OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:CERT
(Results
1 - 18
of
18
) sorted by null
/external/boringssl/src/ssl/
tls_method.cc
130
static void ssl_noop_x509_clear(
CERT
*
cert
) {}
131
static void ssl_noop_x509_free(
CERT
*
cert
) {}
132
static void ssl_noop_x509_dup(
CERT
*new_cert, const
CERT
*
cert
) {}
133
static void ssl_noop_x509_flush_cached_leaf(
CERT
*
cert
) {}
134
static void ssl_noop_x509_flush_cached_chain(
CERT
*cert) {
[
all
...]
ssl_cert.cc
138
CERT
*ssl_cert_new(const SSL_X509_METHOD *x509_method) {
139
CERT
*ret = (
CERT
*)OPENSSL_malloc(sizeof(
CERT
));
144
OPENSSL_memset(ret, 0, sizeof(
CERT
));
155
CERT
*ssl_cert_dup(
CERT
*
cert
) {
156
CERT
*ret = (
CERT
*)OPENSSL_malloc(sizeof(CERT))
[
all
...]
ssl_x509.cc
203
// ssl_cert_set_chain sets elements 1.. of |
cert
->chain| to the serialised
205
// which case no change to |
cert
->chain| is made. It preverses the existing
206
// leaf from |
cert
->chain|, if any.
207
static int ssl_cert_set_chain(
CERT
*
cert
, STACK_OF(X509) *chain) {
210
if (
cert
->chain != NULL) {
216
CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(
cert
->chain, 0);
241
sk_CRYPTO_BUFFER_pop_free(
cert
->chain, CRYPTO_BUFFER_free);
242
cert
->chain = new_chain.release();
247
static void ssl_crypto_x509_cert_flush_cached_leaf(
CERT
*cert)
557
X509 *
cert
= sk_X509_value(session->x509_chain, i);
local
[
all
...]
internal.h
2022
CERT *
cert
;
member in struct:bssl::SSLContext
2548
CERT *
cert
;
member in struct:bssl::SSLConnection
[
all
...]
ssl_privkey.cc
79
static int ssl_set_pkey(
CERT
*
cert
, EVP_PKEY *pkey) {
85
if (
cert
->chain != NULL &&
86
sk_CRYPTO_BUFFER_value(
cert
->chain, 0) != NULL &&
88
!ssl_cert_check_private_key(
cert
, pkey)) {
92
EVP_PKEY_free(
cert
->privatekey);
94
cert
->privatekey = pkey;
139
return ssl->
cert
->privatekey != NULL || ssl->
cert
->key_method != NULL;
200
if (ssl->
cert
->key_method != NULL)
[
all
...]
tls13_both.cc
370
CERT
*
cert
= ssl->
cert
;
local
371
CRYPTO_BUFFER *leaf_buf = sk_CRYPTO_BUFFER_value(
cert
->chain, 0);
381
if (hs->scts_requested && ssl->
cert
->signed_cert_timestamp_list != NULL) {
387
CRYPTO_BUFFER_data(ssl->
cert
->signed_cert_timestamp_list),
388
CRYPTO_BUFFER_len(ssl->
cert
->signed_cert_timestamp_list)) ||
396
ssl->
cert
->ocsp_response != NULL) {
403
CRYPTO_BUFFER_data(ssl->
cert
->ocsp_response),
404
CRYPTO_BUFFER_len(ssl->
cert
->ocsp_response)) |
[
all
...]
ssl_lib.cc
552
ret->
cert
= ssl_cert_new(method->x509_method);
553
if (ret->
cert
== NULL) {
627
ssl_cert_free(ctx->
cert
);
674
ssl->
cert
= ssl_cert_dup(ctx->
cert
);
675
if (ssl->
cert
== NULL) {
773
ssl_cert_free(ssl->
cert
);
[
all
...]
t1_lib.cc
3458
CERT *
cert
= ssl->
cert
;
local
[
all
...]
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
CarrierKeyDownloadMgrTest.java
67
private static final String
CERT
= "-----BEGIN CERTIFICATE-----\r\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\r\n-----END CERTIFICATE-----";
70
private String mJsonStr = "{ \"carrier-keys\": [ { \"certificate\": \"" +
CERT
+ "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"certificate\": \"" +
CERT
+ "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}";
72
private String mJsonStr1 = "{ \"carrier-keys\": [ { \"public-key\": \"" +
CERT
+ "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"public-key\": \"" +
CERT
+ "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}";
160
ByteArrayInputStream certBytes = new ByteArrayInputStream(
CERT
.getBytes());
184
ByteArrayInputStream certBytes = new ByteArrayInputStream(
CERT
.getBytes());
/system/keymaster/km_openssl/
attestation_utils.cpp
50
inline keymaster_blob_t certBlobifier(const uint8_t (&
cert
)[N], bool* fail){
51
keymaster_blob_t result = { dup_array(
cert
), N };
110
template <typename
CERT
>
111
inline bool certCopier(keymaster_blob_t** out,
CERT
&&
cert
, bool* fail) {
112
*(*out)++ = certBlobifier(std::forward<
CERT
>(
cert
), fail);
120
template <typename
CERT
, typename... CERTS>
121
inline bool certCopyHelper(keymaster_blob_t** out, bool* fail,
CERT
&&
cert
, CERTS&&... certs)
[
all
...]
/libcore/luni/src/test/java/tests/security/cert/
X509Certificate2Test.java
18
package tests.security.
cert
;
20
import org.apache.harmony.security.tests.support.
cert
.TestUtils;
26
import java.security.
cert
.CertificateException;
27
import java.security.
cert
.CertificateFactory;
28
import java.security.
cert
.CertificateParsingException;
29
import java.security.
cert
.X509Certificate;
30
import java.security.
cert
.X509Extension;
100
private static String
CERT
=
277
MyX509Certificate
cert
= new MyX509Certificate() {
local
285
assertEquals(new X500Principal("CN=Z"),
cert
.getIssuerX500Principal())
290
MyX509Certificate
cert
= new MyX509Certificate() {
local
303
X509Certificate
cert
= generateCert(CERT_CORRECT);
local
509
X509Certificate
cert
= (X509Certificate) cf.generateCertificate(bais);
local
[
all
...]
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestKeyStoreSpi.java
3
import org.apache.harmony.security.tests.support.
cert
.MyCertificate;
17
import java.security.
cert
.Certificate;
18
import java.security.
cert
.CertificateException;
31
public static final Certificate
CERT
= new MyCertificate("certtype",
56
aliases.put("certalias",
CERT
);
83
public String engineGetCertificateAlias(Certificate
cert
) {
84
if (
cert
== null) {
89
if (alias.getValue() ==
cert
) {
186
public void engineSetCertificateEntry(String alias, Certificate
cert
)
190
throw new KeyStoreException("alias is not a
cert
entry")
[
all
...]
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore4Test.java
7
import org.apache.harmony.security.tests.support.
cert
.MyCertificate;
25
import java.security.
cert
.Certificate;
26
import java.security.
cert
.CertificateException;
250
String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.
CERT
);
258
uninitialized.getCertificateAlias(TestKeyStoreSpi.
CERT
);
566
assertTrue("entry is not
cert
entry", entry instanceof KeyStore.TrustedCertificateEntry);
/build/make/tools/releasetools/
common.py
894
r'^name="(?P<NAME>.*)"\s+certificate="(?P<
CERT
>.*)"\s+'
901
cert
= matches["
CERT
"]
908
if
cert
in SPECIAL_CERT_STRINGS and not privkey:
909
certmap[name] =
cert
910
elif (
cert
.endswith(OPTIONS.public_key_suffix) and
912
cert
[:-public_key_suffix_len] == privkey[:-private_key_suffix_len]):
913
certmap[name] =
cert
[:-public_key_suffix_len]
[
all
...]
/build/soong/third_party/zip/
reader_test.go
738
"PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/
CERT
.SF",
739
"PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/
CERT
.RSA",
/prebuilts/go/darwin-x86/src/archive/zip/
reader_test.go
927
"PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/
CERT
.SF",
928
"PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/
CERT
.RSA",
/prebuilts/go/linux-x86/src/archive/zip/
reader_test.go
927
"PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xe6\x98?o\x01\x00\x00\x84\x02\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfcH\x02\x00META-INF/
CERT
.SF",
928
"PK\x01\x02\x14\x00\x14\x00\b\b\b\x004\x9d3?\xbfP\x96b\x86\x04\x00\x00\xb2\x06\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa9J\x02\x00META-INF/
CERT
.RSA",
/prebuilts/tools/common/m2/repository/itext/itext/2.0.8/
itext-2.0.8.jar
Completed in 316 milliseconds