/external/mockwebserver/src/main/java/com/google/mockwebserver/ |
MockWebServer.java | 36 import java.security.cert.CertificateException; 37 import java.security.cert.X509Certificate;
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
SIPTransaction.java | [all...] |
/external/openssl/crypto/cms/ |
cms_env.c | 277 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) 285 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
|
/external/openssl/crypto/ocsp/ |
ocsp.h | 435 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 483 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
|
/external/openssl/include/openssl/ |
ocsp.h | 435 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 483 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
|
/external/tcpdump/ |
print-isakmp.c | 153 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */ 1047 struct ikev1_pl_cert cert; local 1058 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert)); 1060 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1079 struct ikev1_pl_cert cert; local 1090 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert)); 1092 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1203 "INVALID-ID-INFORMATION", "INVALID-CERT-ENCODING" [all...] |
/libcore/luni/src/main/java/javax/crypto/ |
Cipher.java | 33 import java.security.cert.Certificate; 34 import java.security.cert.X509Certificate; [all...] |
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
SecureClassLoaderTest.java | 27 import java.security.cert.Certificate;
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl.cc | 7 #include <cert.h> 20 #include "net/cert/nss_cert_database.h" 21 #include "net/cert/x509_certificate.h" 109 // then this is a client cert that we are looking for. 136 // Luckily there should only be one cert with a particular 137 // label, and the cert not being found is one of the few reasons the 277 else // Authority cert
|
/external/emma/core/java12/com/vladium/emma/rt/ |
InstrClassLoader.java | 19 import java.security.cert.Certificate;
|
/external/wpa_supplicant_8/hs20/server/ca/ |
setup.sh | 47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate"
|
/frameworks/base/core/java/android/net/ |
SSLCertificateSocketFactory.java | 30 import java.security.cert.X509Certificate;
|
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 28 import java.security.cert.Certificate; 397 * Returns all of the {@link java.security.cert.Certificate} chains that 403 * @return an array of {@link java.security.cert.Certificate} chains.
|
/libcore/luni/src/test/java/tests/java/security/ |
SecureClassLoaderTest.java | 37 import java.security.cert.Certificate;
|
/packages/apps/Exchange/src/com/android/exchange/eas/ |
EasSendMeetingResponse.java | 31 import java.security.cert.CertificateException;
|
/cts/tests/tests/security/src/android/security/cts/ |
OpenSSLHeartbleedTest.java | 37 import java.security.cert.CertificateException; 38 import java.security.cert.CertificateFactory; 39 import java.security.cert.X509Certificate; 265 // Load the server's private key and cert chain 278 // Initialize TLS context to use the private key and cert chain for server sockets [all...] |
/external/chromium_org/net/quic/crypto/ |
proof_test.cc | 9 #include "net/cert/cert_status_flags.h" 10 #include "net/cert/cert_verify_result.h" 11 #include "net/cert/x509_certificate.h" 99 scoped_refptr<X509Certificate> cert = local 101 CHECK_NE(static_cast<X509Certificate*>(NULL), cert); local 104 CHECK(X509Certificate::GetDEREncoded(cert->os_cert_handle(), &der_bytes));
|
/external/chromium_org/net/socket_stream/ |
socket_stream.cc | 857 // Handling a cert error or a client cert request requires reconnection. [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 19 #include "cert.h" 578 * specified cert make sure the extract operation is attempted from the slot 591 SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey, 624 if (!cert || !srvPrivkey || !ciphersuites || !pcanbypass) { 629 srvPubkey = CERT_ExtractPublicKey(cert);
|
sslimpl.h | 151 /* This makes the cert cache entry exactly 4k. */ 187 CERTCertificate * cert; member in struct:ssl3CertNodeStr [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslstreamadapter_unittest.cc | 277 LOG(LS_INFO) << "Setting bogus digest for server cert"; 289 LOG(LS_INFO) << "Setting bogus digest for client cert"; 409 bool GetPeerCertificate(bool client, talk_base::SSLCertificate** cert) { 411 return client_ssl_->GetPeerCertificate(cert); 413 return server_ssl_->GetPeerCertificate(cert);
|
/external/chromium_org/third_party/webrtc/base/ |
sslstreamadapter_unittest.cc | 259 LOG(LS_INFO) << "Setting bogus digest for server cert"; 271 LOG(LS_INFO) << "Setting bogus digest for client cert"; 391 bool GetPeerCertificate(bool client, rtc::SSLCertificate** cert) { 393 return client_ssl_->GetPeerCertificate(cert); 395 return server_ssl_->GetPeerCertificate(cert);
|
/external/conscrypt/src/main/java/org/conscrypt/ |
NativeCrypto.java | 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateParsingException; [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
AndroidKeyPairGeneratorTest.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate;
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509_vfy.c | 162 if (ctx->cert == NULL) 175 (!sk_X509_push(ctx->chain,ctx->cert))) 180 CRYPTO_add(&ctx->cert->references,1,CRYPTO_LOCK_X509); 209 /* If we were passed a cert chain, use it first */ 395 /* Given a STACK_OF(X509) find the issuer of cert (if any) 1026 /* Check cert for matching CRL distribution points */ [all...] |