/external/chromium/chrome/browser/ssl/ |
ssl_error_info.cc | 30 net::X509Certificate* cert, 45 cert->GetDNSNames(&dns_names); 49 if (dns_names[i] == cert->subject().common_name) 66 UTF8ToUTF16(cert->subject().common_name), 73 if (cert->HasExpired()) { 84 // valid as there is still a very unlikely chance that the cert might 260 scoped_refptr<net::X509Certificate> cert = NULL; local 265 if (!cert.get()) { 266 bool r = CertStore::GetInstance()->RetrieveCert(cert_id, &cert); 270 errors->push_back(SSLErrorInfo::CreateError(kErrorTypes[i], cert, url)) [all...] |
ssl_add_cert_handler.cc | 18 net::X509Certificate* cert, 21 : cert_(cert),
|
ssl_manager.h | 39 // Along with it are stored any SSL error code and the associated cert. 52 net::X509Certificate* cert); 70 static string16 GetEVCertName(const net::X509Certificate& cert);
|
/external/openssl/crypto/pkcs12/ |
p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
/external/chromium/chrome/browser/ui/gtk/ |
certificate_viewer.cc | 91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert); 95 net::X509Certificate::OSCertHandle cert); 106 // The certificate hierarchy (leaf cert first). 185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local 199 x509_certificate_model::GetUsageStrings(cert, &usages); 226 cert, alternative_text))); 230 cert, alternative_text)); 234 cert, alternative_text)); 238 cert, alternative_text)); 248 cert, alternative_text))) 449 cert, &extensions); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_openssl.c | 135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 258 if (priv->cert) 259 CertFreeCertificateContext(priv->cert); 286 if (strncmp(name, "cert://", 7) == 0) { 321 X509 *cert = NULL; local 327 (strncmp(name, "cert://", 7) != 0 && 341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 342 if (priv->cert == NULL) { 343 priv->cert = cryptoapi_find_cert( 346 if (priv->cert == NULL) 423 X509 *cert; local 1112 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1426 X509 *cert; local 1558 X509 *cert; member in struct:__anon15379 1585 X509 *cert; local 1612 X509 *cert; local [all...] |
/external/chromium/net/base/ |
x509_certificate_nss.cc | 7 #include <cert.h> 67 if (p->value.pointer.cert) { 68 CERT_DestroyCertificate(p->value.pointer.cert); 69 p->value.pointer.cert = NULL; 129 // Map PORT_GetError() return values to our cert status flags. 184 SECAlgorithmID& signature = node->cert->signature; 580 LOG(ERROR) << "Cert has no policies extension or extension couldn't be " 614 SHA1Fingerprint CertPublicKeyHash(CERTCertificate* cert) { 617 cert->derPublicKey.data, cert->derPublicKey.len) 685 CERTCertificate* cert = CERT_CreateCertificate(serial_number, subject_name, local [all...] |
cert_verifier.cc | 125 CertVerifierWorker(X509Certificate* cert, 129 : cert_(cert), 306 int CertVerifier::Verify(X509Certificate* cert, 321 const RequestParams key = {cert->fingerprint(), hostname, flags}; 347 CertVerifierWorker* worker = new CertVerifierWorker(cert, hostname, flags, 389 void CertVerifier::HandleResult(X509Certificate* cert, 404 const RequestParams key = {cert->fingerprint(), hostname, flags}; 438 void CertVerifier::OnCertTrustChanged(const X509Certificate* cert) { 463 int SingleRequestCertVerifier::Verify(X509Certificate* cert, 473 return cert->Verify(hostname, flags, verify_result) [all...] |
ssl_config_service.h | 26 // Returns true if |cert| is one of the certs in |allowed_bad_certs|. 27 bool IsAllowedBadCert(X509Certificate* cert) const; 68 scoped_refptr<X509Certificate> cert; member in struct:net::SSLConfig::CertAndStatus 72 // Add any known-bad SSL certificate (with its cert status) to
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactorySpiTest.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 33 import java.security.cert.CRL; 34 import java.security.cert.CRLException; 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactorySpi; 148 Certificate cert = certFactorySpi local 150 assertNull("Result must be null", cert); 218 Certificate cert = certFactorySp local [all...] |
CertPathValidator2Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertPath; 29 import org.apache.harmony.security.tests.support.cert.TestUtils; 36 import java.security.cert.CertPath; 37 import java.security.cert.CertPathParameters; 38 import java.security.cert.CertPathValidator; 39 import java.security.cert.CertPathValidatorException; 40 import java.security.cert.PKIXParameters; 48 public static final String CertPathValidatorProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi";
|
X509CRLSelectorTest.java | 23 package tests.security.cert; 28 import java.security.cert.X509CRLSelector; 37 * java.security.cert.X509CRLSelector#addIssuer(javax.security.auth.x500.X500Principal) 52 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String) 74 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String) 86 * java.security.cert.X509CRLSelector#addIssuerName(byte[]) 100 * java.security.cert.X509CRLSelector#addIssuerName(byte[])
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 139 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 262 if (priv->cert) 263 CertFreeCertificateContext(priv->cert); 290 if (strncmp(name, "cert://", 7) == 0) { 325 X509 *cert = NULL; local 331 (strncmp(name, "cert://", 7) != 0 && 345 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 346 if (priv->cert == NULL) { 347 priv->cert = cryptoapi_find_cert( 350 if (priv->cert == NULL) 427 X509 *cert; local 1120 struct wpabuf *cert = NULL; local 1142 struct wpabuf *cert = NULL; local 1214 struct wpabuf *cert; local 1387 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1701 X509 *cert; local 1833 X509 *cert; member in struct:__anon15598 1860 X509 *cert; local 1887 X509 *cert; local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
TimestampTest.java | 24 import java.security.cert.CertPath; 27 import org.apache.harmony.security.tests.support.cert.MyCertPath;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
X509CRLSelectorTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 25 import java.security.cert.X509CRLSelector; 39 * @tests java.security.cert.X509CRLSelector#addIssuer(javax.security.auth.x500.X500Principal) 54 * @tests java.security.cert.X509CRLSelector#addIssuerName(java.lang.String) 76 * @tests java.security.cert.X509CRLSelector#addIssuerName(byte[]) 90 * @tests java.security.cert.X509CRLSelector#addIssuerName(byte[])
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXParameters_ImplTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 28 import java.security.cert.CertPathParameters; 29 import java.security.cert.CertStore; 30 import java.security.cert.CollectionCertStoreParameters; 31 import java.security.cert.PKIXCertPathChecker; 32 import java.security.cert.PKIXParameters; 33 import java.security.cert.X509CertSelector; 40 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
X509CRLEntryImplTest.java | 22 package org.apache.harmony.security.tests.provider.cert; 28 import org.apache.harmony.security.provider.cert.X509CRLEntryImpl;
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
SSLSessionBindingEventTest.java | 21 import java.security.cert.Certificate; 27 import javax.security.cert.X509Certificate;
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar | |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old.h | 88 const struct wpabuf *cert); 125 const struct wpabuf *cert)
|
/libcore/luni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 23 import java.security.cert.Certificate; 24 import java.security.cert.X509Certificate; 64 * of {@link java.security.cert.CertPathValidator
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLSessionImpl.java | 22 import java.security.cert.Certificate; 23 import java.security.cert.CertificateEncodingException; 24 import java.security.cert.X509Certificate; 118 public javax.security.cert.X509Certificate[] getPeerCertificateChain() 123 javax.security.cert.X509Certificate[] certs = new javax.security.cert.X509Certificate[peerCertificates.length]; 126 certs[i] = javax.security.cert.X509Certificate.getInstance(peerCertificates[i] 128 } catch (javax.security.cert.CertificateException ignored) {
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
PKIXParametersTest.java | 17 package libcore.java.security.cert; 22 import java.security.cert.PKIXParameters; 38 ks.setCertificateEntry("cert", pke.getCertificateChain()[0]); 41 // should fail with just key, even though cert is present in key entry
|
/libcore/luni/src/test/java/libcore/javax/security/auth/x500/ |
X500PrincipalTest.java | 20 import java.security.cert.CertificateFactory; 21 import java.security.cert.X509Certificate;
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
FakeSSLSession.java | 21 import java.security.cert.Certificate; 63 public javax.security.cert.X509Certificate[] getPeerCertificateChain() {
|