/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustedCertificateIndex.java | 20 import java.security.cert.TrustAnchor; 21 import java.security.cert.X509Certificate; 51 public TrustAnchor index(X509Certificate cert) { 52 TrustAnchor anchor = new TrustAnchor(cert, null); 59 X509Certificate cert = anchor.getTrustedCert(); local 60 if (cert != null) { 61 subject = cert.getSubjectX500Principal(); 89 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { 90 X500Principal issuer = cert.getIssuerX500Principal(); 106 cert.verify(publicKey) [all...] |
/external/chromium_org/android_webview/browser/ |
aw_ssl_host_state_delegate.cc | 14 net::SHA256HashValue getChainFingerprint256(const net::X509Certificate& cert) { 17 cert.os_cert_handle(), cert.GetIntermediateCertificates()); 26 // For an allowance, we consider a given |cert| to be a match to a saved 27 // allowed cert if the |error| is an exact match to or subset of the errors 29 bool CertPolicy::Check(const net::X509Certificate& cert, 31 net::SHA256HashValue fingerprint = getChainFingerprint256(cert); 42 void CertPolicy::Allow(const net::X509Certificate& cert, 44 // If this same cert had already been saved with a different error status, 46 net::SHA256HashValue fingerprint = getChainFingerprint256(cert); [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/ |
CertificateExpiredExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateExpiredException;
|
CertificateNotYetValidExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateNotYetValidException;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/ |
CertificateExpiredExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateExpiredException;
|
CertificateNotYetValidExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateNotYetValidException;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
PrincipalUtil.java | 4 import java.security.cert.CRLException; 5 import java.security.cert.CertificateEncodingException; 6 import java.security.cert.X509CRL; 7 import java.security.cert.X509Certificate; 24 * return the issuer of the given cert as an X509PrincipalObject. 27 X509Certificate cert) 33 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); 44 * return the subject of the given cert as an X509PrincipalObject. 47 X509Certificate cert) 53 ASN1Primitive.fromByteArray(cert.getTBSCertificate())) [all...] |
/external/chromium_org/content/browser/ |
cert_store_impl.h | 11 #include "net/cert/x509_certificate.h" 21 virtual int StoreCert(net::X509Certificate* cert, 24 scoped_refptr<net::X509Certificate>* cert) OVERRIDE;
|
/external/chromium_org/content/public/browser/ |
cert_store.h | 17 // The purpose of the cert store is to provide an easy way to store/retrieve 20 // associated with the cert have exited, the cert is removed from the store. 24 // Note that the cert ids will overflow if we register more than 2^32 - 1 certs 31 // Stores the specified cert and returns the id associated with it. The cert 33 // When all the RenderProcessHosts associated with a cert have exited, the 34 // cert is removed from the store. 36 virtual int StoreCert(net::X509Certificate* cert, 39 // Tries to retrieve the previously stored cert associated with the specifie [all...] |
/external/openssl/crypto/x509v3/ |
v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 98 cert = PEM_read_X509(inf, NULL, NULL); 99 if(!cert) { 105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 106 cert->cert_info->extensions = NULL; 108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 114 count = X509_get_ext_count(cert); 117 ext = X509_get_ext(cert, i);
|
v3prin.c | 69 X509 *cert; local 76 fprintf(stderr, "Usage v3prin cert.pem\n"); 83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) { 89 count = X509_get_ext_count(cert); 92 ext = X509_get_ext(cert, i);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate; 138 X509Certificate cert[] = new X509Certificate[2]; local 139 cert[0] = (X509Certificate) cf.generateCertificate(certArray); 140 cert[1] = (X509Certificate) cf.generateCertificate(certArray2); 144 keyTest.setCertificateEntry("alias1", cert[0]); 147 keyTest.setKeyEntry("alias2", privateKey, pssWord, cert); 150 keyTest.setCertificateEntry("alias3", cert[1]) 167 X509Certificate cert[] = new X509Certificate[2]; local 204 X509Certificate cert[] = new X509Certificate[2]; local 228 X509Certificate cert[] = new X509Certificate[2]; local 262 X509Certificate cert[] = new X509Certificate[2]; local 297 X509Certificate cert[] = new X509Certificate[2]; local 361 X509Certificate cert[] = new X509Certificate[2]; local 423 X509Certificate cert[] = new X509Certificate[2]; local 447 X509Certificate cert[] = new X509Certificate[2]; local 512 X509Certificate cert = (X509Certificate) cf local 543 X509Certificate cert[] = new X509Certificate[2]; local 567 X509Certificate cert[] = new X509Certificate[2]; local 585 X509Certificate cert[] = new X509Certificate[2]; local [all...] |
Identity2Test.java | 30 import java.security.cert.CertificateFactory; 31 import java.security.cert.X509Certificate; 49 X509Certificate cert; field in class:Identity2Test.CertificateImpl 51 public CertificateImpl(X509Certificate cert) { 52 this.cert = cert; 56 return cert.getIssuerDN(); 74 return cert.getType(); 78 return cert.getSubjectDN(); 82 return cert.getPublicKey() 219 X509Certificate cert[] = new X509Certificate[1]; local 236 X509Certificate cert[] = new X509Certificate[1]; local 250 X509Certificate cert[] = new X509Certificate[1]; local 267 X509Certificate cert[] = new X509Certificate[1]; local 283 X509Certificate cert[] = new X509Certificate[1]; local [all...] |
/build/tools/signapk/test/ |
run | 25 cert := out/key1.pem macro 26 out/signed-$(package): $(package) $(cert) 30 -key $(cert).pk -cert $(cert) -tempdir out
|
/external/chromium_org/chrome/browser/chromeos/net/ |
cert_verify_proc_chromeos.cc | 7 #include "net/cert/test_root_certs.h" 8 #include "net/cert/x509_certificate.h" 41 net::X509Certificate* cert, 55 return VerifyInternalImpl(cert, 70 CERTCertificate* cert = CERT_LIST_TAIL(current_chain)->cert; local 73 if (net::TestRootCerts::GetInstance()->Contains(cert)) { 76 DVLOG(3) << cert->subjectName << " is a TestRootCert"; 86 if (net::X509Certificate::IsSameOSCert(cert, (*i)->os_cert_handle())) { 90 DVLOG(3) << cert->subjectName << " is an additional_trust_anchor" [all...] |
/external/chromium_org/chrome/browser/ssl/ |
ssl_add_certificate.cc | 21 #include "net/cert/cert_database.h" 22 #include "net/cert/x509_certificate.h" 37 net::X509Certificate* cert) { 40 new SSLAddCertificateInfoBarDelegate(cert)))); 44 explicit SSLAddCertificateInfoBarDelegate(net::X509Certificate* cert) 45 : cert_(cert) {} 113 net::X509Certificate* cert) { 120 InfoBarService::FromWebContents(web_contents), cert); 137 scoped_refptr<net::X509Certificate> cert; 139 cert = net::X509Certificate::CreateFromBytes [all...] |
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_unittest.cc | 15 #include "net/cert/nss_cert_database.h" 19 scoped_refptr<net::X509Certificate> cert( 22 ASSERT_TRUE(cert.get()); 25 x509_certificate_model::GetCertNameOrNickname(cert->os_cert_handle())); 44 // Temp cert has no nickname. 65 net::GetTestCertsDirectory(), "ct-test-embedded-cert.pem")); 73 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 75 ASSERT_TRUE(cert.get()); 79 "critical", "notcrit", cert->os_cert_handle(), &extensions); 99 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertPathValidatorSpiTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertPathParameters; 27 import java.security.cert.CertPathValidatorException; 28 import java.security.cert.CertPathValidatorResult; 29 import java.security.cert.CertPathValidatorSpi; 31 import org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi;
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
SslUtil.java | 16 import java.security.cert.CertificateException; 17 import java.security.cert.X509Certificate; 25 public static SslError sslErrorFromNetErrorCode(int error, SslCertificate cert, String url) { 29 return new SslError(SslError.SSL_IDMISMATCH, cert, url); 31 return new SslError(SslError.SSL_DATE_INVALID, cert, url); 33 return new SslError(SslError.SSL_UNTRUSTED, cert, url); 38 return new SslError(SslError.SSL_INVALID, cert, url);
|
/external/chromium_org/net/cert/ |
cert_database_nss.cc | 5 #include "net/cert/cert_database.h" 7 #include <cert.h> 16 #include "net/cert/x509_certificate.h" 17 #include "net/cert/x509_util_nss.h" 41 CERTCertificate* cert = cert_obj->os_cert_handle(); 42 PK11SlotInfo* slot = PK11_KeyForCertExists(cert, NULL, NULL); 52 CERTCertificate* cert = cert_obj->os_cert_handle(); local 54 crypto::ScopedPK11Slot slot(PK11_KeyForCertExists(cert, &key, NULL)); 60 &cert->derSubject, 66 rv = PK11_ImportCert(slot.get(), cert, key, nickname.c_str(), PR_FALSE) [all...] |
nss_cert_database.h | 19 #include "net/cert/cert_type.h" 20 #include "net/cert/x509_certificate.h" 42 // Called with |cert| == NULL after importing a list of certificates 44 virtual void OnCertAdded(const X509Certificate* cert) {} 47 virtual void OnCertRemoved(const X509Certificate* cert) {} 50 // Called with |cert| == NULL after importing a list of certificates 52 virtual void OnCACertChanged(const X509Certificate* cert) {} 64 ImportCertFailure(const scoped_refptr<X509Certificate>& cert, int err); 77 // For SERVER_CERT, only TRUSTED_SSL makes sense, and specifies the cert is 79 // For EMAIL_CERT, only TRUSTED_EMAIL makes sense, and specifies the cert i [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificate.java | 22 package org.apache.harmony.security.tests.support.cert; 29 import java.security.cert.Certificate; 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.CertificateException; 34 * Stub class for <code>java.security.cert.Certificate</code> tests
|
/external/chromium_org/chrome/browser/resources/options/ |
certificate_tree.css | 5 span.cert-untrusted { 14 span.cert-policy {
|
/external/chromium_org/content/browser/ssl/ |
ssl_policy_backend.cc | 34 void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert, 38 ssl_host_state_delegate_->AllowCert(host, cert, error); 42 const net::X509Certificate& cert, 48 host, cert, error, expired_previous_decision) :
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
KeyManagementTest.java | 23 import java.security.cert.CertificateException; 24 import java.security.cert.CertificateFactory; 25 import java.security.cert.Certificate; 53 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 54 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, cert, alias)); local 61 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 63 assertFalse(mDevicePolicyManager.installKeyPair(getWho(), null, cert, alias)); local 78 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 80 assertFalse(mDevicePolicyManager.installKeyPair(null, privKey, cert, alias)); 92 Certificate getCertificate(byte[] cert) throws CertificateException [all...] |