HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 351 - 375 of 728) sorted by null

<<11121314151617181920>>

  /external/chromium_org/chrome/common/net/
x509_certificate_model_nss.cc 7 #include <cert.h>
23 #include "net/cert/x509_certificate.h"
45 std::string HashCert(CERTCertificate* cert, HASH_HashType algorithm, int len) {
48 DCHECK(NULL != cert->derCert.data);
49 DCHECK_NE(0U, cert->derCert.len);
52 SECStatus rv = HASH_HashBuf(algorithm, fingerprint, cert->derCert.data,
53 cert->derCert.len);
  /development/tools/
make_key 24 Creates <name>.pk8 key and <name>.x509.pem cert. Cert contains the
36 # Use named pipes to connect get the raw RSA private key to the cert-
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KSPrivateKeyEntryTest.java 25 import java.security.cert.Certificate;
27 import org.apache.harmony.security.tests.support.cert.MyCertificate;
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/
X509CertificateHolderSelector.java 1 package org.bouncycastle.cert.selector;
9 import org.bouncycastle.cert.X509CertificateHolder;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
NamedJcaJceHelper.java 11 import java.security.cert.CertificateException;
12 import java.security.cert.CertificateFactory;
ProviderJcaJceHelper.java 11 import java.security.cert.CertificateException;
12 import java.security.cert.CertificateFactory;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
AuthorityKeyIdentifierStructure.java 6 import java.security.cert.CertificateParsingException;
7 import java.security.cert.X509Certificate;
  /external/chromium_org/chrome/app/
signature_validator_win_unittest.cc 22 #include "net/cert/test_root_certs.h"
73 PCCERT_CONTEXT cert = CertCreateCertificateContext(X509_ASN_ENCODING, local
77 CRYPT_BIT_BLOB blob = cert->pCertInfo->SubjectPublicKeyInfo.PublicKey;
127 //TODO(caitkp): Figure out how to sign a dll with an expired cert.
  /external/chromium_org/chrome/browser/chromeos/policy/
policy_cert_verifier.cc 11 #include "net/cert/cert_verify_proc.h"
12 #include "net/cert/multi_threaded_cert_verifier.h"
72 net::X509Certificate* cert,
87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
  /external/chromium_org/chrome/browser/ui/
crypto_module_password_dialog_nss.cc 13 #include "net/cert/x509_certificate.h"
140 void UnlockCertSlotIfNecessary(net::X509Certificate* cert,
147 cert->os_cert_handle()->slot));
  /external/chromium_org/net/cert/
x509_certificate_openssl.cc 5 #include "net/cert/x509_certificate.h"
26 #include "net/cert/x509_util_openssl.h"
72 void ParsePrincipal(X509Certificate::OSCertHandle cert,
97 void ParseSubjectAltName(X509Certificate::OSCertHandle cert,
101 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1);
102 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index);
130 LOG(WARNING) << "Bad sized IP Address in cert: " << ip_addr_len;
185 // Decrement the ref-count for the cert and, if all references are gone,
223 SHA1HashValue X509Certificate::CalculateFingerprint(OSCertHandle cert) {
226 int ret = X509_digest(cert, EVP_sha1(), sha1.data, &sha1_size)
261 X509* cert = d2i_X509(NULL, &d2i_data, length); local
    [all...]
x509_util_unittest.cc 5 #include "net/cert/x509_util.h"
13 #include "net/cert/x509_certificate.h"
34 "older cert", "older cert",
38 "newer cert", "newer cert",
44 EXPECT_EQ("newer cert", certs[0]->subject().common_name);
46 EXPECT_EQ("older cert", certs[1]->subject().common_name);
55 // This test creates a self-signed cert and a private key and then verifies the
71 scoped_refptr<X509Certificate> cert(X509Certificate::CreateFromBytes
183 scoped_refptr<X509Certificate> cert = local
    [all...]
  /external/chromium_org/net/extras/sqlite/
sqlite_channel_id_store.cc 20 #include "net/cert/x509_certificate.h"
45 "cert BLOB NOT NULL,"
204 NOTREACHED() << "Unable to open cert DB.";
212 NOTREACHED() << "Unable to open cert DB.";
224 "SELECT origin, private_key, cert, cert_type, expiration_time, "
272 LOG(WARNING) << "Server bound cert database is too new.";
284 LOG(WARNING) << "Unable to update server bound cert database to "
291 LOG(WARNING) << "Unable to update server bound cert database to "
311 LOG(WARNING) << "Unable to update server bound cert database to "
320 LOG(WARNING) << "Unable to update server bound cert database to
521 const std::string& cert = po->channel_id().cert(); local
    [all...]
  /external/chromium_org/net/quic/crypto/
common_cert_set.cc 92 virtual bool MatchCert(StringPiece cert, StringPiece common_set_hashes,
117 int n = Compare(cert, kSets[j].certs[mid], kSets[j].lens[mid]);
  /external/chromium_org/net/socket/
client_socket_pool_manager_impl.h 16 #include "net/cert/cert_database.h"
97 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE;
98 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE;
  /external/chromium_org/net/spdy/
spdy_session_pool.h 22 #include "net/cert/cert_database.h"
147 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE;
148 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE;
  /external/chromium_org/net/ssl/
default_channel_id_store.cc 85 const std::string& cert);
102 const std::string& cert)
107 cert_(cert) {
255 *cert_result = channel_id->cert();
265 const std::string& cert) {
268 cert)));
371 const std::string& cert) {
380 cert));
default_channel_id_store.h 24 // Modeled after the CookieMonster class, it has an in-memory cert store,
58 const std::string& cert) OVERRIDE;
83 // Called by all non-static functions to ensure that the cert store has
113 const std::string& cert);
openssl_client_key_store.cc 12 #include "net/cert/x509_certificate.h"
19 // |cert| is a certificate.
21 crypto::ScopedEVP_PKEY GetOpenSSLPublicKey(const X509Certificate* cert) {
25 X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle()));
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLX509CRLEntry.java 21 import java.security.cert.CRLException;
22 import java.security.cert.X509CRLEntry;
SSLNullSession.java 24 import java.security.cert.Certificate;
97 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
  /external/conscrypt/src/test/java/org/conscrypt/
TrustManagerImplTest.java 21 import java.security.cert.Certificate;
22 import java.security.cert.CertificateException;
23 import java.security.cert.X509Certificate;
42 private String getFingerprint(X509Certificate cert) throws Exception {
44 byte[] encoded = cert.getPublicKey().getEncoded();
185 // build the cert pin manager
196 // build the cert pin manager
199 // install at least one cert in the store (requirement)
203 // install a cert into the user installed store
249 for (X509Certificate cert : checkedChain)
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
Handshake.java 21 import java.security.cert.Certificate;
22 import java.security.cert.X509Certificate;
  /external/openssl/ssl/
ssl_lib.c 302 if (ctx->cert != NULL)
305 * the CERT, not its contents; only when setting new
311 * Now we don't look at the SSL_CTX's CERT after having
314 s->cert = ssl_cert_dup(ctx->cert);
315 if (s->cert == NULL)
319 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */
406 if (s->cert != NULL)
407 ssl_cert_free(s->cert);
581 if (s->cert != NULL) ssl_cert_free(s->cert)
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory1Test.java 21 package org.apache.harmony.security.tests.java.security.cert;
31 import java.security.cert.CRL;
32 import java.security.cert.CRLException;
33 import java.security.cert.CertPath;
34 import java.security.cert.Certificate;
35 import java.security.cert.CertificateException;
36 import java.security.cert.CertificateFactory;
37 import java.security.cert.CertificateFactorySpi;
44 import org.apache.harmony.security.tests.support.cert.MyCertPath;
45 import org.apache.harmony.security.tests.support.cert.MyCertificate
    [all...]

Completed in 907 milliseconds

<<11121314151617181920>>