HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 126 - 150 of 728) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/conscrypt/src/platform/java/org/conscrypt/
PinFailureLogger.java 19 import java.security.cert.CertificateEncodingException;
20 import java.security.cert.X509Certificate;
54 for (X509Certificate cert : chain) {
56 sb.append(Base64.encode(cert.getEncoded()));
PinListEntry.java 22 import java.security.cert.X509Certificate;
93 * CA cert. Otherwise this will return {@code true} indicating the {@code chain}
99 for (X509Certificate cert : chain) {
100 String fingerprint = getFingerprint(cert);
110 private static String getFingerprint(X509Certificate cert) {
113 byte[] encoded = cert.getPublicKey().getEncoded();
145 for (X509Certificate cert : chain) {
146 if (certStore.isUserAddedCertificate(cert)) {
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
DummyTrustManager.java 19 import java.security.cert.X509Certificate;
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
CertificateMessageTest.java 22 import java.security.cert.CertificateEncodingException;
23 import java.security.cert.CertificateException;
24 import java.security.cert.CertificateFactory;
25 import java.security.cert.X509Certificate;
87 X509Certificate cert = (X509Certificate) certFactory.generateCertificate(bais); local
89 new X509Certificate[] { cert });
92 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0]
93 .getEncoded(), cert.getEncoded()));
104 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0]
DigitalSignatureTest.java 23 import java.security.cert.Certificate;
33 private Certificate cert; field in class:DigitalSignatureTest
44 cert = entry.getCertificate();
74 ds_verify.init(cert);
98 ds_verify.init(cert);
TrustManagerImplTest.java 24 import java.security.cert.CertificateException;
25 import java.security.cert.CertificateFactory;
26 import java.security.cert.X509Certificate;
35 // Cert. encoding.was generated by using of classes
39 // org.apache.harmony.security.tests.support.provider.cert.CertFactoryTestData
68 X509Certificate cert = (X509Certificate) certFactory local
70 untrustedChain = new X509Certificate[] { cert };
  /external/chromium_org/chromeos/
cert_loader.cc 17 #include "net/cert/nss_cert_database.h"
18 #include "net/cert/nss_cert_database_chromeos.h"
19 #include "net/cert/x509_certificate.h"
67 // Start observing cert database for changes.
99 const net::X509Certificate* cert) const {
102 return database_->IsHardwareBacked(cert);
119 const net::X509Certificate& cert,
123 CERTCertificateStr* cert_handle = cert.os_cert_handle();
182 void CertLoader::OnCACertChanged(const net::X509Certificate* cert) {
188 void CertLoader::OnCertAdded(const net::X509Certificate* cert) {
    [all...]
  /external/chromium_org/net/cert/
cert_database_mac.cc 5 #include "net/cert/cert_database.h"
18 #include "net/cert/x509_certificate.h"
131 int CertDatabase::CheckUserCert(X509Certificate* cert) {
132 if (!cert)
134 if (cert->HasExpired())
139 OSStatus err = SecIdentityCreateWithCertificate(NULL, cert->os_cert_handle(),
153 int CertDatabase::AddUserCert(X509Certificate* cert) {
157 err = SecCertificateAddToKeychain(cert->os_cert_handle(), NULL);
161 CertDatabase::NotifyObserversOfCertAdded(cert);
166 OSSTATUS_LOG(ERROR, err) << "CertDatabase failed to add cert to keychain"
    [all...]
asn1_util.cc 5 #include "net/cert/asn1_util.h"
95 // SeekToSPKI changes |cert| so that it points to a suffix of the
98 static bool SeekToSPKI(base::StringPiece* cert) {
115 if (!GetElement(cert, kSEQUENCE, &certificate))
119 if (!cert->empty())
147 *cert = tbs_certificate;
151 bool ExtractSPKIFromDERCert(base::StringPiece cert,
153 if (!SeekToSPKI(&cert))
155 if (!ParseElement(&cert, kSEQUENCE, spki_out, NULL))
188 bool ExtractCRLURLsFromDERCert(base::StringPiece cert,
    [all...]
  /external/chromium_org/content/browser/renderer_host/pepper/
pepper_socket_utils.cc 18 #include "net/cert/x509_certificate.h"
71 bool GetCertificateFields(const net::X509Certificate& cert,
73 const net::CertPrincipal& issuer = cert.issuer();
89 const net::CertPrincipal& subject = cert.subject();
105 const std::string& serial_number = cert.serial_number();
110 new base::FundamentalValue(cert.valid_start().ToDoubleT()));
112 new base::FundamentalValue(cert.valid_expiry().ToDoubleT()));
114 net::X509Certificate::GetDEREncoded(cert.os_cert_handle(), &der);
124 scoped_refptr<net::X509Certificate> cert = local
126 if (!cert.get()
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509CertStoreSelector.java 6 import java.security.cert.Certificate;
7 import java.security.cert.X509CertSelector;
8 import java.security.cert.X509Certificate;
33 public boolean match(Certificate cert)
35 return match((Object)cert);
AttributeCertificateHolder.java 7 import java.security.cert.CertSelector;
8 import java.security.cert.Certificate;
9 import java.security.cert.CertificateEncodingException;
10 import java.security.cert.CertificateParsingException;
11 import java.security.cert.X509Certificate;
48 * @deprecated use org.bouncycastle.cert.AttributeCertificateHolder
74 public AttributeCertificateHolder(X509Certificate cert)
81 name = PrincipalUtil.getIssuerX509Principal(cert);
89 new ASN1Integer(cert.getSerialNumber())));
328 public boolean match(Certificate cert)
    [all...]
  /external/chromium_org/net/ssl/
channel_id_service.cc 26 #include "net/cert/x509_certificate.h"
27 #include "net/cert/x509_util.h"
48 // Synchronously found and returned an existing domain bound cert.
50 // Retrieved or generated and returned a domain bound cert asynchronously.
52 // Retrieval/generation request was cancelled before the cert generation
55 // Cert generation failed.
63 // We don't support any of the cert types the server requested.
67 // Couldn't start a worker to generate a cert.
108 DLOG(ERROR) << "Unable to create x509 cert for client";
147 std::string* cert)
246 scoped_ptr<ChannelIDStore::ChannelID> cert = local
    [all...]
client_cert_store_nss.cc 17 #include "net/cert/x509_util.h"
86 if (CERT_CheckCertValidTimes(node->cert, PR_Now(), PR_TRUE) !=
88 DVLOG(2) << "skipped expired cert: "
89 << base::StringPiece(node->cert->nickname);
93 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local
94 node->cert, X509Certificate::OSCertHandles());
99 cert->IsIssuedByEncoded(request.cert_authorities)) ||
101 NSS_CmpCertChainWCANames(node->cert, &ca_names) == SECSuccess)) {
102 DVLOG(2) << "matched cert: " << base::StringPiece(node->cert->nickname)
    [all...]
channel_id_service.h 94 // Fetches the domain bound cert for the specified host if one exists and
99 // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate.
112 std::string* cert,
116 // Fetches the domain bound cert for the specified host if one exists.
121 // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate.
129 // not complete until a new cert is created.
137 std::string* cert,
161 const std::string& cert);
169 const std::string& cert);
177 std::string* cert,
    [all...]
  /build/tools/releasetools/
check_target_files_signatures 31 .x509.pem files. Defaults to "vendor,build". Where cert files
33 printed as the cert name, otherwise a hash of the cert plus its
95 def GetCertSubject(cert):
99 out, err = p.communicate(cert)
101 return "(error reading cert subject)"
106 return "(unknown cert subject)"
113 def Add(self, cert, name=None):
114 if cert in self.certs:
116 self.certs[cert] = self.certs[cert] + "," + nam
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
CertificateFactory.java 6 import java.security.cert.CRL;
7 import java.security.cert.CRLException;
8 import java.security.cert.CertPath;
9 import java.security.cert.CertificateException;
10 import java.security.cert.CertificateFactorySpi;
11 import java.security.cert.CertificateParsingException;
12 import java.security.cert.X509Certificate;
49 private java.security.cert.Certificate readDERCertificate(
71 private java.security.cert.Certificate getCertificate()
91 private java.security.cert.Certificate readPEMCertificate
232 java.security.cert.Certificate cert; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathBuilderSpi.java 4 import java.security.cert.CertPath;
5 import java.security.cert.CertPathBuilderException;
6 import java.security.cert.CertPathBuilderResult;
7 import java.security.cert.CertPathBuilderSpi;
8 import java.security.cert.CertPathParameters;
9 import java.security.cert.CertPathValidator;
10 import java.security.cert.CertificateFactory;
11 import java.security.cert.CertificateParsingException;
12 import java.security.cert.PKIXBuilderParameters;
13 import java.security.cert.PKIXCertPathBuilderResult
67 X509Certificate cert; local
    [all...]
RFC3280CertPathUtilities.java 7 import java.security.cert.CertPath;
8 import java.security.cert.CertPathBuilder;
9 import java.security.cert.CertPathBuilderException;
10 import java.security.cert.CertPathValidatorException;
11 import java.security.cert.CertificateExpiredException;
12 import java.security.cert.CertificateNotYetValidException;
13 import java.security.cert.PKIXCertPathChecker;
14 import java.security.cert.X509CRL;
15 import java.security.cert.X509Certificate;
16 import java.security.cert.X509Extension
867 X509Certificate cert = (X509Certificate)certs.get(index); local
1051 X509Certificate cert = (X509Certificate)certs.get(index); local
1127 X509Certificate cert = (X509Certificate)certs.get(index); local
1156 X509Certificate cert = (X509Certificate)certs.get(index); local
1257 X509Certificate cert = (X509Certificate)certs.get(index); local
1460 X509Certificate cert = (X509Certificate)certs.get(index); local
1538 X509Certificate cert = (X509Certificate)certs.get(index); local
1593 X509Certificate cert = (X509Certificate)certs.get(index); local
1647 X509Certificate cert = (X509Certificate)certs.get(index); local
2028 X509Certificate cert = (X509Certificate)certs.get(index); local
2062 X509Certificate cert = (X509Certificate)certs.get(index); local
2097 X509Certificate cert = (X509Certificate)certs.get(index); local
2120 X509Certificate cert = (X509Certificate)certs.get(index); local
2159 X509Certificate cert = (X509Certificate)certs.get(index); local
2182 X509Certificate cert = (X509Certificate)certs.get(index); local
2213 X509Certificate cert = (X509Certificate)certs.get(index); local
2236 X509Certificate cert = (X509Certificate)certs.get(index); local
2259 X509Certificate cert = (X509Certificate)certs.get(index); local
2311 X509Certificate cert = (X509Certificate)certs.get(index); local
2365 X509Certificate cert = (X509Certificate)certs.get(index); local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
X509ExtensionUtil.java 4 import java.security.cert.CertificateParsingException;
5 import java.security.cert.X509Certificate;
35 public static Collection getIssuerAlternativeNames(X509Certificate cert)
38 byte[] extVal = cert.getExtensionValue(X509Extension.issuerAlternativeName.getId());
43 public static Collection getSubjectAlternativeNames(X509Certificate cert)
46 byte[] extVal = cert.getExtensionValue(X509Extension.subjectAlternativeName.getId());
  /external/chromium_org/third_party/webrtc/base/
fakesslidentity.h 73 static FakeSSLCertificate* DupCert(FakeSSLCertificate cert) {
74 return cert.GetReference();
76 static void DeleteCert(SSLCertificate* cert) { delete cert; }
85 explicit FakeSSLIdentity(const FakeSSLCertificate& cert) : cert_(cert) {}
  /external/chromium_org/chrome/browser/ui/views/
ssl_client_certificate_selector.cc 15 #include "net/cert/x509_certificate.h"
54 net::X509Certificate* cert = cert_request_info->client_certs[i].get(); local
57 base::UTF8ToUTF16(cert->subject().GetDisplayName()),
58 base::UTF8ToUTF16(cert->issuer().GetDisplayName()));
191 scoped_refptr<net::X509Certificate> cert = GetSelectedCert(); local
192 if (cert.get()) {
199 cert.get(),
205 cert));
207 Unlocked(cert.get());
237 net::X509Certificate* cert = GetSelectedCert() local
    [all...]
  /external/chromium_org/chrome/browser/ui/webui/
certificate_viewer_webui.cc 33 net::X509Certificate* cert) {
34 CertificateViewerDialog* dialog = new CertificateViewerDialog(cert);
42 net::X509Certificate* cert)
43 : cert_(cert), webui_(NULL), window_(NULL) {
219 CertificateViewerDialog::CertificateViewerDialog(net::X509Certificate* cert)
220 : CertificateViewerModalDialog(cert),
253 net::X509Certificate* cert)
254 : cert_(cert), dialog_(dialog) {
293 net::X509Certificate::OSCertHandle cert = cert_chain_[cert_index];
300 node_details->SetString("label", x509_certificate_model::GetTitle(cert));
393 cert, &extensions); local
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertificateExpiredExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertificateExpiredException;
CertificateNotYetValidExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertificateNotYetValidException;

Completed in 4108 milliseconds

1 2 3 4 56 7 8 91011>>