/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 140 X509Certificate cert = readCertificate(file); local 141 if (cert == null || (isSystem(alias) 143 && isDeletedSystemCertificate(cert))) { 147 return cert; 184 // reading a cert while its being installed can lead to this. 192 private void writeCertificate(File file, X509Certificate cert) 430 OpenSSLX509Certificate cert = convertToOpenSSLIfNeeded(leaf); local 474 X509Certificate cert = readCertificate(file); local 553 X509Certificate cert = readCertificate(file); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/ |
CertificateEncodingExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateEncodingException;
|
CertificateExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateException;
|
CertificateParsingExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateParsingException;
|
/external/apache-harmony/security/src/test/api/java.injected/java/security/cert/ |
myCertPath.java | 22 package java.security.cert; 25 import java.security.cert.CertPath;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/exception/ |
ExtCertPathBuilderException.java | 3 import java.security.cert.CertPath; 4 import java.security.cert.CertPathBuilderException;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertStoreCollectionSpi.java | 4 import java.security.cert.CRL; 5 import java.security.cert.CRLSelector; 6 import java.security.cert.CertSelector; 7 import java.security.cert.CertStoreException; 8 import java.security.cert.CertStoreParameters; 9 import java.security.cert.CertStoreSpi; 10 import java.security.cert.Certificate; 11 import java.security.cert.CollectionCertStoreParameters;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
PKIXAttrCertChecker.java | 3 import java.security.cert.CertPath; 4 import java.security.cert.CertPathValidatorException;
|
X509V2AttributeCertificate.java | 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateExpiredException; 15 import java.security.cert.CertificateNotYetValidException; 37 * @deprecated use org.bouncycastle.cert.X509AttributeCertificateHolder 42 private AttributeCertificate cert; field in class:X509V2AttributeCertificate 78 AttributeCertificate cert) 81 this.cert = cert; 85 this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); 86 this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate() [all...] |
/external/chromium_org/content/public/browser/ |
ssl_host_state_delegate.h | 12 #include "net/cert/x509_certificate.h" 18 // a particular broken cert for use with particular host. We separate this 33 // Records that |cert| is permitted to be used for |host| in the future, for 36 const net::X509Certificate& cert, 42 // Queries whether |cert| is allowed for |host| and |error|. Returns true in 46 const net::X509Certificate& cert,
|
/external/chromium_org/net/cert/ |
cert_database_android.cc | 5 #include "net/cert/cert_database.h" 20 int CertDatabase::CheckUserCert(X509Certificate* cert) { 33 int CertDatabase::AddUserCert(X509Certificate* cert) {
|
cert_verify_proc_nss.h | 11 #include "net/cert/cert_verify_proc.h" 28 int VerifyInternalImpl(X509Certificate* cert, 37 virtual int VerifyInternal(X509Certificate* cert,
|
test_root_certs.cc | 5 #include "net/cert/test_root_certs.h" 12 #include "net/cert/x509_certificate.h" 60 ScopedTestRoot::ScopedTestRoot(X509Certificate* cert) { 61 Reset(cert); 68 void ScopedTestRoot::Reset(X509Certificate* cert) { 71 if (cert) 72 TestRootCerts::GetInstance()->Add(cert); 73 cert_ = cert;
|
nss_cert_database.cc | 5 #include "net/cert/nss_cert_database.h" 7 #include <cert.h> 24 #include "net/cert/cert_database.h" 25 #include "net/cert/x509_certificate.h" 54 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE { 55 cert_db_->NotifyObserversOfCertAdded(cert); 58 virtual void OnCertRemoved(const X509Certificate* cert) OVERRIDE { 59 cert_db_->NotifyObserversOfCertRemoved(cert); 62 virtual void OnCACertChanged(const X509Certificate* cert) OVERRIDE { 63 cert_db_->NotifyObserversOfCACertChanged(cert); [all...] |
x509_util_ios.cc | 5 #include "net/cert/x509_util_ios.h" 7 #include <cert.h> 14 #include "net/cert/x509_certificate.h" 15 #include "net/cert/x509_util_nss.h" 79 X509Certificate* cert = NULL; local 81 cert = X509Certificate::CreateFromHandle(os_server_cert, 87 return cert; 90 SHA1HashValue CalculateFingerprintNSS(CERTCertificate* cert) { 91 DCHECK(cert->derCert.data); 92 DCHECK_NE(0U, cert->derCert.len) [all...] |
/external/nist-sip/java/gov/nist/javax/sip/ |
ClientTransactionExt.java | 3 import java.security.cert.Certificate; 4 import java.security.cert.X509Certificate;
|
/cts/tests/tests/net/src/android/net/http/cts/ |
X509TrustManagerExtensionsTest.java | 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 54 X509Certificate cert = (X509Certificate)cf.generateCertificate( local 57 // Test without adding cert to keystore. 61 assertEquals(false, tmeNegative.isUserAddedCertificate(cert)); 63 // Test with cert added to keystore. 72 tcs.installCertificate(cert); 75 assertEquals(true, tmePositive.isUserAddedCertificate(cert));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
JcaCertStore.java | 1 package org.bouncycastle.cert.jcajce; 4 import java.security.cert.CertificateEncodingException; 5 import java.security.cert.X509Certificate; 11 import org.bouncycastle.cert.X509CertificateHolder; 45 X509Certificate cert = (X509Certificate)o; local 49 list.add(new X509CertificateHolder(cert.getEncoded()));
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificateFactorySpi.java | 22 package org.apache.harmony.security.tests.support.cert; 26 import java.security.cert.CRL; 27 import java.security.cert.CRLException; 28 import java.security.cert.CertPath; 29 import java.security.cert.Certificate; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactorySpi;
|
/external/chromium_org/net/test/ |
cert_test_util_nss.cc | 15 #include "net/cert/cert_type.h" 44 bool ImportClientCertToSlot(const scoped_refptr<X509Certificate>& cert, 46 std::string nickname = cert->GetDefaultNickname(USER_CERT); 50 cert->os_cert_handle(), 55 LOG(ERROR) << "Could not import cert"; 72 scoped_refptr<X509Certificate> cert(ImportCertFromFile(dir, cert_filename)); 74 if (!cert.get()) { 75 LOG(ERROR) << "Failed to parse cert from file " << cert_filename; 79 if (!ImportClientCertToSlot(cert, slot)) 82 // |cert| continues to point to the original X509Certificate before th [all...] |
/bootable/recovery/ |
verifier.cpp | 343 Certificate* cert = out + (*numKeys - 1); local 344 memset(cert, '\0', sizeof(Certificate)); 350 cert->key_type = Certificate::RSA; 351 cert->rsa = (RSAPublicKey*)malloc(sizeof(RSAPublicKey)); 352 cert->rsa->exponent = 3; 353 cert->hash_len = SHA_DIGEST_SIZE; 359 cert->key_type = Certificate::RSA; 360 cert->rsa = (RSAPublicKey*)malloc(sizeof(RSAPublicKey)); 361 cert->rsa->exponent = 65537; 362 cert->hash_len = SHA_DIGEST_SIZE [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertPathValidator3Test.java | 22 package org.apache.harmony.security.tests.java.security.cert; 29 import java.security.cert.CertPathParameters; 30 import java.security.cert.CertPathValidator; 31 import java.security.cert.CertPathValidatorException; 32 import java.security.cert.PKIXParameters; 34 import org.apache.harmony.security.tests.java.security.cert.CertPathBuilder1Test; 35 import org.apache.harmony.security.tests.java.security.cert.CertPathValidator1Test; 37 import org.apache.harmony.security.tests.support.cert.MyCertPath; 38 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
PKIXCertPathCheckerTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertPathValidatorException; 25 import java.security.cert.PKIXCertPathChecker; 28 import org.apache.harmony.security.tests.support.cert.MyCertificate; 29 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/external/chromium_org/chromeos/ |
cert_loader.h | 18 #include "net/cert/cert_database.h" 32 // initialized), or the cert database changes, observers are called with 64 static std::string GetPkcs11IdAndSlotForCert(const net::X509Certificate& cert, 67 // Starts the CertLoader with the NSS cert database. 82 bool IsCertificateHardwareBacked(const net::X509Certificate* cert) const; 110 virtual void OnCACertChanged(const net::X509Certificate* cert) OVERRIDE; 111 virtual void OnCertAdded(const net::X509Certificate* cert) OVERRIDE; 112 virtual void OnCertRemoved(const net::X509Certificate* cert) OVERRIDE;
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 41 #include <cert.h> 48 #include "net/cert/x509_certificate.h" 49 #include "net/cert/x509_util_nss.h" 70 // Mozilla had some code here to check if a perm version of the cert exists 113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local 114 if (cert == root) { 120 // PR_TRUE). Afaict, checking !CERT_IsCACert on each cert is equivalent. 121 if (!CERT_IsCACert(cert->os_cert_handle(), NULL)) { 123 cert, net::ERR_IMPORT_CA_CERT_NOT_CA)); 124 VLOG(1) << "skipping cert (non-ca)" 180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local [all...] |