/libcore/luni/src/test/java/tests/java/security/ |
SecureClassLoaderTest.java | 37 import java.security.cert.Certificate;
|
/libcore/ojluni/src/main/java/java/lang/ |
ClassLoader.java | 43 import java.security.cert.Certificate; [all...] |
/libcore/ojluni/src/main/java/java/util/jar/ |
JarFile.java | 36 import java.security.cert.Certificate;
|
/prebuilts/go/darwin-x86/src/net/http/httptest/ |
server.go | 110 cert, err := tls.X509KeyPair(internal.LocalhostCert, internal.LocalhostKey) 125 s.TLS.Certificates = []tls.Certificate{cert}
|
/prebuilts/go/linux-x86/src/net/http/httptest/ |
server.go | 110 cert, err := tls.X509KeyPair(internal.LocalhostCert, internal.LocalhostKey) 125 s.TLS.Certificates = []tls.Certificate{cert}
|
/cts/tests/tests/security/src/android/security/cts/ |
OpenSSLHeartbleedTest.java | 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 265 // Load the server's private key and cert chain 278 // Initialize TLS context to use the private key and cert chain for server sockets [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
NativeCrypto.java | 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.CertificateException; 32 import java.security.cert.CertificateParsingException; [all...] |
OpenSSLEngineSocketImpl.java | 31 import java.security.cert.CertificateException;
|
/external/webrtc/webrtc/base/ |
sslstreamadapter_unittest.cc | 340 LOG(LS_INFO) << "Setting bogus digest for server cert"; 352 LOG(LS_INFO) << "Setting bogus digest for client cert"; 477 bool GetPeerCertificate(bool client, rtc::SSLCertificate** cert) { 479 return client_ssl_->GetPeerCertificate(cert); 481 return server_ssl_->GetPeerCertificate(cert); [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyPairGeneratorSpi.java | 63 import java.security.cert.CertificateEncodingException; 64 import java.security.cert.CertificateParsingException; 65 import java.security.cert.X509Certificate; [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server_test.go | 630 t.Fatalf("%s: mismatch on peer cert %d", test.name, i+1) 829 cert, _ := nameToCert[clientHello.ServerName] 830 return cert, nil 842 // GetCertificate method doesn't return a cert, we fall back to what's in [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 630 t.Fatalf("%s: mismatch on peer cert %d", test.name, i+1) 829 cert, _ := nameToCert[clientHello.ServerName] 830 return cert, nil 842 // GetCertificate method doesn't return a cert, we fall back to what's in [all...] |
/build/make/tools/releasetools/ |
common.py | 756 and return a {package: cert} dict.""" 765 name, cert, privkey = m.groups() 768 if cert in SPECIAL_CERT_STRINGS and not privkey: 769 certmap[name] = cert 770 elif (cert.endswith(OPTIONS.public_key_suffix) and 772 cert[:-public_key_suffix_len] == privkey[:-private_key_suffix_len]): 773 certmap[name] = cert[:-public_key_suffix_len] [all...] |
/external/boringssl/src/ssl/ |
handshake_client.c | [all...] |
/external/boringssl/src/crypto/x509/ |
x509_vfy.c | 199 if (ctx->cert == NULL) { 206 * This X509_STORE_CTX has already been used to verify a cert. We 221 if (ctx->chain == NULL || !sk_X509_push(ctx->chain, ctx->cert)) { 226 X509_up_ref(ctx->cert); 285 * If successful for now free up cert so it will be picked up 294 /* If we were passed a cert chain, use it first */ 425 * Free up the found cert we'll add it again later 537 * Given a STACK_OF(X509) find the issuer of cert (if any) 766 ctx->current_cert = ctx->cert; 794 X509 *x = ctx->cert; [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.X509Certificate; 247 // AndroidCAStore exposes CA cert files via the KeyStore 2506 X509Certificate cert = (X509Certificate) c; local [all...] |
AuthorizationList.java | 38 import java.security.cert.CertificateParsingException;
|
/external/curl/lib/vtls/ |
gtls.c | 452 /* set the trusted CA cert bundle file */ 460 infof(data, "error reading ca cert file %s (%s)\n", 472 /* set the trusted CA cert directory */ 477 infof(data, "error reading ca cert file %s (%s)\n", 769 gnutls_x509_crt_t cert, 786 if(NULL == cert) 793 ret = gnutls_pubkey_import_x509(key, cert, 0); 877 /* no peer cert, but auth is ok if we have SRP user and cipher and no 882 failf(data, "failed to get server cert"); 918 failf(data, "server cert verify failed: %d", rc) [all...] |
/prebuilts/go/darwin-x86/src/encoding/asn1/ |
asn1_test.go | 551 var cert Certificate 552 if _, err := Unmarshal(derEncodedSelfSignedCertBytes, &cert); err != nil { 555 if !reflect.DeepEqual(cert, derEncodedSelfSignedCert) { 556 t.Errorf("Bad result:\ngot: %+v\nwant: %+v", cert, derEncodedSelfSignedCert) 564 var cert Certificate 565 if _, err := Unmarshal(derEncodedPaypalNULCertBytes, &cert); err == nil { [all...] |
/prebuilts/go/linux-x86/src/encoding/asn1/ |
asn1_test.go | 551 var cert Certificate 552 if _, err := Unmarshal(derEncodedSelfSignedCertBytes, &cert); err != nil { 555 if !reflect.DeepEqual(cert, derEncodedSelfSignedCert) { 556 t.Errorf("Bad result:\ngot: %+v\nwant: %+v", cert, derEncodedSelfSignedCert) 564 var cert Certificate 565 if _, err := Unmarshal(derEncodedPaypalNULCertBytes, &cert); err == nil { [all...] |
/development/samples/ApiDemos/src/com/example/android/apis/security/ |
KeyStoreUsage.java | 57 import java.security.cert.CertificateException;
|
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 164 bssl::UniquePtr<X509> cert( 166 if (!cert) { 170 if (!sk_X509_push(out_chain->get(), cert.get())) { 173 cert.release(); // sk_X509_push takes ownership. [all...] |
/external/boringssl/src/ssl/test/runner/ |
common.go | [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInformation.java | 29 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PairingSession.java | 39 import java.security.cert.Certificate;
|