/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ |
CodeSignerTest.java | 26 import java.security.cert.CertPath;
|
TimestampTest.java | 25 import java.security.cert.CertPath;
|
/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
DigitalSignatureTest.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateException; 87 Certificate cert = new Certificate("myType") { local 139 dsig.init(cert);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/ |
MSOutlookKeyIdCalculator.java | 1 package org.bouncycastle.cert.selector;
|
/external/chromium/net/base/ |
cert_verifier.h | 101 int Verify(X509Certificate* cert, 154 void HandleResult(X509Certificate* cert, 161 virtual void OnCertTrustChanged(const X509Certificate* cert); 195 int Verify(X509Certificate* cert,
|
ssl_client_auth_cache.cc | 44 void SSLClientAuthCache::OnUserCertAdded(const X509Certificate* cert) {
|
ssl_client_auth_cache.h | 49 virtual void OnUserCertAdded(const X509Certificate* cert);
|
x509_certificate_nss.cc | 7 #include <cert.h> 67 if (p->value.pointer.cert) { 68 CERT_DestroyCertificate(p->value.pointer.cert); 69 p->value.pointer.cert = NULL; 129 // Map PORT_GetError() return values to our cert status flags. 184 SECAlgorithmID& signature = node->cert->signature; 580 LOG(ERROR) << "Cert has no policies extension or extension couldn't be " 614 SHA1Fingerprint CertPublicKeyHash(CERTCertificate* cert) { 617 cert->derPublicKey.data, cert->derPublicKey.len) 685 CERTCertificate* cert = CERT_CreateCertificate(serial_number, subject_name, local [all...] |
cert_verifier.cc | 125 CertVerifierWorker(X509Certificate* cert, 129 : cert_(cert), 306 int CertVerifier::Verify(X509Certificate* cert, 321 const RequestParams key = {cert->fingerprint(), hostname, flags}; 347 CertVerifierWorker* worker = new CertVerifierWorker(cert, hostname, flags, 389 void CertVerifier::HandleResult(X509Certificate* cert, 404 const RequestParams key = {cert->fingerprint(), hostname, flags}; 438 void CertVerifier::OnCertTrustChanged(const X509Certificate* cert) { 463 int SingleRequestCertVerifier::Verify(X509Certificate* cert, 473 return cert->Verify(hostname, flags, verify_result) [all...] |
/external/openssl/crypto/pkcs7/ |
pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/libcore/luni/src/main/java/java/security/cert/ |
CollectionCertStoreParameters.java | 18 package java.security.cert;
|
PKIXCertPathBuilderResult.java | 19 package java.security.cert;
|
/libcore/luni/src/main/java/javax/net/ssl/ |
X509KeyManager.java | 23 import java.security.cert.X509Certificate;
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
Certificate.java | 129 Certificate cert = (Certificate) object; 130 values[0] = cert.tbsCertificate; 131 values[1] = cert.signatureAlgorithm; 132 values[2] = new BitString(cert.signatureValue, 0);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStoreSpi.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 80 public void engineSetCertificateEntry(String alias, Certificate cert) 124 public String engineGetCertificateAlias(Certificate cert) {
|
/tools/build/builder/src/main/java/com/android/builder/signing/ |
SigningInfo.java | 22 import java.security.cert.X509Certificate;
|
/external/chromium/chrome/browser/ssl/ |
ssl_error_info.cc | 30 net::X509Certificate* cert, 45 cert->GetDNSNames(&dns_names); 49 if (dns_names[i] == cert->subject().common_name) 66 UTF8ToUTF16(cert->subject().common_name), 73 if (cert->HasExpired()) { 84 // valid as there is still a very unlikely chance that the cert might 260 scoped_refptr<net::X509Certificate> cert = NULL; local 265 if (!cert.get()) { 266 bool r = CertStore::GetInstance()->RetrieveCert(cert_id, &cert); 270 errors->push_back(SSLErrorInfo::CreateError(kErrorTypes[i], cert, url)) [all...] |
/external/openssl/crypto/pkcs12/ |
p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
CertPinInstallReceiverTest.java | 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.Certificate; 35 import java.security.cert.X509Certificate; 174 String signature, X509Certificate cert) throws Exception { 176 signer.initVerify(cert); 193 private String runTest(String cert, String content, String version, String required, String sig) 196 overrideCert(cert); 203 private String runTestWithoutSig(String cert, String content, String version, String required) 206 return runTest(cert, content, version, required, sig);
|
/external/chromium/chrome/browser/ui/gtk/ |
certificate_viewer.cc | 91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert); 95 net::X509Certificate::OSCertHandle cert); 106 // The certificate hierarchy (leaf cert first). 185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local 199 x509_certificate_model::GetUsageStrings(cert, &usages); 226 cert, alternative_text))); 230 cert, alternative_text)); 234 cert, alternative_text)); 238 cert, alternative_text)); 248 cert, alternative_text))) 449 cert, &extensions); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_openssl.c | 135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 258 if (priv->cert) 259 CertFreeCertificateContext(priv->cert); 286 if (strncmp(name, "cert://", 7) == 0) { 321 X509 *cert = NULL; local 327 (strncmp(name, "cert://", 7) != 0 && 341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 342 if (priv->cert == NULL) { 343 priv->cert = cryptoapi_find_cert( 346 if (priv->cert == NULL) 423 X509 *cert; local 1117 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1431 X509 *cert; local 1563 X509 *cert; member in struct:__anon16755 1590 X509 *cert; local 1617 X509 *cert; local [all...] |
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/ui/model/ |
EntryNode.java | 29 import java.security.cert.Certificate;
30 import java.security.cert.CertificateEncodingException;
31 import java.security.cert.CertificateExpiredException;
32 import java.security.cert.CertificateNotYetValidException;
33 import java.security.cert.X509Certificate;
43 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;
99 X509Certificate cert = getX509Certificate();
local 100 if (cert != null)
105 x500name = new JcaX509CertificateHolder(cert).getSubject();
510 Certificate cert = getCertificate(); local 522 Certificate cert = chain[i]; local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactorySpiTest.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 33 import java.security.cert.CRL; 34 import java.security.cert.CRLException; 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactorySpi; 148 Certificate cert = certFactorySpi local 150 assertNull("Result must be null", cert); 218 Certificate cert = certFactorySp local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 139 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 262 if (priv->cert) 263 CertFreeCertificateContext(priv->cert); 290 if (strncmp(name, "cert://", 7) == 0) { 325 X509 *cert = NULL; local 331 (strncmp(name, "cert://", 7) != 0 && 345 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 346 if (priv->cert == NULL) { 347 priv->cert = cryptoapi_find_cert( 350 if (priv->cert == NULL) 427 X509 *cert; local 1138 struct wpabuf *cert = NULL; local 1160 struct wpabuf *cert = NULL; local 1232 struct wpabuf *cert; local 1409 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1723 X509 *cert; local 1855 X509 *cert; member in struct:__anon16978 1882 X509 *cert; local 1909 X509 *cert; local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
TimestampTest.java | 24 import java.security.cert.CertPath; 27 import org.apache.harmony.security.tests.support.cert.MyCertPath;
|