != NULL || ssl->cert->key_method != NULL;
200 if (ssl->cert->key_method != NULL)
    [all...]
tls13_both.cc 370 CERT *cert = ssl->cert; local
371 CRYPTO_BUFFER *leaf_buf = sk_CRYPTO_BUFFER_value(cert->chain, 0);
381 if (hs->scts_requested && ssl->cert->signed_cert_timestamp_list != NULL) {
387 CRYPTO_BUFFER_data(ssl->cert->signed_cert_timestamp_list),
388 CRYPTO_BUFFER_len(ssl->cert->signed_cert_timestamp_list)) ||
396 ssl->cert->ocsp_response != NULL) {
403 CRYPTO_BUFFER_data(ssl->cert->ocsp_response),
404 CRYPTO_BUFFER_len(ssl->cert->ocsp_response)) |
    [all...]
ssl_lib.cc 552 ret->cert = ssl_cert_new(method->x509_method);
553 if (ret->cert == NULL) {
627 ssl_cert_free(ctx->cert);
674 ssl->cert = ssl_cert_dup(ctx->cert);
675 if (ssl->cert == NULL) {
773 ssl_cert_free(ssl->cert);
    [all...]
t1_lib.cc 3458 CERT *cert = ssl->cert; local
    [all...]
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
CarrierKeyDownloadMgrTest.java 67 private static final String CERT = "-----BEGIN CERTIFICATE-----\r\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\r\n-----END CERTIFICATE-----";
70 private String mJsonStr = "{ \"carrier-keys\": [ { \"certificate\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"certificate\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}";
72 private String mJsonStr1 = "{ \"carrier-keys\": [ { \"public-key\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"public-key\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}";
160 ByteArrayInputStream certBytes = new ByteArrayInputStream(CERT.getBytes());
184 ByteArrayInputStream certBytes = new ByteArrayInputStream(CERT.getBytes());
  /system/keymaster/km_openssl/
attestation_utils.cpp 50 inline keymaster_blob_t certBlobifier(const uint8_t (&cert)[N], bool* fail){
51 keymaster_blob_t result = { dup_array(cert), N };
110 template <typename CERT>
111 inline bool certCopier(keymaster_blob_t** out, CERT&& cert, bool* fail) {
112 *(*out)++ = certBlobifier(std::forward<CERT>(cert), fail);
120 template <typename CERT, typename... CERTS>
121 inline bool certCopyHelper(keymaster_blob_t** out, bool* fail, CERT&& cert, CERTS&&... certs)
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
X509Certificate2Test.java 18 package tests.security.cert;
20 import org.apache.harmony.security.tests.support.cert.TestUtils;
26 import java.security.cert.CertificateException;
27 import java.security.cert.CertificateFactory;
28 import java.security.cert.CertificateParsingException;
29 import java.security.cert.X509Certificate;
30 import java.security.cert.X509Extension;
100 private static String CERT =
277 MyX509Certificate cert = new MyX509Certificate() { local
285 assertEquals(new X500Principal("CN=Z"), cert.getIssuerX500Principal())
290 MyX509Certificate cert = new MyX509Certificate() { local
303 X509Certificate cert = generateCert(CERT_CORRECT); local
509 X509Certificate cert = (X509Certificate) cf.generateCertificate(bais); local
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestKeyStoreSpi.java 3 import org.apache.harmony.security.tests.support.cert.MyCertificate;
17 import java.security.cert.Certificate;
18 import java.security.cert.CertificateException;
31 public static final Certificate CERT = new MyCertificate("certtype",
56 aliases.put("certalias", CERT);
83 public String engineGetCertificateAlias(Certificate cert) {
84 if (cert == null) {
89 if (alias.getValue() == cert) {
186 public void engineSetCertificateEntry(String alias, Certificate cert)
190 throw new KeyStoreException("alias is not a cert entry")
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore4Test.java 7 import org.apache.harmony.security.tests.support.cert.MyCertificate;
25 import java.security.cert.Certificate;
26 import java.security.cert.CertificateException;
250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT);
258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT);
566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);
  /build/make/tools/releasetools/
common.py 894 r'^name="(?P<NAME>.*)"\s+certificate="(?P<CERT>.*)"\s+'
901 cert = matches["CERT"]
908 if cert in SPECIAL_CERT_STRINGS and not privkey:
909 certmap[name] = cert
910 elif (cert.endswith(OPTIONS.public_key_suffix) and
912 cert[:-public_key_suffix_len] == privkey[:-private_key_suffix_len]):
913 certmap[name] = cert[:-public_key_suffix_len]
    [all...]
  /build/soong/third_party/zip/
reader_test.go 738 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF",
739 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
  /prebuilts/go/darwin-x86/src/archive/zip/
reader_test.go 927 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF",
928 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
  /prebuilts/go/linux-x86/src/archive/zip/
reader_test.go 927 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/CERT.SF",
928 "PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/CERT.RSA",
  /prebuilts/tools/common/m2/repository/itext/itext/2.0.8/
itext-2.0.8.jar 

Completed in 316 milliseconds