/libcore/luni/src/test/java/tests/security/cert/ |
CertPathTest.java | 23 package tests.security.cert; 26 import java.security.cert.CertPath; 27 import java.security.cert.CertificateEncodingException; 30 import org.apache.harmony.security.tests.support.cert.MyCertPath; 31 import org.apache.harmony.security.tests.support.cert.MyFailingCertPath; 32 import org.apache.harmony.security.tests.support.cert.TestUtils; 41 * Meaningless cert path encoding just for testing purposes 100 * Assertion: returns cert path type 205 "java.security.cert.CertPath$CertPathRep"));
|
CertPathValidator1Test.java | 23 package tests.security.cert; 32 import java.security.cert.CertPathParameters; 33 import java.security.cert.CertPathValidator; 34 import java.security.cert.CertPathValidatorException; 35 import java.security.cert.CertPathValidatorSpi; 36 import java.security.cert.CertificateException; 38 import org.apache.harmony.security.tests.support.cert.MyCertPath; 39 import org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi;
|
CertStore1Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertStoreParameters; 29 import org.apache.harmony.security.tests.support.cert.MyCertStoreSpi; 36 import java.security.cert.CertStore; 37 import java.security.cert.CertStoreException; 38 import java.security.cert.CertStoreParameters; 39 import java.security.cert.CertStoreSpi; 40 import java.security.cert.CollectionCertStoreParameters; 41 import java.security.cert.LDAPCertStoreParameters; 136 String def = "Proba.cert.store.type" [all...] |
CertStore2Test.java | 1 package tests.security.cert; 10 import java.security.cert.CRL; 11 import java.security.cert.CRLSelector; 12 import java.security.cert.CertSelector; 13 import java.security.cert.CertStore; 14 import java.security.cert.CertStoreException; 15 import java.security.cert.CertStoreParameters; 16 import java.security.cert.CertStoreSpi; 17 import java.security.cert.Certificate; 317 public boolean match(Certificate cert) { [all...] |
PKIXCertPathValidatorResultTest.java | 23 package tests.security.cert; 29 import java.security.cert.PKIXCertPathValidatorResult; 30 import java.security.cert.PolicyNode; 31 import java.security.cert.TrustAnchor; 34 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
X509CRL2Test.java | 18 package tests.security.cert; 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateFactory; 28 import java.security.cert.X509CRL; 29 import java.security.cert.X509CRLEntry; 30 import java.security.cert.X509Certificate; 31 import java.security.cert.X509Extension; 76 * java.security.cert.X509CRL#getExtensionValue(java.lang.String) 106 * java.security.cert.X509CRL#X509CRL() 194 public boolean isRevoked(Certificate cert) { [all...] |
X509CRLEntryTest.java | 23 package tests.security.cert; 30 import java.security.cert.CRLException; 31 import java.security.cert.X509CRLEntry;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 23 package org.apache.harmony.security.tests.support.cert; 34 import java.security.cert.CertPath; 35 import java.security.cert.CertPathBuilder; 36 import java.security.cert.CertPathBuilderException; 37 import java.security.cert.CertPathBuilderResult; 38 import java.security.cert.CertPathParameters; 39 import java.security.cert.CertPathValidatorException; 40 import java.security.cert.CertStore; 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException [all...] |
/packages/apps/Browser/src/com/android/browser/ |
PageDialogsHandler.java | 243 SslCertificate cert = tab.getWebView().getCertificate(); local 244 if (cert == null) { 249 mSSLCertificateDialog = createSslCertificateDialog(cert, tab.getSslCertificateError()) 283 SslCertificate cert = error.getCertificate(); local 284 if (cert == null) { 291 mSSLCertificateOnErrorDialog = createSslCertificateDialog(cert, error)
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
X509CertFactoryPerfTest.java | 21 package org.apache.harmony.security.tests.provider.cert; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.CertificateExpiredException; 33 import java.security.cert.CertificateNotYetValidException; 42 import java.security.cert.CertificateEncodingException; 43 import java.security.cert.X509Certificate; 49 import java.security.cert.CertificateParsingException; 343 Certificate cert = local 346 certEncoding = cert.getEncoded(); 369 java.security.cert.Certificate c = factory.generateCertificate(stream) [all...] |
X509CertImplTest.java | 21 package org.apache.harmony.security.tests.provider.cert; 31 import java.security.cert.CertificateEncodingException; 32 import java.security.cert.CertificateExpiredException; 33 import java.security.cert.CertificateNotYetValidException; 34 import java.security.cert.CertificateParsingException; 35 import java.security.cert.X509Certificate; 50 import org.apache.harmony.security.provider.cert.X509CertImpl; 51 import org.apache.harmony.security.tests.support.cert.TestUtils; 307 Certificate cert = local 310 certEncoding = cert.getEncoded() [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKKeyStore.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.CertificateEncodingException; 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 335 Certificate cert, 341 byte[] cEnc = cert.getEncoded(); 343 dOut.writeUTF(cert.getType()); 544 Certificate cert) 555 if (c.equals(cert)) 564 if (chain != null && chain[0].equals(cert)) 718 Certificate cert = decodeCertificate(dIn); local [all...] |
/libcore/luni/src/main/java/java/security/cert/ |
X509CertSelector.java | 18 package java.security.cert; 1107 X509Certificate cert = (X509Certificate) certificate; local [all...] |
/development/samples/KeyChainDemo/src/com/example/android/keychain/ |
KeyChainDemoActivity.java | 37 import java.security.cert.X509Certificate; 206 for (X509Certificate cert : certs) { 207 sb.append(cert.getIssuerDN()); 213 TextView certTv = (TextView) findViewById(R.id.cert);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory1Test.java | 21 package org.apache.harmony.security.tests.java.security.cert; 31 import java.security.cert.CRL; 32 import java.security.cert.CRLException; 33 import java.security.cert.CertPath; 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.CertificateFactorySpi; 44 import org.apache.harmony.security.tests.support.cert.MyCertPath; 45 import org.apache.harmony.security.tests.support.cert.MyCertificate [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 28 import java.security.cert.CertPath; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509CRL; 31 import java.security.cert.X509Certificate; [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CRLSelectorTest.java | 22 package java.security.cert; 32 import java.security.cert.CRLException; 33 import java.security.cert.X509CRLEntry; 91 public boolean isRevoked(Certificate cert) {
|
X509CertSelectorTest.java | 22 package java.security.cert; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertificateExpiredException; 35 import java.security.cert.CertificateNotYetValidException; 36 import java.security.cert.X509Certificate; 222 public boolean equals(Object cert) { 223 if (cert == null) { 227 || (((TestCert)cert).equalCriteria == null)) { 230 return equalCriteria.equals(((TestCert)cert).equalCriteria) 1655 TestCert cert = new TestCert(sans_1); local 2331 TestCert cert; local 2447 TestCert cert; local 2564 TestCert cert; local 2723 TestCert cert = new TestCert("certificate equality criteria"); local 2789 TestCert cert = new TestCert("certificate equality criteria"); local 2831 TestCert cert = new TestCert(); local 2884 TestCert cert = new TestCert("certificate equality criteria"); local [all...] |
/external/chromium/net/base/ |
x509_certificate_openssl.cc | 46 certs = pkcs7_cert.get()->d.sign->cert; 48 certs = pkcs7_cert.get()->d.signed_and_enveloped->cert; 72 void ParsePrincipal(X509Certificate::OSCertHandle cert, 97 void ParseSubjectAltNames(X509Certificate::OSCertHandle cert, 99 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1); 100 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index); 122 // Maps X509_STORE_CTX_get_error() return values to our cert status flags. 244 DERCache* SetDERCache(X509Certificate::OSCertHandle cert, 252 // |cert|. 259 X509_set_ex_data(cert, x509_der_cache_index, internal_cache) 356 X509* cert = d2i_X509(NULL, &d2i_data, length); local 463 X509* cert = sk_X509_value(chain, i); local [all...] |
/external/chromium/net/socket/ |
ssl_server_socket_unittest.cc | 233 scoped_refptr<net::X509Certificate> cert = local 255 cert_and_status.cert = cert; 264 cert, private_key.get(),
|
/external/chromium/third_party/libjingle/source/talk/base/ |
openssladapter.cc | 784 X509* cert = X509_STORE_CTX_get_current_cert(store); local 789 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 791 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 807 void* cert = local 809 if (custom_verify_callback_(cert)) { 817 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain"; 825 // Add the root cert to the SSL context 826 // TODO: this cert appears to be the wrong one. 834 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len) local [all...] |
/external/openssl/apps/ |
pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 517 /* If chaining get chain from user cert */ 827 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) 836 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 874 X509 *cert; local 877 CRYPTO_push_info("cert_load(): reading one cert"); 879 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 884 sk_X509_push(sk, cert); 886 CRYPTO_push_info("cert_load(): reading one cert");
|
/external/openssl/ssl/ |
d1_srvr.c | 183 if (s->cert == NULL) 478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 499 if (/* don't request cert unless asked for it: */ 502 * don't request cert during re-negotiation: */ 505 /* never request cert in anonymous ciphersuites 512 /* never request cert in Kerberos ciphersuites */ 518 /* no cert request */ 600 /* could be sent for a DH cert, even if we 647 * a client cert, it can be verified */ 1046 CERT *cert; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
x509v3.c | 42 * @cert: Certificate to be freed 44 void x509_certificate_free(struct x509_certificate *cert) 46 if (cert == NULL) 48 if (cert->next) { 51 cert, cert->next); 53 x509_free_name(&cert->issuer); 54 x509_free_name(&cert->subject); 55 os_free(cert->public_key); 56 os_free(cert->sign_value) 1216 struct x509_certificate *cert; local 1578 struct x509_certificate *cert, *trust; local 1704 struct x509_certificate *cert; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 50 const struct wpabuf *cert; member in struct:tls_event_data::__anon15592 56 const struct wpabuf *cert; member in struct:tls_event_data::__anon15593
|