/libcore/ojluni/src/main/java/javax/net/ssl/ |
X509TrustManager.java | 28 import java.security.cert.*;
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ldap/ |
LDAPCertStoreHelper.java | 33 import java.security.cert.CertStore; 34 import java.security.cert.CertStoreException; 35 import java.security.cert.X509CertSelector; 36 import java.security.cert.X509CRLSelector;
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
CertificateMessageTest.java | 22 import java.security.cert.CertificateEncodingException; 23 import java.security.cert.CertificateException; 24 import java.security.cert.CertificateFactory; 25 import java.security.cert.X509Certificate; 87 X509Certificate cert = (X509Certificate) certFactory.generateCertificate(bais); local 89 new X509Certificate[] { cert }); 92 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0] 93 .getEncoded(), cert.getEncoded())); 104 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0]
|
DigitalSignatureTest.java | 23 import java.security.cert.Certificate; 33 private Certificate cert; field in class:DigitalSignatureTest 44 cert = entry.getCertificate(); 74 ds_verify.init(cert); 98 ds_verify.init(cert);
|
TrustManagerImplTest.java | 24 import java.security.cert.CertificateException; 25 import java.security.cert.CertificateFactory; 26 import java.security.cert.X509Certificate; 35 // Cert. encoding.was generated by using of classes 39 // org.apache.harmony.security.tests.support.provider.cert.CertFactoryTestData 68 X509Certificate cert = (X509Certificate) certFactory local 70 untrustedChain = new X509Certificate[] { cert };
|
/external/boringssl/src/ssl/ |
ssl_rsa.c | 69 static int ssl_set_cert(CERT *c, X509 *x509); 70 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey); 81 return ssl_set_cert(ssl->cert, x); 121 ret = ssl_set_pkey(ssl->cert, pkey); 127 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey) { 170 ret = ssl_set_pkey(ssl->cert, pkey); 200 return ssl_set_cert(ctx->cert, x); 203 static int ssl_set_cert(CERT *c, X509 *x) { 221 /* don't fail for a cert/key mismatch, just free current private key 222 * (when switching to a different cert & key, first this function shoul [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXCertStoreSelector.java | 4 import java.security.cert.CertSelector; 5 import java.security.cert.CertStore; 6 import java.security.cert.CertStoreException; 7 import java.security.cert.Certificate; 8 import java.security.cert.X509CertSelector; 56 public boolean match(Certificate cert) 58 return baseSelector.match(cert);
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
PinListEntry.java | 22 import java.security.cert.X509Certificate; 93 * CA cert. Otherwise this will return {@code true} indicating the {@code chain} 99 for (X509Certificate cert : chain) { 100 String fingerprint = getFingerprint(cert); 110 private static String getFingerprint(X509Certificate cert) { 113 byte[] encoded = cert.getPublicKey().getEncoded(); 145 for (X509Certificate cert : chain) { 146 if (certStore.isUserAddedCertificate(cert)) {
|
/external/curl/lib/ |
x509asn1.c | 671 void Curl_parseX509(curl_X509certificate * cert, 683 cert->certificate.header = NULL; 684 cert->certificate.beg = beg; 685 cert->certificate.end = end; 695 beg = Curl_getASN1Element(&cert->signatureAlgorithm, beg, end); 697 Curl_getASN1Element(&cert->signature, beg, end); 703 cert->version.header = NULL; 704 cert->version.beg = &defaultVersion; 705 cert->version.end = &defaultVersion + sizeof defaultVersion;; 708 Curl_getASN1Element(&cert->version, elem.beg, elem.end) 872 curl_X509certificate cert; local 1059 curl_X509certificate cert; local [all...] |
/external/webrtc/talk/app/webrtc/test/ |
fakedtlsidentitystore.h | 128 std::string cert; local 130 rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert); 136 reinterpret_cast<const unsigned char*>(cert.data()), 137 cert.length()); 166 std::string cert; local 168 rtc::SSLIdentity::PemToDer("CERTIFICATE", get_cert(), &cert); 170 observer->OnSuccess(cert, key);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
OSUSocketFactory.java | 20 import java.security.cert.CertPath; 21 import java.security.cert.CertPathValidator; 22 import java.security.cert.CertPathValidatorException; 23 import java.security.cert.Certificate; 24 import java.security.cert.CertificateException; 25 import java.security.cert.CertificateFactory; 26 import java.security.cert.PKIXCertPathChecker; 27 import java.security.cert.PKIXParameters; 28 import java.security.cert.TrustAnchor; 29 import java.security.cert.X509Certificate 68 X509Certificate cert = (X509Certificate) certFactory.generateCertificate(bis); local 254 X509Certificate cert = getCert(mKeyStore, prefix + mHomeSP.getFQDN()); local 289 Certificate cert = keyStore.getCertificate(alias); local 300 Certificate cert = keyStore.getCertificate( local [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
DefaultHostnameVerifierTest.java | 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 255 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 273 assertTrue(verifyWithServerCertificate("www.example.com", cert)); 274 assertFalse(verifyWithServerCertificate("www2.example.com", cert)); 280 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" local 297 assertTrue(verifyWithServerCertificate("www.example.com", cert)); 298 assertFalse(verifyWithServerCertificate("www2.example.com", cert)); 305 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n local 334 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local 362 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local 387 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\\n" local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509CertStoreSelector.java | 4 import java.security.cert.Certificate; 5 import java.security.cert.X509CertSelector; 6 import java.security.cert.X509Certificate; 16 * @deprecated use the classes under org.bouncycastle.cert.selector 34 public boolean match(Certificate cert) 36 return match((Object)cert);
|
/external/conscrypt/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 23 import java.security.cert.CertificateException; 24 import java.security.cert.CertificateEncodingException; 25 import java.security.cert.X509Certificate; 36 * case x509_entry: ASN.1Cert; 106 public static CertificateEntry createForX509Certificate(X509Certificate cert) 108 return createForX509Certificate(cert.getEncoded());
|
/external/curl/docs/examples/ |
cacertinmem.c | 46 X509 * cert=NULL; local 95 PEM_read_bio_X509(bio, &cert, 0, NULL); 96 if (cert == NULL) 103 if (X509_STORE_add_cert(store, cert)==0) 107 X509_free(cert);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateCertificateRepTest.java | 1 package tests.security.cert; 5 import org.apache.harmony.security.tests.support.cert.MyCertificate; 6 import org.apache.harmony.security.tests.support.cert.TestUtils; 7 import org.apache.harmony.security.tests.support.cert.MyCertificate.MyCertificateRep; 10 import java.security.cert.Certificate;
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
IndexedCollectionCertStore.java | 31 import java.security.cert.*; 91 * @see java.security.cert.CertStore 175 private void indexCertificate(X509Certificate cert) { 176 X500Principal subject = cert.getSubjectX500Principal(); 177 Object oldEntry = certSubjects.put(subject, cert); 180 if (cert.equals(oldEntry)) { 184 list.add(cert); 190 if (list.contains(cert) == false) { 191 list.add(cert); 252 for (Certificate cert : otherCertificates) 313 X509Certificate cert = (X509Certificate)obj; local [all...] |
PKIXMasterCertPathValidator.java | 33 import java.security.cert.CertPath; 34 import java.security.cert.CertPathValidatorException; 35 import java.security.cert.PKIXCertPathChecker; 36 import java.security.cert.PKIXReason; 37 import java.security.cert.X509Certificate; 61 * @throws CertPathValidatorException if cert path does not validate 92 debug.println("Checking cert" + (i+1) + " ..."); 144 debug.println("Cert path validation succeeded. (PKIX validation "
|
ForwardBuilder.java | 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertPathValidatorException; 34 import java.security.cert.PKIXReason; 35 import java.security.cert.CertStore; 36 import java.security.cert.CertStoreException; 37 import java.security.cert.PKIXBuilderParameters; 38 import java.security.cert.PKIXCertPathChecker; 39 import java.security.cert.TrustAnchor; 40 import java.security.cert.X509Certificate; 41 import java.security.cert.X509CertSelector [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificate.java | 23 package org.apache.harmony.security.tests.support.cert; 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.X509Extension; 38 * Stub class for <code>java.security.cert.Certificate</code> tests
|
/build/tools/releasetools/ |
check_target_files_signatures | 31 .x509.pem files. Defaults to "vendor,build". Where cert files 33 printed as the cert name, otherwise a hash of the cert plus its 89 def GetCertSubject(cert): 93 out, err = p.communicate(cert) 95 return "(error reading cert subject)" 100 return "(unknown cert subject)" 107 def Add(self, cert, name=None): 108 if cert in self.certs: 110 self.certs[cert] = self.certs[cert] + "," + nam [all...] |
check_target_files_signatures.py | 31 .x509.pem files. Defaults to "vendor,build". Where cert files 33 printed as the cert name, otherwise a hash of the cert plus its 89 def GetCertSubject(cert): 93 out, err = p.communicate(cert) 95 return "(error reading cert subject)" 100 return "(unknown cert subject)" 107 def Add(self, cert, name=None): 108 if cert in self.certs: 110 self.certs[cert] = self.certs[cert] + "," + nam [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
DelegatedCertInstallerTest.java | 34 * Exercise delegated cert installer APIs in {@link DevicePolicyManager} by setting the test app 35 * (CtsCertInstallerApp) as a delegated cert installer and then asking it to invoke various 36 * cert-related APIs. The expected certificate changes are validated both remotely and locally. 69 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 174 byte[] cert = TEST_CA.getBytes(); 181 installCaCert(cert); 184 ADMIN_RECEIVER_COMPONENT, cert)); 187 verifyCaCert(cert); 191 removeCaCert(cert); 194 ADMIN_RECEIVER_COMPONENT, cert)); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 6 import java.security.cert.CRL; 7 import java.security.cert.CRLException; 8 import java.security.cert.CertPath; 9 import java.security.cert.CertificateException; 10 import java.security.cert.CertificateFactorySpi; 11 import java.security.cert.CertificateParsingException; 12 import java.security.cert.X509Certificate; 53 private java.security.cert.Certificate readDERCertificate( 75 private java.security.cert.Certificate getCertificate() 95 private java.security.cert.Certificate readPEMCertificate 236 java.security.cert.Certificate cert; local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/ |
certutils.py | 20 cert: a crypto.X509 certificate (w/ just the pub key) 21 cert_str: a certificate string (w/ just the pub cert) 91 """Loads obj cert object from string.""" 100 def _dump_cert(cert, filetype=FILETYPE_PEM): 101 """Dumps obj cert object to string.""" 102 return crypto.dump_certificate(filetype, cert) 109 subject: a string representing the desired root cert issuer 149 def verify_cb(conn, cert, errnum, depth, ok): 150 host_certs.append(cert) 179 mycert-cert.pem - CA in PEM forma [all...] |