/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory1Test.java | 22 package tests.security.cert; 27 import org.apache.harmony.security.tests.support.cert.MyCertPath; 28 import org.apache.harmony.security.tests.support.cert.MyCertificate; 29 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 38 import java.security.cert.CRL; 39 import java.security.cert.CRLException; 40 import java.security.cert.CertPath; 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate; 138 X509Certificate cert[] = new X509Certificate[2]; local 139 cert[0] = (X509Certificate) cf.generateCertificate(certArray); 140 cert[1] = (X509Certificate) cf.generateCertificate(certArray2); 144 keyTest.setCertificateEntry("alias1", cert[0]); 147 keyTest.setKeyEntry("alias2", privateKey, pssWord, cert); 150 keyTest.setCertificateEntry("alias3", cert[1]) 167 X509Certificate cert[] = new X509Certificate[2]; local 204 X509Certificate cert[] = new X509Certificate[2]; local 228 X509Certificate cert[] = new X509Certificate[2]; local 262 X509Certificate cert[] = new X509Certificate[2]; local 297 X509Certificate cert[] = new X509Certificate[2]; local 361 X509Certificate cert[] = new X509Certificate[2]; local 423 X509Certificate cert[] = new X509Certificate[2]; local 447 X509Certificate cert[] = new X509Certificate[2]; local 512 X509Certificate cert = (X509Certificate) cf local 543 X509Certificate cert[] = new X509Certificate[2]; local 567 X509Certificate cert[] = new X509Certificate[2]; local 585 X509Certificate cert[] = new X509Certificate[2]; local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 34 import java.security.cert.Certificate; 239 * <code>setCertificateEntry(String alias, Certificate cert)</code> 246 * <code>getCertificateAlias(Certificate cert)</code> 643 * <code>setCertificateEntry(String alias, Certificate cert)</code> 656 KeyStoreTestSupport.MCertificate cert = new KeyStoreTestSupport.MCertificate( local 664 kss[i].setCertificateEntry(null, cert); 669 kss[i].setCertificateEntry(aliases[j], cert); 694 cert); 706 * <code>setCerificateEntry(String alias, Certificate cert)</code> 708 * <code>getCertificateAlias(Certificate cert)</code 728 KeyStoreTestSupport.MCertificate cert = new KeyStoreTestSupport.MCertificate( local [all...] |
/external/ipsec-tools/src/racoon/ |
oakley.h | 168 u_int8_t type; /* type of CERT, must be same to pl->v[0]*/ 169 vchar_t cert; /* pointer to the CERT */ member in struct:cert_t_tag 170 vchar_t *pl; /* CERT payload minus isakmp general header */
|
handler.h | 163 cert_t *cert; /* CERT minus general header */ member in struct:ph1handle 164 cert_t *cert_p; /* peer's CERT minus general header */
|
oakley.c | 1350 /* get peer's cert */ 1355 "no peer's CERT payload found.\n"); 1364 "no peer's CERT file found.\n"); 1368 /* don't use cached cert */ 1678 vchar_t *cert = NULL; local 1762 vchar_t *cert = NULL; local 2263 X509 *cert = sk_X509_value(certs,i); local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 55 const struct wpabuf *cert; member in struct:tls_event_data::__anon21458 61 const struct wpabuf *cert; member in struct:tls_event_data::__anon21459
|
tls_gnutls.c | 400 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", 408 "Failed to read CA cert '%s' in PEM format: %s", 424 "Failed to parse CA cert in DER format: %s", 430 "Failed to parse CA cert in PEM format: %s", 471 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 485 "cert/key in PEM format: %s", 511 gnutls_datum_t cert, key; local 513 cert.data = (unsigned char *) params->client_cert_blob; 514 cert.size = params->client_cert_blob_len; 520 conn->xcred, &cert, &key, GNUTLS_X509_FMT_DER 927 gnutls_x509_crt_t cert; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) 47 if (cert == NULL) 49 if (cert->next) { 52 cert, cert->next); 54 x509_free_name(&cert->issuer); 55 x509_free_name(&cert->subject); 56 os_free(cert->public_key); 57 os_free(cert->sign_value) 1480 struct x509_certificate *cert; local 1845 struct x509_certificate *cert, *trust; local 1972 struct x509_certificate *cert; local [all...] |
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 212 X509Certificate cert = null; local 216 cert = (X509Certificate) cf.generateCertificate(is); 235 PublicKey signatureKey = cert.getPublicKey(); 247 // The signature cert matches a trusted key. Now verify that 248 // the digest in the cert matches the actual file data. 252 // based on the signature algorithm of the cert: 254 // "SHA256withRSA" cert -> "SHA256withRSA" signature 255 // "SHA1withRSA" cert -> "SHA1withRSA" signatur [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
SELinuxMMAC.java | 185 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 204 // Check for a cert attached to the signer tag. We allow a signature 205 // to appear as an attribute as well as those attached to cert tags. 206 String cert = parser.getAttributeValue(null, "signature"); local 207 if (cert != null) { 208 pb.addSignature(cert); 223 } else if ("cert".equals(tagName)) { 311 parser.require(XmlPullParser.START_TAG, null, "cert"); 591 for (Signature cert : mCerts) { 592 sb.append("cert=" + cert.toCharsString().substring(0, 11) + "... ") [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 23 package libcore.java.security.cert; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.PKIXParameters; 31 import java.security.cert.TrustAnchor; 36 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
DefaultHostnameVerifierTest.java | 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 255 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 273 assertTrue(verifyWithServerCertificate("www.example.com", cert)); 274 assertFalse(verifyWithServerCertificate("www2.example.com", cert)); 280 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 297 assertTrue(verifyWithServerCertificate("www.example.com", cert)); 298 assertFalse(verifyWithServerCertificate("www2.example.com", cert)); 305 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n local 334 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local 362 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local 387 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CertInstaller.java | 44 import java.security.cert.X509Certificate; 228 X509Certificate cert = mCredentials.getUserCertificate(); local 229 if (cert != null) { 231 String key = Util.toMd5(cert.getPublicKey().getEncoded());
|
/system/extras/verity/ |
VerityVerifier.java | 31 import java.security.cert.X509Certificate; 399 X509Certificate cert = Utils.loadPEMCertificate(args[1]); local 400 key = cert.getPublicKey();
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.X509Certificate; 1292 X509Certificate cert = (X509Certificate) mKeyStore.getCertificate(alias); local 1301 Arrays.asList(mKeyStore.getCertificateChain(alias)), cert); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 9 import java.security.cert.CRLException; 10 import java.security.cert.CertPath; 11 import java.security.cert.CertPathValidatorException; 12 import java.security.cert.CertStore; 13 import java.security.cert.CertStoreException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.PolicyQualifierInfo; 17 import java.security.cert.TrustAnchor; 18 import java.security.cert.X509CRL 1226 Certificate cert = (Certificate)certs.get(index); local [all...] |
RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilderException; 9 import java.security.cert.CertPathValidatorException; 10 import java.security.cert.CertificateExpiredException; 11 import java.security.cert.CertificateNotYetValidException; 12 import java.security.cert.PKIXCertPathChecker; 13 import java.security.cert.X509CRL; 14 import java.security.cert.X509CRLSelector; 15 import java.security.cert.X509CertSelector; 16 import java.security.cert.X509Certificate 897 X509Certificate cert = (X509Certificate)certs.get(index); local 1081 X509Certificate cert = (X509Certificate)certs.get(index); local 1157 X509Certificate cert = (X509Certificate)certs.get(index); local 1186 X509Certificate cert = (X509Certificate)certs.get(index); local 1287 X509Certificate cert = (X509Certificate)certs.get(index); local 1491 X509Certificate cert = (X509Certificate)certs.get(index); local 1569 X509Certificate cert = (X509Certificate)certs.get(index); local 1624 X509Certificate cert = (X509Certificate)certs.get(index); local 1678 X509Certificate cert = (X509Certificate)certs.get(index); local 2076 X509Certificate cert = (X509Certificate)certs.get(index); local 2110 X509Certificate cert = (X509Certificate)certs.get(index); local 2145 X509Certificate cert = (X509Certificate)certs.get(index); local 2168 X509Certificate cert = (X509Certificate)certs.get(index); local 2207 X509Certificate cert = (X509Certificate)certs.get(index); local 2230 X509Certificate cert = (X509Certificate)certs.get(index); local 2261 X509Certificate cert = (X509Certificate)certs.get(index); local 2284 X509Certificate cert = (X509Certificate)certs.get(index); local 2307 X509Certificate cert = (X509Certificate)certs.get(index); local 2359 X509Certificate cert = (X509Certificate)certs.get(index); local 2413 X509Certificate cert = (X509Certificate)certs.get(index); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXParametersTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 29 import java.security.cert.CertPathParameters; 30 import java.security.cert.CertPathValidatorException; 31 import java.security.cert.CertStore; 32 import java.security.cert.CollectionCertStoreParameters; 33 import java.security.cert.PKIXCertPathChecker; 34 import java.security.cert.PKIXParameters; 35 import java.security.cert.X509CertSelector; 42 import org.apache.harmony.security.tests.support.cert.TestUtils; 148 * <code>java.security.cert.TrustAnchor</code [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 824 CBS cert_bag, cert_type, wrapped_cert, cert; local 830 !CBS_get_asn1(&wrapped_cert, &cert, CBS_ASN1_OCTETSTRING)) { 837 const uint8_t *inp = CBS_data(&cert); 838 X509 *x509 = d2i_X509(NULL, &inp, CBS_len(&cert)); 844 if (inp != CBS_data(&cert) + CBS_len(&cert)) { [all...] |
/external/boringssl/src/ssl/ |
s3_srvr.c | 201 if (s->cert == NULL) { 1255 CERT *cert; local [all...] |
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 604 xml_node_t *cred, *cert; local 612 cert = xml_node_create(ctx->xml, cred, NULL, "DigitalCertificate"); 613 add_text_node(ctx, cert, "CertificateType", "x509v3"); 614 add_text_node(ctx, cert, "CertSHA256Fingerprint", cert_fingerprint); 688 char *cert; local 699 cert = db_get_val(ctx, user, realm, "cert", dmacc); 700 if (cert && cert[0] == '\0') 701 cert = NULL 1333 int cert = 0; local 1901 int cert = 0; local [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyPairGeneratorSpi.java | 59 import java.security.cert.CertificateEncodingException; 60 import java.security.cert.X509Certificate; 500 final X509Certificate cert; local 502 cert = generateSelfSignedCertificate(result.getPrivate(), result.getPublic()); 509 certBytes = cert.getEncoded(); [all...] |
AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.CertificateEncodingException; 49 import java.security.cert.CertificateException; 50 import java.security.cert.CertificateFactory; 51 import java.security.cert.X509Certificate; 179 X509Certificate cert = toCertificate(encodedCert); local 180 if (cert == null) { 192 return wrapIntoKeyStoreCertificate(privateKeyAlias, cert); 198 return cert; 369 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLSessionTest.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.X509Certificate; 76 X509Certificate cert = (X509Certificate)store.getCertificate("mykey"); local 77 Principal p2 = cert.getSubjectX500Principal(); 149 Certificate cert = store.getCertificate("mykey"); local 151 assertEquals(cert, certs[0]); 160 X509Certificate cert = (X509Certificate)store.getCertificate("mykey"); local 161 Principal p2 = cert.getSubjectX500Principal(); 184 javax.security.cert.X509Certificate[] res = clientSession.getPeerCertificateChain(); 553 public javax.security.cert.X509Certificate[] getChain() [all...] |