/external/chromium_org/net/cert/ |
x509_util_ios.cc | 5 #include "net/cert/x509_util_ios.h" 7 #include <cert.h> 14 #include "net/cert/x509_certificate.h" 15 #include "net/cert/x509_util_nss.h" 79 X509Certificate* cert = NULL; local 81 cert = X509Certificate::CreateFromHandle(os_server_cert, 87 return cert; 90 SHA1HashValue CalculateFingerprintNSS(CERTCertificate* cert) { 91 DCHECK(cert->derCert.data); 92 DCHECK_NE(0U, cert->derCert.len) [all...] |
nss_cert_database.cc | 5 #include "net/cert/nss_cert_database.h" 7 #include <cert.h> 27 #include "net/cert/cert_database.h" 28 #include "net/cert/x509_certificate.h" 51 const scoped_refptr<X509Certificate>& cert, 53 : certificate(cert), net_error(err) {} 225 const X509Certificate* cert, 228 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust); 271 bool NSSCertDatabase::IsUntrusted(const X509Certificate* cert) const { 273 SECStatus rv = CERT_GetCertTrust(cert->os_cert_handle(), &nsstrust) [all...] |
cert_verify_proc.h | 14 #include "net/cert/x509_cert_types.h" 57 int Verify(X509Certificate* cert, 79 virtual int VerifyInternal(X509Certificate* cert, 86 // Returns true if |cert| is explicitly blacklisted. 87 static bool IsBlacklisted(X509Certificate* cert);
|
mock_cert_verifier.h | 10 #include "net/cert/cert_verifier.h" 11 #include "net/cert/cert_verify_result.h" 18 // result in the cert status being flagged as CERT_STATUS_INVALID and return 28 virtual int Verify(X509Certificate* cert, 44 // Adds a rule that will cause any call to Verify() for |cert| to return rv, 46 // Note: Only the primary certificate of |cert| is checked. Any intermediate 48 void AddResultForCert(X509Certificate* cert, 54 void AddResultForCertAndHost(X509Certificate* cert,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXCertPathCheckerTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertPathValidatorException; 25 import java.security.cert.PKIXCertPathChecker; 28 import org.apache.harmony.security.tests.support.cert.MyCertificate; 29 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
CRLTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CRL; 26 import org.apache.harmony.security.tests.support.cert.MyCRL; 31 * Tests for <code>java.security.cert.CRL</code> fields and methods
|
/external/chromium_org/chromeos/ |
cert_loader.h | 18 #include "net/cert/cert_database.h" 32 // initialized), or the cert database changes, observers are called with 62 // should be used only to identify the cert in its slot. 65 // TODO(tbarzic): Make this check cert slot id if we start loading 67 static std::string GetPkcs11IdForCert(const net::X509Certificate& cert); 69 // Starts the CertLoader with the NSS cert database. 85 bool IsCertificateHardwareBacked(const net::X509Certificate* cert) const; 113 virtual void OnCACertChanged(const net::X509Certificate* cert) OVERRIDE; 114 virtual void OnCertAdded(const net::X509Certificate* cert) OVERRIDE; 115 virtual void OnCertRemoved(const net::X509Certificate* cert) OVERRIDE [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 41 #include <cert.h> 48 #include "net/cert/x509_certificate.h" 49 #include "net/cert/x509_util_nss.h" 70 // Mozilla had some code here to check if a perm version of the cert exists 113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local 114 if (cert == root) { 120 // PR_TRUE). Afaict, checking !CERT_IsCACert on each cert is equivalent. 121 if (!CERT_IsCACert(cert->os_cert_handle(), NULL)) { 123 cert, net::ERR_IMPORT_CA_CERT_NOT_CA)); 124 VLOG(1) << "skipping cert (non-ca)" 180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
ChainStrengthAnalyzerTest.java | 21 import java.security.cert.CertificateException; 22 import java.security.cert.CertificateFactory; 23 import java.security.cert.X509Certificate; 118 private static void check(X509Certificate cert) throws Exception { 119 X509Certificate[] chain = {cert};
|
/libcore/luni/src/main/java/java/security/cert/ |
X509Certificate.java | 18 package java.security.cert; 188 X509Certificate cert = (X509Certificate) factory local 191 return cert.getIssuerX500Principal(); 244 X509Certificate cert = (X509Certificate) factory local 247 return cert.getSubjectX500Principal();
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 22 import java.security.cert.Certificate; 23 import java.security.cert.CertificateEncodingException; 33 public static String getFingerprint(Certificate cert, String hashAlgorithm) { 34 if (cert == null) { 39 return toHexadecimalString(digest.digest(cert.getEncoded()));
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
DefaultHostnameVerifierTest.java | 25 import java.security.cert.CertificateFactory; 26 import java.security.cert.X509Certificate; 150 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 168 assertTrue(verifier.verify("www.example.com", cert)); 169 assertFalse(verifier.verify("www2.example.com", cert)); 175 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 192 assertTrue(verifier.verify("www.example.com", cert)); 193 assertFalse(verifier.verify("www2.example.com", cert)); 200 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 219 assertFalse(verifier.verify("www.example.com", cert)); 229 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local 257 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local 282 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local [all...] |
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 25 openssl req -config ${DIR}/default.cnf -new -key ${DIR}/privkey.pem -nodes -batch > /tmp/cert-rsa-req.pem 26 openssl req -in /tmp/cert-rsa-req.pem -pubkey -noout | openssl rsa -pubin -pubout -outform der > ${DIR}/cert-rsa-pubkey.der 27 openssl x509 -extfile ${DIR}/default.cnf -days 3650 -extensions usr_cert -req -signkey ${DIR}/privkey.pem -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > ${DIR}/cert-rsa.der 28 rm /tmp/cert-rsa-req.pem 30 openssl asn1parse -in ${DIR}/cert-rsa.der -inform d -out ${DIR}/cert-rsa-tbs.der -noout -strparse 4 31 SIG_OFFSET=$(openssl asn1parse -in ${DIR}/cert-rsa.der -inform d | tail -1 | cut -f1 -d:) 32 openssl asn1parse -in ${DIR}/cert-rsa.der -inform d -strparse ${SIG_OFFSET} -noout -out ${DIR}/cert-rsa-sig.de [all...] |
/external/chromium_org/chrome/browser/ |
certificate_manager_model.cc | 21 #include "net/cert/x509_certificate.h" 107 net::X509Certificate* cert = i->get(); local 109 x509_certificate_model::GetType(cert->os_cert_handle()); 114 if (!cert->subject().organization_names.empty()) 115 org = cert->subject().organization_names[0]; 117 org = cert->subject().GetDisplayName(); 119 (*map)[org].push_back(cert); 124 const net::X509Certificate& cert, 130 x509_certificate_model::GetCertNameOrNickname(cert.os_cert_handle())); 133 if (IsHardwareBacked(&cert)) { [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 22 package org.apache.harmony.security.tests.support.cert; 24 import java.security.cert.CertPath; 25 import java.security.cert.CertificateEncodingException; 33 * Stub class for <code>java.security.cert.CertPath</code> tests 45 * my cert path the only encoding 66 * @see java.security.cert.CertPath#getCertificates() 73 * @return default encoded form of this cert path 74 * @see java.security.cert.CertPath#getEncoded() 81 * @return encoded form of this cert path as specified by 85 * @see java.security.cert.CertPath#getEncoded(java.lang.String [all...] |
/external/chromium_org/content/browser/ssl/ |
ssl_policy_backend.h | 13 #include "net/cert/cert_status_flags.h" 14 #include "net/cert/x509_certificate.h" 30 // Records that |cert| is not permitted to be used for |host| in the future, 32 void DenyCertForHost(net::X509Certificate* cert, 36 // Records that |cert| is permitted to be used for |host| in the future, for 38 void AllowCertForHost(net::X509Certificate* cert, 42 // Queries whether |cert| is allowed or denied for |host|. 43 net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert,
|
ssl_client_auth_handler.cc | 12 #include "net/cert/x509_certificate.h" 55 void SSLClientAuthHandler::CertificateSelected(net::X509Certificate* cert) { 58 VLOG(1) << this << " CertificateSelected " << cert; 63 make_scoped_refptr(cert))); 73 // DoCertificateSelected. This is for platforms where the client cert matching 74 // is not performed by Chrome, the platform can handle the cert matching 100 void SSLClientAuthHandler::DoCertificateSelected(net::X509Certificate* cert) { 101 VLOG(1) << this << " DoCertificateSelected " << cert; 104 // user was choosing a cert, or because we have already responded to the 107 request_->ContinueWithCertificate(cert); [all...] |
/external/chromium_org/net/ssl/ |
server_bound_cert_store.cc | 17 const std::string& cert) 22 cert_(cert) {} 30 i->expiration_time(), i->private_key(), i->cert());
|
ssl_info.cc | 8 #include "net/cert/cert_status_flags.h" 9 #include "net/cert/signed_certificate_timestamp.h" 10 #include "net/cert/x509_certificate.h" 26 cert = info.cert; 42 cert = NULL;
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509CRLTest.java | 23 package tests.security.cert; 39 import java.security.cert.CRLException; 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateFactory; 42 import java.security.cert.X509CRL; 43 import java.security.cert.X509CRLEntry; 44 import java.security.cert.X509Certificate; 50 import org.apache.harmony.security.tests.support.cert.TestUtils; 52 import tests.security.cert.X509CRL2Test.MyX509CRL; 86 public boolean isRevoked(Certificate cert) { 286 X509Certificate cert = (X509Certificate) cf.generateCertificate(certArray); local [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
CertificateRequestTest.java | 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 60 X509Certificate cert = (X509Certificate) certFactory.generateCertificate(bais); local 61 X509Certificate[] accepted = { cert }; 62 X500Principal[] certificate_authorities = { cert.getIssuerX500Principal() };
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslidentity.h | 69 // Provides the cert chain, or returns false. The caller owns the chain. 102 explicit SSLCertChain(const SSLCertificate* cert) { 103 certs_.push_back(cert->GetReference()); 124 static SSLCertificate* DupCert(const SSLCertificate* cert) { 125 return cert->GetReference(); 129 static void DeleteCert(SSLCertificate* cert) { delete cert; }
|
/external/chromium_org/third_party/webrtc/base/ |
sslidentity.h | 52 // Provides the cert chain, or returns false. The caller owns the chain. 85 explicit SSLCertChain(const SSLCertificate* cert) { 86 certs_.push_back(cert->GetReference()); 107 static SSLCertificate* DupCert(const SSLCertificate* cert) { 108 return cert->GetReference(); 112 static void DeleteCert(SSLCertificate* cert) { delete cert; }
|
/frameworks/base/core/java/android/net/http/ |
SslError.java | 19 import java.security.cert.X509Certificate; 140 int error, SslCertificate cert, String url) { 145 return new SslError(SSL_IDMISMATCH, cert, url); 147 return new SslError(SSL_DATE_INVALID, cert, url); 149 return new SslError(SSL_UNTRUSTED, cert, url); 151 return new SslError(SSL_INVALID, cert, url);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateEncodingException; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 140 X509Certificate cert[] = new X509Certificate[2]; local 141 cert[0] = (X509Certificate) cf.generateCertificate(certArray); 142 cert[1] = (X509Certificate) cf.generateCertificate(certArray2); 146 keyTest.setCertificateEntry("alias1", cert[0]); 149 keyTest.setKeyEntry("alias2", getPrivateKey(), pssWord, cert); 169 X509Certificate cert[] = new X509Certificate[2]; local 214 X509Certificate cert[] = new X509Certificate[2]; local 251 X509Certificate cert[] = new X509Certificate[2]; local 291 X509Certificate cert[] = new X509Certificate[2]; local 324 X509Certificate cert[] = new X509Certificate[2]; local 382 X509Certificate cert[] = new X509Certificate[2]; local 415 X509Certificate cert[] = new X509Certificate[2]; local 446 X509Certificate cert[] = new X509Certificate[2]; local 513 X509Certificate cert = (X509Certificate) cf.generateCertificate(certArray); local 548 X509Certificate cert[] = new X509Certificate[2]; local 580 X509Certificate cert[] = new X509Certificate[2]; local [all...] |