/external/chromium_org/chrome/common/net/ |
x509_certificate_model_nss.cc | 7 #include <cert.h> 23 #include "net/cert/x509_certificate.h" 45 std::string HashCert(CERTCertificate* cert, HASH_HashType algorithm, int len) { 48 DCHECK(NULL != cert->derCert.data); 49 DCHECK_NE(0U, cert->derCert.len); 52 SECStatus rv = HASH_HashBuf(algorithm, fingerprint, cert->derCert.data, 53 cert->derCert.len);
|
/development/tools/ |
make_key | 24 Creates <name>.pk8 key and <name>.x509.pem cert. Cert contains the 36 # Use named pipes to connect get the raw RSA private key to the cert-
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 25 import java.security.cert.Certificate; 27 import org.apache.harmony.security.tests.support.cert.MyCertificate;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/ |
X509CertificateHolderSelector.java | 1 package org.bouncycastle.cert.selector; 9 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
NamedJcaJceHelper.java | 11 import java.security.cert.CertificateException; 12 import java.security.cert.CertificateFactory;
|
ProviderJcaJceHelper.java | 11 import java.security.cert.CertificateException; 12 import java.security.cert.CertificateFactory;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
AuthorityKeyIdentifierStructure.java | 6 import java.security.cert.CertificateParsingException; 7 import java.security.cert.X509Certificate;
|
/external/chromium_org/chrome/app/ |
signature_validator_win_unittest.cc | 22 #include "net/cert/test_root_certs.h" 73 PCCERT_CONTEXT cert = CertCreateCertificateContext(X509_ASN_ENCODING, local 77 CRYPT_BIT_BLOB blob = cert->pCertInfo->SubjectPublicKeyInfo.PublicKey; 127 //TODO(caitkp): Figure out how to sign a dll with an expired cert.
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 11 #include "net/cert/cert_verify_proc.h" 12 #include "net/cert/multi_threaded_cert_verifier.h" 72 net::X509Certificate* cert, 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
|
/external/chromium_org/chrome/browser/ui/ |
crypto_module_password_dialog_nss.cc | 13 #include "net/cert/x509_certificate.h" 140 void UnlockCertSlotIfNecessary(net::X509Certificate* cert, 147 cert->os_cert_handle()->slot));
|
/external/chromium_org/net/cert/ |
x509_certificate_openssl.cc | 5 #include "net/cert/x509_certificate.h" 26 #include "net/cert/x509_util_openssl.h" 72 void ParsePrincipal(X509Certificate::OSCertHandle cert, 97 void ParseSubjectAltName(X509Certificate::OSCertHandle cert, 101 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1); 102 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index); 130 LOG(WARNING) << "Bad sized IP Address in cert: " << ip_addr_len; 185 // Decrement the ref-count for the cert and, if all references are gone, 223 SHA1HashValue X509Certificate::CalculateFingerprint(OSCertHandle cert) { 226 int ret = X509_digest(cert, EVP_sha1(), sha1.data, &sha1_size) 261 X509* cert = d2i_X509(NULL, &d2i_data, length); local [all...] |
x509_util_unittest.cc | 5 #include "net/cert/x509_util.h" 13 #include "net/cert/x509_certificate.h" 34 "older cert", "older cert", 38 "newer cert", "newer cert", 44 EXPECT_EQ("newer cert", certs[0]->subject().common_name); 46 EXPECT_EQ("older cert", certs[1]->subject().common_name); 55 // This test creates a self-signed cert and a private key and then verifies the 71 scoped_refptr<X509Certificate> cert(X509Certificate::CreateFromBytes 183 scoped_refptr<X509Certificate> cert = local [all...] |
/external/chromium_org/net/extras/sqlite/ |
sqlite_channel_id_store.cc | 20 #include "net/cert/x509_certificate.h" 45 "cert BLOB NOT NULL," 204 NOTREACHED() << "Unable to open cert DB."; 212 NOTREACHED() << "Unable to open cert DB."; 224 "SELECT origin, private_key, cert, cert_type, expiration_time, " 272 LOG(WARNING) << "Server bound cert database is too new."; 284 LOG(WARNING) << "Unable to update server bound cert database to " 291 LOG(WARNING) << "Unable to update server bound cert database to " 311 LOG(WARNING) << "Unable to update server bound cert database to " 320 LOG(WARNING) << "Unable to update server bound cert database to 521 const std::string& cert = po->channel_id().cert(); local [all...] |
/external/chromium_org/net/quic/crypto/ |
common_cert_set.cc | 92 virtual bool MatchCert(StringPiece cert, StringPiece common_set_hashes, 117 int n = Compare(cert, kSets[j].certs[mid], kSets[j].lens[mid]);
|
/external/chromium_org/net/socket/ |
client_socket_pool_manager_impl.h | 16 #include "net/cert/cert_database.h" 97 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE; 98 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE;
|
/external/chromium_org/net/spdy/ |
spdy_session_pool.h | 22 #include "net/cert/cert_database.h" 147 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE; 148 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE;
|
/external/chromium_org/net/ssl/ |
default_channel_id_store.cc | 85 const std::string& cert); 102 const std::string& cert) 107 cert_(cert) { 255 *cert_result = channel_id->cert(); 265 const std::string& cert) { 268 cert))); 371 const std::string& cert) { 380 cert));
|
default_channel_id_store.h | 24 // Modeled after the CookieMonster class, it has an in-memory cert store, 58 const std::string& cert) OVERRIDE; 83 // Called by all non-static functions to ensure that the cert store has 113 const std::string& cert);
|
openssl_client_key_store.cc | 12 #include "net/cert/x509_certificate.h" 19 // |cert| is a certificate. 21 crypto::ScopedEVP_PKEY GetOpenSSLPublicKey(const X509Certificate* cert) { 25 X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle()));
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLX509CRLEntry.java | 21 import java.security.cert.CRLException; 22 import java.security.cert.X509CRLEntry;
|
SSLNullSession.java | 24 import java.security.cert.Certificate; 97 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
|
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustManagerImplTest.java | 21 import java.security.cert.Certificate; 22 import java.security.cert.CertificateException; 23 import java.security.cert.X509Certificate; 42 private String getFingerprint(X509Certificate cert) throws Exception { 44 byte[] encoded = cert.getPublicKey().getEncoded(); 185 // build the cert pin manager 196 // build the cert pin manager 199 // install at least one cert in the store (requirement) 203 // install a cert into the user installed store 249 for (X509Certificate cert : checkedChain) [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Handshake.java | 21 import java.security.cert.Certificate; 22 import java.security.cert.X509Certificate;
|
/external/openssl/ssl/ |
ssl_lib.c | 302 if (ctx->cert != NULL) 305 * the CERT, not its contents; only when setting new 311 * Now we don't look at the SSL_CTX's CERT after having 314 s->cert = ssl_cert_dup(ctx->cert); 315 if (s->cert == NULL) 319 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */ 406 if (s->cert != NULL) 407 ssl_cert_free(s->cert); 581 if (s->cert != NULL) ssl_cert_free(s->cert) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory1Test.java | 21 package org.apache.harmony.security.tests.java.security.cert; 31 import java.security.cert.CRL; 32 import java.security.cert.CRLException; 33 import java.security.cert.CertPath; 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.CertificateFactorySpi; 44 import org.apache.harmony.security.tests.support.cert.MyCertPath; 45 import org.apache.harmony.security.tests.support.cert.MyCertificate [all...] |