HomeSort by relevance Sort by last modified time
    Searched defs:cert (Results 251 - 275 of 390) sorted by null

<<111213141516

  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathValidatorSpi.java 8 import java.security.cert.CertPath;
9 import java.security.cert.CertPathParameters;
10 import java.security.cert.CertPathValidatorException;
11 import java.security.cert.CertPathValidatorResult;
12 import java.security.cert.CertPathValidatorSpi;
13 import java.security.cert.PKIXCertPathChecker;
14 import java.security.cert.PKIXCertPathValidatorResult;
15 import java.security.cert.PKIXParameters;
16 import java.security.cert.TrustAnchor;
17 import java.security.cert.X509Certificate
87 X509Certificate cert = (X509Certificate) certs.get(0); local
273 X509Certificate cert = null; local
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/x509/
X509V2AttributeCertificate.java 13 import java.security.cert.CertificateException;
14 import java.security.cert.CertificateExpiredException;
15 import java.security.cert.CertificateNotYetValidException;
36 * @deprecated use org.bouncycastle.cert.X509AttributeCertificateHolder
41 private AttributeCertificate cert; field in class:X509V2AttributeCertificate
77 AttributeCertificate cert)
80 this.cert = cert;
84 this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate();
85 this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate()
    [all...]
X509V3CertificateGenerator.java 13 import java.security.cert.CertificateEncodingException;
14 import java.security.cert.CertificateParsingException;
15 import java.security.cert.X509Certificate;
43 * @deprecated use org.bouncycastle.cert.X509v3CertificateBuilder.
277 X509Certificate cert)
280 byte[] extValue = cert.getExtensionValue(oid);
307 X509Certificate cert)
310 this.copyAndAddExtension(oid.getId(), critical, cert); local
438 throw new ExtCertificateEncodingException("exception encoding TBS cert", e);
483 throw new ExtCertificateEncodingException("exception encoding TBS cert", e)
    [all...]
  /external/chromium/chrome/browser/ui/gtk/
ssl_client_certificate_selector.cc 64 net::X509Certificate::OSCertHandle cert,
67 net::X509Certificate::OSCertHandle cert);
153 // to different cert that has longer details text.
232 net::X509Certificate::OSCertHandle cert = local
235 details_strings_.push_back(FormatDetailsText(cert));
239 FormatComboBoxText(cert, nicknames[i]).c_str());
242 // Auto-select the first cert.
257 net::X509Certificate::OSCertHandle cert, const std::string& nickname) {
260 rv += x509_certificate_model::GetSerialNumberHexified(cert, "");
267 net::X509Certificate::OSCertHandle cert) {
329 net::X509Certificate* cert = GetSelectedCert(); local
347 net::X509Certificate* cert = GetSelectedCert(); local
350 ShowCertificateViewer(GTK_WINDOW(toplevel), cert); local
363 net::X509Certificate* cert = GetSelectedCert(); local
    [all...]
  /external/chromium/chrome/browser/ui/views/
page_info_bubble_view.cc 102 scoped_refptr<net::X509Certificate> cert; local
103 CertStore::GetInstance()->RetrieveCert(cert_id_, &cert);
105 // certificate, so there is no cert to show. Don't bother showing the cert
107 if (!cert.get() || !cert->os_cert_handle())
  /external/chromium/net/base/
x509_certificate.cc 28 // Returns true if this cert fingerprint is the null (all zero) fingerprint.
60 void Insert(X509Certificate* cert);
86 // Insert |cert| into the cache. The cache does NOT AddRef |cert|.
88 void X509CertificateCache::Insert(X509Certificate* cert) {
91 DCHECK(!IsNullFingerprint(cert->fingerprint())) <<
97 cache_[cert->fingerprint()] = cert;
177 // Else the new cert is better and will replace the old one in the cache.
181 scoped_refptr<X509Certificate> cert = new X509Certificate(cert_handle, source local
218 scoped_refptr<X509Certificate> cert = local
    [all...]
  /external/chromium/net/socket/
ssl_server_socket_nss.cc 49 Socket* socket, X509Certificate* cert, crypto::RSAPrivateKey* key,
51 return new SSLServerSocketNSS(socket, cert, key, ssl_config);
56 scoped_refptr<X509Certificate> cert,
72 cert_(cert),
294 CERTCertificate* cert = CERT_NewTempCertificate( local
300 CERT_DestroyCertificate(cert);
307 CERT_DestroyCertificate(cert);
326 CERT_DestroyCertificate(cert);
331 SSLKEAType cert_kea = NSS_FindCertKEAType(cert);
332 rv = SSL_ConfigSecureServer(nss_fd_, cert, private_key, cert_kea)
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
opensslstreamadapter.cc 185 void OpenSSLStreamAdapter::SetPeerCertificate(SSLCertificate* cert) {
188 peer_certificate_.reset(static_cast<OpenSSLCertificate*>(cert));
536 // Add the root cert to the SSL context
544 // we must specify which client cert to ask for
563 X509* cert = X509_STORE_CTX_get_current_cert(store); local
568 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data));
570 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data));
585 // In peer-to-peer mode, no root cert / certificate authority was
587 // and therefore it will necessarily call here on the first cert it
590 X509* cert = X509_STORE_CTX_get_current_cert(store) local
601 void* cert = local
    [all...]
  /external/openssh/
ssh-add.c 144 Key *private, *cert; local
224 xasprintf(&certpath, "%s-cert.pub", filename);
225 if ((cert = key_load_public(certpath, NULL)) == NULL)
228 if (!key_equal_public(cert, private)) {
231 key_free(cert);
236 if (key_to_certified(private, key_cert_is_legacy(cert)) != 0) {
238 key_free(cert);
241 key_cert_copy(cert, private);
242 key_free(cert);
247 private->cert->key_id)
    [all...]
  /external/openssl/apps/
smime.c 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
432 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
491 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
554 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
562 sk_X509_push(encerts, cert);
563 cert = NULL;
814 X509_free(cert);
  /external/openssl/ssl/
s3_lib.c 3418 CERT *cert; local
3648 CERT *cert; local
3763 CERT *cert; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client_write.c 31 struct x509_certificate *cert; local
36 cert = conn->cred->cert;
37 while (cert) {
38 len += 3 + cert->cert_len;
39 if (x509_certificate_self_signed(cert))
41 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
42 &cert->issuer);
137 struct x509_certificate *cert; local
158 cert = conn->cred ? conn->cred->cert : NULL
    [all...]
tlsv1_server_read.c 273 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
335 * opaque ASN.1Cert<2^24-1>;
338 * ASN.1Cert certificate_list<1..2^24-1>;
406 cert = x509_certificate_parse(pos, cert_len);
407 if (cert == NULL) {
417 chain = cert;
419 last->next = cert;
420 last = cert;
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 27 struct x509_certificate *cert; local
32 cert = conn->cred->cert;
33 while (cert) {
34 len += 3 + cert->cert_len;
35 if (x509_certificate_self_signed(cert))
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
38 &cert->issuer);
134 struct x509_certificate *cert; local
155 cert = conn->cred ? conn->cred->cert : NULL
    [all...]
tlsv1_cred.c 32 x509_certificate_chain_free(cred->cert);
43 struct x509_certificate *cert, *p; local
46 cert = x509_certificate_parse(buf, len);
47 if (cert == NULL) {
56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) {
61 p->next = cert;
64 cert->next = *chain;
65 *chain = cert;
68 x509_name_string(&cert->subject, name, sizeof(name));
153 const char *cert, const u8 *cert_blob
    [all...]
tlsv1_server_read.c 283 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
345 * opaque ASN.1Cert<2^24-1>;
348 * ASN.1Cert certificate_list<1..2^24-1>;
416 cert = x509_certificate_parse(pos, cert_len);
417 if (cert == NULL) {
427 chain = cert;
429 last->next = cert;
430 last = cert;
  /frameworks/base/keystore/java/android/security/
KeyChain.java 34 import java.security.cert.Certificate;
35 import java.security.cert.CertificateException;
36 import java.security.cert.CertificateFactory;
37 import java.security.cert.X509Certificate;
152 public static final String EXTRA_CERTIFICATE = "CERT";
348 X509Certificate cert = chain.get(i); local
349 if (Objects.equal(cert.getSubjectX500Principal(), cert.getIssuerX500Principal())) {
352 X509Certificate issuer = store.findIssuer(cert);
375 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)) local
    [all...]
  /libcore/luni/src/main/java/java/security/cert/
PKIXParameters.java 18 package java.security.cert;
46 // List of cert stores that used to find certificates and CRLs
57 // Indicates whether cert revocation is enabled or not
563 sb.append("\n Cert Stores: ");
568 sb.append("\n Cert Path Checkers: ");
X509CRLSelector.java 19 package java.security.cert;
261 * @param cert
264 public void setCertificateChecking(X509Certificate cert) {
265 this.certificateChecking = cert;
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/
X509CRLImpl.java 23 package org.apache.harmony.security.provider.cert;
35 import java.security.cert.CRLException;
36 import java.security.cert.Certificate;
37 import java.security.cert.X509CRL;
38 import java.security.cert.X509CRLEntry;
39 import java.security.cert.X509Certificate;
60 * @see java.security.cert.X509CRL
134 // ----- java.security.cert.X509CRL abstract method implementations ----
138 * @see java.security.cert.X509CRL#getEncoded()
151 * @see java.security.cert.X509CRL#getVersion(
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
TrustManagerImpl.java 23 import java.security.cert.CertPath;
24 import java.security.cert.CertPathValidator;
25 import java.security.cert.CertPathValidatorException;
26 import java.security.cert.CertificateException;
27 import java.security.cert.CertificateFactory;
28 import java.security.cert.PKIXParameters;
29 import java.security.cert.TrustAnchor;
30 import java.security.cert.X509Certificate;
132 // TODO remove duplicates if same cert is found in both a
137 final X509Certificate cert = (X509Certificate) ks.getCertificate(alias) local
    [all...]
  /libcore/luni/src/test/java/libcore/java/security/
KeyStoreTest.java 41 import java.security.cert.Certificate;
42 import java.security.cert.X509Certificate;
194 // AndroidCAStore exposes CA cert files via the KeyStore
2197 X509Certificate cert = (X509Certificate) c; local
    [all...]
  /libcore/luni/src/test/java/tests/api/javax/net/ssl/
HttpsURLConnectionTest.java 24 import java.security.cert.Certificate;
25 import java.security.cert.CertificateException;
26 import java.security.cert.CertificateFactory;
34 import org.apache.harmony.security.tests.support.cert.TestUtils;
85 Certificate[] cert = con.getLocalCertificates(); local
86 assertNotNull(cert);
87 assertEquals(1, cert.length);
183 Certificate[] cert = con.getServerCertificates(); local
184 assertNotNull(cert);
185 assertEquals(1, cert.length)
290 Certificate cert = cf.generateCertificate(bis); local
305 Certificate cert = cf.generateCertificate(bis); local
    [all...]
X509KeyManagerTest.java 9 import java.security.cert.CertificateFactory;
10 import java.security.cert.X509Certificate;
31 private X509Certificate[] cert; field in class:X509KeyManagerTest
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
CertPathBuilder1Test.java 23 package tests.security.cert;
28 import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi;
29 import org.apache.harmony.security.tests.support.cert.TestUtils;
36 import java.security.cert.CertPath;
37 import java.security.cert.CertPathBuilder;
38 import java.security.cert.CertPathBuilderException;
39 import java.security.cert.CertPathBuilderResult;
40 import java.security.cert.CertPathBuilderSpi;
41 import java.security.cert.CertPathParameters;
42 import java.security.cert.CertificateException
    [all...]

Completed in 2648 milliseconds

<<111213141516