HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 776 - 800 of 1180) sorted by null

<<31323334353637383940>>

  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
AttributeCertificateIssuer.java 1 package org.bouncycastle.cert;
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
OperatorHelper.java 13 import java.security.cert.CertificateException;
14 import java.security.cert.CertificateFactory;
15 import java.security.cert.X509Certificate;
40 import org.bouncycastle.cert.X509CertificateHolder;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXPolicyNode.java 3 import java.security.cert.PolicyNode;
  /external/chromium_org/chrome/browser/chromeos/net/
cert_verify_proc_chromeos_unittest.cc 11 #include "net/cert/cert_verify_proc.h"
12 #include "net/cert/cert_verify_result.h"
13 #include "net/cert/nss_cert_database_chromeos.h"
47 // Load test cert chains from disk.
79 net::X509Certificate* cert,
83 int error = verify_proc->Verify(cert,
101 net::X509Certificate* cert,
105 verify_proc, additional_trust_anchors, cert, root_subject_name);
259 // succeed even if the cert is trusted by a different profile.
  /external/chromium_org/chrome/browser/net/
chrome_fraudulent_certificate_reporter.cc 18 #include "net/cert/x509_certificate.h"
47 if (!ssl_info.cert->GetPEMEncodedChain(&pem_encoded_chain)) {
94 "x-application/chrome-fraudulent-cert-report");
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
fakesession.h 231 void SetRemoteCertificate(talk_base::FakeSSLCertificate* cert) {
232 remote_cert_ = cert;
260 virtual bool GetRemoteCertificate(talk_base::SSLCertificate** cert) const {
264 *cert = remote_cert_->GetReference();
rawtransportchannel.h 140 virtual bool GetRemoteCertificate(talk_base::SSLCertificate** cert) const {
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pkcs7.h 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
pkcs7.h 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
HttpResponseCache.java 40 import java.security.cert.Certificate;
41 import java.security.cert.CertificateEncodingException;
42 import java.security.cert.CertificateException;
43 import java.security.cert.CertificateFactory;
  /external/openssl/crypto/pkcs7/
pkcs7.h 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
  /external/openssl/include/openssl/
pkcs7.h 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
TrustManagerFactory1Test.java 30 import java.security.cert.CertificateException;
31 import java.security.cert.PKIXBuilderParameters;
32 import java.security.cert.TrustAnchor;
33 import java.security.cert.X509CertSelector;
  /libcore/luni/src/main/java/java/security/cert/
CertStore.java 18 package java.security.cert;
CertificateFactory.java 18 package java.security.cert;
CertificateRevokedException.java 17 package java.security.cert;
TrustAnchor.java 18 package java.security.cert;
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
CodeSignerTest.java 27 import java.security.cert.CertPath;
  /libcore/luni/src/test/java/tests/security/cert/
CertPathValidatorExceptionTest.java 23 package tests.security.cert;
27 import java.security.cert.CertPath;
28 import java.security.cert.CertPathValidatorException;
29 import java.security.cert.Certificate;
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CertInstaller.java 44 import java.security.cert.X509Certificate;
228 X509Certificate cert = mCredentials.getUserCertificate(); local
229 if (cert != null) {
231 String key = Util.toMd5(cert.getPublicKey().getEncoded());
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainService.java 42 import java.security.cert.CertificateException;
43 import java.security.cert.CertificateEncodingException;
44 import java.security.cert.CertificateFactory;
45 import java.security.cert.X509Certificate;
330 Log.w(TAG, "Error retrieving cert chain for root " + rootAlias);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
PKIXParametersTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
29 import java.security.cert.CertPathParameters;
30 import java.security.cert.CertPathValidatorException;
31 import java.security.cert.CertStore;
32 import java.security.cert.CollectionCertStoreParameters;
33 import java.security.cert.PKIXCertPathChecker;
34 import java.security.cert.PKIXParameters;
35 import java.security.cert.X509CertSelector;
42 import org.apache.harmony.security.tests.support.cert.TestUtils;
148 * <code>java.security.cert.TrustAnchor</code
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
ocsp.c 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer,
140 X509 *issuer = NULL, *cert = NULL; local
436 else if (!strcmp (*args, "-cert"))
441 X509_free(cert);
442 cert = load_cert(bio_err, *args, FORMAT_PEM,
444 if(!cert) goto end;
446 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
578 BIO_printf (bio_err, "-cert file certificate to check\n");
907 X509_free(cert);
933 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer
    [all...]
  /external/openssl/apps/
ocsp.c 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer,
141 X509 *issuer = NULL, *cert = NULL; local
446 else if (!strcmp (*args, "-cert"))
451 X509_free(cert);
452 cert = load_cert(bio_err, *args, FORMAT_PEM,
454 if(!cert) goto end;
456 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
588 BIO_printf (bio_err, "-cert file certificate to check\n");
917 X509_free(cert);
943 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
s3_srvr.c 237 if (s->cert == NULL)
487 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
489 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
507 if (/* don't request cert unless asked for it: */
510 * don't request cert during re-negotiation: */
513 /* never request cert in anonymous ciphersuites
520 /* never request cert in Kerberos ciphersuites */
526 /* no cert request */
645 * a client cert, it can be verified
1609 CERT *cert; local
    [all...]

Completed in 1573 milliseconds

<<31323334353637383940>>