/prebuilts/tools/common/api-versions/android-2/ |
android.jar | |
/prebuilts/tools/common/api-versions/android-3/ |
android.jar | |
/external/chromium_org/chrome/browser/extensions/api/cast_channel/ |
cast_auth_util_nss.cc | 7 #include <cert.h> 19 #include "net/cert/x509_certificate.h" 239 VLOG(1) << "Disallowed intermdiate cert"; 254 ScopedCERTCertificate cert(CERT_NewTempCertificate( 256 if (!cert.get()) { 269 &cert->signatureWrap, ca_public_key.get(), NULL); 271 VLOG(1)<< "Cert not signed by trusted CA"; 274 VLOG(1) << "Cert signed by trusted CA"; 277 crypto::ScopedSECKEYPublicKey public_key(CERT_ExtractPublicKey(cert.get()));
|
/external/chromium_org/chrome/browser/safe_browsing/ |
download_protection_service.cc | 39 #include "net/cert/x509_cert_types.h" 40 #include "net/cert/x509_certificate.h" 794 scoped_refptr<net::X509Certificate> cert = local 798 if (!cert.get()) { 812 *cert.get(), *issuer.get(), &whitelist_strings); 816 VLOG(2) << "Certificate matched whitelist, cert=" 817 << cert->subject().GetDisplayName() 822 cert = issuer; [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
standalone.py | 85 Note that when ssl module is used and the key/cert location is incorrect, 94 -c ../test/cert/cert.pem \ 95 -k ../test/cert/key.pem \ 111 -c ../test/cert/cert.pem -k ../test/cert/key.pem \ 113 --tls-client-ca=../test/cert/cacert.pem 578 self._logger.debug('Client cert: %r', 588 def default_callback(conn, cert, errnum, errdepth, ok) [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 593 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n"); 654 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 725 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 728 sk_X509_push(encerts, cert); 729 cert = NULL; 1214 X509_free(cert); [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s2_clnt.c | 759 /* We have a cert associated with the SSL, so attach it to 781 if ((s->cert == NULL) || 782 (s->cert->key->x509 == NULL) || 783 (s->cert->key->privatekey == NULL)) 803 * can get a cert or not */ 877 n=i2d_X509(s->cert->key->x509,&d); 880 if (!EVP_SignFinal(&ctx,d,&n,s->cert->key->privatekey)) 1059 /* server's cert for this session */
|
ssltest.c | 356 fprintf(stderr," -cert arg - Server certificate file\n"); 357 fprintf(stderr," -key arg - Server key file (default: same as -cert)\n"); 378 X509 *cert; local 386 cert=SSL_get_peer_certificate(c_ssl); 387 if (cert != NULL) 389 EVP_PKEY *pkey = X509_get_pubkey(cert); 412 X509_free(cert); 683 else if (strcmp(*argv,"-cert") == 0) [all...] |
/external/openssl/apps/ |
cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 593 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n"); 654 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 725 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 728 sk_X509_push(encerts, cert); 729 cert = NULL; 1214 X509_free(cert); [all...] |
/external/openssl/ssl/ |
s2_clnt.c | 759 /* We have a cert associated with the SSL, so attach it to 781 if ((s->cert == NULL) || 782 (s->cert->key->x509 == NULL) || 783 (s->cert->key->privatekey == NULL)) 803 * can get a cert or not */ 877 n=i2d_X509(s->cert->key->x509,&d); 880 if (!EVP_SignFinal(&ctx,d,&n,s->cert->key->privatekey)) 1059 /* server's cert for this session */
|
ssltest.c | 356 fprintf(stderr," -cert arg - Server certificate file\n"); 357 fprintf(stderr," -key arg - Server key file (default: same as -cert)\n"); 378 X509 *cert; local 386 cert=SSL_get_peer_certificate(c_ssl); 387 if (cert != NULL) 389 EVP_PKEY *pkey = X509_get_pubkey(cert); 412 X509_free(cert); 683 else if (strcmp(*argv,"-cert") == 0) [all...] |
/external/chromium_org/net/quic/crypto/ |
crypto_server_test.cc | 361 StringPiece cert, proof; local 362 EXPECT_TRUE(out_.GetStringPiece(kCertificateTag, &cert)); 364 EXPECT_NE(0u, cert.size());
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 7 import org.apache.harmony.security.tests.support.cert.MyCertificate; 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateException; 250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT); 258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT); 566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);
|
SignatureTest.java | 39 import java.security.cert.Certificate; 539 private class MyCertificate extends java.security.cert.Certificate {
|
/external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/ |
SerializationTest.java | 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts(); 365 java.security.cert.Certificate[] certs = initPerm
|
/external/chromium_org/android_webview/native/ |
aw_contents_client_bridge.cc | 19 #include "net/cert/x509_certificate.h" 71 net::X509Certificate* cert, 84 net::X509Certificate::GetDEREncoded(cert->os_cert_handle(), &der_string);
|
/external/chromium_org/net/cert/ |
multi_threaded_cert_verifier_unittest.cc | 5 #include "net/cert/multi_threaded_cert_verifier.h" 15 #include "net/cert/cert_trust_anchor_provider.h" 16 #include "net/cert/cert_verify_proc.h" 17 #include "net/cert/cert_verify_result.h" 18 #include "net/cert/x509_certificate.h" 46 virtual int VerifyInternal(X509Certificate* cert, 53 verify_result->verified_cert = cert;
|
/external/chromium_org/net/test/spawned_test_server/ |
base_test_server.cc | 22 #include "net/cert/test_root_certs.h" 91 BaseTestServer::SSLOptions::ServerCertificate cert) 92 : server_certificate(cert), 382 arguments->SetString("cert-and-key-file", certificate_path.value()); 410 arguments->Set("ssl-client-cert-type", client_cert_types.release()); 421 arguments->Set("cert-serial", 447 arguments->SetString("signed-cert-timestamps-tls-ext", b64_scts_tls_ext);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
dtlstransportchannel.cc | 250 talk_base::SSLCertificate** cert) const { 254 return dtls_->GetPeerCertificate(cert);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertificateTest.java | 17 package libcore.java.security.cert; 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateExpiredException; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.CertificateNotYetValidException; 46 import java.security.cert.CertificateParsingException; 47 import java.security.cert.X509Certificate; 68 private static final String CERT_RSA = "x509/cert-rsa.der"; 70 private static final String CERT_DSA = "x509/cert-dsa.der" [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 216 self.fail("Peer cert %s shouldn't be here!") 229 # this should succeed because we specify the root cert 426 cert = self.sslconn.getpeercert() 428 sys.stdout.write(" client cert is " + pprint.pformat(cert) + "\n") 431 sys.stdout.write(" cert binary is " + str(len(cert_binary)) + " bytes\n") [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 216 self.fail("Peer cert %s shouldn't be here!") 229 # this should succeed because we specify the root cert 426 cert = self.sslconn.getpeercert() 428 sys.stdout.write(" client cert is " + pprint.pformat(cert) + "\n") 431 sys.stdout.write(" cert binary is " + str(len(cert_binary)) + " bytes\n") [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 100 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1815 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); local 1837 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); local 2369 final X509Certificate cert = certGen.generate(privKey); local 2440 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, local 2453 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local 2464 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local 2486 X509Certificate cert = local 2606 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, TEST_SERIAL_1, local [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AndroidKeyPairGeneratorTest.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.X509Certificate; 530 public MyKeyManager(PrivateKey key, X509Certificate cert) { 532 this.chain = new X509Certificate[] { cert };
|
/developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 41 import java.security.cert.CertificateException;
|