HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 626 - 650 of 1180) sorted by null

<<21222324252627282930>>

  /packages/apps/Browser/src/com/android/browser/
KeyChainLookup.java 25 import java.security.cert.X509Certificate;
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pk7_smime.c 324 p7->d.sign->cert))
472 && p7->d.sign->cert) signer =
473 X509_find_by_issuer_and_serial (p7->d.sign->cert,
534 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags)
550 if(cert && !X509_check_private_key(cert, pkey)) {
556 if(!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
  /external/openssl/crypto/pkcs7/
pk7_smime.c 324 p7->d.sign->cert))
472 && p7->d.sign->cert) signer =
473 X509_find_by_issuer_and_serial (p7->d.sign->cert,
534 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags)
550 if(cert && !X509_check_private_key(cert, pkey)) {
556 if(!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
  /external/wpa_supplicant_8/wpa_supplicant/
notify.c 581 const struct wpabuf *cert)
589 if (cert) {
591 size_t len = wpabuf_len(cert) * 2 + 1;
594 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
595 wpabuf_len(cert));
598 "depth=%d subject='%s' cert=%s",
606 cert_hash, cert);
608 wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 30 import java.security.cert.Certificate;
31 import java.security.cert.CertificateEncodingException;
32 import java.security.cert.CertificateException;
33 import java.security.cert.CertificateFactory;
34 import java.security.cert.X509Certificate;
130 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); local
131 x509Certificate = (X509Certificate) cert;
  /frameworks/base/core/java/android/os/
RecoverySystem.java 37 import java.security.cert.CertificateFactory;
38 import java.security.cert.X509Certificate;
211 X509Certificate cert = null; local
215 cert = (X509Certificate) cf.generateCertificate(is);
234 PublicKey signatureKey = cert.getPublicKey();
246 // The signature cert matches a trusted key. Now verify that
247 // the digest in the cert matches the actual file data.
251 // based on the signature algorithm of the cert:
253 // "SHA256withRSA" cert -> "SHA256withRSA" signature
254 // "SHA1withRSA" cert -> "SHA1withRSA" signatur
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 27 import java.security.cert.Certificate;
28 import java.security.cert.CertificateException;
41 import javax.security.cert.X509Certificate;
575 public java.security.cert.X509Certificate[] getAcceptedIssuers() {
576 return new java.security.cert.X509Certificate[0];
588 java.security.cert.X509Certificate[] chain, String authType)
594 java.security.cert.X509Certificate[] chain, String authType)
X509KeyManagerTest.java 9 import java.security.cert.CertificateFactory;
10 import java.security.cert.X509Certificate;
31 private X509Certificate[] cert; field in class:X509KeyManagerTest
    [all...]
  /external/wpa_supplicant_8/hs20/client/
est.c 46 certs = p7->d.sign->cert;
49 certs = p7->d.signed_and_enveloped->cert;
77 X509 *cert = sk_X509_value(certs, i); local
78 X509_print(out, cert);
79 PEM_write_bio_X509(out, cert);
113 res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt",
128 resp = os_readfile("Cert/est-cacerts.txt", &resp_len);
130 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt");
158 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem",
166 unlink("Cert/est-cacerts.txt")
387 X509 *cert; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/ocsp/
ocsp_vfy.c 68 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, STACK_OF(OCSP_SINGLERESP) *sresp);
298 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
320 iname = X509_get_subject_name(cert);
325 X509_pubkey_digest(cert, dgst, md, NULL);
340 ret = ocsp_match_issuerid(cert, tmpid, NULL);
  /external/openssl/crypto/ocsp/
ocsp_vfy.c 68 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, STACK_OF(OCSP_SINGLERESP) *sresp);
298 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
320 iname = X509_get_subject_name(cert);
325 X509_pubkey_digest(cert, dgst, md, NULL);
340 ret = ocsp_match_issuerid(cert, tmpid, NULL);
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
TrustManagerFactoryTest.java 25 import java.security.cert.CertificateException;
26 import java.security.cert.PKIXBuilderParameters;
27 import java.security.cert.PKIXParameters;
28 import java.security.cert.X509CertSelector;
29 import java.security.cert.X509Certificate;
249 // unlike PKIXParameters(KeyStore), the cert chain of the key should be trusted.
  /external/chromium_org/net/third_party/nss/ssl/
sslsecur.c 7 #include "cert.h"
679 ** Return SSLKEAType derived from cert's Public Key algorithm info.
682 NSS_FindCertKEAType(CERTCertificate * cert)
687 if (!cert) goto loser;
689 tag = SECOID_GetAlgorithmTag(&(cert->subjectPublicKeyInfo.algorithm));
740 ssl_ConfigSecureServer(sslSocket *ss, CERTCertificate *cert,
753 /* load the server cert chain */
758 if (cert) {
759 sc->serverCert = CERT_DupCertificate(cert);
760 /* get the size of the cert's public key, and remember it *
    [all...]
ssl.h 15 #include "cert.h"
436 CERTCertificate *cert,
535 ** If the authenticate certificate hook returns SECFailure, then the bad cert
536 ** hook will be called. The bad cert handler is NEVER called if the
538 ** needs to handle and/or override a bad cert, it should do so before it
572 * pRetCert - pointer to pointer to cert, for return of cert
585 * f - the application's callback that delivers the key and cert
600 * the client cert, and any following being used for chain
609 * pRetNSSCert - pointer to pointer to NSS cert, for return of cert
    [all...]
  /external/chromium_org/net/cert/
cert_verify_proc_unittest.cc 5 #include "net/cert/cert_verify_proc.h"
17 #include "net/cert/asn1_util.h"
18 #include "net/cert/cert_status_flags.h"
19 #include "net/cert/cert_verifier.h"
20 #include "net/cert/cert_verify_result.h"
21 #include "net/cert/crl_set.h"
22 #include "net/cert/test_root_certs.h"
23 #include "net/cert/x509_certificate.h"
65 virtual int VerifyInternal(X509Certificate* cert,
78 X509Certificate* cert,
252 scoped_refptr<X509Certificate> cert = local
317 scoped_refptr<X509Certificate> cert = local
    [all...]
x509_certificate_mac.cc 5 #include "net/cert/x509_certificate.h"
25 #include "net/cert/x509_util_mac.h"
179 SecCertificateRef cert = reinterpret_cast<SecCertificateRef>(item); local
191 if (IsValidOSCertHandle(cert)) {
192 CFRetain(cert);
193 output->push_back(cert);
358 OSCertHandle cert) {
363 OSStatus status = SecCertificateGetData(cert, &cert_data);
  /external/chromium_org/third_party/libjingle/source/talk/base/
openssladapter.cc 812 X509* cert = X509_STORE_CTX_get_current_cert(store); local
817 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data));
819 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data));
835 void* cert = local
837 if (custom_verify_callback_(cert)) {
846 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
854 // Add the root cert that we care about to the SSL context
859 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len); local
860 if (cert) {
    [all...]
  /external/chromium_org/third_party/webrtc/base/
openssladapter.cc 795 X509* cert = X509_STORE_CTX_get_current_cert(store); local
800 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data));
802 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data));
818 void* cert = local
820 if (custom_verify_callback_(cert)) {
829 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
837 // Add the root cert that we care about to the SSL context
842 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len); local
843 if (cert) {
    [all...]
  /libcore/luni/src/test/java/libcore/java/security/cert/
CertificateFactoryTest.java 17 package libcore.java.security.cert;
39 import java.security.cert.CertPath;
40 import java.security.cert.Certificate;
41 import java.security.cert.CertificateEncodingException;
42 import java.security.cert.CertificateException;
43 import java.security.cert.CertificateFactory;
44 import java.security.cert.X509Certificate;
577 X509Certificate cert = certGen.generate(caKey); local
580 holder.certificate = cert;
  /libcore/luni/src/test/java/tests/security/cert/
TrustAnchorTest.java 23 package tests.security.cert;
29 import org.apache.harmony.security.tests.support.cert.TestUtils;
33 import java.security.cert.CertificateException;
34 import java.security.cert.CertificateFactory;
35 import java.security.cert.TrustAnchor;
36 import java.security.cert.X509Certificate;
465 X509Certificate cert = new TestCertUtils.TestX509Certificate(x500p, x500p); local
466 TrustAnchor ta2 = new TrustAnchor(cert, null);
467 assertSame(cert, ta2.getTrustedCert());
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 20 import java.security.cert.Certificate;
21 import java.security.cert.CertificateEncodingException;
22 import java.security.cert.CertificateException;
23 import java.security.cert.CertificateFactory;
335 Certificate cert,
341 byte[] cEnc = cert.getEncoded();
343 dOut.writeUTF(cert.getType());
537 Certificate cert)
548 if (c.equals(cert))
557 if (chain != null && chain[0].equals(cert))
711 Certificate cert = decodeCertificate(dIn); local
    [all...]
  /external/chromium_org/chrome/browser/ui/webui/options/
certificate_manager_browsertest.js 60 // it. This simulates what will be displayed if retrieving the cert list
216 // Click on the first cert.
218 // Buttons should now allow you to act on the cert.
253 // the cert-policy CSS class appended.
261 // First cert shouldn't show the controlled setting badge, and the
265 expectEquals(null, cert0.querySelector('.cert-policy'));
274 expectNotEquals(null, cert1.querySelector('.cert-policy'));
  /external/chromium_org/chrome/browser/safe_browsing/
download_protection_service_unittest.cc 34 #include "net/cert/x509_certificate.h"
    [all...]
  /external/chromium_org/net/android/java/src/org/chromium/net/
X509Util.java 28 import java.security.cert.Certificate;
29 import java.security.cert.CertificateException;
30 import java.security.cert.CertificateExpiredException;
31 import java.security.cert.CertificateFactory;
32 import java.security.cert.CertificateNotYetValidException;
33 import java.security.cert.X509Certificate;
453 // order to get more granular error information, cert validity time range is being checked
  /external/chromium_org/net/quic/test_tools/
crypto_test_utils.cc 277 MockCommonCertSets(StringPiece cert, uint64 hash, uint32 index)
278 : cert_(cert.as_string()),
295 virtual bool MatchCert(StringPiece cert,
299 if (cert != cert_) {
331 CommonCertSets* CryptoTestUtils::MockCommonCertSets(StringPiece cert,
334 return new class MockCommonCertSets(cert, hash, index);

Completed in 553 milliseconds

<<21222324252627282930>>