/libcore/ojluni/src/main/java/java/security/cert/ |
CertPathBuilder.java | 26 package java.security.cert;
|
CertPathValidator.java | 26 package java.security.cert;
|
CertPathValidatorException.java | 26 package java.security.cert;
|
X509CRL.java | 26 package java.security.cert;
|
/libcore/ojluni/src/main/java/sun/security/provider/ |
X509Factory.java | 28 import java.security.cert.*; 42 * @see java.security.cert.CertificateFactorySpi 43 * @see java.security.cert.Certificate 44 * @see java.security.cert.CertPath 45 * @see java.security.cert.CRL 46 * @see java.security.cert.X509Certificate 47 * @see java.security.cert.X509CRL 94 X509CertImpl cert = getFromCache(certCache, encoding); 95 if (cert != null) { 96 return cert; [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
OCSPRequest.java | 29 import java.security.cert.Extension; 89 * to construct an unsigned OCSP Request for a single user cert.
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateException; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 76 // We must load the server cert manually (the ContentCache won't handle blobs 292 LogUtils.i(TAG, "TrackingKeyManager: requesting a client cert alias for " 302 LogUtils.i(TAG, "TrackingKeyManager: returning a null cert chain"); 388 LogUtils.i(TAG, "Requesting a client cert alias for " + Arrays.toString(keyTypes));
|
/prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.3.Final/ |
netty-handler-4.1.3.Final.jar | |
/cts/tests/tests/security/src/android/security/cts/ |
X509CertChainBuildingTest.java | 31 import java.security.cert.CertificateException; 32 import java.security.cert.CertificateFactory; 33 import java.security.cert.X509Certificate; 128 // Check that leaf1 -> rootA is preferred over using the cross signed cert when both rootA 156 // Check that when a SHA-256 and SHA-1 are available the SHA-256 cert is used
|
/external/boringssl/src/tool/ |
server.cc | 170 fprintf(stderr, "Failed to load cert chain: %s\n", key_file.c_str()); 178 bssl::UniquePtr<X509> cert = local 180 if (!cert) { 187 if (!SSL_CTX_use_certificate(ctx.get(), cert.get())) {
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedGenerator.java | 25 import org.bouncycastle.cert.X509AttributeCertificateHolder; 26 import org.bouncycastle.cert.X509CRLHolder; 27 import org.bouncycastle.cert.X509CertificateHolder;
|
CMSSignedHelper.java | 31 import org.bouncycastle.cert.X509AttributeCertificateHolder; 32 import org.bouncycastle.cert.X509CRLHolder; 33 import org.bouncycastle.cert.X509CertificateHolder;
|
CMSUtils.java | 34 import org.bouncycastle.cert.X509AttributeCertificateHolder; 35 import org.bouncycastle.cert.X509CRLHolder; 36 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/ |
sslproxy_test.py | 44 context.set_verify(certutils.VERIFY_PEER, self.verify_cb) # Demand a cert 140 self.cert_path = self._temp_dir + 'testCA-cert.cer' 142 self.wrong_cert_path = self._temp_dir + 'wrong-cert.cer' 154 def verify_cb(self, conn, cert, errnum, depth, ok): 159 cert: x509 object 166 self.assertFalse(cert.has_expired()) 168 cert.get_notBefore())
|
/external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/ |
TestKeyManager.java | 23 import java.security.cert.X509Certificate; 129 for (X509Certificate cert : certs) { 130 out.print(cert.getSubjectDN());
|
/external/curl/tests/ |
secureserver.pl | 253 print "pem cert file: $certfile\n"; 275 print STUNCONF "cert = $certfile\n"; 305 print "cert = $certfile\n";
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
CsrUtil.java | 20 import java.security.cert.X509Certificate; 91 X509Certificate cert = certGen.generate(rootPair.getPrivate()); local 92 return cert;
|
/external/ipsec-tools/src/racoon/ |
oakley.c | 1350 /* get peer's cert */ 1355 "no peer's CERT payload found.\n"); 1364 "no peer's CERT file found.\n"); 1368 /* don't use cached cert */ 1678 vchar_t *cert = NULL; local 1762 vchar_t *cert = NULL; local 2263 X509 *cert = sk_X509_value(certs,i); local [all...] |
crypto_openssl.c | 461 eay_check_x509cert(cert, CApath, CAfile, local) 462 vchar_t *cert; 530 x509 = mem2x509(cert); 650 eay_get_x509asn1subjectname(cert) 651 vchar_t *cert; 658 bp = (unsigned char *) cert->v; 660 x509 = mem2x509(cert); 694 eay_get_x509subjectaltname(cert, altname, type, pos) 695 vchar_t *cert; 709 x509 = mem2x509(cert); 900 vchar_t *cert; local [all...] |
/external/libvncserver/libvncserver/ |
rfbssl_gnutls.c | 87 struct rfbssl_ctx *rfbssl_init_global(char *key, char *cert) 98 } else if ((ret = gnutls_certificate_set_x509_trust_file(ctx->x509_cred, cert, GNUTLS_X509_FMT_PEM)) < 0) { 100 } else if (!GNUTLS_E_SUCCESS == (ret = gnutls_certificate_set_x509_key_file(ctx->x509_cred, cert, key, GNUTLS_X509_FMT_PEM))) {
|
/external/openssh/ |
auth2-hostbased.c | 226 if ((fp = sshkey_fingerprint(key->cert->signature_key, 230 "%s CA %s from %s@%s", key->cert->key_id, 231 key_type(key->cert->signature_key), fp,
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateException; 39 import java.security.cert.CertificateFactory;
|
KeyStoreSpiTest.java | 36 import java.security.cert.Certificate; 37 import java.security.cert.CertificateEncodingException; 38 import java.security.cert.CertificateException;
|
/prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.6.Final/ |
netty-handler-4.1.6.Final.jar | |
/external/libvncserver/webclients/java-applet/ssl/ |
SignedUltraViewerSSL.jar | |