/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 291 CERTCertificate *cert; local 301 cert = SSL_PeerCertificate(fd); 302 subject = CERT_NameToAscii(&cert->subject); 303 issuer = CERT_NameToAscii(&cert->issuer); 306 CERT_DestroyCertificate(cert);
|
/libcore/luni/src/main/java/libcore/net/http/ |
HttpResponseCache.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.CertificateEncodingException; 44 import java.security.cert.CertificateException; 45 import java.security.cert.CertificateFactory; 46 import java.security.cert.X509Certificate;
|
/external/openssh/ |
ssh-agent.c | 476 u_char *cert; local 509 cert = buffer_get_string(&e->request, &len); 510 if ((k = key_from_blob(cert, len)) == NULL) 512 xfree(cert); 551 cert = buffer_get_string(&e->request, &len); 552 if ((k = key_from_blob(cert, len)) == NULL) 554 xfree(cert); 583 cert = buffer_get_string(&e->request, &len); 584 if ((k = key_from_blob(cert, len)) == NULL) 586 xfree(cert); [all...] |
/external/chromium/net/ocsp/ |
nss_ocsp.cc | 125 char* GetAlternateOCSPAIAInfo(CERTCertificate *cert); 742 strcasecmp(mime_type, "application/x-x509-ca-cert") == 0 || 743 strcasecmp(mime_type, "application/x-x509-server-cert") == 0 || 744 strcasecmp(mime_type, "application/pkix-cert") == 0 || 861 char* GetAlternateOCSPAIAInfo(CERTCertificate *cert) { 862 if (cert && !cert->isRoot && cert->authKeyID) { 865 &cert->derIssuer) == SECEqual && 867 &cert->authKeyID->keyID) == SECEqual) [all...] |
/frameworks/base/core/java/android/webkit/ |
BrowserFrame.java | 49 import java.security.cert.CertificateEncodingException; 50 import java.security.cert.X509Certificate; 58 import org.apache.harmony.security.provider.cert.X509CertImpl; 1082 X509Certificate cert = new X509CertImpl(certDER); local 1206 X509Certificate cert = new X509CertImpl(cert_der); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KSBuilder_ImplTest.java | 36 import java.security.cert.Certificate; 37 import java.security.cert.CertificateEncodingException; 38 import java.security.cert.CertificateException;
|
KeyStore_Impl2Test.java | 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 43 import org.apache.harmony.security.tests.support.cert.MyCertificate;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
DRLCertFactoryTest.java | 22 package org.apache.harmony.security.tests.provider.cert; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.CertificateException;
|
/external/openssl/apps/ |
s_cb.c | 150 BIO_puts(bio_err, "<no cert>\n"); 242 /* Now we know that a key and cert have been set against 253 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key) 255 if (cert == NULL) 257 if (SSL_CTX_use_certificate(ctx,cert) <= 0) 271 /* Now we know that a key and cert have been set against 702 extname = "cert type";
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
WebUrlLoaderClient.cpp | 235 sCertificateTypeSet.insert("application/x-x509-ca-cert"); 236 sCertificateTypeSet.insert("application/x-x509-user-cert"); 376 ssl_info.cert->GetChainDEREncodedBytes(&chain_bytes); 475 void WebUrlLoaderClient::reportSslCertError(int cert_error, net::X509Certificate* cert) 481 cert->GetChainDEREncodedBytes(&chain_bytes);
|
/frameworks/base/keystore/tests/src/android/security/ |
AndroidKeyStoreTest.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate; 91 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 958 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_CA_1)); local 977 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_CA_1)); local 1379 final X509Certificate cert = certGen.generate(privKey); local 1446 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, local 1458 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local 1469 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local [all...] |
/build/tools/signapk/ |
SignApk.java | 23 import org.bouncycastle.cert.jcajce.JcaCertStore; 57 import java.security.cert.CertificateEncodingException; 58 import java.security.cert.CertificateFactory; 59 import java.security.cert.X509Certificate; 84 private static final String CERT_SF_NAME = "META-INF/CERT.SF"; 85 private static final String CERT_RSA_NAME = "META-INF/CERT.RSA"; 237 * cert can be extracted from the CERT.RSA file but this is much 570 // CERT.SF 579 // CERT.RS [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 27 import java.security.cert.CertificateFactory;
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/ |
Signature_Impl2Test.java | 227 private class MyCertificate extends java.security.cert.Certificate {
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509CertificateHolder.java | 1 package org.bouncycastle.cert;
|
/external/chromium/chrome/browser/ssl/ |
ssl_blocking_page.cc | 104 ssl_info.cert, tab()->render_view_host()->process()->id());
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
OAuth.php | 184 // Fetch the private key cert based on the request 185 $cert = $this->fetch_private_cert($request); variable 188 $privatekeyid = openssl_get_privatekey($cert); 204 // Fetch the public key cert based on the request 205 $cert = $this->fetch_public_cert($request); variable 208 $publickeyid = openssl_get_publickey($cert);
|
/external/chromium/net/base/ |
x509_certificate.cc | 28 // Returns true if this cert fingerprint is the null (all zero) fingerprint. 60 void Insert(X509Certificate* cert); 86 // Insert |cert| into the cache. The cache does NOT AddRef |cert|. 88 void X509CertificateCache::Insert(X509Certificate* cert) { 91 DCHECK(!IsNullFingerprint(cert->fingerprint())) << 97 cache_[cert->fingerprint()] = cert; 177 // Else the new cert is better and will replace the old one in the cache. 181 scoped_refptr<X509Certificate> cert = new X509Certificate(cert_handle, source local 218 scoped_refptr<X509Certificate> cert = local [all...] |
/external/chromium/net/url_request/ |
url_request_test_util.h | 140 net::X509Certificate* cert);
|
/external/ipsec-tools/src/racoon/ |
oakley.h | 168 u_int8_t type; /* type of CERT, must be same to pl->v[0]*/ 169 vchar_t cert; /* pointer to the CERT */ member in struct:cert_t_tag 170 vchar_t *pl; /* CERT payload minus isakmp general header */
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 304 sk= &(p7->d.sign->cert); 307 sk= &(p7->d.signed_and_enveloped->cert); 571 p7i->cert=x509; 584 return(X509_find_by_issuer_and_serial(p7->d.sign->cert,
|
/external/openssl/crypto/x509v3/ |
pcy_tree.c | 259 level->cert = x; 704 cache = policy_cache_set(curr->cert); 741 if (curr->cert) 742 X509_free(curr->cert);
|
/external/tcpdump/ |
isakmp.h | 249 u_int8_t encode; /* Cert Encoding */ 250 char cert; /* Certificate Data */ member in struct:isakmp_pl_cert 273 u_int8_t num_cert; /* # Cert. Types */
|
/external/webkit/Source/WebKit/win/ |
WebMutableURLRequest.h | 159 /* [in] */ OLE_HANDLE cert);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
notify.h | 124 const struct wpabuf *cert);
|