/external/libmicrohttpd/src/testcurl/https/ |
tls_test_common.h | 127 gnutls_datum_t * cert, 133 gnutls_datum_t * cert,
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
CertificateChainCleaner.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.X509Certificate; 69 // If this cert has been signed by a trusted cert, use that. Add the trusted certificate to 78 return result; // The self-signed cert is a root CA. We're done. 95 // We've reached the end of the chain. If any cert in the chain is trusted, we're done. 101 throw new SSLPeerUnverifiedException("Failed to find a trusted cert that signed " + toVerify);
|
/external/webrtc/talk/app/webrtc/ |
statscollector.h | 113 const rtc::SSLCertificate* cert, const StatsReport* issuer); 122 StatsReport* AddCertificateReports(const rtc::SSLCertificate* cert);
|
/external/webrtc/webrtc/base/ |
sslfingerprint.cc | 32 const std::string& algorithm, const rtc::SSLCertificate* cert) { 35 bool ret = cert->ComputeDigest(
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 280 struct x509_certificate *cert) 294 cert_buf = wpabuf_alloc_copy(cert->cert_start, 295 cert->cert_len); 296 ev.peer_cert.cert = cert_buf; 312 x509_name_string(&cert->subject, subject, sizeof(subject)); 321 struct x509_certificate *cert, 329 if (!conn->event_cb || !cert) 334 x509_name_string(&cert->subject, subject, sizeof(subject)); 338 cert_buf = wpabuf_alloc_copy(cert->cert_start, 339 cert->cert_len) 352 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 825 struct x509_certificate *cert; local [all...] |
tlsv1_client_write.c | 27 struct x509_certificate *cert; local 32 cert = conn->cred->cert; 33 while (cert) { 34 len += 3 + cert->cert_len; 35 if (x509_certificate_self_signed(cert)) 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 38 &cert->issuer); 266 struct x509_certificate *cert; local 292 cert = conn->cred ? conn->cred->cert : NULL [all...] |
tlsv1_server_write.c | 27 struct x509_certificate *cert; local 29 cert = conn->cred->cert; 30 while (cert) { 31 len += 3 + cert->cert_len; 32 if (x509_certificate_self_signed(cert)) 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 35 &cert->issuer); 191 struct x509_certificate *cert; local 225 cert = conn->cred->cert [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLSessionBindingEventTest.java | 21 import java.security.cert.Certificate; 27 import javax.security.cert.X509Certificate;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathValidator1Test.java | 23 package tests.security.cert; 32 import java.security.cert.CertPathParameters; 33 import java.security.cert.CertPathValidator; 34 import java.security.cert.CertPathValidatorException; 35 import java.security.cert.CertPathValidatorSpi; 36 import java.security.cert.CertificateException; 38 import org.apache.harmony.security.tests.support.cert.MyCertPath; 39 import org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi;
|
CertificateFactory4Test.java | 18 package tests.security.cert; 33 import java.security.cert.CRL; 34 import java.security.cert.CRLException; 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 55 * java.security.cert.CertificateFactory#generateCertificate(java.io.InputStream) 59 // Test for method java.security.cert.Certificate 60 // java.security.cert.CertificateFactory.generateCertificate(java.io.InputStream) 86 * java.security.cert.CertificateFactory#generateCertificates(java.io.InputStream [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_bsd.go | 12 "/etc/ssl/cert.pem", // OpenBSD
|
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 36 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i); 37 if (cert == NULL) { 43 err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data); 116 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, j); 117 if (cert == NULL) { 124 // configures "Never Trust" on such a cert, it will also be found in the 134 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings); 161 CFDataRef subjectName = SecCertificateCopyNormalizedSubjectContent(cert, &errRef); 166 CFDataRef issuerName = SecCertificateCopyNormalizedIssuerContent(cert, &errRef) [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_bsd.go | 12 "/etc/ssl/cert.pem", // OpenBSD
|
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 36 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i); 37 if (cert == NULL) { 43 err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data); 116 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, j); 117 if (cert == NULL) { 124 // configures "Never Trust" on such a cert, it will also be found in the 134 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings); 161 CFDataRef subjectName = SecCertificateCopyNormalizedSubjectContent(cert, &errRef); 166 CFDataRef issuerName = SecCertificateCopyNormalizedIssuerContent(cert, &errRef) [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
KeyManagerImpl.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.X509Certificate; 162 final Certificate cert = chain[0]; local 163 final String certKeyAlg = cert.getPublicKey().getAlgorithm(); 164 final String certSigAlg = (cert instanceof X509Certificate 165 ? ((X509Certificate) cert).getSigAlgName().toUpperCase(Locale.US)
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 75 * key and be of type java.security.cert.X509Certificate, String, 128 } else { // public key was null. perhaps they gave us a X509 cert. 154 X509Certificate cert = (X509Certificate)fac.generateCertificate(in); local 155 return cert.getPublicKey(); 162 X509Certificate cert = (X509Certificate)fac.generateCertificate(in); local 163 return cert.getPublicKey();
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
WiFiKeyManager.java | 12 import java.security.cert.Certificate; 13 import java.security.cert.X509Certificate; 45 Certificate cert = mKeyStore.getCertificate(alias); local 46 if ((cert instanceof X509Certificate) && mKeyStore.getKey(alias, null) != null) { 47 X509Certificate x509Certificate = (X509Certificate) cert; 50 mAliases.put(issuer, new String[]{alias, cert.getPublicKey().getAlgorithm()});
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 415 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", 423 "Failed to read CA cert '%s' in PEM format: %s", 439 "Failed to parse CA cert in DER format: %s", 445 "Failed to parse CA cert in PEM format: %s", 486 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 500 "cert/key in PEM format: %s", 526 gnutls_datum_t cert, key; local 528 cert.data = (unsigned char *) params->client_cert_blob; 529 cert.size = params->client_cert_blob_len; 535 conn->xcred, &cert, &key, GNUTLS_X509_FMT_DER 999 gnutls_x509_crt_t cert; local [all...] |
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
PKCS7.java | 33 import java.security.cert.X509Certificate; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateEncodingException; 36 import java.security.cert.CertificateExpiredException; 37 import java.security.cert.CertificateNotYetValidException; 38 import java.security.cert.CertificateParsingException; 39 import java.security.cert.X509CRL; 40 import java.security.cert.CRLException; 41 import java.security.cert.CertificateFactory; 721 X509Certificate cert = certificates[i] local 743 X509Certificate cert = certificates[i]; local [all...] |
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
OpenSSLSocketImplTest.java | 34 import java.security.cert.CertificateException; 35 import java.security.cert.X509Certificate; 59 private X509Certificate cert; field in class:OpenSSLSocketImplTest 74 ca = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("ca-cert.pem")); 75 cert = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("cert.pem")); 77 OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("cert-ct-embedded.pem")); 78 certKey = OpenSSLKey.fromPrivateKeyPemInputStream(openTestFile("cert-key.pem")) 254 TestConnection connection = new TestConnection(new X509Certificate[] {cert, ca}, certKey); 276 TestConnection connection = new TestConnection(new X509Certificate[] {cert, ca}, certKey) [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
OpenSSLSocketImplTest.java | 35 import java.security.cert.CertificateException; 36 import java.security.cert.X509Certificate; 65 private X509Certificate cert; field in class:OpenSSLSocketImplTest 82 ca = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("ca-cert.pem")); 83 cert = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("cert.pem")); 85 openTestFile("cert-ct-embedded.pem")); 87 openTestFile("cert-key.pem")).getPrivateKey(); 299 TestConnection connection = new TestConnection(new X509Certificate[] {cert, ca}, certKey); 321 TestConnection connection = new TestConnection(new X509Certificate[] {cert, ca}, certKey, true) [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyStore.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.X509Certificate; 32 import java.security.cert.CertificateException; 206 * @see java.security.cert.Certificate 657 for (Certificate cert : chain) { 658 sb.append(cert); 757 private final Certificate cert; field in class:KeyStore.TrustedCertificateEntry 773 this.cert = trustedCert; 797 this.cert = trustedCert; 808 return cert; [all...] |
/external/boringssl/src/ssl/test/runner/ |
key_agreement.go | 40 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 66 sigAlg, err = selectSignatureAlgorithm(ka.version, cert.PrivateKey, config, clientHello.signatureAlgorithms) 72 sig, err := signMessage(ka.version, cert.PrivateKey, config, sigAlg, serverRSAParams) 97 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 117 key := cert.PrivateKey.(*rsa.PrivateKey) 135 func (ka *rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 139 func (ka *rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 161 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), sentPreMasterSecret) 305 signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error) 306 verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, params []byte, sig []byte) erro [all...] |
/external/boringssl/src/crypto/x509/ |
pkcs7.c | 116 CBS cert; local 120 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) { 124 if (CBS_len(&cert) > LONG_MAX) { 127 inp = CBS_data(&cert); 128 x509 = d2i_X509(NULL, &inp, (long)CBS_len(&cert)); 133 assert(inp == CBS_data(&cert) + CBS_len(&cert));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 14 import java.security.cert.CertificateEncodingException; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.X509Certificate; 46 * @deprecated use org.bouncycastle.cert.X509v3CertificateBuilder. 283 X509Certificate cert) 286 byte[] extValue = cert.getExtensionValue(oid); 313 X509Certificate cert) 316 this.copyAndAddExtension(oid.getId(), critical, cert); local 444 throw new ExtCertificateEncodingException("exception encoding TBS cert", e); 489 throw new ExtCertificateEncodingException("exception encoding TBS cert", e) [all...] |