HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 351 - 375 of 709) sorted by null

<<11121314151617181920>>

  /external/webrtc/webrtc/base/
openssladapter.cc 875 X509* cert = X509_STORE_CTX_get_current_cert(store); local
880 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data));
882 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data));
898 void* cert = local
900 if (custom_verify_callback_(cert)) {
909 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
917 // Add the root cert that we care about to the SSL context
922 X509* cert = d2i_X509(NULL, &cert_buffer, local
924 if (cert) {
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 19 import java.security.cert.Certificate;
20 import java.security.cert.CertificateEncodingException;
21 import java.security.cert.CertificateException;
22 import java.security.cert.CertificateFactory;
345 Certificate cert,
351 byte[] cEnc = cert.getEncoded();
353 dOut.writeUTF(cert.getType());
547 Certificate cert)
558 if (c.equals(cert))
567 if (chain != null && chain[0].equals(cert))
721 Certificate cert = decodeCertificate(dIn); local
    [all...]
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 20 import java.security.cert.Certificate;
21 import java.security.cert.CertificateEncodingException;
22 import java.security.cert.CertificateException;
23 import java.security.cert.CertificateFactory;
349 Certificate cert,
355 byte[] cEnc = cert.getEncoded();
357 dOut.writeUTF(cert.getType());
551 Certificate cert)
562 if (c.equals(cert))
571 if (chain != null && chain[0].equals(cert))
725 Certificate cert = decodeCertificate(dIn); local
    [all...]
  /external/curl/docs/examples/
curlx.c 163 static unsigned char *my_get_ext(X509 *cert, const int type,
168 accessinfo = X509_get_ext_d2i(cert, extensiontype, NULL, NULL);
199 if(ok && ctx->cert) {
202 X509_print_ex(p->errorbio, ctx->cert, 0, 0);
204 accessinfo = my_get_ext(ctx->cert, p->accesstype, NID_sinfo_access);
211 else if(accessinfo = my_get_ext(ctx->cert, p->accesstype,
461 BIO_printf(p.errorbio, "no service URL in user cert "
  /external/libcups/cups/
tls-sspi.c 47 # define SECURITY_FLAG_IGNORE_CERT_DATE_INVALID 0x00002000 /* Expired X509 Cert. */
72 static DWORD http_sspi_verify(PCCERT_CONTEXT cert, const char *common_name, DWORD dwCertFlags);
186 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local
191 if (cert)
193 if (CertNameToStr(X509_ASN_ENCODING, &(cert->pCertInfo->Subject), CERT_SIMPLE_NAME_STR, cert_name, sizeof(cert_name)))
206 CertFreeCertificateContext(cert);
251 PCCERT_CONTEXT cert = NULL; /* Certificate to validate */ local
252 DWORD certFlags = 0; /* Cert verification flags */
259 cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials));
260 if (!cert)
295 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local
335 PCCERT_CONTEXT cert; \/* Certificate *\/ local
    [all...]
tls-darwin.c 47 /* Server cert keychain */
50 /* Temporary self-signed cert */
53 /* Server cert keychain path */
99 SecCertificateRef cert = NULL; /* Self-signed certificate */ local
119 DEBUG_puts("1cupsMakeServerCredentials: Using existing self-signed cert.");
177 cert = SecGenerateSelfSignedCertificate(subject, certParams, publicKey, privateKey);
182 if (!cert)
188 ident = SecIdentityCreate(kCFAllocatorDefault, cert, privateKey);
221 DEBUG_puts("1cupsMakeServerCredentials: Unable to create identity from cert and keys.");
235 if (cert)
872 SecCertificateRef cert = NULL; \/* Certificate *\/ local
989 SecCertificateRef cert = NULL; \/* Certificate *\/ local
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/
RealConnection.java 48 import java.security.cert.Certificate;
49 import java.security.cert.X509Certificate;
197 X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); local
199 + "\n certificate: " + CertificatePinner.pin(cert)
200 + "\n DN: " + cert.getSubjectDN().getName()
201 + "\n subjectAltNames: " + OkHostnameVerifier.allSubjectAltNames(cert));
  /external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/io/
RealConnection.java 49 import java.security.cert.Certificate;
50 import java.security.cert.X509Certificate;
201 X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); local
203 + "\n certificate: " + CertificatePinner.pin(cert)
204 + "\n DN: " + cert.getSubjectDN().getName()
205 + "\n subjectAltNames: " + OkHostnameVerifier.allSubjectAltNames(cert));
  /external/openssh/
authfile.c 431 if (asprintf(&file, "%s-cert.pub", filename) == -1)
456 struct sshkey *key = NULL, *cert = NULL; local
477 (r = sshkey_load_cert(filename, &cert)) != 0)
481 if (sshkey_equal_public(key, cert) == 0) {
487 (r = sshkey_cert_copy(cert, key)) != 0)
496 sshkey_free(cert);
548 sshkey_compare(key->cert->signature_key, pub))) {
  /external/openssh/regress/
cert-file.sh 1 # $OpenBSD: cert-file.sh,v 1.5 2017/03/11 23:44:16 djm Exp $
32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub
36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
58 # Key with no .pub should work - finding the equivalent *-cert.pub.
59 verbose "protocol $p: identity cert with no plain public file"
67 -oCertificateFile=$OBJ/user_key3-cert.pub \
79 # Keys with untrusted cert should fail.
80 verbose "protocol $p: untrusted cert"
85 fail "ssh succeeded with bad cert in protocol $p
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 165 struct x509_certificate *cert; local
174 cert = x509_certificate_parse(buf, len);
175 if (cert == NULL) {
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
194 x509_certificate_free(cert);
  /external/scapy/scapy/layers/tls/
cert.py 14 of a Cert instance after its serial has been modified (for example).
18 'cert' and then resign it with whatever 'key':
19 f = open('cert.der')
57 # loading huge file when importing a cert
243 def verifyCert(self, cert):
244 """ Verifies either a Cert or an X509_Cert. """
245 tbsCert = cert.tbsCertificate
248 sigVal = raw(cert.signatureValue)
429 def resignCert(self, cert):
430 """ Rewrite the signature of either a Cert or an X509_Cert. ""
    [all...]
  /external/boringssl/src/ssl/test/runner/
key_agreement.go 42 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, version uint16) (*serverKeyExchangeMsg, error) {
68 sigAlg, err = selectSignatureAlgorithm(ka.version, cert.PrivateKey, config, clientHello.signatureAlgorithms)
74 sig, err := signMessage(ka.version, cert.PrivateKey, config, sigAlg, serverRSAParams)
99 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
119 key := cert.PrivateKey.(*rsa.PrivateKey)
174 func (ka *rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
199 padded := make([]byte, rsaSize(cert.PublicKey.(*rsa.PublicKey)))
216 encrypted, err := rsaRawEncrypt(cert.PublicKey.(*rsa.PublicKey), padded)
459 signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error)
467 func (ka *nilKeyAgreementAuthentication) signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchan (…)
    [all...]
  /build/soong/java/
app.go 152 cert := android.SrcIsModule(a.getCertString(ctx))
153 if cert != "" {
154 ctx.AddDependency(ctx.Module(), certificateTag, cert)
157 for _, cert := range a.appProperties.Additional_certificates {
158 cert = android.SrcIsModule(cert)
159 if cert != "" {
160 ctx.AddDependency(ctx.Module(), certificateTag, cert)
312 cert := a.getCertString(ctx)
313 certModule := android.SrcIsModule(cert)
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/AuthBoundKeyApp/
Android.mk 32 # sign this app with a different cert than CtsUsePermissionDiffCert
  /cts/hostsidetests/appsecurity/test-apps/DuplicatePermissionDeclareApp/
Android.mk 28 # Use the same cert as the app that also defined the permission
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/
Android.mk 34 # sign this app with a different cert than CtsPermissionDeclareApp
  /cts/hostsidetests/atrace/AtraceTestApp/
Android.mk 30 # sign this app with a different cert than CtsSimpleAppInstallDiffCert
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/
BasicOCSPResp.java 1 package org.bouncycastle.cert.ocsp;
19 import org.bouncycastle.cert.X509CertificateHolder;
CertificateID.java 1 package org.bouncycastle.cert.ocsp;
16 import org.bouncycastle.cert.X509CertificateHolder;
OCSPReqBuilder.java 1 package org.bouncycastle.cert.ocsp;
20 import org.bouncycastle.cert.X509CertificateHolder;
179 * @throws org.bouncycastle.cert.ocsp.OCSPException
  /external/conscrypt/android-stub/src/main/java/com/android/org/conscrypt/
OpenSSLSocketImpl.java 26 import java.security.cert.CertificateEncodingException;
27 import java.security.cert.CertificateException;
  /external/conscrypt/android-stub/src/main/java/org/apache/harmony/xnet/provider/jsse/
OpenSSLSocketImpl.java 26 import java.security.cert.CertificateEncodingException;
27 import java.security.cert.CertificateException;
  /external/conscrypt/common/src/test/java/org/conscrypt/
CertPinManagerTest.java 25 import java.security.cert.CertificateException;
26 import java.security.cert.X509Certificate;
  /external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/
ConscryptJava7Suite.java 40 import org.conscrypt.java.security.cert.CertificateFactoryTest;
41 import org.conscrypt.java.security.cert.X509CertificateTest;

Completed in 749 milliseconds

<<11121314151617181920>>