/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CRLTest.java | 17 package libcore.java.security.cert; 32 import java.security.cert.CRL; 33 import java.security.cert.CRLReason; 34 import java.security.cert.CertificateFactory; 35 import java.security.cert.X509CRL; 36 import java.security.cert.X509CRLEntry; 37 import java.security.cert.X509Certificate; 53 private static final String CERT_RSA = "x509/cert-rsa.der"; 55 private static final String CERT_DSA = "x509/cert-dsa.der"; 57 private static final String CERT_CRL_CA = "x509/cert-crl-ca.der" [all...] |
X509CertificateTest.java | 17 package libcore.java.security.cert; 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateExpiredException; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.CertificateNotYetValidException; 46 import java.security.cert.CertificateParsingException; 47 import java.security.cert.X509Certificate; 68 private static final String CERT_RSA = "x509/cert-rsa.der"; 70 private static final String CERT_DSA = "x509/cert-dsa.der" [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 36 import java.security.cert.Certificate; 37 import java.security.cert.CertificateFactory; 745 * 5. openssl x509 -req -days 37273 -in test.csr -signkey test.key -out test.cert 748 String certName = Support_Resources.getURL("test.cert"); 752 Certificate cert = cf.generateCertificate(is); local 757 c.init(Cipher.ENCRYPT_MODE, cert); 760 c.init(Cipher.ENCRYPT_MODE, cert); 775 * 5. openssl x509 -req -days 37273 -in test.csr -signkey test.key -out test.cert 778 String certName = Support_Resources.getURL("test.cert"); 782 Certificate cert = cf.generateCertificate(is) local 924 Certificate cert = cf.generateCertificate(is); local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateEncodingException; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 140 X509Certificate cert[] = new X509Certificate[2]; local 141 cert[0] = (X509Certificate) cf.generateCertificate(certArray); 142 cert[1] = (X509Certificate) cf.generateCertificate(certArray2); 146 keyTest.setCertificateEntry("alias1", cert[0]); 149 keyTest.setKeyEntry("alias2", getPrivateKey(), pssWord, cert); 169 X509Certificate cert[] = new X509Certificate[2]; local 214 X509Certificate cert[] = new X509Certificate[2]; local 251 X509Certificate cert[] = new X509Certificate[2]; local 291 X509Certificate cert[] = new X509Certificate[2]; local 324 X509Certificate cert[] = new X509Certificate[2]; local 382 X509Certificate cert[] = new X509Certificate[2]; local 415 X509Certificate cert[] = new X509Certificate[2]; local 446 X509Certificate cert[] = new X509Certificate[2]; local 513 X509Certificate cert = (X509Certificate) cf.generateCertificate(certArray); local 548 X509Certificate cert[] = new X509Certificate[2]; local 580 X509Certificate cert[] = new X509Certificate[2]; local [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 52 import java.security.cert.Certificate; 53 import java.security.cert.CertificateFactory; 54 import java.security.cert.X509Certificate; 755 public Certificate getIssuer(Certificate cert) throws Exception { 756 return issuer(keyStore, cert); 769 X509Certificate cert = (X509Certificate) c; local 783 if (!cert.getIssuerDN().equals(x.getSubjectDN())) { 788 + cert 795 throw new IllegalStateException("KeyStore contained no issuing CA for " + cert); 889 X509Certificate cert = (X509Certificate)src.getCertificate(alias); local 912 X509Certificate cert = (X509Certificate)src.getCertificate(alias); local [all...] |
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainActivity.java | 53 import java.security.cert.CertificateException; 54 import java.security.cert.CertificateFactory; 55 import java.security.cert.X509Certificate; 382 X509Certificate cert; local 385 cert = (X509Certificate)cf.generateCertificate(in); 390 X500Principal subjectPrincipal = cert.getSubjectX500Principal();
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509CertSelectorTest.java | 18 package tests.security.cert; 30 import java.security.cert.CertPath; 31 import java.security.cert.CertPathBuilder; 32 import java.security.cert.CertPathBuilderException; 33 import java.security.cert.CertificateEncodingException; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateExpiredException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.CertificateNotYetValidException; 38 import java.security.cert.CertificateParsingException 1075 TestCert cert = new TestCert(); local [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AndroidKeyStoreTest.java | 46 import java.security.cert.Certificate; 47 import java.security.cert.CertificateFactory; 86 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 922 Certificate cert = generateCertificate(FAKE_RSA_CA_1); local 1285 final Certificate cert = generateCertificate(FAKE_RSA_CA_1); local 1300 final Certificate cert = generateCertificate(FAKE_RSA_CA_1); local 1770 Certificate cert = generateCertificate(FAKE_RSA_USER_1); local [all...] |
TestUtils.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 143 Certificate cert; local 146 cert = keyStore.getCertificate(alias); 154 assertEquals(cert, privEntry.getCertificate()); 155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 156 cert instanceof X509Certificate); 157 final X509Certificate x509Cert = (X509Certificate) cert; 160 PublicKey keystorePublicKey = cert.getPublicKey() [all...] |
/external/boringssl/src/include/openssl/ |
x509_vfy.h | 181 * function is then called to actually check the cert chain. */ 197 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 226 /* This is a used when verifying cert chains. Since the 227 * gathering of the cert chain can take some time (and have to be 235 X509 *cert; /* The cert to check */ member in struct:x509_store_ctx_st 245 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 258 int last_untrusted; /* index of last untrusted cert */ 268 X509 *current_issuer; /* cert currently being tested as valid issuer */ 325 /* These are 'informational' when looking for issuer cert */ [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 210 throw new IllegalArgumentException("can't create cert factory - " + e.toString()); 254 tab.put(e.nextElement(), "cert"); 308 * simply return the cert for the private key 340 Certificate cert) 350 if (tc.equals(cert)) 1123 Certificate cert; local 1386 Certificate cert = engineGetCertificate(name); local 1462 Certificate cert = (Certificate)certs.get(certId); local 1540 Certificate cert = (Certificate)chainCerts.get(certId); local [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustedCertificateStoreTest.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 56 "cert-store-test" + tempFileRandom.nextInt()); 699 X509Certificate cert = (X509Certificate) certificateFactory.generateCertificate( local 702 File expectedFile = store.getCertificateFile(dir, cert); 711 store.findIssuer(cert)); 713 store.getTrustAnchor(cert)); 727 X509Certificate cert = (X509Certificate) store.getCertificate(alias); local 728 File expectedFile = store.getCertificateFile(dir, cert); [all...] |
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 461 eay_check_x509cert(cert, CApath, CAfile, local) 462 vchar_t *cert; 530 x509 = mem2x509(cert); 650 eay_get_x509asn1subjectname(cert) 651 vchar_t *cert; 658 bp = (unsigned char *) cert->v; 660 x509 = mem2x509(cert); 694 eay_get_x509subjectaltname(cert, altname, type, pos) 695 vchar_t *cert; 709 x509 = mem2x509(cert); 900 vchar_t *cert; local [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/ssl/ |
SslContextFactory.java | 31 import java.security.cert.CRL; 32 import java.security.cert.CertStore; 33 import java.security.cert.Certificate; 34 import java.security.cert.CollectionCertStoreParameters; 35 import java.security.cert.PKIXBuilderParameters; 36 import java.security.cert.X509CertSelector; 78 public java.security.cert.X509Certificate[] getAcceptedIssuers() 80 return new java.security.cert.X509Certificate[]{}; 83 public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) 87 public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType 277 Certificate cert = _certAlias == null?null:keyStore.getCertificate(_certAlias); local [all...] |
/external/nist-pkits/src/libcore/java/security/cert/ |
X509CertificateNistPkitsTest.java | 17 package libcore.java.security.cert; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertPathValidator; 27 import java.security.cert.CertPathValidatorException; 28 import java.security.cert.CertStore; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.CollectionCertStoreParameters; 31 import java.security.cert.PKIXCertPathValidatorResult; 32 import java.security.cert.PKIXParameters; 33 import java.security.cert.TrustAnchor [all...] |
/external/openssh/ |
sshkey.c | 85 int cert; member in struct:keytype 89 { "ssh-ed25519-cert-v01@openssh.com", "ED25519-CERT", 102 { "ssh-rsa-cert-v01@openssh.com", "RSA-CERT", KEY_RSA_CERT, 0, 1 }, 103 { "ssh-dss-cert-v01@openssh.com", "DSA-CERT", KEY_DSA_CERT, 0, 1 }, 105 { "ecdsa-sha2-nistp256-cert-v01@openssh.com", "ECDSA-CERT", 107 { "ecdsa-sha2-nistp384-cert-v01@openssh.com", "ECDSA-CERT" 461 struct sshkey_cert *cert; local 2407 struct sshbuf *cert; local [all...] |
/external/tcpdump/ |
isakmp.h | 260 u_int8_t encode; /* Cert Encoding */ 261 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert 284 u_int8_t num_cert; /* # Cert. Types */
|
print-isakmp.c | 153 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */ 1047 struct ikev1_pl_cert cert; local 1058 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert)); 1060 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1079 struct ikev1_pl_cert cert; local 1090 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert)); 1092 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1203 "INVALID-ID-INFORMATION", "INVALID-CERT-ENCODING" [all...] |
/external/wpa_supplicant_8/hs20/client/ |
osu_client.c | 171 mkdir("Cert", S_IRWXU); 187 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, 198 fingerprint = xml_node_get_text(ctx->xml, cert); 209 der = os_readfile("Cert/est_cert.der", &der_len); 229 unlink("Cert/est_cert.der"); 232 if (rename("Cert/est-cacerts.pem", buf) < 0) { 239 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); 240 if (rename("Cert/est_cert.pem", buf) < 0) { 241 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", 257 if (rename("Cert/privkey-plain.pem", buf) < 0) 279 char *cert; local 523 xml_node_t *tnds, *mo, *cert; local 680 xml_node_t *cert; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 179 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 302 if (priv->cert) 303 CertFreeCertificateContext(priv->cert); 330 if (strncmp(name, "cert://", 7) == 0) { 365 X509 *cert = NULL; local 371 (strncmp(name, "cert://", 7) != 0 && 385 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 386 if (priv->cert == NULL) { 387 priv->cert = cryptoapi_find_cert( 390 if (priv->cert == NULL) 468 X509 *cert; local 1391 struct wpabuf *cert = NULL; local 1414 struct wpabuf *cert = NULL; local 1555 struct wpabuf *cert; local 1744 X509 *cert = d2i_X509(NULL, local 2078 X509 *cert; local 2210 X509 *cert; member in struct:__anon21464 2241 X509 *cert; local 2268 X509 *cert; local 3314 X509 *cert; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 304 const u8 *cert; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 45 int (*cert_cb)(void *ctx, struct http_cert *cert); 168 static void debug_dump_cert(const char *title, X509 *cert) 178 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); 193 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, 201 on = os_realloc_array(cert->othername, cert->num_othername + 1, 205 cert->othername = on; 206 on = &on[cert->num_othername]; 221 cert->num_othername++; 225 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, 881 X509 *cert; local 942 X509 *cert; local 1094 X509 *cert; local [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); local 1444 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); local 1932 final X509Certificate cert = certGen.generate(keyPair.getPrivate()); local 2003 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, local 2016 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local 2027 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_2, local 2049 X509Certificate cert = local 2169 X509Certificate cert = generateCertificate(mAndroidKeyStore, TEST_ALIAS_1, TEST_SERIAL_1, local [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/auth/x500/ |
X500PrincipalTest.java | 24 import java.security.cert.CertificateFactory; 25 import java.security.cert.X509Certificate; 33 import org.apache.harmony.security.tests.support.cert.TestUtils; 268 X509Certificate cert = (X509Certificate)cf.generateCertificate(is); local 269 X500Principal xx = cert.getIssuerX500Principal(); 505 "C=US, ST=California, L=San Diego, O=Apache, OU=Project Harmony, CN=Test cert"); 507 "C=US,ST=California,L=San Diego,O=Apache,OU=Project Harmony,CN=Test cert", [all...] |
/packages/apps/Settings/src/com/android/settings/ |
TrustedCredentialsSettings.java | 57 import java.security.cert.CertificateEncodingException; 58 import java.security.cert.X509Certificate; 471 X509Certificate cert = KeyChain.toCertificate(encodedCertificate); local 473 mTab, alias, cert, profileId));
|