HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 901 - 925 of 1180) sorted by null

<<31323334353637383940>>

  /prebuilts/tools/common/api-versions/android-2/
android.jar 
  /prebuilts/tools/common/api-versions/android-3/
android.jar 
  /external/chromium_org/chrome/browser/extensions/api/cast_channel/
cast_auth_util_nss.cc 7 #include <cert.h>
19 #include "net/cert/x509_certificate.h"
239 VLOG(1) << "Disallowed intermdiate cert";
254 ScopedCERTCertificate cert(CERT_NewTempCertificate(
256 if (!cert.get()) {
269 &cert->signatureWrap, ca_public_key.get(), NULL);
271 VLOG(1)<< "Cert not signed by trusted CA";
274 VLOG(1) << "Cert signed by trusted CA";
277 crypto::ScopedSECKEYPublicKey public_key(CERT_ExtractPublicKey(cert.get()));
  /external/chromium_org/chrome/browser/safe_browsing/
download_protection_service.cc 39 #include "net/cert/x509_cert_types.h"
40 #include "net/cert/x509_certificate.h"
794 scoped_refptr<net::X509Certificate> cert = local
798 if (!cert.get()) {
812 *cert.get(), *issuer.get(), &whitelist_strings);
816 VLOG(2) << "Certificate matched whitelist, cert="
817 << cert->subject().GetDisplayName()
822 cert = issuer;
    [all...]
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/
standalone.py 85 Note that when ssl module is used and the key/cert location is incorrect,
94 -c ../test/cert/cert.pem \
95 -k ../test/cert/key.pem \
111 -c ../test/cert/cert.pem -k ../test/cert/key.pem \
113 --tls-client-ca=../test/cert/cacert.pem
578 self._logger.debug('Client cert: %r',
588 def default_callback(conn, cert, errnum, errdepth, ok)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
cms.c 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
593 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n");
654 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
725 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
728 sk_X509_push(encerts, cert);
729 cert = NULL;
1214 X509_free(cert);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
s2_clnt.c 759 /* We have a cert associated with the SSL, so attach it to
781 if ((s->cert == NULL) ||
782 (s->cert->key->x509 == NULL) ||
783 (s->cert->key->privatekey == NULL))
803 * can get a cert or not */
877 n=i2d_X509(s->cert->key->x509,&d);
880 if (!EVP_SignFinal(&ctx,d,&n,s->cert->key->privatekey))
1059 /* server's cert for this session */
ssltest.c 356 fprintf(stderr," -cert arg - Server certificate file\n");
357 fprintf(stderr," -key arg - Server key file (default: same as -cert)\n");
378 X509 *cert; local
386 cert=SSL_get_peer_certificate(c_ssl);
387 if (cert != NULL)
389 EVP_PKEY *pkey = X509_get_pubkey(cert);
412 X509_free(cert);
683 else if (strcmp(*argv,"-cert") == 0)
    [all...]
  /external/openssl/apps/
cms.c 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
593 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n");
654 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
725 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
728 sk_X509_push(encerts, cert);
729 cert = NULL;
1214 X509_free(cert);
    [all...]
  /external/openssl/ssl/
s2_clnt.c 759 /* We have a cert associated with the SSL, so attach it to
781 if ((s->cert == NULL) ||
782 (s->cert->key->x509 == NULL) ||
783 (s->cert->key->privatekey == NULL))
803 * can get a cert or not */
877 n=i2d_X509(s->cert->key->x509,&d);
880 if (!EVP_SignFinal(&ctx,d,&n,s->cert->key->privatekey))
1059 /* server's cert for this session */
ssltest.c 356 fprintf(stderr," -cert arg - Server certificate file\n");
357 fprintf(stderr," -key arg - Server key file (default: same as -cert)\n");
378 X509 *cert; local
386 cert=SSL_get_peer_certificate(c_ssl);
387 if (cert != NULL)
389 EVP_PKEY *pkey = X509_get_pubkey(cert);
412 X509_free(cert);
683 else if (strcmp(*argv,"-cert") == 0)
    [all...]
  /external/chromium_org/net/quic/crypto/
crypto_server_test.cc 361 StringPiece cert, proof; local
362 EXPECT_TRUE(out_.GetStringPiece(kCertificateTag, &cert));
364 EXPECT_NE(0u, cert.size());
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore4Test.java 7 import org.apache.harmony.security.tests.support.cert.MyCertificate;
25 import java.security.cert.Certificate;
26 import java.security.cert.CertificateException;
250 String alias = keyStore.getCertificateAlias(TestKeyStoreSpi.CERT);
258 uninitialized.getCertificateAlias(TestKeyStoreSpi.CERT);
566 assertTrue("entry is not cert entry", entry instanceof KeyStore.TrustedCertificateEntry);
SignatureTest.java 39 import java.security.cert.Certificate;
539 private class MyCertificate extends java.security.cert.Certificate {
  /external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/
SerializationTest.java 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts();
365 java.security.cert.Certificate[] certs = initPerm
  /external/chromium_org/android_webview/native/
aw_contents_client_bridge.cc 19 #include "net/cert/x509_certificate.h"
71 net::X509Certificate* cert,
84 net::X509Certificate::GetDEREncoded(cert->os_cert_handle(), &der_string);
  /external/chromium_org/net/cert/
multi_threaded_cert_verifier_unittest.cc 5 #include "net/cert/multi_threaded_cert_verifier.h"
15 #include "net/cert/cert_trust_anchor_provider.h"
16 #include "net/cert/cert_verify_proc.h"
17 #include "net/cert/cert_verify_result.h"
18 #include "net/cert/x509_certificate.h"
46 virtual int VerifyInternal(X509Certificate* cert,
53 verify_result->verified_cert = cert;
  /external/chromium_org/net/test/spawned_test_server/
base_test_server.cc 22 #include "net/cert/test_root_certs.h"
91 BaseTestServer::SSLOptions::ServerCertificate cert)
92 : server_certificate(cert),
382 arguments->SetString("cert-and-key-file", certificate_path.value());
410 arguments->Set("ssl-client-cert-type", client_cert_types.release());
421 arguments->Set("cert-serial",
447 arguments->SetString("signed-cert-timestamps-tls-ext", b64_scts_tls_ext);
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
dtlstransportchannel.cc 250 talk_base::SSLCertificate** cert) const {
254 return dtls_->GetPeerCertificate(cert);
  /libcore/luni/src/test/java/libcore/java/security/cert/
X509CertificateTest.java 17 package libcore.java.security.cert;
41 import java.security.cert.Certificate;
42 import java.security.cert.CertificateException;
43 import java.security.cert.CertificateExpiredException;
44 import java.security.cert.CertificateFactory;
45 import java.security.cert.CertificateNotYetValidException;
46 import java.security.cert.CertificateParsingException;
47 import java.security.cert.X509Certificate;
68 private static final String CERT_RSA = "x509/cert-rsa.der";
70 private static final String CERT_DSA = "x509/cert-dsa.der"
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_ssl.py 216 self.fail("Peer cert %s shouldn't be here!")
229 # this should succeed because we specify the root cert
426 cert = self.sslconn.getpeercert()
428 sys.stdout.write(" client cert is " + pprint.pformat(cert) + "\n")
431 sys.stdout.write(" cert binary is " + str(len(cert_binary)) + " bytes\n")
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_ssl.py 216 self.fail("Peer cert %s shouldn't be here!")
229 # this should succeed because we specify the root cert
426 cert = self.sslconn.getpeercert()
428 sys.stdout.write(" client cert is " + pprint.pformat(cert) + "\n")
431 sys.stdout.write(" cert binary is " + str(len(cert_binary)) + " bytes\n")
    [all...]
  /frameworks/base/keystore/tests/src/android/security/
AndroidKeyStoreTest.java 41 import java.security.cert.Certificate;
42 import java.security.cert.CertificateFactory;
43 import java.security.cert.X509Certificate;
100 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650
1815 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); local
1837 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); local
2369 final X509Certificate cert = certGen.generate(privKey); local
2440 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, local
2453 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local
2464 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local
2486 X509Certificate cert = local
2606 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, TEST_SERIAL_1, local
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
AndroidKeyPairGeneratorTest.java 32 import java.security.cert.Certificate;
33 import java.security.cert.X509Certificate;
530 public MyKeyManager(PrivateKey key, X509Certificate cert) {
532 this.chain = new X509Certificate[] { cert };
  /developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/
BasicAndroidKeyStoreFragment.java 41 import java.security.cert.CertificateException;

Completed in 1356 milliseconds

<<31323334353637383940>>