HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 176 - 200 of 728) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/net/cert/
single_request_cert_verifier.h 8 #include "net/cert/cert_verifier.h"
27 int Verify(X509Certificate* cert,
test_root_certs.h 68 bool Contains(CERTCertificate* cert) const;
84 bool Contains(X509* cert) const;
130 // Creates a ScopedTestRoot that will adds|cert| to the TestRootCerts store.
131 explicit ScopedTestRoot(X509Certificate* cert);
134 // Assigns |cert| to be the new test root cert. If |cert| is NULL, undoes
137 // a cert being passed at construction), the existing TestRootCerts store is
139 void Reset(X509Certificate* cert);
cert_verify_proc_nss.cc 5 #include "net/cert/cert_verify_proc_nss.h"
10 #include <cert.h>
22 #include "net/cert/asn1_util.h"
23 #include "net/cert/cert_status_flags.h"
24 #include "net/cert/cert_verifier.h"
25 #include "net/cert/cert_verify_result.h"
26 #include "net/cert/crl_set.h"
27 #include "net/cert/ev_root_ca_metadata.h"
28 #include "net/cert/x509_certificate.h"
29 #include "net/cert/x509_util_nss.h
300 CERTCertificate* cert = *i; local
747 CERTCertificate* cert = x509_util_ios::CreateNSSCertHandleFromOSHandle( local
    [all...]
ct_objects_extractor_nss.cc 5 #include "net/cert/ct_objects_extractor.h"
7 #include <cert.h>
16 #include "net/cert/asn1_util.h"
17 #include "net/cert/scoped_nss_types.h"
18 #include "net/cert/signed_certificate_timestamp.h"
40 ScopedCERTCertificate cert; member in struct:net::ct::__anon13703::NSSCertWrapper
45 cert.reset(CERT_DupCertificate(cert_handle));
56 // shares a serial number with another cert issued by the same CA,
58 cert.reset(CERT_NewTempCertificate(
61 DCHECK(cert.get() != NULL)
    [all...]
x509_util_openssl.cc 5 #include "net/cert/x509_util_openssl.h"
18 #include "net/cert/x509_cert_types.h"
19 #include "net/cert/x509_util.h"
116 ScopedX509 cert(X509_new());
117 if (!cert.get() || !X509_set_version(cert.get(), 2L) /* i.e. version 3 */ ||
118 !X509_set_pubkey(cert.get(), key) ||
119 !X509_set_serialNumber(cert.get(), asn1_serial.get()) ||
120 !X509_set_notBefore(cert.get(), asn1_not_before_time.get()) ||
121 !X509_set_notAfter(cert.get(), asn1_not_after_time.get()) |
    [all...]
  /external/chromium_org/third_party/boringssl/src/ssl/
ssl_cert.c 159 void ssl_cert_set_default_md(CERT *cert)
162 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
163 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
164 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
167 CERT *ssl_cert_new(void)
169 CERT *ret;
171 ret=(CERT *)OPENSSL_malloc(sizeof(CERT));
177 memset(ret,0,sizeof(CERT));
    [all...]
s3_lib.c 1101 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
1112 if (!ssl_cert_inst(&s->cert))
1175 if (s->cert->dh_tmp != NULL)
1176 DH_free(s->cert->dh_tmp);
1177 s->cert->dh_tmp = dh;
1211 if (s->cert->ecdh_tmp != NULL)
1212 EC_KEY_free(s->cert->ecdh_tmp);
1213 s->cert->ecdh_tmp = ecdh;
1257 return ssl_cert_set1_chain(s->cert,
1260 return ssl_cert_set0_chain(s->cert,
1477 CERT *cert; local
1699 CERT *cert; local
1785 CERT *cert; local
    [all...]
  /external/chromium_org/third_party/webrtc/base/
nssidentity.h 16 #include "cert.h"
54 explicit NSSCertificate(CERTCertificate* cert);
90 NSSCertificate(CERTCertificate* cert, SSLCertChain* chain);
117 NSSIdentity(NSSKeyPair* keypair, NSSCertificate* cert) :
118 keypair_(keypair), certificate_(cert) {}
ssladapter.h 45 typedef bool (*VerificationCallback)(void* cert);
  /external/nist-sip/java/gov/nist/javax/sip/
TransactionExt.java 4 import java.security.cert.Certificate;
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 26 import java.security.cert.Certificate;
27 import java.security.cert.CertificateFactory;
28 import java.security.cert.X509Certificate;
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
X509CRL2Test.java 18 package org.apache.harmony.security.tests.java.security.cert;
21 import java.security.cert.CertificateFactory;
22 import java.security.cert.X509Certificate;
44 * @tests java.security.cert.X509CRL#getExtensionValue(java.lang.String)
X509CRLEntry2Test.java 18 package org.apache.harmony.security.tests.java.security.cert;
21 import java.security.cert.CertificateFactory;
22 import java.security.cert.X509Certificate;
44 * @tests java.security.cert.X509CRLEntry#getExtensionValue(java.lang.String)
CertificateTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
28 import java.security.cert.Certificate;
29 import java.security.cert.CertificateEncodingException;
30 import java.security.cert.CertificateException;
32 import org.apache.harmony.security.tests.support.cert.MyCertificate;
41 * Meaningless cert encoding just for testing purposes
PKIXBuilderParametersTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
26 import java.security.cert.PKIXBuilderParameters;
27 import java.security.cert.PKIXParameters;
28 import java.security.cert.X509CertSelector;
32 import org.apache.harmony.security.tests.support.cert.TestUtils;
156 * <code>java.security.cert.TrustAnchor</code>
CertificateFactory3Test.java 22 package org.apache.harmony.security.tests.java.security.cert;
27 import java.security.cert.CertPath;
28 import java.security.cert.Certificate;
29 import java.security.cert.CertificateFactory;
38 import org.apache.harmony.security.tests.support.cert.TestUtils;
54 public static String fileCertPathPki = "java/security/cert/CertPath.PkiPath";
106 Certificate cert = certFs[0] local
115 assertEquals("Incorrect Certificate in Collection", cert, it.next());
127 Certificate cert = certFs[0] local
131 list.add(cert);
    [all...]
CertificateFactorySpiTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
28 import java.security.cert.CRL;
29 import java.security.cert.CRLException;
30 import java.security.cert.Certificate;
31 import java.security.cert.CertificateException;
32 import java.security.cert.CertificateFactorySpi;
37 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi;
157 Certificate cert = certFactorySpi local
159 assertNull("Result must be null", cert);
227 Certificate cert = certFactorySp local
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/
CertPathValidatorExceptionTest.java 22 package org.apache.harmony.security.tests.java.security.cert.serialization;
25 import java.security.cert.CertPath;
26 import java.security.cert.CertPathValidatorException;
  /external/chromium_org/net/third_party/nss/ssl/
cmpcert.c 13 #include "cert.h"
20 * Look to see if any of the signers in the cert chain for "cert" are found
25 NSS_CmpCertChainWCANames(CERTCertificate *cert, CERTDistNames *caNames)
38 if (!cert || !caNames || !caNames->nnames || !caNames->names ||
42 curcert = CERT_DupCertificate(cert);
sslreveal.c 8 #include "cert.h"
14 * the caller should delete the cert when done with SSL_DestroyCertificate
19 CERTCertificate * cert = NULL; local
25 * the same cert
28 cert = CERT_DupCertificate(sslsocket->sec.peerCert);
30 return cert;
  /external/chromium_org/ppapi/tests/
test_tcp_socket_private_trusted.cc 55 const pp::X509CertificatePrivate& cert = socket.GetServerCertificate(); local
57 cert.GetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_COMMON_NAME).AsString(),
60 cert.GetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_COMMON_NAME).AsString(),
  /external/conscrypt/src/platform/java/org/conscrypt/
TrustManagerImpl.java 24 import java.security.cert.CertPath;
25 import java.security.cert.CertPathValidator;
26 import java.security.cert.CertPathValidatorException;
27 import java.security.cert.Certificate;
28 import java.security.cert.CertificateException;
29 import java.security.cert.CertificateParsingException;
30 import java.security.cert.CertificateFactory;
31 import java.security.cert.PKIXCertPathChecker;
32 import java.security.cert.PKIXParameters;
33 import java.security.cert.TrustAnchor
181 final X509Certificate cert = (X509Certificate) ks.getCertificate(alias); local
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
CaCertManagementTest.java 22 import java.security.cert.CertificateException;
23 import java.security.cert.CertificateFactory;
24 import java.security.cert.Certificate;
73 Certificate cert = readCertificate(certBuffer); local
74 if (certificateToMatch.equals(cert)) {
  /external/chromium_org/net/data/ssl/scripts/
generate-policy-certs.sh 32 try openssl genrsa -out out/policy-cert.key 2048
81 -key out/policy-cert.key \
82 -out out/policy-cert.csr \
90 -in out/policy-cert.csr \
91 -out out/policy-cert.pem \
95 try /bin/sh -c "cat out/policy-cert.pem \
  /external/chromium_org/chrome/browser/ssl/
ssl_error_info.cc 15 #include "net/cert/cert_status_flags.h"
30 net::X509Certificate* cert,
42 cert->GetDNSNames(&dns_names);
46 if (dns_names[i] == cert->subject().common_name)
61 if (cert->HasExpired()) {
66 (base::Time::Now() - cert->valid_expiry()).InDays()),
70 } else if (base::Time::Now() < cert->valid_start()) {
75 (cert->valid_start() - base::Time::Now()).InDays()));
236 scoped_refptr<net::X509Certificate> cert = NULL; local
241 if (!cert.get())
    [all...]

Completed in 833 milliseconds

1 2 3 4 5 6 78 91011>>