/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
AttributeCertificateIssuer.java | 1 package org.bouncycastle.cert;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
OperatorHelper.java | 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateFactory; 15 import java.security.cert.X509Certificate; 40 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXPolicyNode.java | 3 import java.security.cert.PolicyNode;
|
/external/chromium_org/chrome/browser/chromeos/net/ |
cert_verify_proc_chromeos_unittest.cc | 11 #include "net/cert/cert_verify_proc.h" 12 #include "net/cert/cert_verify_result.h" 13 #include "net/cert/nss_cert_database_chromeos.h" 47 // Load test cert chains from disk. 79 net::X509Certificate* cert, 83 int error = verify_proc->Verify(cert, 101 net::X509Certificate* cert, 105 verify_proc, additional_trust_anchors, cert, root_subject_name); 259 // succeed even if the cert is trusted by a different profile.
|
/external/chromium_org/chrome/browser/net/ |
chrome_fraudulent_certificate_reporter.cc | 18 #include "net/cert/x509_certificate.h" 47 if (!ssl_info.cert->GetPEMEncodedChain(&pem_encoded_chain)) { 94 "x-application/chrome-fraudulent-cert-report");
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
fakesession.h | 231 void SetRemoteCertificate(talk_base::FakeSSLCertificate* cert) { 232 remote_cert_ = cert; 260 virtual bool GetRemoteCertificate(talk_base::SSLCertificate** cert) const { 264 *cert = remote_cert_->GetReference();
|
rawtransportchannel.h | 140 virtual bool GetRemoteCertificate(talk_base::SSLCertificate** cert) const {
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
HttpResponseCache.java | 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateEncodingException; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory;
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
/external/openssl/include/openssl/ |
pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 372 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
TrustManagerFactory1Test.java | 30 import java.security.cert.CertificateException; 31 import java.security.cert.PKIXBuilderParameters; 32 import java.security.cert.TrustAnchor; 33 import java.security.cert.X509CertSelector;
|
/libcore/luni/src/main/java/java/security/cert/ |
CertStore.java | 18 package java.security.cert;
|
CertificateFactory.java | 18 package java.security.cert;
|
CertificateRevokedException.java | 17 package java.security.cert;
|
TrustAnchor.java | 18 package java.security.cert;
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
CodeSignerTest.java | 27 import java.security.cert.CertPath;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathValidatorExceptionTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertPath; 28 import java.security.cert.CertPathValidatorException; 29 import java.security.cert.Certificate;
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CertInstaller.java | 44 import java.security.cert.X509Certificate; 228 X509Certificate cert = mCredentials.getUserCertificate(); local 229 if (cert != null) { 231 String key = Util.toMd5(cert.getPublicKey().getEncoded());
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateEncodingException; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.X509Certificate; 330 Log.w(TAG, "Error retrieving cert chain for root " + rootAlias);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXParametersTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 29 import java.security.cert.CertPathParameters; 30 import java.security.cert.CertPathValidatorException; 31 import java.security.cert.CertStore; 32 import java.security.cert.CollectionCertStoreParameters; 33 import java.security.cert.PKIXCertPathChecker; 34 import java.security.cert.PKIXParameters; 35 import java.security.cert.X509CertSelector; 42 import org.apache.harmony.security.tests.support.cert.TestUtils; 148 * <code>java.security.cert.TrustAnchor</code [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
ocsp.c | 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, 140 X509 *issuer = NULL, *cert = NULL; local 436 else if (!strcmp (*args, "-cert")) 441 X509_free(cert); 442 cert = load_cert(bio_err, *args, FORMAT_PEM, 444 if(!cert) goto end; 446 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) 578 BIO_printf (bio_err, "-cert file certificate to check\n"); 907 X509_free(cert); 933 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer [all...] |
/external/openssl/apps/ |
ocsp.c | 98 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, 141 X509 *issuer = NULL, *cert = NULL; local 446 else if (!strcmp (*args, "-cert")) 451 X509_free(cert); 452 cert = load_cert(bio_err, *args, FORMAT_PEM, 454 if(!cert) goto end; 456 if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) 588 BIO_printf (bio_err, "-cert file certificate to check\n"); 917 X509_free(cert); 943 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_srvr.c | 237 if (s->cert == NULL) 487 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 489 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 507 if (/* don't request cert unless asked for it: */ 510 * don't request cert during re-negotiation: */ 513 /* never request cert in anonymous ciphersuites 520 /* never request cert in Kerberos ciphersuites */ 526 /* no cert request */ 645 * a client cert, it can be verified 1609 CERT *cert; local [all...] |