/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 35 x509_certificate_chain_free(cred->cert); 48 struct x509_certificate *cert, *p; local 51 cert = x509_certificate_parse(buf, len); 52 if (cert == NULL) { 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 66 p->next = cert; 69 cert->next = *chain; 70 *chain = cert; 73 x509_name_string(&cert->subject, name, sizeof(name)); 158 const char *cert, const u8 *cert_blob 506 struct x509_certificate *cert; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old.h | 82 const struct wpabuf *cert); 124 const struct wpabuf *cert)
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
SslCertificateTest.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate;
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
PKIXParametersTest.java | 17 package libcore.java.security.cert; 22 import java.security.cert.PKIXParameters; 38 ks.setCertificateEntry("cert", pke.getCertificateChain()[0]); 41 // should fail with just key, even though cert is present in key entry
|
X509CertSelectorTest.java | 17 package libcore.java.security.cert; 22 import java.security.cert.Certificate; 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509CertSelector; 25 import java.security.cert.X509Certificate;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathValidator2Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertPath; 29 import org.apache.harmony.security.tests.support.cert.TestUtils; 36 import java.security.cert.CertPath; 37 import java.security.cert.CertPathParameters; 38 import java.security.cert.CertPathValidator; 39 import java.security.cert.CertPathValidatorException; 40 import java.security.cert.PKIXParameters; 48 public static final String CertPathValidatorProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi";
|
X509CRLSelectorTest.java | 23 package tests.security.cert; 28 import java.security.cert.X509CRLSelector; 37 * java.security.cert.X509CRLSelector#addIssuer(javax.security.auth.x500.X500Principal) 52 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String) 74 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String) 86 * java.security.cert.X509CRLSelector#addIssuerName(byte[]) 100 * java.security.cert.X509CRLSelector#addIssuerName(byte[])
|
PKIXCertPathValidatorResultTest.java | 23 package tests.security.cert; 29 import java.security.cert.PKIXCertPathValidatorResult; 30 import java.security.cert.PolicyNode; 31 import java.security.cert.TrustAnchor; 34 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
CertPathBuilder1Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi; 29 import org.apache.harmony.security.tests.support.cert.TestUtils; 36 import java.security.cert.CertPath; 37 import java.security.cert.CertPathBuilder; 38 import java.security.cert.CertPathBuilderException; 39 import java.security.cert.CertPathBuilderResult; 40 import java.security.cert.CertPathBuilderSpi; 41 import java.security.cert.CertPathParameters; 42 import java.security.cert.CertificateException [all...] |
CertStore2Test.java | 1 package tests.security.cert; 10 import java.security.cert.CRL; 11 import java.security.cert.CRLSelector; 12 import java.security.cert.CertSelector; 13 import java.security.cert.CertStore; 14 import java.security.cert.CertStoreException; 15 import java.security.cert.CertStoreParameters; 16 import java.security.cert.CertStoreSpi; 17 import java.security.cert.Certificate; 317 public boolean match(Certificate cert) { [all...] |
CertificateFactory2Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 35 import java.security.cert.CRL; 36 import java.security.cert.CRLException; 37 import java.security.cert.CertPath; 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 51 private static final String CertificateFactoryProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi"; 132 Certificate cert = certFactory.generateCertificate(dis) local [all...] |
/libcore/ojluni/src/test/java/security/cert/ |
AKISerialNumberTest.java | 33 // jdk/test/java/security/cert/CertPathBuilder/akiExt/AKISerialNumber.java 35 package test.java.security.cert; 39 import java.security.cert.*;
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
FakeSSLSession.java | 21 import java.security.cert.Certificate; 63 public javax.security.cert.X509Certificate[] getPeerCertificateChain() {
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 3 import org.apache.harmony.security.tests.support.cert.MyCertificate; 17 import java.security.cert.Certificate; 18 import java.security.cert.CertificateException; 31 public static final Certificate CERT = new MyCertificate("certtype", 56 aliases.put("certalias", CERT); 83 public String engineGetCertificateAlias(Certificate cert) { 84 if (cert == null) { 89 if (alias.getValue() == cert) { 186 public void engineSetCertificateEntry(String alias, Certificate cert) 190 throw new KeyStoreException("alias is not a cert entry") [all...] |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar | |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
AdminActionBookkeepingTest.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 33 * The CA cert below is the content of cacert.pem as generated by: 187 * Test: It should be recored whether the Device Owner or the user installed a CA cert. 191 final Certificate cert = CertificateFactory.getInstance("X.509") local 195 // Install a CA cert. 196 assertNull(store.getCertificateAlias(cert)); 198 final String alias = store.getCertificateAlias(cert); 201 // Verify that the CA cert was marked as installed by the Device Owner. 204 // Uninstall the CA cert [all...] |
/cts/tests/tests/net/src/android/net/http/cts/ |
SslCertificateTest.java | 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateExpiredException; 29 import java.security.cert.CertificateNotYetValidException; 30 import java.security.cert.X509Certificate;
|
/cts/tests/tests/net/src/org/apache/http/conn/ssl/cts/ |
AbstractVerifierTest.java | 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertificateExpiredException; 35 import java.security.cert.CertificateNotYetValidException; 36 import java.security.cert.X509Certificate;
|
/external/boringssl/src/ssl/ |
tls_method.c | 266 static void ssl_noop_x509_clear(CERT *cert) {} 267 static void ssl_noop_x509_free(CERT *cert) {} 268 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} 269 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} 270 static void ssl_noop_x509_flush_cached_chain(CERT *cert) { [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 48 int (*cert_cb)(void *ctx, struct http_cert *cert); 171 static void debug_dump_cert(const char *title, X509 *cert) 181 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); 196 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, 204 on = os_realloc_array(cert->othername, cert->num_othername + 1, 208 cert->othername = on; 209 on = &on[cert->num_othername]; 224 cert->num_othername++; 228 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, 919 X509 *cert; local 980 X509 *cert; local 1152 X509 *cert; local [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509CRL.java | 30 import java.security.cert.CRLException; 31 import java.security.cert.Certificate; 32 import java.security.cert.X509CRL; 33 import java.security.cert.X509CRLEntry; 34 import java.security.cert.X509Certificate; 355 public boolean isRevoked(Certificate cert) { 356 if (!(cert instanceof X509Certificate)) { 361 if (cert instanceof OpenSSLX509Certificate) { 362 osslCert = (OpenSSLX509Certificate) cert; 366 cert.getEncoded())) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HostnameVerifierTest.java | 22 import java.security.cert.CertificateFactory; 23 import java.security.cert.X509Certificate; 159 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem 160 String cert = "-----BEGIN CERTIFICATE-----\n" local 172 InputStream in = new ByteArrayInputStream(cert.getBytes("UTF-8")); 187 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.com' -newkey rsa:512 -out cert.pem 188 String cert = "-----BEGIN CERTIFICATE-----\n" local 200 InputStream in = new ByteArrayInputStream(cert.getBytes("UTF-8")); 210 * $ cat ./cert.cnf 220 * $ openssl req -x509 -nodes -days 36500 -subj '/CN=foo.com' -config ./cert.cnf 223 String cert = "-----BEGIN CERTIFICATE-----\\n" local 260 String cert = "-----BEGIN CERTIFICATE-----\\n" local [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test.go | 431 cert, err := ParseCertificate(derBytes) 437 if len(cert.PolicyIdentifiers) != 1 || !cert.PolicyIdentifiers[0].Equal(template.PolicyIdentifiers[0]) { 438 t.Errorf("%s: failed to parse policy identifiers: got:%#v want:%#v", test.name, cert.PolicyIdentifiers, template.PolicyIdentifiers) 441 if len(cert.PermittedDNSDomains) != 2 || cert.PermittedDNSDomains[0] != ".example.com" || cert.PermittedDNSDomains[1] != "example.com" { 442 t.Errorf("%s: failed to parse name constraints: %#v", test.name, cert.PermittedDNSDomains) 445 if cert.Subject.CommonName != commonName { 446 t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test.go | 431 cert, err := ParseCertificate(derBytes) 437 if len(cert.PolicyIdentifiers) != 1 || !cert.PolicyIdentifiers[0].Equal(template.PolicyIdentifiers[0]) { 438 t.Errorf("%s: failed to parse policy identifiers: got:%#v want:%#v", test.name, cert.PolicyIdentifiers, template.PolicyIdentifiers) 441 if len(cert.PermittedDNSDomains) != 2 || cert.PermittedDNSDomains[0] != ".example.com" || cert.PermittedDNSDomains[1] != "example.com" { 442 t.Errorf("%s: failed to parse name constraints: %#v", test.name, cert.PermittedDNSDomains) 445 if cert.Subject.CommonName != commonName { 446 t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName [all...] |