/external/conscrypt/common/src/main/java/org/conscrypt/ |
Java7ExtendedSSLSession.java | 19 import java.security.cert.Certificate; 24 import javax.security.cert.X509Certificate; 126 public java.security.cert.X509Certificate[] getPeerCertificates()
|
OpenSSLX509Certificate.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertificateExpiredException; 35 import java.security.cert.CertificateNotYetValidException; 36 import java.security.cert.CertificateParsingException; 37 import java.security.cert.X509Certificate; 189 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 191 if (cert instanceof OpenSSLX509Certificate) { 192 return (OpenSSLX509Certificate) cert; [all...] |
SessionSnapshot.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.X509Certificate; 142 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
Java7ExtendedSSLSession.java | 20 import java.security.cert.Certificate; 25 import javax.security.cert.X509Certificate; 127 public java.security.cert.X509Certificate[] getPeerCertificates()
|
OpenSSLX509Certificate.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.CertificateEncodingException; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateExpiredException; 36 import java.security.cert.CertificateNotYetValidException; 37 import java.security.cert.CertificateParsingException; 38 import java.security.cert.X509Certificate; 193 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 195 if (cert instanceof OpenSSLX509Certificate) { 196 return (OpenSSLX509Certificate) cert; [all...] |
SessionSnapshot.java | 21 import java.security.cert.Certificate; 22 import java.security.cert.X509Certificate; 143 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
|
SSLUtils.java | 47 import java.security.cert.CertificateEncodingException; 48 import java.security.cert.CertificateFactory; 49 import java.security.cert.X509Certificate; 57 import javax.security.cert.CertificateException; 183 throws java.security.cert.CertificateException { 196 } catch (java.security.cert.CertificateException e) { 202 byte[] bytes) throws java.security.cert.CertificateException { 321 * Converts the peer certificates into a cert chain. 323 static javax.security.cert.X509Certificate[] toCertificateChain(X509Certificate[] certificates) 326 javax.security.cert.X509Certificate[] chain [all...] |
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/java/security/ |
TestKeyStore.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 69 import org.bouncycastle.cert.X509CertificateHolder; 70 import org.bouncycastle.cert.X509v3CertificateBuilder; 71 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 72 import org.bouncycastle.cert.ocsp.BasicOCSPResp; 73 import org.bouncycastle.cert.ocsp.BasicOCSPRespBuilder; 74 import org.bouncycastle.cert.ocsp.CertificateID 889 X509Certificate cert = (X509Certificate) c; local 1058 X509Certificate cert = (X509Certificate) src.getCertificate(alias); local 1081 X509Certificate cert = (X509Certificate) src.getCertificate(alias); local [all...] |
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/ |
TestKeyStore.java | 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateException; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 68 import org.bouncycastle.cert.X509CertificateHolder; 69 import org.bouncycastle.cert.X509v3CertificateBuilder; 70 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 71 import org.bouncycastle.cert.ocsp.BasicOCSPResp; 72 import org.bouncycastle.cert.ocsp.BasicOCSPRespBuilder; 73 import org.bouncycastle.cert.ocsp.CertificateID 886 X509Certificate cert = (X509Certificate) c; local 1055 X509Certificate cert = (X509Certificate) src.getCertificate(alias); local 1078 X509Certificate cert = (X509Certificate) src.getCertificate(alias); local [all...] |
/external/libcups/cups/ |
tls-gnutls.c | 35 /* Server cert keychain path */ 73 cups_file_t *fp; /* Key/cert file */ 370 gnutls_x509_crt_t cert; /* Certificate */ local 374 cert = http_gnutls_create_credential((http_credential_t *)cupsArrayFirst(credentials)); 375 if (cert) 377 result = gnutls_x509_crt_check_hostname(cert, common_name) != 0; 385 size_t cserial_size, /* Size of cert serial number */ 395 gnutls_x509_crt_get_serial(cert, cserial, &cserial_size); 411 gnutls_x509_crt_deinit(cert); 431 gnutls_x509_crt_t cert; /* Certificate * local 604 gnutls_x509_crt_t cert; \/* Certificate *\/ local 632 gnutls_x509_crt_t cert; \/* Certificate *\/ local 872 gnutls_x509_crt_t cert; \/* Certificate *\/ local [all...] |
/external/python/cpython2/Lib/test/ |
test_ssl.py | 63 # cert with all kinds of subject alt names 395 """Wrapping with an empty cert file""" 407 def ok(cert, hostname): 408 ssl.match_hostname(cert, hostname) 409 def fail(cert, hostname): 411 ssl.match_hostname, cert, hostname) 413 cert = {'subject': ((('commonName', 'example.com'),),)} 414 ok(cert, 'example.com') 415 ok(cert, 'ExAmple.cOm') 416 fail(cert, 'www.example.com' [all...] |
/external/boringssl/src/crypto/x509/ |
x509_test.cc | 1555 std::string cert = kRootCAPEM; local 1596 const X509 *cert; member in struct:ExpectedInfo [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
CaCertManagementTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 56 * Test: a valid cert should be installable and also removable. 123 * Whether a given cert, or one a lot like it, has been installed system-wide and is available
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
RespData.java | 1 package org.bouncycastle.cert.ocsp;
|
RevokedStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
OCSPResp.java | 1 package org.bouncycastle.cert.ocsp; 14 import org.bouncycastle.cert.CertIOException;
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CTPolicyImpl.java | 19 import java.security.cert.X509Certificate;
|
/external/conscrypt/repackaged/platform/src/main/java/com/android/org/conscrypt/ct/ |
CTPolicyImpl.java | 20 import java.security.cert.X509Certificate;
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CertificatePinning.java | 23 import java.security.cert.Certificate;
|
/external/vboot_reference/tests/ |
gen_test_keys.sh | 33 ${BIN_DIR}/dumpRSAPublicKey -cert ${key_base}.crt \
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 139 X509* cert = NULL; local 144 if (argc != 3 || (strcmp(argv[1], "-cert") && strcmp(argv[1], "-pub"))) { 150 fprintf(stderr, "Usage: %s <-cert | -pub> <file>\n", progname); 154 if (!strcmp(argv[1], "-cert")) 166 if (!PEM_read_X509(fp, &cert, NULL, NULL)) { 172 key = X509_get_pubkey(cert); 192 X509_free(cert);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 217 throw new IllegalArgumentException("can't create cert factory - " + e.toString()); 262 tab.put(e.nextElement(), "cert"); 317 * simply return the cert for the private key 349 Certificate cert) 359 if (tc.equals(cert)) 1139 Certificate cert; local 1422 Certificate cert = engineGetCertificate(name); local 1498 Certificate cert = (Certificate)certs.get(certId); local 1578 Certificate cert = (Certificate)chainCerts.get(certId); local 1721 Certificate cert = engineGetCertificate(alias); local [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateEncodingException; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 221 throw new IllegalArgumentException("can't create cert factory - " + e.toString()); 266 tab.put(e.nextElement(), "cert"); 321 * simply return the cert for the private key 353 Certificate cert) 363 if (tc.equals(cert)) 1143 Certificate cert; local 1426 Certificate cert = engineGetCertificate(name); local 1502 Certificate cert = (Certificate)certs.get(certId); local 1582 Certificate cert = (Certificate)chainCerts.get(certId); local 1725 Certificate cert = engineGetCertificate(alias); local [all...] |
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 37 def CertUsesSha256(cert): 38 """Check if the cert uses SHA-256 hashing algorithm.""" 40 cmd = ['openssl', 'x509', '-text', '-noout', '-in', cert] 53 def VerifyPackage(cert, package): 69 print('Certificate: %s' % (cert,)) 97 use_sha256 = CertUsesSha256(cert) 126 cmd = ['openssl', 'rsautl', '-verify', '-certin', '-inkey', cert, 148 def VerifyAbOtaPayload(cert, package): 160 pubkey_fp.write(common.ExtractPublicKey(cert))
|
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_DummyPKCS12Keystore.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateException;
|