HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 276 - 300 of 761) sorted by null

<<11121314151617181920>>

  /external/chromium/chrome/browser/ssl/
ssl_error_info.cc 30 net::X509Certificate* cert,
45 cert->GetDNSNames(&dns_names);
49 if (dns_names[i] == cert->subject().common_name)
66 UTF8ToUTF16(cert->subject().common_name),
73 if (cert->HasExpired()) {
84 // valid as there is still a very unlikely chance that the cert might
260 scoped_refptr<net::X509Certificate> cert = NULL; local
265 if (!cert.get()) {
266 bool r = CertStore::GetInstance()->RetrieveCert(cert_id, &cert);
270 errors->push_back(SSLErrorInfo::CreateError(kErrorTypes[i], cert, url))
    [all...]
ssl_add_cert_handler.cc 18 net::X509Certificate* cert,
21 : cert_(cert),
ssl_manager.h 39 // Along with it are stored any SSL error code and the associated cert.
52 net::X509Certificate* cert);
70 static string16 GetEVCertName(const net::X509Certificate& cert);
  /external/openssl/crypto/pkcs12/
p12_kiss.c 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert
76 * or it should point to a valid STACK structure. pkey and cert can be
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
95 if(cert)
96 *cert = NULL;
135 if (pkey && *pkey && cert && !*cert)
139 *cert = x;
167 if (cert && *cert)
    [all...]
  /external/chromium/chrome/browser/ui/gtk/
certificate_viewer.cc 91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert);
95 net::X509Certificate::OSCertHandle cert);
106 // The certificate hierarchy (leaf cert first).
185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local
199 x509_certificate_model::GetUsageStrings(cert, &usages);
226 cert, alternative_text)));
230 cert, alternative_text));
234 cert, alternative_text));
238 cert, alternative_text));
248 cert, alternative_text)))
449 cert, &extensions); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_openssl.c 135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
258 if (priv->cert)
259 CertFreeCertificateContext(priv->cert);
286 if (strncmp(name, "cert://", 7) == 0) {
321 X509 *cert = NULL; local
327 (strncmp(name, "cert://", 7) != 0 &&
341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
342 if (priv->cert == NULL) {
343 priv->cert = cryptoapi_find_cert(
346 if (priv->cert == NULL)
423 X509 *cert; local
1112 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1426 X509 *cert; local
1558 X509 *cert; member in struct:__anon15379
1585 X509 *cert; local
1612 X509 *cert; local
    [all...]
  /external/chromium/net/base/
x509_certificate_nss.cc 7 #include <cert.h>
67 if (p->value.pointer.cert) {
68 CERT_DestroyCertificate(p->value.pointer.cert);
69 p->value.pointer.cert = NULL;
129 // Map PORT_GetError() return values to our cert status flags.
184 SECAlgorithmID& signature = node->cert->signature;
580 LOG(ERROR) << "Cert has no policies extension or extension couldn't be "
614 SHA1Fingerprint CertPublicKeyHash(CERTCertificate* cert) {
617 cert->derPublicKey.data, cert->derPublicKey.len)
685 CERTCertificate* cert = CERT_CreateCertificate(serial_number, subject_name, local
    [all...]
cert_verifier.cc 125 CertVerifierWorker(X509Certificate* cert,
129 : cert_(cert),
306 int CertVerifier::Verify(X509Certificate* cert,
321 const RequestParams key = {cert->fingerprint(), hostname, flags};
347 CertVerifierWorker* worker = new CertVerifierWorker(cert, hostname, flags,
389 void CertVerifier::HandleResult(X509Certificate* cert,
404 const RequestParams key = {cert->fingerprint(), hostname, flags};
438 void CertVerifier::OnCertTrustChanged(const X509Certificate* cert) {
463 int SingleRequestCertVerifier::Verify(X509Certificate* cert,
473 return cert->Verify(hostname, flags, verify_result)
    [all...]
ssl_config_service.h 26 // Returns true if |cert| is one of the certs in |allowed_bad_certs|.
27 bool IsAllowedBadCert(X509Certificate* cert) const;
68 scoped_refptr<X509Certificate> cert; member in struct:net::SSLConfig::CertAndStatus
72 // Add any known-bad SSL certificate (with its cert status) to
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactorySpiTest.java 23 package tests.security.cert;
28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi;
33 import java.security.cert.CRL;
34 import java.security.cert.CRLException;
35 import java.security.cert.Certificate;
36 import java.security.cert.CertificateException;
37 import java.security.cert.CertificateFactorySpi;
148 Certificate cert = certFactorySpi local
150 assertNull("Result must be null", cert);
218 Certificate cert = certFactorySp local
    [all...]
CertPathValidator2Test.java 23 package tests.security.cert;
28 import org.apache.harmony.security.tests.support.cert.MyCertPath;
29 import org.apache.harmony.security.tests.support.cert.TestUtils;
36 import java.security.cert.CertPath;
37 import java.security.cert.CertPathParameters;
38 import java.security.cert.CertPathValidator;
39 import java.security.cert.CertPathValidatorException;
40 import java.security.cert.PKIXParameters;
48 public static final String CertPathValidatorProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi";
X509CRLSelectorTest.java 23 package tests.security.cert;
28 import java.security.cert.X509CRLSelector;
37 * java.security.cert.X509CRLSelector#addIssuer(javax.security.auth.x500.X500Principal)
52 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String)
74 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String)
86 * java.security.cert.X509CRLSelector#addIssuerName(byte[])
100 * java.security.cert.X509CRLSelector#addIssuerName(byte[])
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 139 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
262 if (priv->cert)
263 CertFreeCertificateContext(priv->cert);
290 if (strncmp(name, "cert://", 7) == 0) {
325 X509 *cert = NULL; local
331 (strncmp(name, "cert://", 7) != 0 &&
345 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
346 if (priv->cert == NULL) {
347 priv->cert = cryptoapi_find_cert(
350 if (priv->cert == NULL)
427 X509 *cert; local
1120 struct wpabuf *cert = NULL; local
1142 struct wpabuf *cert = NULL; local
1214 struct wpabuf *cert; local
1387 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1701 X509 *cert; local
1833 X509 *cert; member in struct:__anon15598
1860 X509 *cert; local
1887 X509 *cert; local
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
TimestampTest.java 24 import java.security.cert.CertPath;
27 import org.apache.harmony.security.tests.support.cert.MyCertPath;
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
X509CRLSelectorTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
25 import java.security.cert.X509CRLSelector;
39 * @tests java.security.cert.X509CRLSelector#addIssuer(javax.security.auth.x500.X500Principal)
54 * @tests java.security.cert.X509CRLSelector#addIssuerName(java.lang.String)
76 * @tests java.security.cert.X509CRLSelector#addIssuerName(byte[])
90 * @tests java.security.cert.X509CRLSelector#addIssuerName(byte[])
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
PKIXParameters_ImplTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
28 import java.security.cert.CertPathParameters;
29 import java.security.cert.CertStore;
30 import java.security.cert.CollectionCertStoreParameters;
31 import java.security.cert.PKIXCertPathChecker;
32 import java.security.cert.PKIXParameters;
33 import java.security.cert.X509CertSelector;
40 import org.apache.harmony.security.tests.support.cert.TestUtils;
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
X509CRLEntryImplTest.java 22 package org.apache.harmony.security.tests.provider.cert;
28 import org.apache.harmony.security.provider.cert.X509CRLEntryImpl;
  /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/
SSLSessionBindingEventTest.java 21 import java.security.cert.Certificate;
27 import javax.security.cert.X509Certificate;
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar 
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old.h 88 const struct wpabuf *cert);
125 const struct wpabuf *cert)
  /libcore/luni/src/main/java/javax/net/ssl/
HttpsURLConnection.java 23 import java.security.cert.Certificate;
24 import java.security.cert.X509Certificate;
64 * of {@link java.security.cert.CertPathValidator
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
SSLSessionImpl.java 22 import java.security.cert.Certificate;
23 import java.security.cert.CertificateEncodingException;
24 import java.security.cert.X509Certificate;
118 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
123 javax.security.cert.X509Certificate[] certs = new javax.security.cert.X509Certificate[peerCertificates.length];
126 certs[i] = javax.security.cert.X509Certificate.getInstance(peerCertificates[i]
128 } catch (javax.security.cert.CertificateException ignored) {
  /libcore/luni/src/test/java/libcore/java/security/cert/
PKIXParametersTest.java 17 package libcore.java.security.cert;
22 import java.security.cert.PKIXParameters;
38 ks.setCertificateEntry("cert", pke.getCertificateChain()[0]);
41 // should fail with just key, even though cert is present in key entry
  /libcore/luni/src/test/java/libcore/javax/security/auth/x500/
X500PrincipalTest.java 20 import java.security.cert.CertificateFactory;
21 import java.security.cert.X509Certificate;
  /libcore/support/src/test/java/libcore/javax/net/ssl/
FakeSSLSession.java 21 import java.security.cert.Certificate;
63 public javax.security.cert.X509Certificate[] getPeerCertificateChain() {

Completed in 1784 milliseconds

<<11121314151617181920>>