HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 301 - 325 of 1411) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.c 35 x509_certificate_chain_free(cred->cert);
48 struct x509_certificate *cert, *p; local
51 cert = x509_certificate_parse(buf, len);
52 if (cert == NULL) {
61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) {
66 p->next = cert;
69 cert->next = *chain;
70 *chain = cert;
73 x509_name_string(&cert->subject, name, sizeof(name));
158 const char *cert, const u8 *cert_blob
506 struct x509_certificate *cert; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old.h 82 const struct wpabuf *cert);
124 const struct wpabuf *cert)
  /frameworks/base/core/tests/coretests/src/android/net/http/
SslCertificateTest.java 23 import java.security.cert.CertificateFactory;
24 import java.security.cert.X509Certificate;
  /libcore/luni/src/test/java/libcore/java/security/cert/
PKIXParametersTest.java 17 package libcore.java.security.cert;
22 import java.security.cert.PKIXParameters;
38 ks.setCertificateEntry("cert", pke.getCertificateChain()[0]);
41 // should fail with just key, even though cert is present in key entry
X509CertSelectorTest.java 17 package libcore.java.security.cert;
22 import java.security.cert.Certificate;
23 import java.security.cert.CertificateFactory;
24 import java.security.cert.X509CertSelector;
25 import java.security.cert.X509Certificate;
  /libcore/luni/src/test/java/tests/security/cert/
CertPathValidator2Test.java 23 package tests.security.cert;
28 import org.apache.harmony.security.tests.support.cert.MyCertPath;
29 import org.apache.harmony.security.tests.support.cert.TestUtils;
36 import java.security.cert.CertPath;
37 import java.security.cert.CertPathParameters;
38 import java.security.cert.CertPathValidator;
39 import java.security.cert.CertPathValidatorException;
40 import java.security.cert.PKIXParameters;
48 public static final String CertPathValidatorProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi";
X509CRLSelectorTest.java 23 package tests.security.cert;
28 import java.security.cert.X509CRLSelector;
37 * java.security.cert.X509CRLSelector#addIssuer(javax.security.auth.x500.X500Principal)
52 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String)
74 * java.security.cert.X509CRLSelector#addIssuerName(java.lang.String)
86 * java.security.cert.X509CRLSelector#addIssuerName(byte[])
100 * java.security.cert.X509CRLSelector#addIssuerName(byte[])
PKIXCertPathValidatorResultTest.java 23 package tests.security.cert;
29 import java.security.cert.PKIXCertPathValidatorResult;
30 import java.security.cert.PolicyNode;
31 import java.security.cert.TrustAnchor;
34 import org.apache.harmony.security.tests.support.cert.TestUtils;
CertPathBuilder1Test.java 23 package tests.security.cert;
28 import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi;
29 import org.apache.harmony.security.tests.support.cert.TestUtils;
36 import java.security.cert.CertPath;
37 import java.security.cert.CertPathBuilder;
38 import java.security.cert.CertPathBuilderException;
39 import java.security.cert.CertPathBuilderResult;
40 import java.security.cert.CertPathBuilderSpi;
41 import java.security.cert.CertPathParameters;
42 import java.security.cert.CertificateException
    [all...]
CertStore2Test.java 1 package tests.security.cert;
10 import java.security.cert.CRL;
11 import java.security.cert.CRLSelector;
12 import java.security.cert.CertSelector;
13 import java.security.cert.CertStore;
14 import java.security.cert.CertStoreException;
15 import java.security.cert.CertStoreParameters;
16 import java.security.cert.CertStoreSpi;
17 import java.security.cert.Certificate;
317 public boolean match(Certificate cert) {
    [all...]
CertificateFactory2Test.java 23 package tests.security.cert;
28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi;
35 import java.security.cert.CRL;
36 import java.security.cert.CRLException;
37 import java.security.cert.CertPath;
38 import java.security.cert.Certificate;
39 import java.security.cert.CertificateException;
40 import java.security.cert.CertificateFactory;
51 private static final String CertificateFactoryProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi";
132 Certificate cert = certFactory.generateCertificate(dis) local
    [all...]
  /libcore/ojluni/src/test/java/security/cert/
AKISerialNumberTest.java 33 // jdk/test/java/security/cert/CertPathBuilder/akiExt/AKISerialNumber.java
35 package test.java.security.cert;
39 import java.security.cert.*;
  /libcore/support/src/test/java/libcore/javax/net/ssl/
FakeSSLSession.java 21 import java.security.cert.Certificate;
63 public javax.security.cert.X509Certificate[] getPeerCertificateChain() {
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestKeyStoreSpi.java 3 import org.apache.harmony.security.tests.support.cert.MyCertificate;
17 import java.security.cert.Certificate;
18 import java.security.cert.CertificateException;
31 public static final Certificate CERT = new MyCertificate("certtype",
56 aliases.put("certalias", CERT);
83 public String engineGetCertificateAlias(Certificate cert) {
84 if (cert == null) {
89 if (alias.getValue() == cert) {
186 public void engineSetCertificateEntry(String alias, Certificate cert)
190 throw new KeyStoreException("alias is not a cert entry")
    [all...]
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar 
  /prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar 
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
AdminActionBookkeepingTest.java 27 import java.security.cert.Certificate;
28 import java.security.cert.CertificateFactory;
33 * The CA cert below is the content of cacert.pem as generated by:
187 * Test: It should be recored whether the Device Owner or the user installed a CA cert.
191 final Certificate cert = CertificateFactory.getInstance("X.509") local
195 // Install a CA cert.
196 assertNull(store.getCertificateAlias(cert));
198 final String alias = store.getCertificateAlias(cert);
201 // Verify that the CA cert was marked as installed by the Device Owner.
204 // Uninstall the CA cert
    [all...]
  /cts/tests/tests/net/src/android/net/http/cts/
SslCertificateTest.java 26 import java.security.cert.CertificateEncodingException;
27 import java.security.cert.CertificateException;
28 import java.security.cert.CertificateExpiredException;
29 import java.security.cert.CertificateNotYetValidException;
30 import java.security.cert.X509Certificate;
  /cts/tests/tests/net/src/org/apache/http/conn/ssl/cts/
AbstractVerifierTest.java 32 import java.security.cert.CertificateEncodingException;
33 import java.security.cert.CertificateException;
34 import java.security.cert.CertificateExpiredException;
35 import java.security.cert.CertificateNotYetValidException;
36 import java.security.cert.X509Certificate;
  /external/boringssl/src/ssl/
tls_method.c 266 static void ssl_noop_x509_clear(CERT *cert) {}
267 static void ssl_noop_x509_free(CERT *cert) {}
268 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {}
269 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {}
270 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {
    [all...]
  /external/wpa_supplicant_8/src/utils/
http_curl.c 48 int (*cert_cb)(void *ctx, struct http_cert *cert);
171 static void debug_dump_cert(const char *title, X509 *cert)
181 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
196 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert,
204 on = os_realloc_array(cert->othername, cert->num_othername + 1,
208 cert->othername = on;
209 on = &on[cert->num_othername];
224 cert->num_othername++;
228 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert,
919 X509 *cert; local
980 X509 *cert; local
1152 X509 *cert; local
    [all...]
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLX509CRL.java 30 import java.security.cert.CRLException;
31 import java.security.cert.Certificate;
32 import java.security.cert.X509CRL;
33 import java.security.cert.X509CRLEntry;
34 import java.security.cert.X509Certificate;
355 public boolean isRevoked(Certificate cert) {
356 if (!(cert instanceof X509Certificate)) {
361 if (cert instanceof OpenSSLX509Certificate) {
362 osslCert = (OpenSSLX509Certificate) cert;
366 cert.getEncoded()))
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HostnameVerifierTest.java 22 import java.security.cert.CertificateFactory;
23 import java.security.cert.X509Certificate;
159 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem
160 String cert = "-----BEGIN CERTIFICATE-----\n" local
172 InputStream in = new ByteArrayInputStream(cert.getBytes("UTF-8"));
187 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.com' -newkey rsa:512 -out cert.pem
188 String cert = "-----BEGIN CERTIFICATE-----\n" local
200 InputStream in = new ByteArrayInputStream(cert.getBytes("UTF-8"));
210 * $ cat ./cert.cnf
220 * $ openssl req -x509 -nodes -days 36500 -subj '/CN=foo.com' -config ./cert.cnf
223 String cert = "-----BEGIN CERTIFICATE-----\\n" local
260 String cert = "-----BEGIN CERTIFICATE-----\\n" local
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go 431 cert, err := ParseCertificate(derBytes)
437 if len(cert.PolicyIdentifiers) != 1 || !cert.PolicyIdentifiers[0].Equal(template.PolicyIdentifiers[0]) {
438 t.Errorf("%s: failed to parse policy identifiers: got:%#v want:%#v", test.name, cert.PolicyIdentifiers, template.PolicyIdentifiers)
441 if len(cert.PermittedDNSDomains) != 2 || cert.PermittedDNSDomains[0] != ".example.com" || cert.PermittedDNSDomains[1] != "example.com" {
442 t.Errorf("%s: failed to parse name constraints: %#v", test.name, cert.PermittedDNSDomains)
445 if cert.Subject.CommonName != commonName {
446 t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test.go 431 cert, err := ParseCertificate(derBytes)
437 if len(cert.PolicyIdentifiers) != 1 || !cert.PolicyIdentifiers[0].Equal(template.PolicyIdentifiers[0]) {
438 t.Errorf("%s: failed to parse policy identifiers: got:%#v want:%#v", test.name, cert.PolicyIdentifiers, template.PolicyIdentifiers)
441 if len(cert.PermittedDNSDomains) != 2 || cert.PermittedDNSDomains[0] != ".example.com" || cert.PermittedDNSDomains[1] != "example.com" {
442 t.Errorf("%s: failed to parse name constraints: %#v", test.name, cert.PermittedDNSDomains)
445 if cert.Subject.CommonName != commonName {
446 t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName
    [all...]

Completed in 655 milliseconds

<<11121314151617181920>>