HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 51 - 75 of 728) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/conscrypt/src/platform/java/org/conscrypt/
TrustedCertificateStore.java 26 import java.security.cert.Certificate;
27 import java.security.cert.CertificateException;
28 import java.security.cert.CertificateFactory;
29 import java.security.cert.X509Certificate;
140 X509Certificate cert = readCertificate(file); local
141 if (cert == null || (isSystem(alias)
143 && isDeletedSystemCertificate(cert))) {
147 return cert;
184 // reading a cert while its being installed can lead to this.
192 private void writeCertificate(File file, X509Certificate cert)
430 OpenSSLX509Certificate cert = convertToOpenSSLIfNeeded(leaf); local
474 X509Certificate cert = readCertificate(file); local
553 X509Certificate cert = readCertificate(file); local
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/
CertificateEncodingExceptionTest.java 22 package org.apache.harmony.security.tests.javax.security.cert.serialization;
24 import javax.security.cert.CertificateEncodingException;
CertificateExceptionTest.java 22 package org.apache.harmony.security.tests.javax.security.cert.serialization;
24 import javax.security.cert.CertificateException;
CertificateParsingExceptionTest.java 22 package org.apache.harmony.security.tests.javax.security.cert.serialization;
24 import javax.security.cert.CertificateParsingException;
  /external/apache-harmony/security/src/test/api/java.injected/java/security/cert/
myCertPath.java 22 package java.security.cert;
25 import java.security.cert.CertPath;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/exception/
ExtCertPathBuilderException.java 3 import java.security.cert.CertPath;
4 import java.security.cert.CertPathBuilderException;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertStoreCollectionSpi.java 4 import java.security.cert.CRL;
5 import java.security.cert.CRLSelector;
6 import java.security.cert.CertSelector;
7 import java.security.cert.CertStoreException;
8 import java.security.cert.CertStoreParameters;
9 import java.security.cert.CertStoreSpi;
10 import java.security.cert.Certificate;
11 import java.security.cert.CollectionCertStoreParameters;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
PKIXAttrCertChecker.java 3 import java.security.cert.CertPath;
4 import java.security.cert.CertPathValidatorException;
X509V2AttributeCertificate.java 13 import java.security.cert.CertificateException;
14 import java.security.cert.CertificateExpiredException;
15 import java.security.cert.CertificateNotYetValidException;
37 * @deprecated use org.bouncycastle.cert.X509AttributeCertificateHolder
42 private AttributeCertificate cert; field in class:X509V2AttributeCertificate
78 AttributeCertificate cert)
81 this.cert = cert;
85 this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate();
86 this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate()
    [all...]
  /external/chromium_org/content/public/browser/
ssl_host_state_delegate.h 12 #include "net/cert/x509_certificate.h"
18 // a particular broken cert for use with particular host. We separate this
33 // Records that |cert| is permitted to be used for |host| in the future, for
36 const net::X509Certificate& cert,
42 // Queries whether |cert| is allowed for |host| and |error|. Returns true in
46 const net::X509Certificate& cert,
  /external/chromium_org/net/cert/
cert_database_android.cc 5 #include "net/cert/cert_database.h"
20 int CertDatabase::CheckUserCert(X509Certificate* cert) {
33 int CertDatabase::AddUserCert(X509Certificate* cert) {
cert_verify_proc_nss.h 11 #include "net/cert/cert_verify_proc.h"
28 int VerifyInternalImpl(X509Certificate* cert,
37 virtual int VerifyInternal(X509Certificate* cert,
test_root_certs.cc 5 #include "net/cert/test_root_certs.h"
12 #include "net/cert/x509_certificate.h"
60 ScopedTestRoot::ScopedTestRoot(X509Certificate* cert) {
61 Reset(cert);
68 void ScopedTestRoot::Reset(X509Certificate* cert) {
71 if (cert)
72 TestRootCerts::GetInstance()->Add(cert);
73 cert_ = cert;
nss_cert_database.cc 5 #include "net/cert/nss_cert_database.h"
7 #include <cert.h>
24 #include "net/cert/cert_database.h"
25 #include "net/cert/x509_certificate.h"
54 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE {
55 cert_db_->NotifyObserversOfCertAdded(cert);
58 virtual void OnCertRemoved(const X509Certificate* cert) OVERRIDE {
59 cert_db_->NotifyObserversOfCertRemoved(cert);
62 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE {
63 cert_db_->NotifyObserversOfCACertChanged(cert);
    [all...]
x509_util_ios.cc 5 #include "net/cert/x509_util_ios.h"
7 #include <cert.h>
14 #include "net/cert/x509_certificate.h"
15 #include "net/cert/x509_util_nss.h"
79 X509Certificate* cert = NULL; local
81 cert = X509Certificate::CreateFromHandle(os_server_cert,
87 return cert;
90 SHA1HashValue CalculateFingerprintNSS(CERTCertificate* cert) {
91 DCHECK(cert->derCert.data);
92 DCHECK_NE(0U, cert->derCert.len)
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/
ClientTransactionExt.java 3 import java.security.cert.Certificate;
4 import java.security.cert.X509Certificate;
  /cts/tests/tests/net/src/android/net/http/cts/
X509TrustManagerExtensionsTest.java 26 import java.security.cert.CertificateFactory;
27 import java.security.cert.X509Certificate;
54 X509Certificate cert = (X509Certificate)cf.generateCertificate( local
57 // Test without adding cert to keystore.
61 assertEquals(false, tmeNegative.isUserAddedCertificate(cert));
63 // Test with cert added to keystore.
72 tcs.installCertificate(cert);
75 assertEquals(true, tmePositive.isUserAddedCertificate(cert));
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/
JcaCertStore.java 1 package org.bouncycastle.cert.jcajce;
4 import java.security.cert.CertificateEncodingException;
5 import java.security.cert.X509Certificate;
11 import org.bouncycastle.cert.X509CertificateHolder;
45 X509Certificate cert = (X509Certificate)o; local
49 list.add(new X509CertificateHolder(cert.getEncoded()));
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
MyCertificateFactorySpi.java 22 package org.apache.harmony.security.tests.support.cert;
26 import java.security.cert.CRL;
27 import java.security.cert.CRLException;
28 import java.security.cert.CertPath;
29 import java.security.cert.Certificate;
30 import java.security.cert.CertificateException;
31 import java.security.cert.CertificateFactorySpi;
  /external/chromium_org/net/test/
cert_test_util_nss.cc 15 #include "net/cert/cert_type.h"
44 bool ImportClientCertToSlot(const scoped_refptr<X509Certificate>& cert,
46 std::string nickname = cert->GetDefaultNickname(USER_CERT);
50 cert->os_cert_handle(),
55 LOG(ERROR) << "Could not import cert";
72 scoped_refptr<X509Certificate> cert(ImportCertFromFile(dir, cert_filename));
74 if (!cert.get()) {
75 LOG(ERROR) << "Failed to parse cert from file " << cert_filename;
79 if (!ImportClientCertToSlot(cert, slot))
82 // |cert| continues to point to the original X509Certificate before th
    [all...]
  /bootable/recovery/
verifier.cpp 343 Certificate* cert = out + (*numKeys - 1); local
344 memset(cert, '\0', sizeof(Certificate));
350 cert->key_type = Certificate::RSA;
351 cert->rsa = (RSAPublicKey*)malloc(sizeof(RSAPublicKey));
352 cert->rsa->exponent = 3;
353 cert->hash_len = SHA_DIGEST_SIZE;
359 cert->key_type = Certificate::RSA;
360 cert->rsa = (RSAPublicKey*)malloc(sizeof(RSAPublicKey));
361 cert->rsa->exponent = 65537;
362 cert->hash_len = SHA_DIGEST_SIZE
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertPathValidator3Test.java 22 package org.apache.harmony.security.tests.java.security.cert;
29 import java.security.cert.CertPathParameters;
30 import java.security.cert.CertPathValidator;
31 import java.security.cert.CertPathValidatorException;
32 import java.security.cert.PKIXParameters;
34 import org.apache.harmony.security.tests.java.security.cert.CertPathBuilder1Test;
35 import org.apache.harmony.security.tests.java.security.cert.CertPathValidator1Test;
37 import org.apache.harmony.security.tests.support.cert.MyCertPath;
38 import org.apache.harmony.security.tests.support.cert.TestUtils;
PKIXCertPathCheckerTest.java 22 package org.apache.harmony.security.tests.java.security.cert;
24 import java.security.cert.CertPathValidatorException;
25 import java.security.cert.PKIXCertPathChecker;
28 import org.apache.harmony.security.tests.support.cert.MyCertificate;
29 import org.apache.harmony.security.tests.support.cert.TestUtils;
  /external/chromium_org/chromeos/
cert_loader.h 18 #include "net/cert/cert_database.h"
32 // initialized), or the cert database changes, observers are called with
64 static std::string GetPkcs11IdAndSlotForCert(const net::X509Certificate& cert,
67 // Starts the CertLoader with the NSS cert database.
82 bool IsCertificateHardwareBacked(const net::X509Certificate* cert) const;
110 virtual void OnCACertChanged(const net::X509Certificate* cert) OVERRIDE;
111 virtual void OnCertAdded(const net::X509Certificate* cert) OVERRIDE;
112 virtual void OnCertRemoved(const net::X509Certificate* cert) OVERRIDE;
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsNSSCertificateDB.cpp 41 #include <cert.h>
48 #include "net/cert/x509_certificate.h"
49 #include "net/cert/x509_util_nss.h"
70 // Mozilla had some code here to check if a perm version of the cert exists
113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local
114 if (cert == root) {
120 // PR_TRUE). Afaict, checking !CERT_IsCACert on each cert is equivalent.
121 if (!CERT_IsCACert(cert->os_cert_handle(), NULL)) {
123 cert, net::ERR_IMPORT_CA_CERT_NOT_CA));
124 VLOG(1) << "skipping cert (non-ca)"
180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local
    [all...]

Completed in 524 milliseconds

1 23 4 5 6 7 8 91011>>