/external/chromium_org/chrome/browser/chromeos/net/ |
cert_verify_proc_chromeos.cc | 7 #include "net/cert/test_root_certs.h" 8 #include "net/cert/x509_certificate.h" 41 net::X509Certificate* cert, 55 return VerifyInternalImpl(cert, 70 CERTCertificate* cert = CERT_LIST_TAIL(current_chain)->cert; local 73 if (net::TestRootCerts::GetInstance()->Contains(cert)) { 76 DVLOG(3) << cert->subjectName << " is a TestRootCert"; 86 if (net::X509Certificate::IsSameOSCert(cert, (*i)->os_cert_handle())) { 90 DVLOG(3) << cert->subjectName << " is an additional_trust_anchor" [all...] |
/external/chromium_org/chrome/browser/ssl/ |
ssl_add_certificate.cc | 21 #include "net/cert/cert_database.h" 22 #include "net/cert/x509_certificate.h" 37 net::X509Certificate* cert) { 40 new SSLAddCertificateInfoBarDelegate(cert)))); 44 explicit SSLAddCertificateInfoBarDelegate(net::X509Certificate* cert) 45 : cert_(cert) {} 113 net::X509Certificate* cert) { 120 InfoBarService::FromWebContents(web_contents), cert); 137 scoped_refptr<net::X509Certificate> cert; 139 cert = net::X509Certificate::CreateFromBytes [all...] |
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_unittest.cc | 15 #include "net/cert/nss_cert_database.h" 19 scoped_refptr<net::X509Certificate> cert( 22 ASSERT_TRUE(cert.get()); 25 x509_certificate_model::GetCertNameOrNickname(cert->os_cert_handle())); 44 // Temp cert has no nickname. 65 net::GetTestCertsDirectory(), "ct-test-embedded-cert.pem")); 73 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile( 75 ASSERT_TRUE(cert.get()); 79 "critical", "notcrit", cert->os_cert_handle(), &extensions); 99 scoped_refptr<net::X509Certificate> cert(net::ImportCertFromFile [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertPathValidatorSpiTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertPathParameters; 27 import java.security.cert.CertPathValidatorException; 28 import java.security.cert.CertPathValidatorResult; 29 import java.security.cert.CertPathValidatorSpi; 31 import org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi;
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
SslUtil.java | 16 import java.security.cert.CertificateException; 17 import java.security.cert.X509Certificate; 25 public static SslError sslErrorFromNetErrorCode(int error, SslCertificate cert, String url) { 29 return new SslError(SslError.SSL_IDMISMATCH, cert, url); 31 return new SslError(SslError.SSL_DATE_INVALID, cert, url); 33 return new SslError(SslError.SSL_UNTRUSTED, cert, url); 38 return new SslError(SslError.SSL_INVALID, cert, url);
|
/external/chromium_org/net/cert/ |
cert_database_nss.cc | 5 #include "net/cert/cert_database.h" 7 #include <cert.h> 16 #include "net/cert/x509_certificate.h" 17 #include "net/cert/x509_util_nss.h" 41 CERTCertificate* cert = cert_obj->os_cert_handle(); 42 PK11SlotInfo* slot = PK11_KeyForCertExists(cert, NULL, NULL); 52 CERTCertificate* cert = cert_obj->os_cert_handle(); local 54 crypto::ScopedPK11Slot slot(PK11_KeyForCertExists(cert, &key, NULL)); 60 &cert->derSubject, 66 rv = PK11_ImportCert(slot.get(), cert, key, nickname.c_str(), PR_FALSE) [all...] |
nss_cert_database.h | 19 #include "net/cert/cert_type.h" 20 #include "net/cert/x509_certificate.h" 42 // Called with |cert| == NULL after importing a list of certificates 44 virtual void OnCertAdded(const X509Certificate* cert) {} 47 virtual void OnCertRemoved(const X509Certificate* cert) {} 50 // Called with |cert| == NULL after importing a list of certificates 52 virtual void OnCACertChanged(const X509Certificate* cert) {} 64 ImportCertFailure(const scoped_refptr<X509Certificate>& cert, int err); 77 // For SERVER_CERT, only TRUSTED_SSL makes sense, and specifies the cert is 79 // For EMAIL_CERT, only TRUSTED_EMAIL makes sense, and specifies the cert i [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
PKIXCertPathCheckerTest.java | 23 package tests.security.cert; 27 import java.security.cert.CertPathValidatorException; 28 import java.security.cert.Certificate; 29 import java.security.cert.PKIXCertPathChecker; 34 import org.apache.harmony.security.tests.support.cert.MyCertificate; 35 import org.apache.harmony.security.tests.support.cert.TestUtils; 89 public void check(Certificate cert,
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 14 struct x509_certificate *cert; member in struct:tlsv1_credentials 27 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 30 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificate.java | 22 package org.apache.harmony.security.tests.support.cert; 29 import java.security.cert.Certificate; 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.CertificateException; 34 * Stub class for <code>java.security.cert.Certificate</code> tests
|
/external/chromium_org/chrome/browser/resources/options/ |
certificate_tree.css | 5 span.cert-untrusted { 14 span.cert-policy {
|
/external/chromium_org/content/browser/ssl/ |
ssl_policy_backend.cc | 34 void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert, 38 ssl_host_state_delegate_->AllowCert(host, cert, error); 42 const net::X509Certificate& cert, 48 host, cert, error, expired_previous_decision) :
|
/external/openssl/crypto/x509v3/ |
v3prin.c | 69 X509 *cert; local 76 fprintf(stderr, "Usage v3prin cert.pem\n"); 83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) { 89 count = X509_get_ext_count(cert); 92 ext = X509_get_ext(cert, i);
|
/frameworks/base/core/java/android/net/http/ |
X509TrustManagerExtensions.java | 21 import java.security.cert.CertificateException; 22 import java.security.cert.X509Certificate; 81 public boolean isUserAddedCertificate(X509Certificate cert) { 82 return mDelegate.isUserAddedCertificate(cert);
|
/libcore/luni/src/main/java/java/security/cert/ |
CertPathValidatorSpi.java | 18 package java.security.cert;
|
Extension.java | 17 package java.security.cert;
|
X509Extension.java | 18 package java.security.cert;
|
/libcore/luni/src/test/java/tests/security/ |
CertPathBuilderTest.java | 18 import java.security.cert.CertPath; 19 import java.security.cert.CertPathBuilder; 20 import java.security.cert.CertPathBuilderResult; 21 import java.security.cert.CertPathParameters;
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 5 import java.security.cert.CertificateFactory; 6 import java.security.cert.X509Certificate; 7 import java.security.cert.Certificate; 22 private X509Certificate[] cert = null; field in class:X509KeyManagerImpl 95 cert = new X509Certificate[2]; 96 cert[0] = (X509Certificate) cf.generateCertificate(certArray); 97 cert[1] = (X509Certificate) cf.generateCertificate(certArray2); 100 keyTest.setCertificateEntry("clientAlias_01", cert[0]); 101 keyTest.setCertificateEntry("clientAlias_02", cert[0]); 102 keyTest.setCertificateEntry("clientAlias_03", cert[1]) [all...] |
X509TrustManagerImpl.java | 4 import java.security.cert.X509Certificate; 5 import java.security.cert.CertificateException; 40 X509Certificate[] cert = new X509Certificate[0]; local 41 return cert;
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
KeyManagementTest.java | 23 import java.security.cert.CertificateException; 24 import java.security.cert.CertificateFactory; 25 import java.security.cert.Certificate; 53 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 54 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, cert, alias)); local 61 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 63 assertFalse(mDevicePolicyManager.installKeyPair(getWho(), null, cert, alias)); local 78 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 80 assertFalse(mDevicePolicyManager.installKeyPair(null, privKey, cert, alias)); 92 Certificate getCertificate(byte[] cert) throws CertificateException [all...] |
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 140 X509Certificate cert = readCertificate(file); local 141 if (cert == null || (isSystem(alias) 143 && isDeletedSystemCertificate(cert))) { 147 return cert; 184 // reading a cert while its being installed can lead to this. 192 private void writeCertificate(File file, X509Certificate cert) 430 OpenSSLX509Certificate cert = convertToOpenSSLIfNeeded(leaf); local 474 X509Certificate cert = readCertificate(file); local 553 X509Certificate cert = readCertificate(file); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/ |
CertificateEncodingExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateEncodingException;
|
CertificateExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateException;
|
CertificateParsingExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateParsingException;
|