HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 801 - 825 of 1180) sorted by null

<<31323334353637383940>>

  /external/wpa_supplicant_8/hs20/server/
spp_server.c 582 xml_node_t *cred, *cert; local
590 cert = xml_node_create(ctx->xml, cred, NULL, "DigitalCertificate");
591 add_text_node(ctx, cert, "CertificateType", "x509v3");
592 add_text_node(ctx, cert, "CertSHA256Fingerprint", cert_fingerprint);
666 char *cert; local
677 cert = db_get_val(ctx, user, realm, "cert", dmacc);
678 if (cert && cert[0] == '\0')
679 cert = NULL
1311 int cert = 0; local
1874 int cert = 0; local
    [all...]
  /build/tools/releasetools/
common.py 561 and return a {package: cert} dict."""
569 name, cert, privkey = m.groups()
572 if cert in SPECIAL_CERT_STRINGS and not privkey:
573 certmap[name] = cert
574 elif (cert.endswith(OPTIONS.public_key_suffix) and
576 cert[:-public_key_suffix_len] == privkey[:-private_key_suffix_len]):
577 certmap[name] = cert[:-public_key_suffix_len]
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
statscollector.cc 701 const talk_base::SSLCertificate* cert, const std::string& issuer_id) {
707 if (!cert->GetSignatureDigestAlgorithm(&digest_algorithm))
711 talk_base::SSLFingerprint::Create(digest_algorithm, cert));
723 cert->ToDER(&der_buffer);
743 const talk_base::SSLCertificate* cert) {
746 // the id of the leaf report. The provided cert must be non-null, so at least
749 ASSERT(cert != NULL);
753 if (cert->GetChain(chain.accept())) {
764 return AddOneCertificateReport(cert, issuer_id);
799 talk_base::scoped_ptr<talk_base::SSLCertificate> cert; local
    [all...]
  /external/google-tv-pairing-protocol/java/jar/
bcprov-jdk15-143.jar 
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl1Test.java 34 import java.security.cert.Certificate;
239 * <code>setCertificateEntry(String alias, Certificate cert)</code>
246 * <code>getCertificateAlias(Certificate cert)</code>
643 * <code>setCertificateEntry(String alias, Certificate cert)</code>
656 KeyStoreTestSupport.MCertificate cert = new KeyStoreTestSupport.MCertificate( local
664 kss[i].setCertificateEntry(null, cert);
669 kss[i].setCertificateEntry(aliases[j], cert);
694 cert);
706 * <code>setCerificateEntry(String alias, Certificate cert)</code>
708 * <code>getCertificateAlias(Certificate cert)</code
728 KeyStoreTestSupport.MCertificate cert = new KeyStoreTestSupport.MCertificate( local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLEntryObject.java 5 import java.security.cert.CRLException;
6 import java.security.cert.X509CRLEntry;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CRLEntryObject.java 5 import java.security.cert.CRLException;
6 import java.security.cert.X509CRLEntry;
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/
SSLClientCertificateRequest.java 23 import java.security.cert.CertificateEncodingException;
24 import java.security.cert.X509Certificate;
  /external/chromium_org/chrome/browser/resources/chromeos/
certificate_manager_dialog.js 39 $('cert-manager-header').hidden = true;
  /external/chromium_org/content/renderer/media/
webrtc_identity_service_unittest.cc 19 static const char FAKE_CERTIFICATE[] = "fake cert";
51 void OnIdentityReady(const std::string& cert, const std::string& key) {
52 last_certificate_ = cert;
  /external/chromium_org/net/cert/
ct_objects_extractor_unittest.cc 5 #include "net/cert/ct_objects_extractor.h"
9 #include "net/cert/ct_log_verifier.h"
10 #include "net/cert/ct_serialization.h"
11 #include "net/cert/signed_certificate_timestamp.h"
12 #include "net/cert/x509_certificate.h"
26 "ct-test-embedded-cert.pem",
38 void ExtractEmbeddedSCT(scoped_refptr<X509Certificate> cert,
41 EXPECT_TRUE(ExtractEmbeddedSCTList(cert->os_cert_handle(), &sct_list));
80 // Should have empty leaf cert for this log entry type.
nss_profile_filter_chromeos_unittest.cc 5 #include "net/cert/nss_profile_filter_chromeos.h"
7 #include <cert.h>
45 node->cert, X509Certificate::OSCertHandles()));
  /external/chromium_org/net/quic/
quic_stream_factory.h 20 #include "net/cert/cert_database.h"
154 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE;
155 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE;
quic_client_session.cc 233 if (!GetSSLInfo(&ssl_info) || !ssl_info.cert) {
392 ssl_info->cert = cert_verify_result_->verified_cert;
487 if (!GetSSLInfo(&ssl_info) || !ssl_info.cert) {
498 // Only pool secure QUIC sessions if the cert matches the new hostname.
499 return ssl_info.cert->VerifyNameMatch(hostname, &unused);
759 dict->SetBoolean("secure", GetSSLInfo(&ssl_info) && ssl_info.cert);
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
transportchannelproxy.cc 192 talk_base::SSLCertificate** cert) const {
197 return impl_->GetRemoteCertificate(cert);
  /external/chromium_org/third_party/openssl/openssl/apps/
pkcs7.c 252 certs=p7->d.sign->cert;
256 certs=p7->d.signed_and_enveloped->cert;
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pk7_doit.c 150 pkey = X509_get_pubkey(ri->cert);
966 STACK_OF(X509) *cert;
971 cert=p7->d.sign->cert;
975 cert=p7->d.signed_and_enveloped->cert;
985 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial);
987 /* were we able to find the cert in passed to us */
995 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
  /external/okhttp/okcurl/src/main/java/com/squareup/okhttp/curl/
Main.java 35 import java.security.cert.CertificateException;
36 import java.security.cert.X509Certificate;
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
HostnameVerifierTest.java 22 import java.security.cert.CertificateFactory;
23 import java.security.cert.X509Certificate;
383 // cat cert.cnf
393 // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \
394 // -newkey rsa:512 -out cert.pem
418 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem
441 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.com' -newkey rsa:512 -out cert.pem
458 // $ cat ./cert.cnf
468 // $ openssl req -x509 -nodes -days 36500 -subj '/CN=foo.com' -config ./cert.cnf \
469 // -newkey rsa:512 -out cert.pe
    [all...]
  /external/openssl/apps/
pkcs7.c 252 certs=p7->d.sign->cert;
256 certs=p7->d.signed_and_enveloped->cert;
  /external/openssl/crypto/pkcs7/
pk7_doit.c 150 pkey = X509_get_pubkey(ri->cert);
971 STACK_OF(X509) *cert;
976 cert=p7->d.sign->cert;
980 cert=p7->d.signed_and_enveloped->cert;
990 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial);
992 /* were we able to find the cert in passed to us */
1000 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
  /external/wpa_supplicant_8/hs20/server/www/
users.php 48 if ($cmd == 'cert' && $id > 0) {
143 echo "[<a href=\"users.php?cmd=cert&id=$id\">Certificate</a>]\n";
158 $cert = $row['cert']; variable
159 if (strlen($cert) > 0) {
160 echo "Certificate fingerprint: $cert<br>\n";
  /external/wpa_supplicant_8/src/crypto/
tls.h 53 const struct wpabuf *cert; member in struct:tls_event_data::__anon37293
59 const struct wpabuf *cert; member in struct:tls_event_data::__anon37294
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory_ImplTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
28 import java.security.cert.CertPath;
29 import java.security.cert.CertificateFactory;
30 import java.security.cert.X509CRL;
31 import java.security.cert.X509Certificate;
    [all...]
  /external/chromium_org/chrome/browser/ssl/
ssl_blocking_page.cc 274 ssl_info_.cert.get(),
372 // Strings that display the invalid cert.
374 ASCIIToUTF16(ssl_info_.cert->subject().GetDisplayName()));
376 ASCIIToUTF16(ssl_info_.cert->issuer().GetDisplayName()));
438 ssl_info_.cert.get(),
491 ssl_info_.cert.get(), web_contents_->GetRenderProcessHost()->GetID());

Completed in 667 milliseconds

<<31323334353637383940>>