/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
JcaX509CertificateHolder.java | 1 package org.bouncycastle.cert.jcajce; 3 import java.security.cert.CertificateEncodingException; 4 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.X509CertificateHolder; 18 * @param cert certificate to be used a the source for the holder creation. 21 public JcaX509CertificateHolder(X509Certificate cert) 24 super(Certificate.getInstance(cert.getEncoded()));
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
TrustRootIndex.java | 18 import java.security.cert.X509Certificate; 21 /** Returns the trusted CA certificate that signed {@code cert}. */ 22 X509Certificate findByIssuerAndSignature(X509Certificate cert);
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/tls/ |
TrustRootIndex.java | 19 import java.security.cert.X509Certificate; 25 /** Returns the trusted CA certificate that signed {@code cert}. */ 26 X509Certificate findByIssuerAndSignature(X509Certificate cert);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
CertificateStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
UnknownStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
/external/epid-sdk/epid/common/src/ |
file_parser-internal.h | 34 ones in cert. Also verifies that certificate contains correct file header. 36 \param[in] cert 45 EpidStatus EpidVerifyCaCertificate(EpidCaCertificate const* cert);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/jcajce/ |
JcaCertificateID.java | 1 package org.bouncycastle.cert.ocsp.jcajce; 4 import java.security.cert.CertificateEncodingException; 5 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 8 import org.bouncycastle.cert.ocsp.CertificateID; 9 import org.bouncycastle.cert.ocsp.OCSPException;
|
JcaBasicOCSPRespBuilder.java | 1 package org.bouncycastle.cert.ocsp.jcajce; 6 import org.bouncycastle.cert.ocsp.BasicOCSPRespBuilder; 7 import org.bouncycastle.cert.ocsp.OCSPException;
|
/external/curl/docs/cmdline-opts/ |
proxy-cert.d | 1 Long: proxy-cert 2 Arg: <cert[:passwd]> 6 Same as --cert but used in HTTPS proxy context.
|
proxy-cert-type.d | 1 Long: proxy-cert-type 6 Same as --cert-type but used in HTTPS proxy context.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PrincipalUtils.java | 3 import java.security.cert.TrustAnchor; 4 import java.security.cert.X509CRL; 5 import java.security.cert.X509CRLEntry; 6 import java.security.cert.X509Certificate; 15 static X500Name getSubjectPrincipal(X509Certificate cert) 17 return X500Name.getInstance(cert.getSubjectX500Principal().getEncoded()); 25 static X500Name getIssuerPrincipal(X509Certificate cert) 27 return X500Name.getInstance(cert.getIssuerX500Principal().getEncoded()); 38 * @param cert The attribute certificate or certificate. 42 Object cert) [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/provider/ |
PrincipalUtils.java | 4 import java.security.cert.TrustAnchor; 5 import java.security.cert.X509CRL; 6 import java.security.cert.X509CRLEntry; 7 import java.security.cert.X509Certificate; 16 static X500Name getSubjectPrincipal(X509Certificate cert) 18 return X500Name.getInstance(cert.getSubjectX500Principal().getEncoded()); 26 static X500Name getIssuerPrincipal(X509Certificate cert) 28 return X500Name.getInstance(cert.getIssuerX500Principal().getEncoded()); 39 * @param cert The attribute certificate or certificate. 43 Object cert) [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate; 49 for (X509Certificate cert : chain) { 51 checkCert(cert); 54 + cert.getSubjectX500Principal(), e); 60 for (X509Certificate cert : chain) { 62 checkCert(cert); 65 + cert.getSubjectX500Principal(), e); 70 public static final void checkCert(X509Certificate cert) throws CertificateException { 71 checkKeyLength(cert); [all...] |
CertPinManager.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate;
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
ChainStrengthAnalyzer.java | 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate; 51 for (X509Certificate cert : chain) { 53 checkCert(cert); 56 + cert.getSubjectX500Principal(), e); 62 for (X509Certificate cert : chain) { 64 checkCert(cert); 67 + cert.getSubjectX500Principal(), e); 72 public static final void checkCert(X509Certificate cert) throws CertificateException { 73 checkKeyLength(cert); [all...] |
CertPinManager.java | 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate;
|
/external/ipsec-tools/src/racoon/ |
dnssec.c | 62 cert_t *cert = NULL; local 105 "not supported multiple CERT RR.\n"); 114 "not supported CERT RR type %d.\n", res->ci_type); 118 /* create cert holder */ 119 cert = oakley_newcert(); 120 if (cert == NULL) { 122 "failed to get cert buffer.\n"); 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 128 "failed to get cert buffer.\n") [all...] |
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-2109/ |
poc.c | 29 X509 *cert; variable 37 cert = d2i_X509_bio(in, NULL); // x509 should be present on all Android systems 39 if(cert != NULL){ 40 X509_free(cert);
|
/external/epid-sdk/epid/common/1.1/ |
file_parser.h | 60 \param[in] cert 77 EpidCaCertificate const* cert, 102 \param[in] cert 122 EpidCaCertificate const* cert, 148 \param[in] cert 168 EpidCaCertificate const* cert, Epid11SigRl* rl, 193 \param[in] cert 213 EpidCaCertificate const* cert,
|
/cts/tools/utils/ |
certificates.py | 22 cert = None variable in class:Certificate 24 def __init__(self, cert, key): 25 self.cert = cert 29 return crypto.dump_certificate(crypto.FILETYPE_PEM, self.cert) 47 cert = crypto.load_certificate(crypto.FILETYPE_PEM, data) 49 return Certificate(cert, key) 59 cert = crypto.X509() 60 cert.set_pubkey(key) 61 cert.set_version(2 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
PrincipalUtil.java | 4 import java.security.cert.CRLException; 5 import java.security.cert.CertificateEncodingException; 6 import java.security.cert.X509CRL; 7 import java.security.cert.X509Certificate; 24 * return the issuer of the given cert as an X509PrincipalObject. 27 X509Certificate cert) 33 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); 44 * return the subject of the given cert as an X509PrincipalObject. 47 X509Certificate cert) 53 ASN1Primitive.fromByteArray(cert.getTBSCertificate())) [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/ |
PrincipalUtil.java | 5 import java.security.cert.CRLException; 6 import java.security.cert.CertificateEncodingException; 7 import java.security.cert.X509CRL; 8 import java.security.cert.X509Certificate; 26 * return the issuer of the given cert as an X509PrincipalObject. 29 X509Certificate cert) 35 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); 46 * return the subject of the given cert as an X509PrincipalObject. 49 X509Certificate cert) 55 ASN1Primitive.fromByteArray(cert.getTBSCertificate())) [all...] |
/external/conscrypt/android-stub/src/main/java/com/android/org/conscrypt/ |
NativeCrypto.java | 19 import java.security.cert.CertificateEncodingException; 20 import java.security.cert.CertificateException;
|
/external/conscrypt/android-stub/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
NativeCrypto.java | 19 import java.security.cert.CertificateEncodingException; 20 import java.security.cert.CertificateException;
|
/build/make/tools/signapk/test/ |
run | 25 cert := out/key1.pem macro 26 out/signed-$(package): $(package) $(cert) 30 -key $(cert).pk -cert $(cert) -tempdir out
|