/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509CertStoreSelector.java | 4 import java.security.cert.Certificate; 5 import java.security.cert.X509CertSelector; 6 import java.security.cert.X509Certificate; 16 * @deprecated use the classes under org.bouncycastle.cert.selector 34 public boolean match(Certificate cert) 36 return match((Object)cert);
|
AttributeCertificateHolder.java | 7 import java.security.cert.CertSelector; 8 import java.security.cert.Certificate; 9 import java.security.cert.CertificateEncodingException; 10 import java.security.cert.CertificateParsingException; 11 import java.security.cert.X509Certificate; 48 * @deprecated use org.bouncycastle.cert.AttributeCertificateHolder 74 public AttributeCertificateHolder(X509Certificate cert) 81 name = PrincipalUtil.getIssuerX509Principal(cert); 89 new ASN1Integer(cert.getSerialNumber()))); 328 public boolean match(Certificate cert) [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 22 import java.security.cert.CertificateEncodingException; 23 import java.security.cert.CertificateException; 24 import java.security.cert.X509Certificate; 36 * case x509_entry: ASN.1Cert; 106 public static CertificateEntry createForX509Certificate(X509Certificate cert) 108 return createForX509Certificate(cert.getEncoded());
|
/external/curl/docs/examples/ |
cacertinmem.c | 23 * CA cert in memory with OpenSSL to get a HTTPS page. 40 X509 * cert=NULL; local 89 PEM_read_bio_X509(bio, &cert, 0, NULL); 90 if(cert == NULL) 97 if(X509_STORE_add_cert(store, cert)==0) 101 X509_free(cert);
|
usercertinmem.c | 47 X509 *cert = NULL; local 130 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); 131 if(cert == NULL) { 136 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); 169 if(cert) 170 X509_free(cert);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateCertificateRepTest.java | 1 package tests.security.cert; 5 import org.apache.harmony.security.tests.support.cert.MyCertificate; 6 import org.apache.harmony.security.tests.support.cert.TestUtils; 7 import org.apache.harmony.security.tests.support.cert.MyCertificate.MyCertificateRep; 10 import java.security.cert.Certificate;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificate.java | 23 package org.apache.harmony.security.tests.support.cert; 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.X509Extension; 38 * Stub class for <code>java.security.cert.Certificate</code> tests
|
/build/make/tools/releasetools/ |
check_target_files_signatures | 31 .x509.pem files. Defaults to "vendor,build". Where cert files 33 printed as the cert name, otherwise a hash of the cert plus its 89 def GetCertSubject(cert): 93 out, err = p.communicate(cert) 95 return "(error reading cert subject)" 100 return "(unknown cert subject)" 107 def Add(self, cert, name=None): 108 if cert in self.certs: 110 self.certs[cert] = self.certs[cert] + "," + nam [all...] |
check_target_files_signatures.py | 31 .x509.pem files. Defaults to "vendor,build". Where cert files 33 printed as the cert name, otherwise a hash of the cert plus its 89 def GetCertSubject(cert): 93 out, err = p.communicate(cert) 95 return "(error reading cert subject)" 100 return "(unknown cert subject)" 107 def Add(self, cert, name=None): 108 if cert in self.certs: 110 self.certs[cert] = self.certs[cert] + "," + nam [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.X509CRL; 41 import java.security.cert.X509Certificate; 42 import java.security.cert.PKIXCertPathChecker; 43 import java.security.cert.TrustAnchor; 44 import java.security.cert.CRLException; 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertPathValidatorException; 47 import java.security.cert.CertPathValidatorException.BasicReason; 48 import java.security.cert.PKIXReason [all...] |
ForwardBuilder.java | 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertPathValidatorException; 34 import java.security.cert.PKIXReason; 35 import java.security.cert.CertStore; 36 import java.security.cert.CertStoreException; 37 import java.security.cert.PKIXBuilderParameters; 38 import java.security.cert.PKIXCertPathChecker; 39 import java.security.cert.TrustAnchor; 40 import java.security.cert.X509Certificate; 41 import java.security.cert.X509CertSelector [all...] |
OCSP.java | 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertPathValidatorException; 35 import java.security.cert.CertPathValidatorException.BasicReason; 36 import java.security.cert.CRLReason; 37 import java.security.cert.Extension; 38 import java.security.cert.X509Certificate; 106 * @param cert the certificate to be checked 114 public static RevocationStatus check(X509Certificate cert, 120 X509CertImpl certImpl = X509CertImpl.toImpl(cert); 140 * @param cert the certificate to be checke [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/ |
certutils.py | 20 cert: a crypto.X509 certificate (w/ just the pub key) 21 cert_str: a certificate string (w/ just the pub cert) 93 """Loads obj cert object from string.""" 102 def _dump_cert(cert, filetype=FILETYPE_PEM): 103 """Dumps obj cert object to string.""" 104 return crypto.dump_certificate(filetype, cert) 111 subject: a string representing the desired root cert issuer 152 def verify_cb(conn, cert, errnum, depth, ok): 153 host_certs.append(cert) 182 mycert-cert.pem - CA in PEM forma [all...] |
certutils_test.py | 84 cert = certutils.load_cert(cert_str) 85 self.assertEqual(issuer, cert.get_subject().commonName) 94 cert_path = base_path + '-cert.pem' 95 ca_cert_android = base_path + '-cert.cer' 96 ca_cert_windows = base_path + '-cert.p12' 121 cert = certutils.load_cert(cert_string) 122 self.assertEqual(issuer, cert.get_issuer().commonName) 123 self.assertEqual(subject, cert.get_subject().commonName) 129 cert = certutils.load_cert(cert_string) 130 self.assertEqual(issuer, cert.get_issuer().commonName [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HttpsURLConnectionTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 34 import org.apache.harmony.security.tests.support.cert.TestUtils; 92 Certificate[] cert = con.getLocalCertificates(); local 93 assertNotNull(cert); 94 assertEquals(1, cert.length); 180 Certificate[] cert = con.getServerCertificates(); local 181 assertNotNull(cert); 182 assertEquals(1, cert.length) 276 Certificate cert = cf.generateCertificate(bis); local 291 Certificate cert = cf.generateCertificate(bis); local [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
KeyManagementTest.java | 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 39 import java.security.cert.Certificate; 84 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 87 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, cert, alias)); local 108 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 111 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 113 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 133 // Use assets/generate-client-cert-chain.sh to regenerate the client cert chain 167 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 194 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 196 mDevicePolicyManager.installKeyPair(getWho(), null, cert, alias); local 210 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertBlacklistTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 66 * Tests that the path building correctly routes around a blacklisted cert where there are 67 * other valid paths available. This prevents breakage where a cert was cross signed by a 95 for (Certificate cert : collection) { 96 certs[i++] = (X509Certificate) cert;
|
ConscryptIntermediateVerificationTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.X509Certificate; 27 import java.security.cert.CertificateFactory; 54 for (Certificate cert : certs) { 55 result.add((X509Certificate) cert);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
X509ExtensionUtil.java | 4 import java.security.cert.CertificateParsingException; 5 import java.security.cert.X509Certificate; 35 public static Collection getIssuerAlternativeNames(X509Certificate cert) 38 byte[] extVal = cert.getExtensionValue(X509Extension.issuerAlternativeName.getId()); 43 public static Collection getSubjectAlternativeNames(X509Certificate cert) 46 byte[] extVal = cert.getExtensionValue(X509Extension.subjectAlternativeName.getId());
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
CertBlacklistTest.java | 21 import java.security.cert.Certificate; 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 63 /** Test that the path building correctly routes around a blacklisted cert where there are 64 * other valid paths available. This prevents breakage where a cert was cross signed by a 93 for (Certificate cert : collection) { 94 certs[i++] = (X509Certificate) cert;
|
/external/webrtc/webrtc/base/ |
fakesslidentity.h | 82 static FakeSSLCertificate* DupCert(FakeSSLCertificate cert) { 83 return cert.GetReference(); 85 static void DeleteCert(SSLCertificate* cert) { delete cert; } 96 explicit FakeSSLIdentity(const FakeSSLCertificate& cert) : cert_(cert) {}
|
/tools/apksig/src/test/java/com/android/apksig/internal/util/ |
Resources.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 71 for (Certificate cert : certs) { 72 result.add((X509Certificate) cert);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathBuilderSpi.java | 4 import java.security.cert.CertPath; 5 import java.security.cert.CertPathBuilderException; 6 import java.security.cert.CertPathBuilderResult; 7 import java.security.cert.CertPathBuilderSpi; 8 import java.security.cert.CertPathParameters; 9 import java.security.cert.CertificateParsingException; 10 import java.security.cert.PKIXBuilderParameters; 11 import java.security.cert.PKIXCertPathBuilderResult; 12 import java.security.cert.PKIXCertPathValidatorResult; 13 import java.security.cert.X509Certificate 89 X509Certificate cert; local [all...] |
RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilderException; 9 import java.security.cert.CertPathValidatorException; 10 import java.security.cert.CertificateExpiredException; 11 import java.security.cert.CertificateNotYetValidException; 12 import java.security.cert.PKIXCertPathChecker; 13 import java.security.cert.X509CRL; 14 import java.security.cert.X509CRLSelector; 15 import java.security.cert.X509CertSelector; 16 import java.security.cert.X509Certificate 897 X509Certificate cert = (X509Certificate)certs.get(index); local 1081 X509Certificate cert = (X509Certificate)certs.get(index); local 1157 X509Certificate cert = (X509Certificate)certs.get(index); local 1186 X509Certificate cert = (X509Certificate)certs.get(index); local 1287 X509Certificate cert = (X509Certificate)certs.get(index); local 1491 X509Certificate cert = (X509Certificate)certs.get(index); local 1569 X509Certificate cert = (X509Certificate)certs.get(index); local 1624 X509Certificate cert = (X509Certificate)certs.get(index); local 1678 X509Certificate cert = (X509Certificate)certs.get(index); local 2076 X509Certificate cert = (X509Certificate)certs.get(index); local 2110 X509Certificate cert = (X509Certificate)certs.get(index); local 2145 X509Certificate cert = (X509Certificate)certs.get(index); local 2168 X509Certificate cert = (X509Certificate)certs.get(index); local 2207 X509Certificate cert = (X509Certificate)certs.get(index); local 2230 X509Certificate cert = (X509Certificate)certs.get(index); local 2261 X509Certificate cert = (X509Certificate)certs.get(index); local 2284 X509Certificate cert = (X509Certificate)certs.get(index); local 2307 X509Certificate cert = (X509Certificate)certs.get(index); local 2359 X509Certificate cert = (X509Certificate)certs.get(index); local 2413 X509Certificate cert = (X509Certificate)certs.get(index); local [all...] |
CertPathValidatorUtilities.java | 9 import java.security.cert.CRLException; 10 import java.security.cert.CertPath; 11 import java.security.cert.CertPathValidatorException; 12 import java.security.cert.CertStore; 13 import java.security.cert.CertStoreException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.PolicyQualifierInfo; 17 import java.security.cert.TrustAnchor; 18 import java.security.cert.X509CRL 1211 Certificate cert = (Certificate)certs.get(index); local [all...] |