/external/chromium_org/net/cert/ |
single_request_cert_verifier.h | 8 #include "net/cert/cert_verifier.h" 27 int Verify(X509Certificate* cert,
|
test_root_certs.h | 68 bool Contains(CERTCertificate* cert) const; 84 bool Contains(X509* cert) const; 130 // Creates a ScopedTestRoot that will adds|cert| to the TestRootCerts store. 131 explicit ScopedTestRoot(X509Certificate* cert); 134 // Assigns |cert| to be the new test root cert. If |cert| is NULL, undoes 137 // a cert being passed at construction), the existing TestRootCerts store is 139 void Reset(X509Certificate* cert);
|
cert_verify_proc_nss.cc | 5 #include "net/cert/cert_verify_proc_nss.h" 10 #include <cert.h> 22 #include "net/cert/asn1_util.h" 23 #include "net/cert/cert_status_flags.h" 24 #include "net/cert/cert_verifier.h" 25 #include "net/cert/cert_verify_result.h" 26 #include "net/cert/crl_set.h" 27 #include "net/cert/ev_root_ca_metadata.h" 28 #include "net/cert/x509_certificate.h" 29 #include "net/cert/x509_util_nss.h 300 CERTCertificate* cert = *i; local 747 CERTCertificate* cert = x509_util_ios::CreateNSSCertHandleFromOSHandle( local [all...] |
ct_objects_extractor_nss.cc | 5 #include "net/cert/ct_objects_extractor.h" 7 #include <cert.h> 16 #include "net/cert/asn1_util.h" 17 #include "net/cert/scoped_nss_types.h" 18 #include "net/cert/signed_certificate_timestamp.h" 40 ScopedCERTCertificate cert; member in struct:net::ct::__anon13703::NSSCertWrapper 45 cert.reset(CERT_DupCertificate(cert_handle)); 56 // shares a serial number with another cert issued by the same CA, 58 cert.reset(CERT_NewTempCertificate( 61 DCHECK(cert.get() != NULL) [all...] |
x509_util_openssl.cc | 5 #include "net/cert/x509_util_openssl.h" 18 #include "net/cert/x509_cert_types.h" 19 #include "net/cert/x509_util.h" 116 ScopedX509 cert(X509_new()); 117 if (!cert.get() || !X509_set_version(cert.get(), 2L) /* i.e. version 3 */ || 118 !X509_set_pubkey(cert.get(), key) || 119 !X509_set_serialNumber(cert.get(), asn1_serial.get()) || 120 !X509_set_notBefore(cert.get(), asn1_not_before_time.get()) || 121 !X509_set_notAfter(cert.get(), asn1_not_after_time.get()) | [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
ssl_cert.c | 159 void ssl_cert_set_default_md(CERT *cert) 162 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 163 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 164 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1(); 167 CERT *ssl_cert_new(void) 169 CERT *ret; 171 ret=(CERT *)OPENSSL_malloc(sizeof(CERT)); 177 memset(ret,0,sizeof(CERT)); [all...] |
s3_lib.c | 1101 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); 1112 if (!ssl_cert_inst(&s->cert)) 1175 if (s->cert->dh_tmp != NULL) 1176 DH_free(s->cert->dh_tmp); 1177 s->cert->dh_tmp = dh; 1211 if (s->cert->ecdh_tmp != NULL) 1212 EC_KEY_free(s->cert->ecdh_tmp); 1213 s->cert->ecdh_tmp = ecdh; 1257 return ssl_cert_set1_chain(s->cert, 1260 return ssl_cert_set0_chain(s->cert, 1477 CERT *cert; local 1699 CERT *cert; local 1785 CERT *cert; local [all...] |
/external/chromium_org/third_party/webrtc/base/ |
nssidentity.h | 16 #include "cert.h" 54 explicit NSSCertificate(CERTCertificate* cert); 90 NSSCertificate(CERTCertificate* cert, SSLCertChain* chain); 117 NSSIdentity(NSSKeyPair* keypair, NSSCertificate* cert) : 118 keypair_(keypair), certificate_(cert) {}
|
ssladapter.h | 45 typedef bool (*VerificationCallback)(void* cert);
|
/external/nist-sip/java/gov/nist/javax/sip/ |
TransactionExt.java | 4 import java.security.cert.Certificate;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateFactory; 28 import java.security.cert.X509Certificate;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
X509CRL2Test.java | 18 package org.apache.harmony.security.tests.java.security.cert; 21 import java.security.cert.CertificateFactory; 22 import java.security.cert.X509Certificate; 44 * @tests java.security.cert.X509CRL#getExtensionValue(java.lang.String)
|
X509CRLEntry2Test.java | 18 package org.apache.harmony.security.tests.java.security.cert; 21 import java.security.cert.CertificateFactory; 22 import java.security.cert.X509Certificate; 44 * @tests java.security.cert.X509CRLEntry#getExtensionValue(java.lang.String)
|
CertificateTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException; 32 import org.apache.harmony.security.tests.support.cert.MyCertificate; 41 * Meaningless cert encoding just for testing purposes
|
PKIXBuilderParametersTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 26 import java.security.cert.PKIXBuilderParameters; 27 import java.security.cert.PKIXParameters; 28 import java.security.cert.X509CertSelector; 32 import org.apache.harmony.security.tests.support.cert.TestUtils; 156 * <code>java.security.cert.TrustAnchor</code>
|
CertificateFactory3Test.java | 22 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.CertPath; 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 38 import org.apache.harmony.security.tests.support.cert.TestUtils; 54 public static String fileCertPathPki = "java/security/cert/CertPath.PkiPath"; 106 Certificate cert = certFs[0] local 115 assertEquals("Incorrect Certificate in Collection", cert, it.next()); 127 Certificate cert = certFs[0] local 131 list.add(cert); [all...] |
CertificateFactorySpiTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 28 import java.security.cert.CRL; 29 import java.security.cert.CRLException; 30 import java.security.cert.Certificate; 31 import java.security.cert.CertificateException; 32 import java.security.cert.CertificateFactorySpi; 37 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 157 Certificate cert = certFactorySpi local 159 assertNull("Result must be null", cert); 227 Certificate cert = certFactorySp local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/ |
CertPathValidatorExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertPathValidatorException;
|
/external/chromium_org/net/third_party/nss/ssl/ |
cmpcert.c | 13 #include "cert.h" 20 * Look to see if any of the signers in the cert chain for "cert" are found 25 NSS_CmpCertChainWCANames(CERTCertificate *cert, CERTDistNames *caNames) 38 if (!cert || !caNames || !caNames->nnames || !caNames->names || 42 curcert = CERT_DupCertificate(cert);
|
sslreveal.c | 8 #include "cert.h" 14 * the caller should delete the cert when done with SSL_DestroyCertificate 19 CERTCertificate * cert = NULL; local 25 * the same cert 28 cert = CERT_DupCertificate(sslsocket->sec.peerCert); 30 return cert;
|
/external/chromium_org/ppapi/tests/ |
test_tcp_socket_private_trusted.cc | 55 const pp::X509CertificatePrivate& cert = socket.GetServerCertificate(); local 57 cert.GetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_COMMON_NAME).AsString(), 60 cert.GetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_COMMON_NAME).AsString(),
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustManagerImpl.java | 24 import java.security.cert.CertPath; 25 import java.security.cert.CertPathValidator; 26 import java.security.cert.CertPathValidatorException; 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateParsingException; 30 import java.security.cert.CertificateFactory; 31 import java.security.cert.PKIXCertPathChecker; 32 import java.security.cert.PKIXParameters; 33 import java.security.cert.TrustAnchor 181 final X509Certificate cert = (X509Certificate) ks.getCertificate(alias); local [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
CaCertManagementTest.java | 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.Certificate; 73 Certificate cert = readCertificate(certBuffer); local 74 if (certificateToMatch.equals(cert)) {
|
/external/chromium_org/net/data/ssl/scripts/ |
generate-policy-certs.sh | 32 try openssl genrsa -out out/policy-cert.key 2048 81 -key out/policy-cert.key \ 82 -out out/policy-cert.csr \ 90 -in out/policy-cert.csr \ 91 -out out/policy-cert.pem \ 95 try /bin/sh -c "cat out/policy-cert.pem \
|
/external/chromium_org/chrome/browser/ssl/ |
ssl_error_info.cc | 15 #include "net/cert/cert_status_flags.h" 30 net::X509Certificate* cert, 42 cert->GetDNSNames(&dns_names); 46 if (dns_names[i] == cert->subject().common_name) 61 if (cert->HasExpired()) { 66 (base::Time::Now() - cert->valid_expiry()).InDays()), 70 } else if (base::Time::Now() < cert->valid_start()) { 75 (cert->valid_start() - base::Time::Now()).InDays())); 236 scoped_refptr<net::X509Certificate> cert = NULL; local 241 if (!cert.get()) [all...] |