/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertStoreExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertStoreException;
|
CertificateEncodingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateEncodingException;
|
CertificateExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateException;
|
CertificateParsingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateParsingException;
|
PolicyQualifierInfoTest.java | 21 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.PolicyQualifierInfo;
|
/external/chromium_org/chrome/browser/net/ |
chrome_fraudulent_certificate_reporter_unittest.cc | 18 #include "net/cert/x509_certificate.h" 32 // Builds an SSLInfo from an invalid cert chain. In this case, the cert is 33 // expired; what matters is that the cert would not pass even a normal 39 info.cert = net::ImportCertFromFile(net::GetTestCertsDirectory(), 47 // Builds an SSLInfo from a "good" cert chain, as defined by IsGoodSSLInfo, 56 info.cert = net::ImportCertFromFile(net::GetTestCertsDirectory(),
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 21 #include "net/cert/pem_tokenizer.h" 22 #include "net/cert/x509_certificate.h" 320 base::DictionaryValue* cert = NULL; local 321 (*it)->GetAsDictionary(&cert); 324 cert->GetStringWithoutPathExpansion(certificate::kGUID, &guid); 326 cert->GetStringWithoutPathExpansion(certificate::kType, &cert_type); 332 cert->GetStringWithoutPathExpansion(certificate::kX509, &x509_data); 450 scoped_refptr<net::X509Certificate> cert = local 452 LOG_IF(ERROR, !cert.get()) << "Couldn't create certificate from X509 data: " 454 return cert; [all...] |
/external/chromium_org/net/android/ |
network_library.cc | 53 void AddTestRootCertificate(const uint8* cert, size_t len) { 55 ScopedJavaLocalRef<jbyteArray> cert_array = ToJavaByteArray(env, cert, len);
|
/external/chromium_org/net/cert/ |
x509_certificate.cc | 5 #include "net/cert/x509_certificate.h" 27 #include "net/cert/pem_tokenizer.h" 170 return; // A hash collision where the winning cert was already freed. 175 return; // A hash collision where the winning cert is still around. 280 X509Certificate* cert = NULL; local 282 cert = CreateFromHandle(handle, intermediate_ca_certs); 289 return cert; 299 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles()); 301 return cert; 380 X509Certificate* cert = NULL local [all...] |
/external/conscrypt/src/compat/java/org/conscrypt/ |
Platform.java | 27 import java.security.cert.CertificateException; 28 import java.security.cert.X509Certificate;
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
Platform.java | 34 import java.security.cert.CertificateException; 35 import java.security.cert.X509Certificate;
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.X509Certificate; 92 keyStore.setCertificateEntry("cert", certificate);
|
/external/openssl/crypto/cms/ |
cms_smime.c | 609 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) 624 /* If we have a cert try matching RecipientInfo 627 if (!cert || (CMS_RecipientInfo_ktri_cert_cmp(ri, cert) == 0)) 632 if (cert) 649 /* If no cert and not debugging don't leave loop 658 /* If no cert and not debugging always return success */ 659 if (ri_match && !cert && !debug) 733 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, 750 if (!pk && !cert && !dcont && !out [all...] |
/frameworks/base/packages/SystemUI/tests/ |
Android.mk | 26 # sign this with platform cert, so this test is allowed to inject key events into
|
/libcore/luni/src/test/java/tests/security/cert/ |
CRLExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CRLException;
|
CertPathBuilderExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertPathBuilderException;
|
CertStoreExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertStoreException;
|
CertificateEncodingExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertificateEncodingException;
|
CertificateExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertificateException;
|
CertificateParsingExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertificateParsingException;
|
PolicyQualifierInfoTest.java | 22 package tests.security.cert; 27 import java.security.cert.PolicyQualifierInfo;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
CodeSignerTest.java | 25 import java.security.cert.CertPath;
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
HttpsURLConnectionTest.java | 23 import java.security.cert.Certificate;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInfoGeneratorBuilder.java | 6 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/chromium_org/chrome/browser/ui/android/ |
certificate_viewer_android.cc | 11 #include "net/cert/x509_certificate.h" 19 net::X509Certificate* cert) {
|