/packages/apps/Browser/src/com/android/browser/ |
KeyChainLookup.java | 25 import java.security.cert.X509Certificate;
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_smime.c | 324 p7->d.sign->cert)) 472 && p7->d.sign->cert) signer = 473 X509_find_by_issuer_and_serial (p7->d.sign->cert, 534 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) 550 if(cert && !X509_check_private_key(cert, pkey)) { 556 if(!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
|
/external/openssl/crypto/pkcs7/ |
pk7_smime.c | 324 p7->d.sign->cert)) 472 && p7->d.sign->cert) signer = 473 X509_find_by_issuer_and_serial (p7->d.sign->cert, 534 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) 550 if(cert && !X509_check_private_key(cert, pkey)) { 556 if(!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
notify.c | 581 const struct wpabuf *cert) 589 if (cert) { 591 size_t len = wpabuf_len(cert) * 2 + 1; 594 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert), 595 wpabuf_len(cert)); 598 "depth=%d subject='%s' cert=%s", 606 cert_hash, cert); 608 wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.CertificateEncodingException; 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 130 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); local 131 x509Certificate = (X509Certificate) cert;
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 211 X509Certificate cert = null; local 215 cert = (X509Certificate) cf.generateCertificate(is); 234 PublicKey signatureKey = cert.getPublicKey(); 246 // The signature cert matches a trusted key. Now verify that 247 // the digest in the cert matches the actual file data. 251 // based on the signature algorithm of the cert: 253 // "SHA256withRSA" cert -> "SHA256withRSA" signature 254 // "SHA1withRSA" cert -> "SHA1withRSA" signatur [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateException; 41 import javax.security.cert.X509Certificate; 575 public java.security.cert.X509Certificate[] getAcceptedIssuers() { 576 return new java.security.cert.X509Certificate[0]; 588 java.security.cert.X509Certificate[] chain, String authType) 594 java.security.cert.X509Certificate[] chain, String authType)
|
X509KeyManagerTest.java | 9 import java.security.cert.CertificateFactory; 10 import java.security.cert.X509Certificate; 31 private X509Certificate[] cert; field in class:X509KeyManagerTest [all...] |
/external/wpa_supplicant_8/hs20/client/ |
est.c | 46 certs = p7->d.sign->cert; 49 certs = p7->d.signed_and_enveloped->cert; 77 X509 *cert = sk_X509_value(certs, i); local 78 X509_print(out, cert); 79 PEM_write_bio_X509(out, cert); 113 res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt", 128 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 130 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); 158 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem", 166 unlink("Cert/est-cacerts.txt") 387 X509 *cert; local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp_vfy.c | 68 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, STACK_OF(OCSP_SINGLERESP) *sresp); 298 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 320 iname = X509_get_subject_name(cert); 325 X509_pubkey_digest(cert, dgst, md, NULL); 340 ret = ocsp_match_issuerid(cert, tmpid, NULL);
|
/external/openssl/crypto/ocsp/ |
ocsp_vfy.c | 68 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, STACK_OF(OCSP_SINGLERESP) *sresp); 298 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 320 iname = X509_get_subject_name(cert); 325 X509_pubkey_digest(cert, dgst, md, NULL); 340 ret = ocsp_match_issuerid(cert, tmpid, NULL);
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 25 import java.security.cert.CertificateException; 26 import java.security.cert.PKIXBuilderParameters; 27 import java.security.cert.PKIXParameters; 28 import java.security.cert.X509CertSelector; 29 import java.security.cert.X509Certificate; 249 // unlike PKIXParameters(KeyStore), the cert chain of the key should be trusted.
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslsecur.c | 7 #include "cert.h" 679 ** Return SSLKEAType derived from cert's Public Key algorithm info. 682 NSS_FindCertKEAType(CERTCertificate * cert) 687 if (!cert) goto loser; 689 tag = SECOID_GetAlgorithmTag(&(cert->subjectPublicKeyInfo.algorithm)); 740 ssl_ConfigSecureServer(sslSocket *ss, CERTCertificate *cert, 753 /* load the server cert chain */ 758 if (cert) { 759 sc->serverCert = CERT_DupCertificate(cert); 760 /* get the size of the cert's public key, and remember it * [all...] |
ssl.h | 15 #include "cert.h" 436 CERTCertificate *cert, 535 ** If the authenticate certificate hook returns SECFailure, then the bad cert 536 ** hook will be called. The bad cert handler is NEVER called if the 538 ** needs to handle and/or override a bad cert, it should do so before it 572 * pRetCert - pointer to pointer to cert, for return of cert 585 * f - the application's callback that delivers the key and cert 600 * the client cert, and any following being used for chain 609 * pRetNSSCert - pointer to pointer to NSS cert, for return of cert [all...] |
/external/chromium_org/net/cert/ |
cert_verify_proc_unittest.cc | 5 #include "net/cert/cert_verify_proc.h" 17 #include "net/cert/asn1_util.h" 18 #include "net/cert/cert_status_flags.h" 19 #include "net/cert/cert_verifier.h" 20 #include "net/cert/cert_verify_result.h" 21 #include "net/cert/crl_set.h" 22 #include "net/cert/test_root_certs.h" 23 #include "net/cert/x509_certificate.h" 65 virtual int VerifyInternal(X509Certificate* cert, 78 X509Certificate* cert, 252 scoped_refptr<X509Certificate> cert = local 317 scoped_refptr<X509Certificate> cert = local [all...] |
x509_certificate_mac.cc | 5 #include "net/cert/x509_certificate.h" 25 #include "net/cert/x509_util_mac.h" 179 SecCertificateRef cert = reinterpret_cast<SecCertificateRef>(item); local 191 if (IsValidOSCertHandle(cert)) { 192 CFRetain(cert); 193 output->push_back(cert); 358 OSCertHandle cert) { 363 OSStatus status = SecCertificateGetData(cert, &cert_data);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
openssladapter.cc | 812 X509* cert = X509_STORE_CTX_get_current_cert(store); local 817 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 819 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 835 void* cert = local 837 if (custom_verify_callback_(cert)) { 846 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain"; 854 // Add the root cert that we care about to the SSL context 859 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len); local 860 if (cert) { [all...] |
/external/chromium_org/third_party/webrtc/base/ |
openssladapter.cc | 795 X509* cert = X509_STORE_CTX_get_current_cert(store); local 800 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 802 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 818 void* cert = local 820 if (custom_verify_callback_(cert)) { 829 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain"; 837 // Add the root cert that we care about to the SSL context 842 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len); local 843 if (cert) { [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 17 package libcore.java.security.cert; 39 import java.security.cert.CertPath; 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateEncodingException; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 577 X509Certificate cert = certGen.generate(caKey); local 580 holder.certificate = cert;
|
/libcore/luni/src/test/java/tests/security/cert/ |
TrustAnchorTest.java | 23 package tests.security.cert; 29 import org.apache.harmony.security.tests.support.cert.TestUtils; 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertificateFactory; 35 import java.security.cert.TrustAnchor; 36 import java.security.cert.X509Certificate; 465 X509Certificate cert = new TestCertUtils.TestX509Certificate(x500p, x500p); local 466 TrustAnchor ta2 = new TrustAnchor(cert, null); 467 assertSame(cert, ta2.getTrustedCert());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.CertificateEncodingException; 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 335 Certificate cert, 341 byte[] cEnc = cert.getEncoded(); 343 dOut.writeUTF(cert.getType()); 537 Certificate cert) 548 if (c.equals(cert)) 557 if (chain != null && chain[0].equals(cert)) 711 Certificate cert = decodeCertificate(dIn); local [all...] |
/external/chromium_org/chrome/browser/ui/webui/options/ |
certificate_manager_browsertest.js | 60 // it. This simulates what will be displayed if retrieving the cert list 216 // Click on the first cert. 218 // Buttons should now allow you to act on the cert. 253 // the cert-policy CSS class appended. 261 // First cert shouldn't show the controlled setting badge, and the 265 expectEquals(null, cert0.querySelector('.cert-policy')); 274 expectNotEquals(null, cert1.querySelector('.cert-policy'));
|
/external/chromium_org/chrome/browser/safe_browsing/ |
download_protection_service_unittest.cc | 34 #include "net/cert/x509_certificate.h" [all...] |
/external/chromium_org/net/android/java/src/org/chromium/net/ |
X509Util.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateException; 30 import java.security.cert.CertificateExpiredException; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.CertificateNotYetValidException; 33 import java.security.cert.X509Certificate; 453 // order to get more granular error information, cert validity time range is being checked
|
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils.cc | 277 MockCommonCertSets(StringPiece cert, uint64 hash, uint32 index) 278 : cert_(cert.as_string()), 295 virtual bool MatchCert(StringPiece cert, 299 if (cert != cert_) { 331 CommonCertSets* CryptoTestUtils::MockCommonCertSets(StringPiece cert, 334 return new class MockCommonCertSets(cert, hash, index);
|