/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 163 #include <openssl/x509.h> 1120 if (sc->peer_pkeys[i].x509 != NULL) 1121 X509_free(sc->peer_pkeys[i].x509); 1122 sc->peer_pkeys[i].x509 = X509_up_ref(x); 1309 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1363 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1446 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1448 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_ECC].x509); 1987 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 2358 if (!s->cert || !s->cert->key->x509 || ! 2373 X509 *x509=NULL; local [all...] |
H A D | ssl_locl.h | 426 X509 *x509; member in struct:cert_pkey_st
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | constants.py | 13 x509 = 0 variable in class:CertificateType
|
/external/openssl/apps/ |
H A D | req.c | 78 #include <openssl/x509.h> 123 * -x509 - output a self signed X509 structure instead. 162 int ex=1,x509=0,days=30; local 352 else if (strcmp(*argv,"-x509") == 0) 353 x509=1; 439 BIO_printf(bio_err," -x509 output a x509 structure instead of a cert. req.\n"); 440 BIO_printf(bio_err," -days number of days a certificate generated by -x509 is valid for.\n"); 441 BIO_printf(bio_err," -set_serial serial number to use for a certificate generated by -x509.\n"); 799 if (newreq || x509) [all...] |
H A D | ca.c | 72 #include <openssl/x509.h> 199 static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509, 206 static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509, 214 static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509, 222 static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, 229 static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval); 302 X509 *x509=NULL, *x509p = NULL; local 781 x509=load_cert(bio_err, certfile, FORMAT_PEM, NULL, e, 783 if (x509 == NULL) 786 if (!X509_check_private_key(x509,pke 1574 certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 1647 certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, ENGINE *e) argument 1702 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, int verbose, X509_REQ *req, char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 2268 certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy) argument 2413 do_revoke(X509 *x509, CA_DB *db, int type, char *value) argument [all...] |
/external/openssl/ssl/ |
H A D | s3_clnt.c | 1317 if (sc->peer_pkeys[i].x509 != NULL) 1318 X509_free(sc->peer_pkeys[i].x509); 1319 sc->peer_pkeys[i].x509=x; 1619 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1626 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_DSA_SIGN].x509); 1689 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1782 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1789 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_DSA_SIGN].x509); 1897 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1901 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_ECC].x509); 3393 X509 *x509=NULL; local [all...] |
H A D | ssl_locl.h | 484 X509 *x509; member in struct:cert_pkey_st
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_vfy.c | 66 #include <openssl/x509.h> 2247 int X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, argument 2253 ctx->cert=x509;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | x509_vfy.h | 1 /* crypto/x509/x509_vfy.h */ 60 #include <openssl/x509.h> 61 /* openssl/x509.h ends up #include-ing this file at about the only 124 X509 *x509; member in union:x509_object_st::__anon11676 455 X509 *x509, STACK_OF(X509) *chain);
|
H A D | x509.h | 1 /* crypto/x509/x509.h */ 467 X509 *x509; member in struct:X509_info_st 482 * Pat Richard <patr@x509.com> and are used to manipulate 645 OPENSSL_EXPORT X509 *d2i_X509_fp(FILE *fp, X509 **x509); 646 OPENSSL_EXPORT int i2d_X509_fp(FILE *fp,X509 *x509); 680 OPENSSL_EXPORT X509 *d2i_X509_bio(BIO *bp,X509 **x509); 681 OPENSSL_EXPORT int i2d_X509_bio(BIO *bp,X509 *x509); 714 OPENSSL_EXPORT X509 *X509_dup(X509 *x509); 920 OPENSSL_EXPORT int X509_REQ_check_private_key(X509_REQ *x509,EVP_PKE [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | crypto_openssl.c | 53 #include <openssl/x509.h> 269 * The following are derived from code in crypto/x509/x509_cmp.c 463 X509 *x509 = NULL; local 493 if (info->x509) { 494 X509_STORE_add_cert(cert_ctx, info->x509); 524 x509 = mem2x509(cert); 525 if (x509 == NULL) 531 X509_STORE_CTX_init(csc, cert_ctx, x509, NULL); 550 if (x509 != NULL) 551 X509_free(x509); 647 X509 *x509 = NULL; local 694 X509 *x509 = NULL; local 796 X509 *x509 = NULL; local 847 X509 *x509; local 889 X509 *x509; local 949 X509 *x509; local 1064 X509 *x509 = NULL; local [all...] |
/external/openssl/crypto/store/ |
H A D | store.h | 72 #include <openssl/x509.h> 221 } x509; member in union:STORE_OBJECT_st::__anon28359
|
/external/openssl/crypto/x509/ |
H A D | x509_vfy.c | 1 /* crypto/x509/x509_vfy.c */ 69 #include <openssl/x509.h> 2006 int X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, argument 2012 ctx->cert=x509;
|
H A D | x509_vfy.h | 1 /* crypto/x509/x509_vfy.h */ 60 #include <openssl/x509.h> 61 /* openssl/x509.h ends up #include-ing this file at about the only 129 X509 *x509; member in union:x509_object_st::__anon28369 431 X509 *x509, STACK_OF(X509) *chain);
|
H A D | x509.h | 1 /* crypto/x509/x509.h */ 513 X509 *x509; member in struct:X509_info_st 528 * Pat Richard <patr@x509.com> and are used to manipulate 684 X509 *d2i_X509_fp(FILE *fp, X509 **x509); 685 int i2d_X509_fp(FILE *fp,X509 *x509); 723 X509 *d2i_X509_bio(BIO *bp,X509 **x509); 724 int i2d_X509_bio(BIO *bp,X509 *x509); 761 X509 *X509_dup(X509 *x509); 961 int X509_REQ_check_private_key(X509_REQ *x509,EVP_PKE [all...] |
/external/openssl/include/openssl/ |
H A D | x509_vfy.h | 1 /* crypto/x509/x509_vfy.h */ 60 #include <openssl/x509.h> 61 /* openssl/x509.h ends up #include-ing this file at about the only 129 X509 *x509; member in union:x509_object_st::__anon28402 431 X509 *x509, STACK_OF(X509) *chain);
|
H A D | x509.h | 1 /* crypto/x509/x509.h */ 513 X509 *x509; member in struct:X509_info_st 528 * Pat Richard <patr@x509.com> and are used to manipulate 684 X509 *d2i_X509_fp(FILE *fp, X509 **x509); 685 int i2d_X509_fp(FILE *fp,X509 *x509); 723 X509 *d2i_X509_bio(BIO *bp,X509 **x509); 724 int i2d_X509_bio(BIO *bp,X509 *x509); 761 X509 *X509_dup(X509 *x509); 961 int X509_REQ_check_private_key(X509_REQ *x509,EVP_PKE [all...] |
/external/qemu/ui/ |
H A D | vnc-android.c | 138 return "vencrypt+x509+none"; 140 return "vencrypt+x509+vnc"; 142 return "vencrypt+x509+plain"; 146 return "vencrypt+x509+sasl"; 174 monitor_printf(mon, " x509 dname: %s\n", client->tls.dname); 176 monitor_printf(mon, " x509 dname: none\n"); 2194 int tls = 0, x509 = 0; local 2227 } else if (strncmp(options, "x509", 4) == 0) { 2229 x509 = 1; /* Require x509 certificate [all...] |
H A D | vnc.c | 130 return "vencrypt+x509+none"; 132 return "vencrypt+x509+vnc"; 134 return "vencrypt+x509+plain"; 138 return "vencrypt+x509+sasl"; 166 monitor_printf(mon, " x509 dname: %s\n", client->tls.dname); 168 monitor_printf(mon, " x509 dname: none\n"); 2190 int tls = 0, x509 = 0; local 2223 } else if (strncmp(options, "x509", 4) == 0) { 2225 x509 = 1; /* Require x509 certificate [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1667 if (info->x509) { 1669 info->x509); 1864 X509 *x509 = NULL; local 1867 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); 1870 if (x509) { 1871 if (SSL_use_certificate(conn->ssl, x509) == 1) 1873 X509_free(x509);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1667 if (info->x509) { 1669 info->x509); 1864 X509 *x509 = NULL; local 1867 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); 1870 if (x509) { 1871 if (SSL_use_certificate(conn->ssl, x509) == 1) 1873 X509_free(x509);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1667 if (info->x509) { 1669 info->x509); 1864 X509 *x509 = NULL; local 1867 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); 1870 if (x509) { 1871 if (SSL_use_certificate(conn->ssl, x509) == 1) 1873 X509_free(x509);
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 1000 static X509* X509_dup_nocopy(X509* x509) { argument 1001 if (x509 == NULL) { 1004 CRYPTO_add(&x509->references, 1, CRYPTO_LOCK_X509); 1005 return x509; 4901 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 4902 JNI_TRACE("get_X509_GENERAL_NAME_stack(%p, %d)", x509, type); 4904 if (x509 == NULL) { 4905 jniThrowNullPointerException(env, "x509 == null"); 4906 JNI_TRACE("get_X509_GENERAL_NAME_stack(%p, %d) => x509 == null", x509, typ 4992 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5007 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5022 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5065 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5077 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5102 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5108 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5132 get_X509_signature(X509 *x509, ASN1_BIT_STRING** signature) argument 5173 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5186 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5697 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 5703 X509* x509 = reinterpret_cast<X509*>(static_cast<uintptr_t>(x509Ref)); local 8565 X509* x509 = SSL_get_peer_certificate(ssl); local [all...] |
/external/robolectric/lib/main/ |
H A D | httpclient-4.0.3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ... |
/external/chromium_org/third_party/libaddressinput/src/java/testlibs/ |
H A D | httpclient-4.1.1.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/impl/ ... |