HomeSort by relevance Sort by last modified time
    Searched defs:issuer (Results 26 - 50 of 68) sorted by null

12 3

  /libcore/luni/src/main/java/java/security/cert/
X509CRLSelector.java 62 * Sets the criterion for the issuer distinguished names.
64 * The CRL issuer must match at least one of the specified distinguished
68 * the list of issuer distinguished names to match, or {@code
69 * null} if any issuer distinguished name will do.
79 for (X500Principal issuer: issuers) {
80 issuerNames.add(issuer.getName(X500Principal.CANONICAL));
86 * {@link #addIssuerName} instead. Sets the criterion for the issuer
89 * The CRL issuer must match at least one of the specified distinguished
98 * the list of issuer distinguished names to match, or {@code
99 * null} if any issuer distinguished name will do
    [all...]
X509CertSelector.java 55 private X500Principal issuer; field in class:X509CertSelector
124 * Sets the issuer that a certificate must match.
126 * @param issuer
127 * the issuer to match, or {@code null} if the issuer is not to
130 public void setIssuer(X500Principal issuer) {
131 this.issuer = issuer;
137 * Returns the issuer that a certificate must match.
139 * @return the issuer that a certificate must match, or {@code null} if th
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/
X509CRLImpl.java 72 private X500Principal issuer; field in class:X509CRLImpl
94 // by the same issuer as CRL.
163 if (issuer == null) {
164 issuer = tbsCertList.getIssuer().getX500Principal();
166 return issuer;
174 if (issuer == null) {
175 issuer = tbsCertList.getIssuer().getX500Principal();
177 return issuer;
209 // null means that revoked certificate issuer is the same as CRL issuer
    [all...]
X509CertImpl.java 79 private volatile X500Principal issuer; field in class:X509CertImpl
171 X500Principal result = issuer;
173 // retrieve the issuer's principal
174 issuer = result = tbsCert.getIssuer().getX500Principal();
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
TrustManagerImpl.java 236 // the "issuer" of the current certificate. In a properly
315 // we have a KeyStore and the issuer of the last cert in
318 X509Certificate issuer = trustedCertificateStore.findIssuer(lastCert); local
319 if (issuer != null) {
320 return trustedCertificateIndex.index(issuer);
TrustedCertificateStore.java 346 // match on verified issuer of Certificate
357 X500Principal issuer = c.getIssuerX500Principal(); local
358 X509Certificate user = findCert(addedDir, issuer, selector, X509Certificate.class);
362 X509Certificate system = findCert(systemDir, issuer, selector, X509Certificate.class);
  /external/wpa_supplicant_8/src/crypto/
tls_nss.c 298 char *subject, *issuer; local
309 issuer = CERT_NameToAscii(&cert->issuer);
310 wpa_printf(MSG_DEBUG, "NSS: Peer certificate subject='%s' issuer='%s'",
311 subject, issuer);
314 PR_Free(issuer);
  /external/wpa_supplicant_8/src/tls/
x509v3.h 59 struct x509_name issuer; member in struct:x509_certificate
119 int x509_certificate_check_signature(struct x509_certificate *issuer,
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
X509CRLImplTest.java 84 private static String issuerName = "O=CRL Issuer";
85 private static String certIssuerName = "O=Certificate Issuer";
106 // add the Certificate Issuer Extension to check if implementation
199 Name issuer = new Name(issuerName); typedefs
202 new TBSCertList(2, signature, issuer, thisUpdate,
312 assertEquals("Incorrect issuer value",
320 assertEquals("Incorrect issuer value",
366 new Name("O=Another Cert Issuer"),
373 + "because issuer is not the same as CRL issuer",
    [all...]
X509CertFactoryPerfTest.java 75 static String issuerName = "O=Certificate Issuer";
197 // Issuer Alternative Name
199 new AlternativeName(AlternativeName.ISSUER, extnSANames)),
243 Name issuer = new Name(issuerName); typedefs
256 signature, issuer, validity, subject, subjectPublicKeyInfo,
473 assertEquals("Incorrect issuer",
482 assertEquals("Incorrect issuer",
700 "Incorrect value of Issuer Alternative Name",
706 fail("Issuer Alternative Name extension was incorrectly encoded.");
X509CertImplTest.java 100 String issuerName = "O=Certificate Issuer";
222 // Issuer Alternative Name
224 new AlternativeName(AlternativeName.ISSUER, extnSANames)),
269 Name issuer = new Name(issuerName); local
282 signature, issuer, validity, subject, subjectPublicKeyInfo,
403 assertEquals("Incorrect issuer",
412 assertEquals("Incorrect issuer",
630 "Incorrect value of Issuer Alternative Name",
636 fail("Issuer Alternative Name extension was incorrectly encoded.");
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
TestCertUtils.java 421 X500Principal issuer) {
422 super(subj, issuer);
437 private X500Principal issuer; field in class:TestCertUtils.TestX509Certificate
439 public TestX509Certificate(X500Principal subj, X500Principal issuer) {
441 this.issuer = issuer;
445 return issuer;
456 * and followed by the encoded form of Issuer (as X500Principal)
461 byte[] aissuer = issuer.getEncoded();
  /external/chromium/net/base/
x509_certificate_unittest.cc 201 const CertPrincipal& issuer = google_cert->issuer(); local
202 EXPECT_EQ("Thawte SGC CA", issuer.common_name);
203 EXPECT_EQ("", issuer.locality_name);
204 EXPECT_EQ("", issuer.state_or_province_name);
205 EXPECT_EQ("ZA", issuer.country_name);
206 EXPECT_EQ(0U, issuer.street_addresses.size());
207 ASSERT_EQ(1U, issuer.organization_names.size());
208 EXPECT_EQ("Thawte Consulting (Pty) Ltd.", issuer.organization_names[0]);
209 EXPECT_EQ(0U, issuer.organization_unit_names.size())
265 const CertPrincipal& issuer = webkit_cert->issuer(); local
328 const CertPrincipal& issuer = thawte_cert->issuer(); local
    [all...]
  /external/chromium/net/socket/
ssl_client_socket_mac.cc 745 // First, get the cert issuer names allowed by the server.
751 << " valid issuer names";
755 CFDataRef issuer = reinterpret_cast<CFDataRef>( local
758 if (p.ParseDistinguishedName(CFDataGetBytePtr(issuer),
759 CFDataGetLength(issuer))) {
    [all...]
  /external/ipsec-tools/src/racoon/
remoteconf.c 268 vchar_t *issuer; local
270 issuer = eay_get_x509asn1issuername(rmconf->mycert);
271 if (rmsel->certificate_request->l - 1 != issuer->l ||
273 issuer->v, issuer->l) != 0) {
274 vfree(issuer);
276 "Not matched: cert issuer mismatch.\n");
279 vfree(issuer);
  /external/openssl/apps/
ocsp.c 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer,
100 static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, const EVP_MD * cert_id_md, X509 *issuer,
140 X509 *issuer = NULL, *cert = NULL; local
424 else if (!strcmp(*args, "-issuer"))
429 X509_free(issuer);
430 issuer = load_cert(bio_err, *args, FORMAT_PEM,
431 NULL, e, "issuer certificate");
432 if(!issuer) goto end;
446 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
459 if(!add_ocsp_serial(&req, *args, cert_id_md, issuer, ids)
    [all...]
x509.c 105 " -issuer_hash - print issuer hash value\n",
107 " -issuer_hash_old - print old-style (MD5) issuer hash value\n",
111 " -issuer - print issuer DN\n",
185 int text=0,serial=0,subject=0,issuer=0,startdate=0,enddate=0; local
421 else if (strcmp(*argv,"-issuer") == 0)
422 issuer= ++num;
718 if (issuer == i)
720 print_name(STDout, "issuer= ",
859 BIO_printf(STDout,"/* issuer :%s */\n",buf)
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestCertUtils.java 422 X500Principal issuer) {
423 super(subj, issuer);
438 private X500Principal issuer; field in class:TestCertUtils.TestX509Certificate
440 public TestX509Certificate(X500Principal subj, X500Principal issuer) {
442 this.issuer = issuer;
446 return issuer;
457 * and followed by the encoded form of Issuer (as X500Principal)
462 byte[] aissuer = issuer.getEncoded();
  /external/chromium/net/ocsp/
nss_ocsp.cc 824 // An entry in our OCSP responder table. |issuer| and |issuer_key_id| are
827 SECItem issuer; member in struct:__anon3744::OCSPResponderTableEntry
864 if (SECITEM_CompareItem(&g_ocsp_responder_table[i].issuer,
  /external/openssl/crypto/x509/
x509_vfy.c 87 /* Issuer name matches certificate */
95 /* CRL issuer is certificate issuer */
99 /* CRL issuer is on certificate path */
103 /* CRL issuer matches CRL AKID */
112 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
400 /* Given a STACK_OF(X509) find the issuer of cert (if any)
406 X509 *issuer; local
409 issuer = sk_X509_value(sk, i);
410 if (ctx->check_issued(ctx, x, issuer))
1301 X509 *issuer = NULL; local
1345 X509 *issuer = NULL; local
    [all...]
  /libcore/support/src/test/java/libcore/java/security/
TestKeyStore.java 410 X500Principal issuer = ((caCert != null) local
414 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca,
470 X500Principal issuer,
506 x509cg.setIssuerDN(issuer);
662 return issuer(keyStore, cert);
670 public static Certificate issuer(KeyStore keyStore, Certificate c) method in class:TestKeyStore
673 throw new IllegalStateException("issuer requires an X509Certificate, found " + c);
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 122 * issuer of the given X509 certificate. Uses the default provider
145 * issuer of the given X509 certificate. Uses the specified
270 * Returns the issuer of an attribute certificate or certificate.
272 * @return The issuer as <code>X500Principal</code>.
848 * from the certificate if not given to the issuer criterion of the
853 * {@link X509AttributeCertificate}s the issuer may contain more than one
890 "CRL issuer information from distribution point cannot be decoded.",
899 * certificate issuer is CRL issuer, distributionPoint field MUST be
905 "CRL issuer is omitted from distribution point but no distributionPoint field present.")
1391 X509Certificate issuer = null; local
    [all...]
RFC3280CertPathUtilities.java 144 throw new AnnotatedException("Could not read CRL issuer.", e);
177 throw new AnnotatedException("Could not read certificate issuer.", e);
270 * If the DP includes cRLIssuer, then verify that the issuer field in the
273 * boolean asserted. Otherwise, verify that the CRL issuer matches the
274 * certificate issuer.
317 "CRL issuer information from distribution point cannot be decoded.", e);
327 throw new AnnotatedException("CRL issuer of CRL does not match CRL issuer of distribution point.");
340 throw new AnnotatedException("Cannot find matching CRL issuer for certificate.");
417 * Obtain and validate the certification path for the complete CRL issuer
1978 DERObject issuer = null; local
    [all...]
  /external/openssl/crypto/ocsp/
ocsp.h 95 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN
162 * internalError (2), --Internal error in issuer
345 * issuer Name,
350 X509_NAME* issuer; member in struct:ocsp_service_locator_st
413 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer);
487 X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
  /external/openssl/crypto/pkcs7/
pkcs7.h 88 X509_NAME *issuer; member in struct:pkcs7_issuer_and_serial_st

Completed in 889 milliseconds

12 3