/libcore/luni/src/main/java/java/security/cert/ |
X509CRLSelector.java | 62 * Sets the criterion for the issuer distinguished names. 64 * The CRL issuer must match at least one of the specified distinguished 68 * the list of issuer distinguished names to match, or {@code 69 * null} if any issuer distinguished name will do. 79 for (X500Principal issuer: issuers) { 80 issuerNames.add(issuer.getName(X500Principal.CANONICAL)); 86 * {@link #addIssuerName} instead. Sets the criterion for the issuer 89 * The CRL issuer must match at least one of the specified distinguished 98 * the list of issuer distinguished names to match, or {@code 99 * null} if any issuer distinguished name will do [all...] |
X509CertSelector.java | 55 private X500Principal issuer; field in class:X509CertSelector 124 * Sets the issuer that a certificate must match. 126 * @param issuer 127 * the issuer to match, or {@code null} if the issuer is not to 130 public void setIssuer(X500Principal issuer) { 131 this.issuer = issuer; 137 * Returns the issuer that a certificate must match. 139 * @return the issuer that a certificate must match, or {@code null} if th [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CRLImpl.java | 72 private X500Principal issuer; field in class:X509CRLImpl 94 // by the same issuer as CRL. 163 if (issuer == null) { 164 issuer = tbsCertList.getIssuer().getX500Principal(); 166 return issuer; 174 if (issuer == null) { 175 issuer = tbsCertList.getIssuer().getX500Principal(); 177 return issuer; 209 // null means that revoked certificate issuer is the same as CRL issuer [all...] |
X509CertImpl.java | 79 private volatile X500Principal issuer; field in class:X509CertImpl 171 X500Principal result = issuer; 173 // retrieve the issuer's principal 174 issuer = result = tbsCert.getIssuer().getX500Principal();
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
TrustManagerImpl.java | 236 // the "issuer" of the current certificate. In a properly 315 // we have a KeyStore and the issuer of the last cert in 318 X509Certificate issuer = trustedCertificateStore.findIssuer(lastCert); local 319 if (issuer != null) { 320 return trustedCertificateIndex.index(issuer);
|
TrustedCertificateStore.java | 346 // match on verified issuer of Certificate 357 X500Principal issuer = c.getIssuerX500Principal(); local 358 X509Certificate user = findCert(addedDir, issuer, selector, X509Certificate.class); 362 X509Certificate system = findCert(systemDir, issuer, selector, X509Certificate.class);
|
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 298 char *subject, *issuer; local 309 issuer = CERT_NameToAscii(&cert->issuer); 310 wpa_printf(MSG_DEBUG, "NSS: Peer certificate subject='%s' issuer='%s'", 311 subject, issuer); 314 PR_Free(issuer);
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 59 struct x509_name issuer; member in struct:x509_certificate 119 int x509_certificate_check_signature(struct x509_certificate *issuer,
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
X509CRLImplTest.java | 84 private static String issuerName = "O=CRL Issuer"; 85 private static String certIssuerName = "O=Certificate Issuer"; 106 // add the Certificate Issuer Extension to check if implementation 199 Name issuer = new Name(issuerName); typedefs 202 new TBSCertList(2, signature, issuer, thisUpdate, 312 assertEquals("Incorrect issuer value", 320 assertEquals("Incorrect issuer value", 366 new Name("O=Another Cert Issuer"), 373 + "because issuer is not the same as CRL issuer", [all...] |
X509CertFactoryPerfTest.java | 75 static String issuerName = "O=Certificate Issuer"; 197 // Issuer Alternative Name 199 new AlternativeName(AlternativeName.ISSUER, extnSANames)), 243 Name issuer = new Name(issuerName); typedefs 256 signature, issuer, validity, subject, subjectPublicKeyInfo, 473 assertEquals("Incorrect issuer", 482 assertEquals("Incorrect issuer", 700 "Incorrect value of Issuer Alternative Name", 706 fail("Issuer Alternative Name extension was incorrectly encoded.");
|
X509CertImplTest.java | 100 String issuerName = "O=Certificate Issuer"; 222 // Issuer Alternative Name 224 new AlternativeName(AlternativeName.ISSUER, extnSANames)), 269 Name issuer = new Name(issuerName); local 282 signature, issuer, validity, subject, subjectPublicKeyInfo, 403 assertEquals("Incorrect issuer", 412 assertEquals("Incorrect issuer", 630 "Incorrect value of Issuer Alternative Name", 636 fail("Issuer Alternative Name extension was incorrectly encoded.");
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 421 X500Principal issuer) { 422 super(subj, issuer); 437 private X500Principal issuer; field in class:TestCertUtils.TestX509Certificate 439 public TestX509Certificate(X500Principal subj, X500Principal issuer) { 441 this.issuer = issuer; 445 return issuer; 456 * and followed by the encoded form of Issuer (as X500Principal) 461 byte[] aissuer = issuer.getEncoded();
|
/external/chromium/net/base/ |
x509_certificate_unittest.cc | 201 const CertPrincipal& issuer = google_cert->issuer(); local 202 EXPECT_EQ("Thawte SGC CA", issuer.common_name); 203 EXPECT_EQ("", issuer.locality_name); 204 EXPECT_EQ("", issuer.state_or_province_name); 205 EXPECT_EQ("ZA", issuer.country_name); 206 EXPECT_EQ(0U, issuer.street_addresses.size()); 207 ASSERT_EQ(1U, issuer.organization_names.size()); 208 EXPECT_EQ("Thawte Consulting (Pty) Ltd.", issuer.organization_names[0]); 209 EXPECT_EQ(0U, issuer.organization_unit_names.size()) 265 const CertPrincipal& issuer = webkit_cert->issuer(); local 328 const CertPrincipal& issuer = thawte_cert->issuer(); local [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_mac.cc | 745 // First, get the cert issuer names allowed by the server. 751 << " valid issuer names"; 755 CFDataRef issuer = reinterpret_cast<CFDataRef>( local 758 if (p.ParseDistinguishedName(CFDataGetBytePtr(issuer), 759 CFDataGetLength(issuer))) { [all...] |
/external/ipsec-tools/src/racoon/ |
remoteconf.c | 268 vchar_t *issuer; local 270 issuer = eay_get_x509asn1issuername(rmconf->mycert); 271 if (rmsel->certificate_request->l - 1 != issuer->l || 273 issuer->v, issuer->l) != 0) { 274 vfree(issuer); 276 "Not matched: cert issuer mismatch.\n"); 279 vfree(issuer);
|
/external/openssl/apps/ |
ocsp.c | 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, 100 static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, const EVP_MD * cert_id_md, X509 *issuer, 140 X509 *issuer = NULL, *cert = NULL; local 424 else if (!strcmp(*args, "-issuer")) 429 X509_free(issuer); 430 issuer = load_cert(bio_err, *args, FORMAT_PEM, 431 NULL, e, "issuer certificate"); 432 if(!issuer) goto end; 446 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) 459 if(!add_ocsp_serial(&req, *args, cert_id_md, issuer, ids) [all...] |
x509.c | 105 " -issuer_hash - print issuer hash value\n", 107 " -issuer_hash_old - print old-style (MD5) issuer hash value\n", 111 " -issuer - print issuer DN\n", 185 int text=0,serial=0,subject=0,issuer=0,startdate=0,enddate=0; local 421 else if (strcmp(*argv,"-issuer") == 0) 422 issuer= ++num; 718 if (issuer == i) 720 print_name(STDout, "issuer= ", 859 BIO_printf(STDout,"/* issuer :%s */\n",buf) [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 422 X500Principal issuer) { 423 super(subj, issuer); 438 private X500Principal issuer; field in class:TestCertUtils.TestX509Certificate 440 public TestX509Certificate(X500Principal subj, X500Principal issuer) { 442 this.issuer = issuer; 446 return issuer; 457 * and followed by the encoded form of Issuer (as X500Principal) 462 byte[] aissuer = issuer.getEncoded();
|
/external/chromium/net/ocsp/ |
nss_ocsp.cc | 824 // An entry in our OCSP responder table. |issuer| and |issuer_key_id| are 827 SECItem issuer; member in struct:__anon3744::OCSPResponderTableEntry 864 if (SECITEM_CompareItem(&g_ocsp_responder_table[i].issuer,
|
/external/openssl/crypto/x509/ |
x509_vfy.c | 87 /* Issuer name matches certificate */ 95 /* CRL issuer is certificate issuer */ 99 /* CRL issuer is on certificate path */ 103 /* CRL issuer matches CRL AKID */ 112 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 400 /* Given a STACK_OF(X509) find the issuer of cert (if any) 406 X509 *issuer; local 409 issuer = sk_X509_value(sk, i); 410 if (ctx->check_issued(ctx, x, issuer)) 1301 X509 *issuer = NULL; local 1345 X509 *issuer = NULL; local [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 410 X500Principal issuer = ((caCert != null) local 414 x509c = createCertificate(publicKey, signingKey, subject, issuer, keyUsage, ca, 470 X500Principal issuer, 506 x509cg.setIssuerDN(issuer); 662 return issuer(keyStore, cert); 670 public static Certificate issuer(KeyStore keyStore, Certificate c) method in class:TestKeyStore 673 throw new IllegalStateException("issuer requires an X509Certificate, found " + c); [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 122 * issuer of the given X509 certificate. Uses the default provider 145 * issuer of the given X509 certificate. Uses the specified 270 * Returns the issuer of an attribute certificate or certificate. 272 * @return The issuer as <code>X500Principal</code>. 848 * from the certificate if not given to the issuer criterion of the 853 * {@link X509AttributeCertificate}s the issuer may contain more than one 890 "CRL issuer information from distribution point cannot be decoded.", 899 * certificate issuer is CRL issuer, distributionPoint field MUST be 905 "CRL issuer is omitted from distribution point but no distributionPoint field present.") 1391 X509Certificate issuer = null; local [all...] |
RFC3280CertPathUtilities.java | 144 throw new AnnotatedException("Could not read CRL issuer.", e); 177 throw new AnnotatedException("Could not read certificate issuer.", e); 270 * If the DP includes cRLIssuer, then verify that the issuer field in the 273 * boolean asserted. Otherwise, verify that the CRL issuer matches the 274 * certificate issuer. 317 "CRL issuer information from distribution point cannot be decoded.", e); 327 throw new AnnotatedException("CRL issuer of CRL does not match CRL issuer of distribution point."); 340 throw new AnnotatedException("Cannot find matching CRL issuer for certificate."); 417 * Obtain and validate the certification path for the complete CRL issuer 1978 DERObject issuer = null; local [all...] |
/external/openssl/crypto/ocsp/ |
ocsp.h | 95 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN 162 * internalError (2), --Internal error in issuer 345 * issuer Name, 350 X509_NAME* issuer; member in struct:ocsp_service_locator_st 413 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer); 487 X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 88 X509_NAME *issuer; member in struct:pkcs7_issuer_and_serial_st
|