/libcore/luni/src/main/java/java/security/cert/ |
Certificate.java | 18 package java.security.cert;
|
X509CRL.java | 18 package java.security.cert;
|
X509CRLSelector.java | 19 package java.security.cert; 261 * @param cert 264 public void setCertificateChecking(X509Certificate cert) { 265 this.certificateChecking = cert;
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
KeyManagerFactoryImpl.java | 28 import java.security.cert.CertificateException;
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.Certificate; 154 private PublicKey createPublicKey(String cert) throws Exception { 155 byte[] derCert = Base64.decode(cert.getBytes());
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
X509ExtendedKeyManagerTest.java | 23 import java.security.cert.X509Certificate;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateListTest.java | 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509CRL; 30 import java.security.cert.X509CRLEntry; 95 new GeneralName(new Name("O=Cert Organization"))//new GeneralName(4, "O=Organization")
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V1CertificateGenerator.java | 14 import java.security.cert.CertificateEncodingException; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.X509Certificate; 41 * @deprecated use org.bouncycastle.cert.X509v1CertificateBuilder. 304 throw new ExtCertificateEncodingException("exception encoding TBS cert", e); 343 throw new ExtCertificateEncodingException("exception encoding TBS cert", e);
|
/external/ipsec-tools/src/racoon/ |
oakley.c | 1346 /* get peer's cert */ 1351 "no peer's CERT payload found.\n"); 1360 "no peer's CERT file found.\n"); 1364 /* don't use cached cert */ 1674 vchar_t *cert = NULL; local 1758 vchar_t *cert = NULL; local 2215 X509 *cert = sk_X509_value(certs,i); local [all...] |
crypto_openssl.c | 455 eay_check_x509cert(cert, CApath, CAfile, local) 456 vchar_t *cert; 524 x509 = mem2x509(cert); 644 eay_get_x509asn1subjectname(cert) 645 vchar_t *cert; 652 bp = (unsigned char *) cert->v; 654 x509 = mem2x509(cert); 688 eay_get_x509subjectaltname(cert, altname, type, pos) 689 vchar_t *cert; 703 x509 = mem2x509(cert); 890 vchar_t *cert; local [all...] |
/external/openssh/regress/ |
Makefile | 58 cert-hostkey \ 59 cert-userkey \ 77 known_hosts-cert host_ca_key* cert_host_key* \
|
/external/openssl/crypto/ocsp/ |
ocsp_srv.c | 198 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 204 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
/external/openssl/crypto/pkcs7/ |
pk7_asn1.c | 122 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 178 X509_free(ri->cert); 205 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_gnutls.c | 455 static int tls_match_altsubject(X509 *cert, const char *match) 463 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); 584 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 591 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 617 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 624 "cert/key in DER format: %s", 715 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 722 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 749 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 756 "cert/key in DER format: %s" 879 gnutls_x509_crt_t cert; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 409 static int tls_match_altsubject(X509 *cert, const char *match) 417 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); 538 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 545 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 573 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 580 "cert/key in DER format: %s", 648 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 655 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 684 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 691 "cert/key in DER format: %s" 811 gnutls_x509_crt_t cert; local [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
AndroidKeyPairGeneratorTest.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate;
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.X509Certificate; 43 import org.apache.harmony.security.provider.cert.X509CertImpl;
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateException; 39 import java.security.cert.CertificateFactory;
|
KeyStoreSpiTest.java | 36 import java.security.cert.Certificate; 37 import java.security.cert.CertificateEncodingException; 38 import java.security.cert.CertificateException;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedData.java | 8 import java.security.cert.CertStore; 9 import java.security.cert.CertStoreException; 33 import org.bouncycastle.cert.X509AttributeCertificateHolder; 34 import org.bouncycastle.cert.X509CRLHolder; 35 import org.bouncycastle.cert.X509CertificateHolder; 62 * X509CertificateHolder cert = (X509CertificateHolder)certIt.next(); 64 * if (signer.verify(new JcaSimpleSignerInfoVerifierBuilder().setProvider("BC").build(cert))) 387 * @exception NoSuchAlgorithmException if the cert store isn't available. 403 * @exception NoSuchAlgorithmException if the cert store isn't available.
|
/external/openssl/crypto/x509v3/ |
v3_conf.c | 347 X509 *cert) 350 if (cert) 351 sk = &cert->cert_info->extensions; 500 char *section, X509 *cert) 504 return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert);
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old.c | 548 const struct wpabuf *cert) 575 cert_hex = cert ? wpabuf_head(cert) : ""; 576 cert_hex_len = cert ? wpabuf_len(cert) : 0;
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 36 import java.security.cert.Certificate; 37 import java.security.cert.CertificateFactory; 745 * 5. openssl x509 -req -days 37273 -in test.csr -signkey test.key -out test.cert 748 String certName = Support_Resources.getURL("test.cert"); 752 Certificate cert = cf.generateCertificate(is); local 757 c.init(Cipher.ENCRYPT_MODE, cert); 760 c.init(Cipher.ENCRYPT_MODE, cert); 775 * 5. openssl x509 -req -days 37273 -in test.csr -signkey test.key -out test.cert 778 String certName = Support_Resources.getURL("test.cert"); 782 Certificate cert = cf.generateCertificate(is) local 924 Certificate cert = cf.generateCertificate(is); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.TrustAnchor; 28 import java.security.cert.X509Certificate; 35 import org.apache.harmony.security.tests.support.cert.TestUtils; 485 X509Certificate cert = local 487 TrustAnchor ta = new TrustAnchor(cert, null); 488 assertEquals(cert, ta.getTrustedCert());
|