/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 8 import java.security.cert.CertPath; 9 import java.security.cert.CertPathParameters; 10 import java.security.cert.CertPathValidatorException; 11 import java.security.cert.CertPathValidatorResult; 12 import java.security.cert.CertPathValidatorSpi; 13 import java.security.cert.PKIXCertPathChecker; 14 import java.security.cert.PKIXCertPathValidatorResult; 15 import java.security.cert.PKIXParameters; 16 import java.security.cert.TrustAnchor; 17 import java.security.cert.X509Certificate 87 X509Certificate cert = (X509Certificate) certs.get(0); local 273 X509Certificate cert = null; local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
X509V2AttributeCertificate.java | 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateExpiredException; 15 import java.security.cert.CertificateNotYetValidException; 36 * @deprecated use org.bouncycastle.cert.X509AttributeCertificateHolder 41 private AttributeCertificate cert; field in class:X509V2AttributeCertificate 77 AttributeCertificate cert) 80 this.cert = cert; 84 this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); 85 this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate() [all...] |
X509V3CertificateGenerator.java | 13 import java.security.cert.CertificateEncodingException; 14 import java.security.cert.CertificateParsingException; 15 import java.security.cert.X509Certificate; 43 * @deprecated use org.bouncycastle.cert.X509v3CertificateBuilder. 277 X509Certificate cert) 280 byte[] extValue = cert.getExtensionValue(oid); 307 X509Certificate cert) 310 this.copyAndAddExtension(oid.getId(), critical, cert); local 438 throw new ExtCertificateEncodingException("exception encoding TBS cert", e); 483 throw new ExtCertificateEncodingException("exception encoding TBS cert", e) [all...] |
/external/chromium/chrome/browser/ui/gtk/ |
ssl_client_certificate_selector.cc | 64 net::X509Certificate::OSCertHandle cert, 67 net::X509Certificate::OSCertHandle cert); 153 // to different cert that has longer details text. 232 net::X509Certificate::OSCertHandle cert = local 235 details_strings_.push_back(FormatDetailsText(cert)); 239 FormatComboBoxText(cert, nicknames[i]).c_str()); 242 // Auto-select the first cert. 257 net::X509Certificate::OSCertHandle cert, const std::string& nickname) { 260 rv += x509_certificate_model::GetSerialNumberHexified(cert, ""); 267 net::X509Certificate::OSCertHandle cert) { 329 net::X509Certificate* cert = GetSelectedCert(); local 347 net::X509Certificate* cert = GetSelectedCert(); local 350 ShowCertificateViewer(GTK_WINDOW(toplevel), cert); local 363 net::X509Certificate* cert = GetSelectedCert(); local [all...] |
/external/chromium/chrome/browser/ui/views/ |
page_info_bubble_view.cc | 102 scoped_refptr<net::X509Certificate> cert; local 103 CertStore::GetInstance()->RetrieveCert(cert_id_, &cert); 105 // certificate, so there is no cert to show. Don't bother showing the cert 107 if (!cert.get() || !cert->os_cert_handle())
|
/external/chromium/net/base/ |
x509_certificate.cc | 28 // Returns true if this cert fingerprint is the null (all zero) fingerprint. 60 void Insert(X509Certificate* cert); 86 // Insert |cert| into the cache. The cache does NOT AddRef |cert|. 88 void X509CertificateCache::Insert(X509Certificate* cert) { 91 DCHECK(!IsNullFingerprint(cert->fingerprint())) << 97 cache_[cert->fingerprint()] = cert; 177 // Else the new cert is better and will replace the old one in the cache. 181 scoped_refptr<X509Certificate> cert = new X509Certificate(cert_handle, source local 218 scoped_refptr<X509Certificate> cert = local [all...] |
/external/chromium/net/socket/ |
ssl_server_socket_nss.cc | 49 Socket* socket, X509Certificate* cert, crypto::RSAPrivateKey* key, 51 return new SSLServerSocketNSS(socket, cert, key, ssl_config); 56 scoped_refptr<X509Certificate> cert, 72 cert_(cert), 294 CERTCertificate* cert = CERT_NewTempCertificate( local 300 CERT_DestroyCertificate(cert); 307 CERT_DestroyCertificate(cert); 326 CERT_DestroyCertificate(cert); 331 SSLKEAType cert_kea = NSS_FindCertKEAType(cert); 332 rv = SSL_ConfigSecureServer(nss_fd_, cert, private_key, cert_kea) [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslstreamadapter.cc | 185 void OpenSSLStreamAdapter::SetPeerCertificate(SSLCertificate* cert) { 188 peer_certificate_.reset(static_cast<OpenSSLCertificate*>(cert)); 536 // Add the root cert to the SSL context 544 // we must specify which client cert to ask for 563 X509* cert = X509_STORE_CTX_get_current_cert(store); local 568 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 570 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 585 // In peer-to-peer mode, no root cert / certificate authority was 587 // and therefore it will necessarily call here on the first cert it 590 X509* cert = X509_STORE_CTX_get_current_cert(store) local 601 void* cert = local [all...] |
/external/openssh/ |
ssh-add.c | 144 Key *private, *cert; local 224 xasprintf(&certpath, "%s-cert.pub", filename); 225 if ((cert = key_load_public(certpath, NULL)) == NULL) 228 if (!key_equal_public(cert, private)) { 231 key_free(cert); 236 if (key_to_certified(private, key_cert_is_legacy(cert)) != 0) { 238 key_free(cert); 241 key_cert_copy(cert, private); 242 key_free(cert); 247 private->cert->key_id) [all...] |
/external/openssl/apps/ |
smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 432 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n"); 491 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 554 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 562 sk_X509_push(encerts, cert); 563 cert = NULL; 814 X509_free(cert);
|
/external/openssl/ssl/ |
s3_lib.c | 3418 CERT *cert; local 3648 CERT *cert; local 3763 CERT *cert; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_write.c | 31 struct x509_certificate *cert; local 36 cert = conn->cred->cert; 37 while (cert) { 38 len += 3 + cert->cert_len; 39 if (x509_certificate_self_signed(cert)) 41 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 42 &cert->issuer); 137 struct x509_certificate *cert; local 158 cert = conn->cred ? conn->cred->cert : NULL [all...] |
tlsv1_server_read.c | 273 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 335 * opaque ASN.1Cert<2^24-1>; 338 * ASN.1Cert certificate_list<1..2^24-1>; 406 cert = x509_certificate_parse(pos, cert_len); 407 if (cert == NULL) { 417 chain = cert; 419 last->next = cert; 420 last = cert;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 27 struct x509_certificate *cert; local 32 cert = conn->cred->cert; 33 while (cert) { 34 len += 3 + cert->cert_len; 35 if (x509_certificate_self_signed(cert)) 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 38 &cert->issuer); 134 struct x509_certificate *cert; local 155 cert = conn->cred ? conn->cred->cert : NULL [all...] |
tlsv1_cred.c | 32 x509_certificate_chain_free(cred->cert); 43 struct x509_certificate *cert, *p; local 46 cert = x509_certificate_parse(buf, len); 47 if (cert == NULL) { 56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 61 p->next = cert; 64 cert->next = *chain; 65 *chain = cert; 68 x509_name_string(&cert->subject, name, sizeof(name)); 153 const char *cert, const u8 *cert_blob [all...] |
tlsv1_server_read.c | 283 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 345 * opaque ASN.1Cert<2^24-1>; 348 * ASN.1Cert certificate_list<1..2^24-1>; 416 cert = x509_certificate_parse(pos, cert_len); 417 if (cert == NULL) { 427 chain = cert; 429 last->next = cert; 430 last = cert;
|
/frameworks/base/keystore/java/android/security/ |
KeyChain.java | 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.X509Certificate; 152 public static final String EXTRA_CERTIFICATE = "CERT"; 348 X509Certificate cert = chain.get(i); local 349 if (Objects.equal(cert.getSubjectX500Principal(), cert.getIssuerX500Principal())) { 352 X509Certificate issuer = store.findIssuer(cert); 375 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)) local [all...] |
/libcore/luni/src/main/java/java/security/cert/ |
PKIXParameters.java | 18 package java.security.cert; 46 // List of cert stores that used to find certificates and CRLs 57 // Indicates whether cert revocation is enabled or not 563 sb.append("\n Cert Stores: "); 568 sb.append("\n Cert Path Checkers: ");
|
X509CRLSelector.java | 19 package java.security.cert; 261 * @param cert 264 public void setCertificateChecking(X509Certificate cert) { 265 this.certificateChecking = cert;
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CRLImpl.java | 23 package org.apache.harmony.security.provider.cert; 35 import java.security.cert.CRLException; 36 import java.security.cert.Certificate; 37 import java.security.cert.X509CRL; 38 import java.security.cert.X509CRLEntry; 39 import java.security.cert.X509Certificate; 60 * @see java.security.cert.X509CRL 134 // ----- java.security.cert.X509CRL abstract method implementations ---- 138 * @see java.security.cert.X509CRL#getEncoded() 151 * @see java.security.cert.X509CRL#getVersion( [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
TrustManagerImpl.java | 23 import java.security.cert.CertPath; 24 import java.security.cert.CertPathValidator; 25 import java.security.cert.CertPathValidatorException; 26 import java.security.cert.CertificateException; 27 import java.security.cert.CertificateFactory; 28 import java.security.cert.PKIXParameters; 29 import java.security.cert.TrustAnchor; 30 import java.security.cert.X509Certificate; 132 // TODO remove duplicates if same cert is found in both a 137 final X509Certificate cert = (X509Certificate) ks.getCertificate(alias) local [all...] |
/libcore/luni/src/test/java/libcore/java/security/ |
KeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.X509Certificate; 194 // AndroidCAStore exposes CA cert files via the KeyStore 2197 X509Certificate cert = (X509Certificate) c; local [all...] |
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
HttpsURLConnectionTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 34 import org.apache.harmony.security.tests.support.cert.TestUtils; 85 Certificate[] cert = con.getLocalCertificates(); local 86 assertNotNull(cert); 87 assertEquals(1, cert.length); 183 Certificate[] cert = con.getServerCertificates(); local 184 assertNotNull(cert); 185 assertEquals(1, cert.length) 290 Certificate cert = cf.generateCertificate(bis); local 305 Certificate cert = cf.generateCertificate(bis); local [all...] |
X509KeyManagerTest.java | 9 import java.security.cert.CertificateFactory; 10 import java.security.cert.X509Certificate; 31 private X509Certificate[] cert; field in class:X509KeyManagerTest [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathBuilder1Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi; 29 import org.apache.harmony.security.tests.support.cert.TestUtils; 36 import java.security.cert.CertPath; 37 import java.security.cert.CertPathBuilder; 38 import java.security.cert.CertPathBuilderException; 39 import java.security.cert.CertPathBuilderResult; 40 import java.security.cert.CertPathBuilderSpi; 41 import java.security.cert.CertPathParameters; 42 import java.security.cert.CertificateException [all...] |