/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 8 // 'cert.pem' and 'key.pem' and will overwrite existing files. 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 145 certOut, err := os.Create("cert.pem") 147 log.Fatalf("failed to open cert.pem for writing: %s", err) 151 log.Print("written cert.pem\n")
|
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 47 priv, ok := cert.PrivateKey.(crypto.Decrypter) 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 78 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret) 192 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 257 priv, ok := cert.PrivateKey.(crypto.Signer) 301 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 337 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error [all...] |
tls.go | 196 var cert Certificate 205 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 211 if len(cert.Certificate) == 0 { 241 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes) 248 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 263 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 274 return cert, nil
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 8 // 'cert.pem' and 'key.pem' and will overwrite existing files. 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 145 certOut, err := os.Create("cert.pem") 147 log.Fatalf("failed to open cert.pem for writing: %s", err) 151 log.Print("written cert.pem\n")
|
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 47 priv, ok := cert.PrivateKey.(crypto.Decrypter) 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 78 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret) 192 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 257 priv, ok := cert.PrivateKey.(crypto.Signer) 301 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 337 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error [all...] |
tls.go | 196 var cert Certificate 205 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 211 if len(cert.Certificate) == 0 { 241 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes) 248 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 263 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 274 return cert, nil
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
AbstractSessionContext.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateEncodingException; 26 import java.security.cert.X509Certificate; 229 for (Certificate cert : certs) { 230 data = cert.getEncoded();
|
/external/libvncserver/webclients/java-applet/ssl/ |
SignedVncViewer.jar | |
VncViewer.jar | |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
CertificateMonitor.java | 48 import java.security.cert.CertificateException; 49 import java.security.cert.CertificateFactory; 50 import java.security.cert.X509Certificate; 83 X509Certificate cert = parseCert(certBuffer); local 84 pemCert = Credentials.convertToPem(cert); 86 Log.e(LOG_TAG, "Problem converting cert", ce);
|
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
NetworkSecurityConfigTests.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); external variable declarations 90 TEST_CA_CERT = (X509Certificate) cert;
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 25 import java.security.cert.CertificateException; 26 import java.security.cert.PKIXBuilderParameters; 27 import java.security.cert.PKIXParameters; 28 import java.security.cert.X509CertSelector; 29 import java.security.cert.X509Certificate; 249 // unlike PKIXParameters(KeyStore), the cert chain of the key should be trusted.
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CRLEntryImpl.java | 29 import java.security.cert.CRLException; 30 import java.security.cert.CRLReason; 31 import java.security.cert.X509CRLEntry; 506 public Map<String, java.security.cert.Extension> getExtensions() { 511 Map<String, java.security.cert.Extension> map = new TreeMap<>();
|
X509CRLImpl.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.X509CRL; 43 import java.security.cert.X509Certificate; 44 import java.security.cert.X509CRLEntry; 45 import java.security.cert.CRLException; 448 * Called from java.security.cert.X509CRL.verify(PublicKey key, 604 * @param cert the certificate to check for. 608 public boolean isRevoked(Certificate cert) { 609 if (revokedMap.isEmpty() || (!(cert instanceof X509Certificate))) { 612 X509Certificate xcert = (X509Certificate) cert; [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
X509KeyManagerTest.java | 9 import java.security.cert.CertificateFactory; 10 import java.security.cert.X509Certificate; 31 private X509Certificate[] cert; field in class:X509KeyManagerTest [all...] |
/external/boringssl/src/ssl/ |
ssl_lib.c | 260 ret->cert = ssl_cert_new(method->x509_method); 261 if (ret->cert == NULL) { 339 ssl_cert_free(ctx->cert); 382 ssl->cert = ssl_cert_dup(ctx->cert); 383 if (ssl->cert == NULL) { 480 ssl_cert_free(ssl->cert); [all...] |
/external/webrtc/webrtc/base/ |
openssladapter.cc | 875 X509* cert = X509_STORE_CTX_get_current_cert(store); local 880 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 882 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 898 void* cert = local 900 if (custom_verify_callback_(cert)) { 909 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain"; 917 // Add the root cert that we care about to the SSL context 922 X509* cert = d2i_X509(NULL, &cert_buffer, local 924 if (cert) { [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 17 package libcore.java.security.cert; 44 import java.security.cert.CertPath; 45 import java.security.cert.Certificate; 46 import java.security.cert.CertificateEncodingException; 47 import java.security.cert.CertificateException; 48 import java.security.cert.CertificateFactory; 49 import java.security.cert.X509Certificate; 584 X509Certificate cert = certGen.generate(caKey); local 587 holder.certificate = cert;
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
DistributionPointFetcher.java | 31 import java.security.cert.*; 97 X509Certificate cert = selector.getCertificateChecking(); local 98 if (cert == null) { 102 X509CertImpl certImpl = X509CertImpl.toImpl(cert); 373 debug.println("crl issuer does not equal cert issuer.\n" + 375 "cert issuer: " + certIssuer); 405 // cert's key cannot be used to verify the CRL 488 // the names in the cRLIssuer of the cert's DP 506 // cert is not a CA cert [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 22 import java.security.cert.Certificate; 23 import java.security.cert.CertificateEncodingException; 24 import java.security.cert.CertificateException; 25 import java.security.cert.CertificateFactory; 341 Certificate cert, 347 byte[] cEnc = cert.getEncoded(); 349 dOut.writeUTF(cert.getType()); 543 Certificate cert) 554 if (c.equals(cert)) 563 if (chain != null && chain[0].equals(cert)) 717 Certificate cert = decodeCertificate(dIn); local [all...] |
/external/curl/docs/examples/ |
curlx.c | 163 static unsigned char *my_get_ext(X509 *cert, const int type, 168 accessinfo = X509_get_ext_d2i(cert, extensiontype, NULL, NULL); 198 if((ok= X509_verify_cert(ctx)) && ctx->cert) { 201 X509_print_ex(p->errorbio, ctx->cert, 0, 0); 203 if(accessinfo = my_get_ext(ctx->cert, p->accesstype, NID_sinfo_access)) { 209 else if(accessinfo = my_get_ext(ctx->cert, p->accesstype, 452 BIO_printf(p.errorbio, "no service URL in user cert "
|
/external/libcups/cups/ |
tls-sspi.c | 47 # define SECURITY_FLAG_IGNORE_CERT_DATE_INVALID 0x00002000 /* Expired X509 Cert. */ 72 static DWORD http_sspi_verify(PCCERT_CONTEXT cert, const char *common_name, DWORD dwCertFlags); 186 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local 191 if (cert) 193 if (CertNameToStr(X509_ASN_ENCODING, &(cert->pCertInfo->Subject), CERT_SIMPLE_NAME_STR, cert_name, sizeof(cert_name))) 206 CertFreeCertificateContext(cert); 251 PCCERT_CONTEXT cert = NULL; /* Certificate to validate */ local 252 DWORD certFlags = 0; /* Cert verification flags */ 259 cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); 260 if (!cert) 295 PCCERT_CONTEXT cert = http_sspi_create_credential((http_credential_t *)cupsArrayFirst(credentials)); local 335 PCCERT_CONTEXT cert; \/* Certificate *\/ local [all...] |
tls-darwin.c | 47 /* Server cert keychain */ 50 /* Temporary self-signed cert */ 53 /* Server cert keychain path */ 99 SecCertificateRef cert = NULL; /* Self-signed certificate */ local 119 DEBUG_puts("1cupsMakeServerCredentials: Using existing self-signed cert."); 177 cert = SecGenerateSelfSignedCertificate(subject, certParams, publicKey, privateKey); 182 if (!cert) 188 ident = SecIdentityCreate(kCFAllocatorDefault, cert, privateKey); 221 DEBUG_puts("1cupsMakeServerCredentials: Unable to create identity from cert and keys."); 235 if (cert) 872 SecCertificateRef cert = NULL; \/* Certificate *\/ local 989 SecCertificateRef cert = NULL; \/* Certificate *\/ local [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/ |
RealConnection.java | 48 import java.security.cert.Certificate; 49 import java.security.cert.X509Certificate; 197 X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); local 199 + "\n certificate: " + CertificatePinner.pin(cert) 200 + "\n DN: " + cert.getSubjectDN().getName() 201 + "\n subjectAltNames: " + OkHostnameVerifier.allSubjectAltNames(cert));
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 165 struct x509_certificate *cert; local 174 cert = x509_certificate_parse(buf, len); 175 if (cert == NULL) { 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 194 x509_certificate_free(cert);
|