HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 501 - 525 of 1411) sorted by null

<<21222324252627282930>>

  /prebuilts/go/darwin-x86/src/crypto/tls/
generate_cert.go 8 // 'cert.pem' and 'key.pem' and will overwrite existing files.
34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
145 certOut, err := os.Create("cert.pem")
147 log.Fatalf("failed to open cert.pem for writing: %s", err)
151 log.Print("written cert.pem\n")
key_agreement.go 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
47 priv, ok := cert.PrivateKey.(crypto.Decrypter)
65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
78 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret)
192 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
257 priv, ok := cert.PrivateKey.(crypto.Signer)
301 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
337 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error
    [all...]
tls.go 196 var cert Certificate
205 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
211 if len(cert.Certificate) == 0 {
241 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes)
248 x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
263 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
274 return cert, nil
  /prebuilts/go/linux-x86/src/crypto/tls/
generate_cert.go 8 // 'cert.pem' and 'key.pem' and will overwrite existing files.
34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
145 certOut, err := os.Create("cert.pem")
147 log.Fatalf("failed to open cert.pem for writing: %s", err)
151 log.Print("written cert.pem\n")
key_agreement.go 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
47 priv, ok := cert.PrivateKey.(crypto.Decrypter)
65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
78 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret)
192 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
257 priv, ok := cert.PrivateKey.(crypto.Signer)
301 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
337 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error
    [all...]
tls.go 196 var cert Certificate
205 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
211 if len(cert.Certificate) == 0 {
241 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes)
248 x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
263 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
274 return cert, nil
  /external/conscrypt/common/src/main/java/org/conscrypt/
AbstractSessionContext.java 24 import java.security.cert.Certificate;
25 import java.security.cert.CertificateEncodingException;
26 import java.security.cert.X509Certificate;
229 for (Certificate cert : certs) {
230 data = cert.getEncoded();
  /external/libvncserver/webclients/java-applet/ssl/
SignedVncViewer.jar 
VncViewer.jar 
  /frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
CertificateMonitor.java 48 import java.security.cert.CertificateException;
49 import java.security.cert.CertificateFactory;
50 import java.security.cert.X509Certificate;
83 X509Certificate cert = parseCert(certBuffer); local
84 pemCert = Credentials.convertToPem(cert);
86 Log.e(LOG_TAG, "Problem converting cert", ce);
  /frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
NetworkSecurityConfigTests.java 28 import java.security.cert.Certificate;
29 import java.security.cert.CertificateFactory;
30 import java.security.cert.X509Certificate;
89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); external variable declarations
90 TEST_CA_CERT = (X509Certificate) cert;
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
TrustManagerFactoryTest.java 25 import java.security.cert.CertificateException;
26 import java.security.cert.PKIXBuilderParameters;
27 import java.security.cert.PKIXParameters;
28 import java.security.cert.X509CertSelector;
29 import java.security.cert.X509Certificate;
249 // unlike PKIXParameters(KeyStore), the cert chain of the key should be trusted.
  /libcore/ojluni/src/main/java/sun/security/x509/
X509CRLEntryImpl.java 29 import java.security.cert.CRLException;
30 import java.security.cert.CRLReason;
31 import java.security.cert.X509CRLEntry;
506 public Map<String, java.security.cert.Extension> getExtensions() {
511 Map<String, java.security.cert.Extension> map = new TreeMap<>();
X509CRLImpl.java 41 import java.security.cert.Certificate;
42 import java.security.cert.X509CRL;
43 import java.security.cert.X509Certificate;
44 import java.security.cert.X509CRLEntry;
45 import java.security.cert.CRLException;
448 * Called from java.security.cert.X509CRL.verify(PublicKey key,
604 * @param cert the certificate to check for.
608 public boolean isRevoked(Certificate cert) {
609 if (revokedMap.isEmpty() || (!(cert instanceof X509Certificate))) {
612 X509Certificate xcert = (X509Certificate) cert;
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
X509KeyManagerTest.java 9 import java.security.cert.CertificateFactory;
10 import java.security.cert.X509Certificate;
31 private X509Certificate[] cert; field in class:X509KeyManagerTest
    [all...]
  /external/boringssl/src/ssl/
ssl_lib.c 260 ret->cert = ssl_cert_new(method->x509_method);
261 if (ret->cert == NULL) {
339 ssl_cert_free(ctx->cert);
382 ssl->cert = ssl_cert_dup(ctx->cert);
383 if (ssl->cert == NULL) {
480 ssl_cert_free(ssl->cert);
    [all...]
  /external/webrtc/webrtc/base/
openssladapter.cc 875 X509* cert = X509_STORE_CTX_get_current_cert(store); local
880 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data));
882 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data));
898 void* cert = local
900 if (custom_verify_callback_(cert)) {
909 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
917 // Add the root cert that we care about to the SSL context
922 X509* cert = d2i_X509(NULL, &cert_buffer, local
924 if (cert) {
    [all...]
  /libcore/luni/src/test/java/libcore/java/security/cert/
CertificateFactoryTest.java 17 package libcore.java.security.cert;
44 import java.security.cert.CertPath;
45 import java.security.cert.Certificate;
46 import java.security.cert.CertificateEncodingException;
47 import java.security.cert.CertificateException;
48 import java.security.cert.CertificateFactory;
49 import java.security.cert.X509Certificate;
584 X509Certificate cert = certGen.generate(caKey); local
587 holder.certificate = cert;
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
DistributionPointFetcher.java 31 import java.security.cert.*;
97 X509Certificate cert = selector.getCertificateChecking(); local
98 if (cert == null) {
102 X509CertImpl certImpl = X509CertImpl.toImpl(cert);
373 debug.println("crl issuer does not equal cert issuer.\n" +
375 "cert issuer: " + certIssuer);
405 // cert's key cannot be used to verify the CRL
488 // the names in the cRLIssuer of the cert's DP
506 // cert is not a CA cert
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 22 import java.security.cert.Certificate;
23 import java.security.cert.CertificateEncodingException;
24 import java.security.cert.CertificateException;
25 import java.security.cert.CertificateFactory;
341 Certificate cert,
347 byte[] cEnc = cert.getEncoded();
349 dOut.writeUTF(cert.getType());
543 Certificate cert)
554 if (c.equals(cert))
563 if (chain != null && chain[0].equals(cert))
717 Certificate cert = decodeCertificate(dIn); local
    [all...]
  /external/curl/docs/examples/
curlx.c 163 static unsigned char *my_get_ext(X509 *cert, const int type,
168 accessinfo = X509_get_ext_d2i(cert, extensiontype, NULL, NULL);
198 if((ok= X509_verify_cert(ctx)) && ctx->cert) {
201 X509_print_ex(p->errorbio, ctx->cert, 0, 0);
203 if(accessinfo = my_get_ext(ctx->cert, p->accesstype, NID_sinfo_access)) {
209 else if(accessinfo = my_get_ext(ctx->cert, p->accesstype,
452 BIO_printf(p.errorbio, "no service URL in user cert "
  /external/libcups/cups/
tls-sspi.c 47 # define SECURITY_FLAG_IGNORE_CERT_DATE_INVALID 0x00002000 /* Expired X509 Cert. */
72 static DWORD http_sspi_verify(PCCERT_CONTEXT cert, const char *common_name, DWORD dwCertFlags);
186 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local
191 if (cert)
193 if (CertNameToStr(X509_ASN_ENCODING, &(cert->pCertInfo->Subject), CERT_SIMPLE_NAME_STR, cert_name, sizeof(cert_name)))
206 CertFreeCertificateContext(cert);
251 PCCERT_CONTEXT cert = NULL; /* Certificate to validate */ local
252 DWORD certFlags = 0; /* Cert verification flags */
259 cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials));
260 if (!cert)
295 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local
335 PCCERT_CONTEXT cert; \/* Certificate *\/ local
    [all...]
tls-darwin.c 47 /* Server cert keychain */
50 /* Temporary self-signed cert */
53 /* Server cert keychain path */
99 SecCertificateRef cert = NULL; /* Self-signed certificate */ local
119 DEBUG_puts("1cupsMakeServerCredentials: Using existing self-signed cert.");
177 cert = SecGenerateSelfSignedCertificate(subject, certParams, publicKey, privateKey);
182 if (!cert)
188 ident = SecIdentityCreate(kCFAllocatorDefault, cert, privateKey);
221 DEBUG_puts("1cupsMakeServerCredentials: Unable to create identity from cert and keys.");
235 if (cert)
872 SecCertificateRef cert = NULL; \/* Certificate *\/ local
989 SecCertificateRef cert = NULL; \/* Certificate *\/ local
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/
RealConnection.java 48 import java.security.cert.Certificate;
49 import java.security.cert.X509Certificate;
197 X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); local
199 + "\n certificate: " + CertificatePinner.pin(cert)
200 + "\n DN: " + cert.getSubjectDN().getName()
201 + "\n subjectAltNames: " + OkHostnameVerifier.allSubjectAltNames(cert));
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 165 struct x509_certificate *cert; local
174 cert = x509_certificate_parse(buf, len);
175 if (cert == NULL) {
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
194 x509_certificate_free(cert);

Completed in 1715 milliseconds

<<21222324252627282930>>