/external/conscrypt/common/src/main/java/org/conscrypt/ |
TrustedCertificateIndex.java | 20 import java.security.cert.TrustAnchor; 21 import java.security.cert.X509Certificate; 55 public TrustAnchor index(X509Certificate cert) { 56 TrustAnchor anchor = new TrustAnchor(cert, null); 63 X509Certificate cert = anchor.getTrustedCert(); local 64 if (cert != null) { 65 subject = cert.getSubjectX500Principal(); 77 if (cert != null) { 79 if (cert.equals(entry.getTrustedCert())) { 102 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { [all...] |
ConscryptCertStore.java | 19 import java.security.cert.X509Certificate; 24 * TrustManagerImpl. This is primarily implemented by the cert store on the
|
/external/openssh/regress/ |
cert-hostkey.sh | 1 # $OpenBSD: cert-hostkey.sh,v 1.14 2016/05/02 09:52:00 djm Exp $ 6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_* 17 *cert*) types="$i,$types";; 35 printf "@cert-authority $HOSTS " 53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 54 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert 78 verbose "$tid: sign host ${ktype} cert" 95 $OBJ/cert_host_key_${ktype}-cert.pub || \ 97 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cer [all...] |
/cts/tests/tests/net/src/android/net/http/cts/ |
X509TrustManagerExtensionsTest.java | 22 import java.security.cert.Certificate; 23 import java.security.cert.X509Certificate; 51 for (Certificate cert : tm.getAcceptedIssuers()) { 52 assertFalse(xtm.isUserAddedCertificate((X509Certificate) cert));
|
/external/conscrypt/common/src/main/java/org/conscrypt/ct/ |
CTPolicy.java | 19 import java.security.cert.X509Certificate;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
AndroidTrustRootIndex.java | 20 import java.security.cert.TrustAnchor; 21 import java.security.cert.X509Certificate; 39 @Override public X509Certificate findByIssuerAndSignature(X509Certificate cert) { 42 trustManager, cert);
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/tls/ |
AndroidTrustRootIndex.java | 21 import java.security.cert.TrustAnchor; 22 import java.security.cert.X509Certificate; 41 @Override public X509Certificate findByIssuerAndSignature(X509Certificate cert) { 44 trustManager, cert);
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-cleartext/src/android/security/net/config/cts/ |
CleartextPermittedTest.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate;
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-cleartext-pre-P/src/android/security/net/config/cts/ |
CleartextPermittedTest.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/exception/ |
ExtCertPathBuilderException.java | 3 import java.security.cert.CertPath; 4 import java.security.cert.CertPathBuilderException;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertStoreCollectionSpi.java | 4 import java.security.cert.CRL; 5 import java.security.cert.CRLSelector; 6 import java.security.cert.CertSelector; 7 import java.security.cert.CertStoreException; 8 import java.security.cert.CertStoreParameters; 9 import java.security.cert.CertStoreSpi; 10 import java.security.cert.Certificate; 11 import java.security.cert.CollectionCertStoreParameters;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
PKIXAttrCertChecker.java | 3 import java.security.cert.CertPath; 4 import java.security.cert.CertPathValidatorException;
|
X509V2AttributeCertificate.java | 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateExpiredException; 15 import java.security.cert.CertificateNotYetValidException; 37 * @deprecated use org.bouncycastle.cert.X509AttributeCertificateHolder 42 private AttributeCertificate cert; field in class:X509V2AttributeCertificate 78 AttributeCertificate cert) 81 this.cert = cert; 85 this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); 86 this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate() [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/provider/ |
CertStoreCollectionSpi.java | 5 import java.security.cert.CRL; 6 import java.security.cert.CRLSelector; 7 import java.security.cert.CertSelector; 8 import java.security.cert.CertStoreException; 9 import java.security.cert.CertStoreParameters; 10 import java.security.cert.CertStoreSpi; 11 import java.security.cert.Certificate; 12 import java.security.cert.CollectionCertStoreParameters;
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/x509/ |
PKIXAttrCertChecker.java | 4 import java.security.cert.CertPath; 5 import java.security.cert.CertPathValidatorException;
|
X509V2AttributeCertificate.java | 14 import java.security.cert.CertificateException; 15 import java.security.cert.CertificateExpiredException; 16 import java.security.cert.CertificateNotYetValidException; 38 * @deprecated use org.bouncycastle.cert.X509AttributeCertificateHolder 44 private AttributeCertificate cert; field in class:X509V2AttributeCertificate 80 AttributeCertificate cert) 83 this.cert = cert; 87 this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); 88 this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate() [all...] |
/external/nist-sip/java/gov/nist/javax/sip/ |
ClientTransactionExt.java | 3 import java.security.cert.Certificate; 4 import java.security.cert.X509Certificate;
|
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/ |
fip_create.sh | 26 --fwu-cert FILENAME Non-Trusted Firmware Updater certificate 34 --rot-cert FILENAME Root Of Trust key certificate 35 --trusted-key-cert FILENAME Trusted key certificate 36 --scp-fw-key-cert FILENAME SCP Firmware key certificate 37 --soc-fw-key-cert FILENAME SoC Firmware key certificate 38 --tos-fw-key-cert FILENAME Trusted OS Firmware key certificate 39 --nt-fw-key-cert FILENAME Non-Trusted Firmware key certificate 40 --tb-fw-cert FILENAME Trusted Boot Firmware BL2 certificate 41 --scp-fw-cert FILENAME SCP Firmware content certificate 42 --soc-fw-cert FILENAME SoC Firmware content certificat [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
JcaCertStore.java | 1 package org.bouncycastle.cert.jcajce; 4 import java.security.cert.CertificateEncodingException; 5 import java.security.cert.X509Certificate; 11 import org.bouncycastle.cert.X509CertificateHolder; 45 X509Certificate cert = (X509Certificate)o; local 49 list.add(new X509CertificateHolder(cert.getEncoded()));
|
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/javax/net/ssl/ |
TestHostnameVerifier.java | 4 import java.security.cert.CertificateParsingException; 5 import java.security.cert.X509Certificate; 28 private boolean verify(String hostname, X509Certificate cert) { 29 for (String certHost : getHostnames(cert)) { 39 private List<String> getHostnames(X509Certificate cert) { 42 Collection<List<?>> altNamePairs = cert.getSubjectAlternativeNames();
|
/external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/ |
TestHostnameVerifier.java | 3 import java.security.cert.CertificateParsingException; 4 import java.security.cert.X509Certificate; 26 private boolean verify(String hostname, X509Certificate cert) { 27 for (String certHost : getHostnames(cert)) { 37 private List<String> getHostnames(X509Certificate cert) { 40 Collection<List<?>> altNamePairs = cert.getSubjectAlternativeNames();
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) 47 if (cert == NULL) 49 if (cert->next) { 52 cert, cert->next); 54 x509_free_name(&cert->issuer); 55 x509_free_name(&cert->subject); 56 os_free(cert->public_key); 57 os_free(cert->sign_value) 1624 struct x509_certificate *cert; local 2030 struct x509_certificate *cert, *trust; local 2159 struct x509_certificate *cert; local [all...] |
/device/linaro/bootloader/arm-trusted-firmware/make_helpers/tbbr/ |
tbbr_tools.mk | 46 $(eval $(call FIP_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert)) 47 $(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_KEY_CERT},--trusted-key-cert)) 50 $(eval $(call FWU_FIP_ADD_PAYLOAD,${FWU_CERT},--fwu-cert)) 51 $(eval $(call FWU_CERT_ADD_CMD_OPT,${FWU_CERT},--fwu-cert)) 62 # Add the BL2 CoT (image cert + image) 65 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert)) 66 $(eval $(call FIP_ADD_PAYLOAD,${BUILD_PLAT}/tb_fw.crt,--tb-fw-cert)) 68 # Add the SCP_BL2 CoT (key cert + img cert + image) 72 $(eval $(call CERT_ADD_CMD_OPT,${BUILD_PLAT}/scp_fw_content.crt,--scp-fw-cert)) [all...] |
/external/epid-sdk/epid/common/1.1/src/ |
file_parser.c | 39 EpidCaCertificate const* cert, void* rl, 51 if (!buf || !cert || !rl_len) return kEpidBadArgErr; 93 result = EpidVerifyCaCertificate(cert); 106 (EcdsaPublicKey*)&cert->pubkey, signature); 128 EpidCaCertificate const* cert, 133 if (!buf || !cert || !pubkey) { 153 result = EpidVerifyCaCertificate(cert); 159 (EcdsaPublicKey*)&cert->pubkey, &buf_pubkey->signature); 172 EpidCaCertificate const* cert, 174 return Epid11ParseRlFile(buf, len, cert, rl, rl_len, kPrivRlFile) [all...] |