/build/tools/signapk/ |
SignApk.java | 24 import org.bouncycastle.cert.jcajce.JcaCertStore; 60 import java.security.cert.CertificateEncodingException; 61 import java.security.cert.CertificateFactory; 62 import java.security.cert.X509Certificate; 105 private static final String CERT_SF_NAME = "META-INF/CERT.SF"; 106 private static final String CERT_SIG_NAME = "META-INF/CERT.%s"; 107 private static final String CERT_SF_MULTI_NAME = "META-INF/CERT%d.SF"; 108 private static final String CERT_SIG_MULTI_NAME = "META-INF/CERT%d.%s"; 120 * algorithm specified in the cert. 122 private static int getDigestAlgorithm(X509Certificate cert) { [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 36 import java.security.cert.Certificate; 37 import java.security.cert.CertificateFactory; 745 * 5. openssl x509 -req -days 37273 -in test.csr -signkey test.key -out test.cert 748 String certName = Support_Resources.getURL("test.cert"); 752 Certificate cert = cf.generateCertificate(is); local 757 c.init(Cipher.ENCRYPT_MODE, cert); 760 c.init(Cipher.ENCRYPT_MODE, cert); 775 * 5. openssl x509 -req -days 37273 -in test.csr -signkey test.key -out test.cert 778 String certName = Support_Resources.getURL("test.cert"); 782 Certificate cert = cf.generateCertificate(is) local 924 Certificate cert = cf.generateCertificate(is); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.TrustAnchor; 28 import java.security.cert.X509Certificate; 35 import org.apache.harmony.security.tests.support.cert.TestUtils; 487 X509Certificate cert = local 489 TrustAnchor ta = new TrustAnchor(cert, null); 490 assertEquals(cert, ta.getTrustedCert());
|
/libcore/luni/src/test/java/libcore/java/security/ |
ProviderTest.java | 26 import java.security.cert.CRL; 27 import java.security.cert.CRLSelector; 28 import java.security.cert.CertSelector; 29 import java.security.cert.CertStoreException; 30 import java.security.cert.CertStoreParameters; 31 import java.security.cert.CertStoreSpi; 32 import java.security.cert.Certificate;
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CRLTest.java | 17 package libcore.java.security.cert; 32 import java.security.cert.CRL; 33 import java.security.cert.CRLReason; 34 import java.security.cert.CertificateFactory; 35 import java.security.cert.X509CRL; 36 import java.security.cert.X509CRLEntry; 37 import java.security.cert.X509Certificate; 53 private static final String CERT_RSA = "x509/cert-rsa.der"; 55 private static final String CERT_DSA = "x509/cert-dsa.der"; 57 private static final String CERT_CRL_CA = "x509/cert-crl-ca.der" [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
sslcon.c | 9 #include "cert.h" 738 ssl2_SendCertificateResponseMessage(sslSocket *ss, SECItem *cert, 748 sendLen = SSL_HL_CLIENT_CERTIFICATE_HBYTES + encCode->len + cert->len; 759 msg[2] = MSB(cert->len); 760 msg[3] = LSB(cert->len); 763 PORT_Memcpy(msg + SSL_HL_CLIENT_CERTIFICATE_HBYTES, cert->data, cert->len); 764 PORT_Memcpy(msg + SSL_HL_CLIENT_CERTIFICATE_HBYTES + cert->len, 1903 CERTCertificate *cert = NULL; local 2017 CERTCertificate * cert = 0; local 2291 CERTCertificate * cert = NULL; \/* app-selected client cert. *\/ local 2403 CERTCertificate *cert = NULL; local 2739 PRUint8 * cert; local 3311 PRUint8 *cert = NULL; local [all...] |
/external/wpa_supplicant_8/hs20/client/ |
osu_client.c | 166 mkdir("Cert", S_IRWXU); 182 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, 193 fingerprint = xml_node_get_text(ctx->xml, cert); 204 der = os_readfile("Cert/est_cert.der", &der_len); 224 unlink("Cert/est_cert.der"); 227 if (rename("Cert/est-cacerts.pem", buf) < 0) { 234 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); 235 if (rename("Cert/est_cert.pem", buf) < 0) { 236 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", 252 if (rename("Cert/privkey-plain.pem", buf) < 0) 274 char *cert; local 518 xml_node_t *tnds, *mo, *cert; local 658 xml_node_t *cert; local [all...] |
/external/chromium_org/chrome/browser/extensions/api/cast_channel/ |
cast_socket.cc | 23 #include "net/cert/cert_verifier.h" 24 #include "net/cert/x509_certificate.h" 120 // If a peer cert was extracted in a previous attempt to connect, then 121 // whitelist that cert. 146 bool CastSocket::ExtractPeerCert(std::string* cert) { 147 DCHECK(cert); 150 if (!socket_->GetSSLInfo(&ssl_info) || !ssl_info.cert.get()) 153 ssl_info.cert->os_cert_handle(), cert); 156 << *cert; [all...] |
/external/chromium_org/content/browser/media/ |
webrtc_identity_store_backend.cc | 411 std::string cert, private_key; local 412 stmt.ColumnBlobAsString(3, &cert); 417 key, Identity(common_name, cert, private_key, creation_time))); 510 // We do a full copy of the cert here, and hopefully just here. 572 const std::string& cert = (*it)->identity.certificate; local 573 add_stmt.BindBlob(3, cert.data(), cert.size());
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertPathValidatorExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertPathValidatorException; 25 import java.security.cert.CertPath;
|
TrustAnchorTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.TrustAnchor; 28 import java.security.cert.X509Certificate; 35 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/external/chromium_org/net/http/ |
http_response_info.cc | 13 #include "net/cert/signed_certificate_timestamp.h" 14 #include "net/cert/x509_certificate.h" 50 // This bit is set if the response info has a cert at the end. 59 // This bit is set if the response info has a cert status at the end. 192 ssl_info.cert = X509Certificate::CreateFromPickle(pickle, &iter, type); 193 if (!ssl_info.cert.get()) 334 ssl_info.cert->Persist(pickle);
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier_chromium.cc | 18 #include "net/cert/asn1_util.h" 19 #include "net/cert/cert_status_flags.h" 20 #include "net/cert/cert_verifier.h" 21 #include "net/cert/cert_verify_result.h" 22 #include "net/cert/single_request_cert_verifier.h" 23 #include "net/cert/x509_certificate.h" 24 #include "net/cert/x509_util.h" 70 const std::string& cert); 300 const string& cert) { 302 if (!asn1::ExtractSPKIFromDERCert(cert, &spki)) [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
opensslidentity.cc | 345 scoped_ptr<OpenSSLCertificate> cert( 347 if (!cert) { 368 cert.release());
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/external/chromium_org/third_party/webrtc/base/ |
opensslidentity.cc | 328 scoped_ptr<OpenSSLCertificate> cert( 330 if (!cert) { 351 cert.release());
|
/external/ipsec-tools/src/racoon/ |
getcertsbyname.c | 70 getnewci(qtype, keytag, algorithm, flags, certlen, cert) 72 unsigned char *cert; 91 memcpy(res->ci_cert, cert, certlen); 112 * get CERT RR by FQDN and create certinfo structure chain. 224 /* get CERT RR */ 249 /* parse CERT RR */ 291 /* CERT RR */
|
/external/nist-pkits/src/libcore/java/security/cert/ |
X509CertificateNistPkitsTest.java | 17 package libcore.java.security.cert; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertPathValidator; 27 import java.security.cert.CertPathValidatorException; 28 import java.security.cert.CertStore; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.CollectionCertStoreParameters; 31 import java.security.cert.PKIXCertPathValidatorResult; 32 import java.security.cert.PKIXParameters; 33 import java.security.cert.TrustAnchor [all...] |
/external/openssl/crypto/pkcs12/ |
pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/external/openssl/include/openssl/ |
pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/frameworks/base/services/core/java/com/android/server/pm/ |
SELinuxMMAC.java | 162 String cert = parser.getAttributeValue(null, "signature"); local 163 if (cert == null) { 171 signature = new Signature(cert);
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.X509Certificate;
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CRLSelectorTest.java | 22 package java.security.cert; 32 import java.security.cert.CRLException; 33 import java.security.cert.X509CRLEntry; 91 public boolean isRevoked(Certificate cert) {
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 22 import java.security.cert.Certificate;
|