/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 582 xml_node_t *cred, *cert; local 590 cert = xml_node_create(ctx->xml, cred, NULL, "DigitalCertificate"); 591 add_text_node(ctx, cert, "CertificateType", "x509v3"); 592 add_text_node(ctx, cert, "CertSHA256Fingerprint", cert_fingerprint); 666 char *cert; local 677 cert = db_get_val(ctx, user, realm, "cert", dmacc); 678 if (cert && cert[0] == '\0') 679 cert = NULL 1311 int cert = 0; local 1874 int cert = 0; local [all...] |
/build/tools/releasetools/ |
common.py | 561 and return a {package: cert} dict.""" 569 name, cert, privkey = m.groups() 572 if cert in SPECIAL_CERT_STRINGS and not privkey: 573 certmap[name] = cert 574 elif (cert.endswith(OPTIONS.public_key_suffix) and 576 cert[:-public_key_suffix_len] == privkey[:-private_key_suffix_len]): 577 certmap[name] = cert[:-public_key_suffix_len] [all...] |
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
statscollector.cc | 701 const talk_base::SSLCertificate* cert, const std::string& issuer_id) { 707 if (!cert->GetSignatureDigestAlgorithm(&digest_algorithm)) 711 talk_base::SSLFingerprint::Create(digest_algorithm, cert)); 723 cert->ToDER(&der_buffer); 743 const talk_base::SSLCertificate* cert) { 746 // the id of the leaf report. The provided cert must be non-null, so at least 749 ASSERT(cert != NULL); 753 if (cert->GetChain(chain.accept())) { 764 return AddOneCertificateReport(cert, issuer_id); 799 talk_base::scoped_ptr<talk_base::SSLCertificate> cert; local [all...] |
/external/google-tv-pairing-protocol/java/jar/ |
bcprov-jdk15-143.jar | |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 34 import java.security.cert.Certificate; 239 * <code>setCertificateEntry(String alias, Certificate cert)</code> 246 * <code>getCertificateAlias(Certificate cert)</code> 643 * <code>setCertificateEntry(String alias, Certificate cert)</code> 656 KeyStoreTestSupport.MCertificate cert = new KeyStoreTestSupport.MCertificate( local 664 kss[i].setCertificateEntry(null, cert); 669 kss[i].setCertificateEntry(aliases[j], cert); 694 cert); 706 * <code>setCerificateEntry(String alias, Certificate cert)</code> 708 * <code>getCertificateAlias(Certificate cert)</code 728 KeyStoreTestSupport.MCertificate cert = new KeyStoreTestSupport.MCertificate( local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLEntryObject.java | 5 import java.security.cert.CRLException; 6 import java.security.cert.X509CRLEntry;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CRLEntryObject.java | 5 import java.security.cert.CRLException; 6 import java.security.cert.X509CRLEntry;
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
SSLClientCertificateRequest.java | 23 import java.security.cert.CertificateEncodingException; 24 import java.security.cert.X509Certificate;
|
/external/chromium_org/chrome/browser/resources/chromeos/ |
certificate_manager_dialog.js | 39 $('cert-manager-header').hidden = true;
|
/external/chromium_org/content/renderer/media/ |
webrtc_identity_service_unittest.cc | 19 static const char FAKE_CERTIFICATE[] = "fake cert"; 51 void OnIdentityReady(const std::string& cert, const std::string& key) { 52 last_certificate_ = cert;
|
/external/chromium_org/net/cert/ |
ct_objects_extractor_unittest.cc | 5 #include "net/cert/ct_objects_extractor.h" 9 #include "net/cert/ct_log_verifier.h" 10 #include "net/cert/ct_serialization.h" 11 #include "net/cert/signed_certificate_timestamp.h" 12 #include "net/cert/x509_certificate.h" 26 "ct-test-embedded-cert.pem", 38 void ExtractEmbeddedSCT(scoped_refptr<X509Certificate> cert, 41 EXPECT_TRUE(ExtractEmbeddedSCTList(cert->os_cert_handle(), &sct_list)); 80 // Should have empty leaf cert for this log entry type.
|
nss_profile_filter_chromeos_unittest.cc | 5 #include "net/cert/nss_profile_filter_chromeos.h" 7 #include <cert.h> 45 node->cert, X509Certificate::OSCertHandles()));
|
/external/chromium_org/net/quic/ |
quic_stream_factory.h | 20 #include "net/cert/cert_database.h" 154 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE; 155 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE;
|
quic_client_session.cc | 233 if (!GetSSLInfo(&ssl_info) || !ssl_info.cert) { 392 ssl_info->cert = cert_verify_result_->verified_cert; 487 if (!GetSSLInfo(&ssl_info) || !ssl_info.cert) { 498 // Only pool secure QUIC sessions if the cert matches the new hostname. 499 return ssl_info.cert->VerifyNameMatch(hostname, &unused); 759 dict->SetBoolean("secure", GetSSLInfo(&ssl_info) && ssl_info.cert);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
transportchannelproxy.cc | 192 talk_base::SSLCertificate** cert) const { 197 return impl_->GetRemoteCertificate(cert);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkcs7.c | 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert;
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_doit.c | 150 pkey = X509_get_pubkey(ri->cert); 966 STACK_OF(X509) *cert; 971 cert=p7->d.sign->cert; 975 cert=p7->d.signed_and_enveloped->cert; 985 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial); 987 /* were we able to find the cert in passed to us */ 995 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
|
/external/okhttp/okcurl/src/main/java/com/squareup/okhttp/curl/ |
Main.java | 35 import java.security.cert.CertificateException; 36 import java.security.cert.X509Certificate;
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
HostnameVerifierTest.java | 22 import java.security.cert.CertificateFactory; 23 import java.security.cert.X509Certificate; 383 // cat cert.cnf 393 // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \ 394 // -newkey rsa:512 -out cert.pem 418 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem 441 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.com' -newkey rsa:512 -out cert.pem 458 // $ cat ./cert.cnf 468 // $ openssl req -x509 -nodes -days 36500 -subj '/CN=foo.com' -config ./cert.cnf \ 469 // -newkey rsa:512 -out cert.pe [all...] |
/external/openssl/apps/ |
pkcs7.c | 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert;
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 150 pkey = X509_get_pubkey(ri->cert); 971 STACK_OF(X509) *cert; 976 cert=p7->d.sign->cert; 980 cert=p7->d.signed_and_enveloped->cert; 990 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial); 992 /* were we able to find the cert in passed to us */ 1000 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
|
/external/wpa_supplicant_8/hs20/server/www/ |
users.php | 48 if ($cmd == 'cert' && $id > 0) { 143 echo "[<a href=\"users.php?cmd=cert&id=$id\">Certificate</a>]\n"; 158 $cert = $row['cert']; variable 159 if (strlen($cert) > 0) { 160 echo "Certificate fingerprint: $cert<br>\n";
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 53 const struct wpabuf *cert; member in struct:tls_event_data::__anon37293 59 const struct wpabuf *cert; member in struct:tls_event_data::__anon37294
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 28 import java.security.cert.CertPath; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509CRL; 31 import java.security.cert.X509Certificate; [all...] |
/external/chromium_org/chrome/browser/ssl/ |
ssl_blocking_page.cc | 274 ssl_info_.cert.get(), 372 // Strings that display the invalid cert. 374 ASCIIToUTF16(ssl_info_.cert->subject().GetDisplayName())); 376 ASCIIToUTF16(ssl_info_.cert->issuer().GetDisplayName())); 438 ssl_info_.cert.get(), 491 ssl_info_.cert.get(), web_contents_->GetRenderProcessHost()->GetID());
|