/external/conscrypt/src/platform/java/org/conscrypt/ |
PinFailureLogger.java | 19 import java.security.cert.CertificateEncodingException; 20 import java.security.cert.X509Certificate; 54 for (X509Certificate cert : chain) { 56 sb.append(Base64.encode(cert.getEncoded()));
|
PinListEntry.java | 22 import java.security.cert.X509Certificate; 93 * CA cert. Otherwise this will return {@code true} indicating the {@code chain} 99 for (X509Certificate cert : chain) { 100 String fingerprint = getFingerprint(cert); 110 private static String getFingerprint(X509Certificate cert) { 113 byte[] encoded = cert.getPublicKey().getEncoded(); 145 for (X509Certificate cert : chain) { 146 if (certStore.isUserAddedCertificate(cert)) {
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
DummyTrustManager.java | 19 import java.security.cert.X509Certificate;
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
CertificateMessageTest.java | 22 import java.security.cert.CertificateEncodingException; 23 import java.security.cert.CertificateException; 24 import java.security.cert.CertificateFactory; 25 import java.security.cert.X509Certificate; 87 X509Certificate cert = (X509Certificate) certFactory.generateCertificate(bais); local 89 new X509Certificate[] { cert }); 92 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0] 93 .getEncoded(), cert.getEncoded())); 104 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0]
|
DigitalSignatureTest.java | 23 import java.security.cert.Certificate; 33 private Certificate cert; field in class:DigitalSignatureTest 44 cert = entry.getCertificate(); 74 ds_verify.init(cert); 98 ds_verify.init(cert);
|
TrustManagerImplTest.java | 24 import java.security.cert.CertificateException; 25 import java.security.cert.CertificateFactory; 26 import java.security.cert.X509Certificate; 35 // Cert. encoding.was generated by using of classes 39 // org.apache.harmony.security.tests.support.provider.cert.CertFactoryTestData 68 X509Certificate cert = (X509Certificate) certFactory local 70 untrustedChain = new X509Certificate[] { cert };
|
/external/chromium_org/chromeos/ |
cert_loader.cc | 17 #include "net/cert/nss_cert_database.h" 18 #include "net/cert/nss_cert_database_chromeos.h" 19 #include "net/cert/x509_certificate.h" 67 // Start observing cert database for changes. 99 const net::X509Certificate* cert) const { 102 return database_->IsHardwareBacked(cert); 119 const net::X509Certificate& cert, 123 CERTCertificateStr* cert_handle = cert.os_cert_handle(); 182 void CertLoader::OnCACertChanged(const net::X509Certificate* cert) { 188 void CertLoader::OnCertAdded(const net::X509Certificate* cert) { [all...] |
/external/chromium_org/net/cert/ |
cert_database_mac.cc | 5 #include "net/cert/cert_database.h" 18 #include "net/cert/x509_certificate.h" 131 int CertDatabase::CheckUserCert(X509Certificate* cert) { 132 if (!cert) 134 if (cert->HasExpired()) 139 OSStatus err = SecIdentityCreateWithCertificate(NULL, cert->os_cert_handle(), 153 int CertDatabase::AddUserCert(X509Certificate* cert) { 157 err = SecCertificateAddToKeychain(cert->os_cert_handle(), NULL); 161 CertDatabase::NotifyObserversOfCertAdded(cert); 166 OSSTATUS_LOG(ERROR, err) << "CertDatabase failed to add cert to keychain" [all...] |
asn1_util.cc | 5 #include "net/cert/asn1_util.h" 95 // SeekToSPKI changes |cert| so that it points to a suffix of the 98 static bool SeekToSPKI(base::StringPiece* cert) { 115 if (!GetElement(cert, kSEQUENCE, &certificate)) 119 if (!cert->empty()) 147 *cert = tbs_certificate; 151 bool ExtractSPKIFromDERCert(base::StringPiece cert, 153 if (!SeekToSPKI(&cert)) 155 if (!ParseElement(&cert, kSEQUENCE, spki_out, NULL)) 188 bool ExtractCRLURLsFromDERCert(base::StringPiece cert, [all...] |
/external/chromium_org/content/browser/renderer_host/pepper/ |
pepper_socket_utils.cc | 18 #include "net/cert/x509_certificate.h" 71 bool GetCertificateFields(const net::X509Certificate& cert, 73 const net::CertPrincipal& issuer = cert.issuer(); 89 const net::CertPrincipal& subject = cert.subject(); 105 const std::string& serial_number = cert.serial_number(); 110 new base::FundamentalValue(cert.valid_start().ToDoubleT())); 112 new base::FundamentalValue(cert.valid_expiry().ToDoubleT())); 114 net::X509Certificate::GetDEREncoded(cert.os_cert_handle(), &der); 124 scoped_refptr<net::X509Certificate> cert = local 126 if (!cert.get() [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509CertStoreSelector.java | 6 import java.security.cert.Certificate; 7 import java.security.cert.X509CertSelector; 8 import java.security.cert.X509Certificate; 33 public boolean match(Certificate cert) 35 return match((Object)cert);
|
AttributeCertificateHolder.java | 7 import java.security.cert.CertSelector; 8 import java.security.cert.Certificate; 9 import java.security.cert.CertificateEncodingException; 10 import java.security.cert.CertificateParsingException; 11 import java.security.cert.X509Certificate; 48 * @deprecated use org.bouncycastle.cert.AttributeCertificateHolder 74 public AttributeCertificateHolder(X509Certificate cert) 81 name = PrincipalUtil.getIssuerX509Principal(cert); 89 new ASN1Integer(cert.getSerialNumber()))); 328 public boolean match(Certificate cert) [all...] |
/external/chromium_org/net/ssl/ |
channel_id_service.cc | 26 #include "net/cert/x509_certificate.h" 27 #include "net/cert/x509_util.h" 48 // Synchronously found and returned an existing domain bound cert. 50 // Retrieved or generated and returned a domain bound cert asynchronously. 52 // Retrieval/generation request was cancelled before the cert generation 55 // Cert generation failed. 63 // We don't support any of the cert types the server requested. 67 // Couldn't start a worker to generate a cert. 108 DLOG(ERROR) << "Unable to create x509 cert for client"; 147 std::string* cert) 246 scoped_ptr<ChannelIDStore::ChannelID> cert = local [all...] |
client_cert_store_nss.cc | 17 #include "net/cert/x509_util.h" 86 if (CERT_CheckCertValidTimes(node->cert, PR_Now(), PR_TRUE) != 88 DVLOG(2) << "skipped expired cert: " 89 << base::StringPiece(node->cert->nickname); 93 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local 94 node->cert, X509Certificate::OSCertHandles()); 99 cert->IsIssuedByEncoded(request.cert_authorities)) || 101 NSS_CmpCertChainWCANames(node->cert, &ca_names) == SECSuccess)) { 102 DVLOG(2) << "matched cert: " << base::StringPiece(node->cert->nickname) [all...] |
channel_id_service.h | 94 // Fetches the domain bound cert for the specified host if one exists and 99 // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate. 112 std::string* cert, 116 // Fetches the domain bound cert for the specified host if one exists. 121 // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate. 129 // not complete until a new cert is created. 137 std::string* cert, 161 const std::string& cert); 169 const std::string& cert); 177 std::string* cert, [all...] |
/build/tools/releasetools/ |
check_target_files_signatures | 31 .x509.pem files. Defaults to "vendor,build". Where cert files 33 printed as the cert name, otherwise a hash of the cert plus its 95 def GetCertSubject(cert): 99 out, err = p.communicate(cert) 101 return "(error reading cert subject)" 106 return "(unknown cert subject)" 113 def Add(self, cert, name=None): 114 if cert in self.certs: 116 self.certs[cert] = self.certs[cert] + "," + nam [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 6 import java.security.cert.CRL; 7 import java.security.cert.CRLException; 8 import java.security.cert.CertPath; 9 import java.security.cert.CertificateException; 10 import java.security.cert.CertificateFactorySpi; 11 import java.security.cert.CertificateParsingException; 12 import java.security.cert.X509Certificate; 49 private java.security.cert.Certificate readDERCertificate( 71 private java.security.cert.Certificate getCertificate() 91 private java.security.cert.Certificate readPEMCertificate 232 java.security.cert.Certificate cert; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathBuilderSpi.java | 4 import java.security.cert.CertPath; 5 import java.security.cert.CertPathBuilderException; 6 import java.security.cert.CertPathBuilderResult; 7 import java.security.cert.CertPathBuilderSpi; 8 import java.security.cert.CertPathParameters; 9 import java.security.cert.CertPathValidator; 10 import java.security.cert.CertificateFactory; 11 import java.security.cert.CertificateParsingException; 12 import java.security.cert.PKIXBuilderParameters; 13 import java.security.cert.PKIXCertPathBuilderResult 67 X509Certificate cert; local [all...] |
RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilder; 9 import java.security.cert.CertPathBuilderException; 10 import java.security.cert.CertPathValidatorException; 11 import java.security.cert.CertificateExpiredException; 12 import java.security.cert.CertificateNotYetValidException; 13 import java.security.cert.PKIXCertPathChecker; 14 import java.security.cert.X509CRL; 15 import java.security.cert.X509Certificate; 16 import java.security.cert.X509Extension 867 X509Certificate cert = (X509Certificate)certs.get(index); local 1051 X509Certificate cert = (X509Certificate)certs.get(index); local 1127 X509Certificate cert = (X509Certificate)certs.get(index); local 1156 X509Certificate cert = (X509Certificate)certs.get(index); local 1257 X509Certificate cert = (X509Certificate)certs.get(index); local 1460 X509Certificate cert = (X509Certificate)certs.get(index); local 1538 X509Certificate cert = (X509Certificate)certs.get(index); local 1593 X509Certificate cert = (X509Certificate)certs.get(index); local 1647 X509Certificate cert = (X509Certificate)certs.get(index); local 2028 X509Certificate cert = (X509Certificate)certs.get(index); local 2062 X509Certificate cert = (X509Certificate)certs.get(index); local 2097 X509Certificate cert = (X509Certificate)certs.get(index); local 2120 X509Certificate cert = (X509Certificate)certs.get(index); local 2159 X509Certificate cert = (X509Certificate)certs.get(index); local 2182 X509Certificate cert = (X509Certificate)certs.get(index); local 2213 X509Certificate cert = (X509Certificate)certs.get(index); local 2236 X509Certificate cert = (X509Certificate)certs.get(index); local 2259 X509Certificate cert = (X509Certificate)certs.get(index); local 2311 X509Certificate cert = (X509Certificate)certs.get(index); local 2365 X509Certificate cert = (X509Certificate)certs.get(index); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
X509ExtensionUtil.java | 4 import java.security.cert.CertificateParsingException; 5 import java.security.cert.X509Certificate; 35 public static Collection getIssuerAlternativeNames(X509Certificate cert) 38 byte[] extVal = cert.getExtensionValue(X509Extension.issuerAlternativeName.getId()); 43 public static Collection getSubjectAlternativeNames(X509Certificate cert) 46 byte[] extVal = cert.getExtensionValue(X509Extension.subjectAlternativeName.getId());
|
/external/chromium_org/third_party/webrtc/base/ |
fakesslidentity.h | 73 static FakeSSLCertificate* DupCert(FakeSSLCertificate cert) { 74 return cert.GetReference(); 76 static void DeleteCert(SSLCertificate* cert) { delete cert; } 85 explicit FakeSSLIdentity(const FakeSSLCertificate& cert) : cert_(cert) {}
|
/external/chromium_org/chrome/browser/ui/views/ |
ssl_client_certificate_selector.cc | 15 #include "net/cert/x509_certificate.h" 54 net::X509Certificate* cert = cert_request_info->client_certs[i].get(); local 57 base::UTF8ToUTF16(cert->subject().GetDisplayName()), 58 base::UTF8ToUTF16(cert->issuer().GetDisplayName())); 191 scoped_refptr<net::X509Certificate> cert = GetSelectedCert(); local 192 if (cert.get()) { 199 cert.get(), 205 cert)); 207 Unlocked(cert.get()); 237 net::X509Certificate* cert = GetSelectedCert() local [all...] |
/external/chromium_org/chrome/browser/ui/webui/ |
certificate_viewer_webui.cc | 33 net::X509Certificate* cert) { 34 CertificateViewerDialog* dialog = new CertificateViewerDialog(cert); 42 net::X509Certificate* cert) 43 : cert_(cert), webui_(NULL), window_(NULL) { 219 CertificateViewerDialog::CertificateViewerDialog(net::X509Certificate* cert) 220 : CertificateViewerModalDialog(cert), 253 net::X509Certificate* cert) 254 : cert_(cert), dialog_(dialog) { 293 net::X509Certificate::OSCertHandle cert = cert_chain_[cert_index]; 300 node_details->SetString("label", x509_certificate_model::GetTitle(cert)); 393 cert, &extensions); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateExpiredExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateExpiredException;
|
CertificateNotYetValidExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateNotYetValidException;
|