/external/webrtc/webrtc/base/ |
openssladapter.cc | 875 X509* cert = X509_STORE_CTX_get_current_cert(store); local 880 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 882 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 898 void* cert = local 900 if (custom_verify_callback_(cert)) { 909 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain"; 917 // Add the root cert that we care about to the SSL context 922 X509* cert = d2i_X509(NULL, &cert_buffer, local 924 if (cert) { [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 19 import java.security.cert.Certificate; 20 import java.security.cert.CertificateEncodingException; 21 import java.security.cert.CertificateException; 22 import java.security.cert.CertificateFactory; 345 Certificate cert, 351 byte[] cEnc = cert.getEncoded(); 353 dOut.writeUTF(cert.getType()); 547 Certificate cert) 558 if (c.equals(cert)) 567 if (chain != null && chain[0].equals(cert)) 721 Certificate cert = decodeCertificate(dIn); local [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.CertificateEncodingException; 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 349 Certificate cert, 355 byte[] cEnc = cert.getEncoded(); 357 dOut.writeUTF(cert.getType()); 551 Certificate cert) 562 if (c.equals(cert)) 571 if (chain != null && chain[0].equals(cert)) 725 Certificate cert = decodeCertificate(dIn); local [all...] |
/external/curl/docs/examples/ |
curlx.c | 163 static unsigned char *my_get_ext(X509 *cert, const int type, 168 accessinfo = X509_get_ext_d2i(cert, extensiontype, NULL, NULL); 199 if(ok && ctx->cert) { 202 X509_print_ex(p->errorbio, ctx->cert, 0, 0); 204 accessinfo = my_get_ext(ctx->cert, p->accesstype, NID_sinfo_access); 211 else if(accessinfo = my_get_ext(ctx->cert, p->accesstype, 461 BIO_printf(p.errorbio, "no service URL in user cert "
|
/external/libcups/cups/ |
tls-sspi.c | 47 # define SECURITY_FLAG_IGNORE_CERT_DATE_INVALID 0x00002000 /* Expired X509 Cert. */ 72 static DWORD http_sspi_verify(PCCERT_CONTEXT cert, const char *common_name, DWORD dwCertFlags); 186 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local 191 if (cert) 193 if (CertNameToStr(X509_ASN_ENCODING, &(cert->pCertInfo->Subject), CERT_SIMPLE_NAME_STR, cert_name, sizeof(cert_name))) 206 CertFreeCertificateContext(cert); 251 PCCERT_CONTEXT cert = NULL; /* Certificate to validate */ local 252 DWORD certFlags = 0; /* Cert verification flags */ 259 cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); 260 if (!cert) 295 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local 335 PCCERT_CONTEXT cert; \/* Certificate *\/ local [all...] |
tls-darwin.c | 47 /* Server cert keychain */ 50 /* Temporary self-signed cert */ 53 /* Server cert keychain path */ 99 SecCertificateRef cert = NULL; /* Self-signed certificate */ local 119 DEBUG_puts("1cupsMakeServerCredentials: Using existing self-signed cert."); 177 cert = SecGenerateSelfSignedCertificate(subject, certParams, publicKey, privateKey); 182 if (!cert) 188 ident = SecIdentityCreate(kCFAllocatorDefault, cert, privateKey); 221 DEBUG_puts("1cupsMakeServerCredentials: Unable to create identity from cert and keys."); 235 if (cert) 872 SecCertificateRef cert = NULL; \/* Certificate *\/ local 989 SecCertificateRef cert = NULL; \/* Certificate *\/ local [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/ |
RealConnection.java | 48 import java.security.cert.Certificate; 49 import java.security.cert.X509Certificate; 197 X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); local 199 + "\n certificate: " + CertificatePinner.pin(cert) 200 + "\n DN: " + cert.getSubjectDN().getName() 201 + "\n subjectAltNames: " + OkHostnameVerifier.allSubjectAltNames(cert));
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/io/ |
RealConnection.java | 49 import java.security.cert.Certificate; 50 import java.security.cert.X509Certificate; 201 X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); local 203 + "\n certificate: " + CertificatePinner.pin(cert) 204 + "\n DN: " + cert.getSubjectDN().getName() 205 + "\n subjectAltNames: " + OkHostnameVerifier.allSubjectAltNames(cert));
|
/external/openssh/ |
authfile.c | 431 if (asprintf(&file, "%s-cert.pub", filename) == -1) 456 struct sshkey *key = NULL, *cert = NULL; local 477 (r = sshkey_load_cert(filename, &cert)) != 0) 481 if (sshkey_equal_public(key, cert) == 0) { 487 (r = sshkey_cert_copy(cert, key)) != 0) 496 sshkey_free(cert); 548 sshkey_compare(key->cert->signature_key, pub))) {
|
/external/openssh/regress/ |
cert-file.sh | 1 # $OpenBSD: cert-file.sh,v 1.5 2017/03/11 23:44:16 djm Exp $ 32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub 36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER 58 # Key with no .pub should work - finding the equivalent *-cert.pub. 59 verbose "protocol $p: identity cert with no plain public file" 67 -oCertificateFile=$OBJ/user_key3-cert.pub \ 79 # Keys with untrusted cert should fail. 80 verbose "protocol $p: untrusted cert" 85 fail "ssh succeeded with bad cert in protocol $p [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 165 struct x509_certificate *cert; local 174 cert = x509_certificate_parse(buf, len); 175 if (cert == NULL) { 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 194 x509_certificate_free(cert);
|
/external/scapy/scapy/layers/tls/ |
cert.py | 14 of a Cert instance after its serial has been modified (for example). 18 'cert' and then resign it with whatever 'key': 19 f = open('cert.der') 57 # loading huge file when importing a cert 243 def verifyCert(self, cert): 244 """ Verifies either a Cert or an X509_Cert. """ 245 tbsCert = cert.tbsCertificate 248 sigVal = raw(cert.signatureValue) 429 def resignCert(self, cert): 430 """ Rewrite the signature of either a Cert or an X509_Cert. "" [all...] |
/external/boringssl/src/ssl/test/runner/ |
key_agreement.go | 42 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, version uint16) (*serverKeyExchangeMsg, error) { 68 sigAlg, err = selectSignatureAlgorithm(ka.version, cert.PrivateKey, config, clientHello.signatureAlgorithms) 74 sig, err := signMessage(ka.version, cert.PrivateKey, config, sigAlg, serverRSAParams) 99 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 119 key := cert.PrivateKey.(*rsa.PrivateKey) 174 func (ka *rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 199 padded := make([]byte, rsaSize(cert.PublicKey.(*rsa.PublicKey))) 216 encrypted, err := rsaRawEncrypt(cert.PublicKey.(*rsa.PublicKey), padded) 459 signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error) 467 func (ka *nilKeyAgreementAuthentication) signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchan (…) [all...] |
/build/soong/java/ |
app.go | 152 cert := android.SrcIsModule(a.getCertString(ctx)) 153 if cert != "" { 154 ctx.AddDependency(ctx.Module(), certificateTag, cert) 157 for _, cert := range a.appProperties.Additional_certificates { 158 cert = android.SrcIsModule(cert) 159 if cert != "" { 160 ctx.AddDependency(ctx.Module(), certificateTag, cert) 312 cert := a.getCertString(ctx) 313 certModule := android.SrcIsModule(cert) [all...] |
/cts/hostsidetests/appsecurity/test-apps/AuthBoundKeyApp/ |
Android.mk | 32 # sign this app with a different cert than CtsUsePermissionDiffCert
|
/cts/hostsidetests/appsecurity/test-apps/DuplicatePermissionDeclareApp/ |
Android.mk | 28 # Use the same cert as the app that also defined the permission
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/ |
Android.mk | 34 # sign this app with a different cert than CtsPermissionDeclareApp
|
/cts/hostsidetests/atrace/AtraceTestApp/ |
Android.mk | 30 # sign this app with a different cert than CtsSimpleAppInstallDiffCert
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
BasicOCSPResp.java | 1 package org.bouncycastle.cert.ocsp; 19 import org.bouncycastle.cert.X509CertificateHolder;
|
CertificateID.java | 1 package org.bouncycastle.cert.ocsp; 16 import org.bouncycastle.cert.X509CertificateHolder;
|
OCSPReqBuilder.java | 1 package org.bouncycastle.cert.ocsp; 20 import org.bouncycastle.cert.X509CertificateHolder; 179 * @throws org.bouncycastle.cert.ocsp.OCSPException
|
/external/conscrypt/android-stub/src/main/java/com/android/org/conscrypt/ |
OpenSSLSocketImpl.java | 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException;
|
/external/conscrypt/android-stub/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLSocketImpl.java | 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException;
|
/external/conscrypt/common/src/test/java/org/conscrypt/ |
CertPinManagerTest.java | 25 import java.security.cert.CertificateException; 26 import java.security.cert.X509Certificate;
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/ |
ConscryptJava7Suite.java | 40 import org.conscrypt.java.security.cert.CertificateFactoryTest; 41 import org.conscrypt.java.security.cert.X509CertificateTest;
|