/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AdaptableX509CertSelector.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.X509Certificate; 32 import java.security.cert.X509CertSelector; 33 import java.security.cert.CertificateException; 155 public boolean match(Certificate cert) { 156 X509Certificate xcert = (X509Certificate)cert; 198 if (!super.match(cert)) { 232 + "Cert's: " + Arrays.toString(certSubjectKeyID));
|
AlgorithmChecker.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.X509CRL; 41 import java.security.cert.X509Certificate; 42 import java.security.cert.PKIXCertPathChecker; 43 import java.security.cert.TrustAnchor; 44 import java.security.cert.CRLException; 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertPathValidatorException; 47 import java.security.cert.CertPathValidatorException.BasicReason; 48 import java.security.cert.PKIXReason [all...] |
ForwardBuilder.java | 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertPathValidatorException; 34 import java.security.cert.PKIXReason; 35 import java.security.cert.CertStore; 36 import java.security.cert.CertStoreException; 37 import java.security.cert.PKIXBuilderParameters; 38 import java.security.cert.PKIXCertPathChecker; 39 import java.security.cert.TrustAnchor; 40 import java.security.cert.X509Certificate; 41 import java.security.cert.X509CertSelector [all...] |
OCSP.java | 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertPathValidatorException; 35 import java.security.cert.CertPathValidatorException.BasicReason; 36 import java.security.cert.CRLReason; 37 import java.security.cert.Extension; 38 import java.security.cert.X509Certificate; 106 * @param cert the certificate to be checked 114 public static RevocationStatus check(X509Certificate cert, 120 X509CertImpl certImpl = X509CertImpl.toImpl(cert); 140 * @param cert the certificate to be checke [all...] |
/system/extras/verity/ |
generate_verity_key.c | 67 X509 *cert = NULL; local 79 cert = PEM_read_X509(f, &cert, NULL, NULL); 80 if (!cert) { 85 pkey = X509_get_pubkey(cert); 108 if (cert) { 109 X509_free(cert);
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
CTVerifierTest.java | 30 private OpenSSLX509Certificate cert; field in class:CTVerifierTest 37 ca = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("ca-cert.pem")); 38 cert = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("cert.pem")); 40 openTestFile("cert-ct-embedded.pem")); 60 OpenSSLX509Certificate[] chain = new OpenSSLX509Certificate[] { cert, ca }; 70 OpenSSLX509Certificate[] chain = new OpenSSLX509Certificate[] { cert, ca }; 89 OpenSSLX509Certificate[] chain = new OpenSSLX509Certificate[] { cert, ca }; 98 OpenSSLX509Certificate[] chain = new OpenSSLX509Certificate[] { cert, ca }; 111 OpenSSLX509Certificate[] chain = new OpenSSLX509Certificate[] { cert, ca } [all...] |
/cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/ |
AdminActionBookkeepingTest.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 34 * The CA cert below is the content of cacert.pem as generated by: 90 * Test: It should be recored whether the Profile Owner or the user installed a CA cert. 94 final Certificate cert = CertificateFactory.getInstance("X.509") local 98 // Install a CA cert. 99 assertNull(store.getCertificateAlias(cert)); 101 final String alias = store.getCertificateAlias(cert); 104 // Verify that the CA cert was marked as installed by the Profile Owner. 107 // Uninstall the CA cert [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509CertStoreSelector.java | 4 import java.security.cert.Certificate; 5 import java.security.cert.X509CertSelector; 6 import java.security.cert.X509Certificate; 16 * @deprecated use the classes under org.bouncycastle.cert.selector 34 public boolean match(Certificate cert) 36 return match((Object)cert);
|
AttributeCertificateHolder.java | 7 import java.security.cert.CertSelector; 8 import java.security.cert.Certificate; 9 import java.security.cert.CertificateEncodingException; 10 import java.security.cert.CertificateParsingException; 11 import java.security.cert.X509Certificate; 48 * @deprecated use org.bouncycastle.cert.AttributeCertificateHolder 74 public AttributeCertificateHolder(X509Certificate cert) 81 name = PrincipalUtil.getIssuerX509Principal(cert); 89 new ASN1Integer(cert.getSerialNumber()))); 328 public boolean match(Certificate cert) [all...] |
/external/curl/docs/examples/ |
cacertinmem.c | 23 * CA cert in memory with OpenSSL to get a HTTPS page. 40 X509 *cert=NULL; local 89 PEM_read_bio_X509(bio, &cert, 0, NULL); 90 if(cert == NULL) 97 if(X509_STORE_add_cert(store, cert)==0) 101 X509_free(cert);
|
usercertinmem.c | 47 X509 *cert = NULL; local 130 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); 131 if(cert == NULL) { 136 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); 169 if(cert) 170 X509_free(cert);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateCertificateRepTest.java | 1 package tests.security.cert; 5 import org.apache.harmony.security.tests.support.cert.MyCertificate; 6 import org.apache.harmony.security.tests.support.cert.TestUtils; 7 import org.apache.harmony.security.tests.support.cert.MyCertificate.MyCertificateRep; 10 import java.security.cert.Certificate;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificate.java | 23 package org.apache.harmony.security.tests.support.cert; 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.X509Extension; 38 * Stub class for <code>java.security.cert.Certificate</code> tests
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HttpsURLConnectionTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 34 import org.apache.harmony.security.tests.support.cert.TestUtils; 92 Certificate[] cert = con.getLocalCertificates(); local 93 assertNotNull(cert); 94 assertEquals(1, cert.length); 180 Certificate[] cert = con.getServerCertificates(); local 181 assertNotNull(cert); 182 assertEquals(1, cert.length) 276 Certificate cert = cf.generateCertificate(bis); local 291 Certificate cert = cf.generateCertificate(bis); local [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
KeyManagementTest.java | 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 39 import java.security.cert.Certificate; 84 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 87 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, cert, alias)); local 108 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 111 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 113 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 133 // Use assets/generate-client-cert-chain.sh to regenerate the client cert chain 167 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 194 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local 196 mDevicePolicyManager.installKeyPair(getWho(), null, cert, alias); local 210 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); local [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertBlacklistTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 66 * Tests that the path building correctly routes around a blacklisted cert where there are 67 * other valid paths available. This prevents breakage where a cert was cross signed by a 95 for (Certificate cert : collection) { 96 certs[i++] = (X509Certificate) cert;
|
ConscryptIntermediateVerificationTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.X509Certificate; 27 import java.security.cert.CertificateFactory; 54 for (Certificate cert : certs) { 55 result.add((X509Certificate) cert);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
X509ExtensionUtil.java | 4 import java.security.cert.CertificateParsingException; 5 import java.security.cert.X509Certificate; 35 public static Collection getIssuerAlternativeNames(X509Certificate cert) 38 byte[] extVal = cert.getExtensionValue(X509Extension.issuerAlternativeName.getId()); 43 public static Collection getSubjectAlternativeNames(X509Certificate cert) 46 byte[] extVal = cert.getExtensionValue(X509Extension.subjectAlternativeName.getId());
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
CertBlacklistTest.java | 21 import java.security.cert.Certificate; 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 63 /** Test that the path building correctly routes around a blacklisted cert where there are 64 * other valid paths available. This prevents breakage where a cert was cross signed by a 93 for (Certificate cert : collection) { 94 certs[i++] = (X509Certificate) cert;
|
/external/webrtc/webrtc/base/ |
fakesslidentity.h | 82 static FakeSSLCertificate* DupCert(FakeSSLCertificate cert) { 83 return cert.GetReference(); 85 static void DeleteCert(SSLCertificate* cert) { delete cert; } 96 explicit FakeSSLIdentity(const FakeSSLCertificate& cert) : cert_(cert) {}
|
/tools/apksig/src/test/java/com/android/apksig/internal/util/ |
Resources.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 71 for (Certificate cert : certs) { 72 result.add((X509Certificate) cert);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathBuilderSpi.java | 4 import java.security.cert.CertPath; 5 import java.security.cert.CertPathBuilderException; 6 import java.security.cert.CertPathBuilderResult; 7 import java.security.cert.CertPathBuilderSpi; 8 import java.security.cert.CertPathParameters; 9 import java.security.cert.CertificateParsingException; 10 import java.security.cert.PKIXBuilderParameters; 11 import java.security.cert.PKIXCertPathBuilderResult; 12 import java.security.cert.PKIXCertPathValidatorResult; 13 import java.security.cert.X509Certificate 89 X509Certificate cert; local [all...] |
RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilderException; 9 import java.security.cert.CertPathValidatorException; 10 import java.security.cert.CertificateExpiredException; 11 import java.security.cert.CertificateNotYetValidException; 12 import java.security.cert.PKIXCertPathChecker; 13 import java.security.cert.X509CRL; 14 import java.security.cert.X509CRLSelector; 15 import java.security.cert.X509CertSelector; 16 import java.security.cert.X509Certificate 897 X509Certificate cert = (X509Certificate)certs.get(index); local 1081 X509Certificate cert = (X509Certificate)certs.get(index); local 1157 X509Certificate cert = (X509Certificate)certs.get(index); local 1186 X509Certificate cert = (X509Certificate)certs.get(index); local 1287 X509Certificate cert = (X509Certificate)certs.get(index); local 1491 X509Certificate cert = (X509Certificate)certs.get(index); local 1569 X509Certificate cert = (X509Certificate)certs.get(index); local 1624 X509Certificate cert = (X509Certificate)certs.get(index); local 1678 X509Certificate cert = (X509Certificate)certs.get(index); local 2076 X509Certificate cert = (X509Certificate)certs.get(index); local 2110 X509Certificate cert = (X509Certificate)certs.get(index); local 2145 X509Certificate cert = (X509Certificate)certs.get(index); local 2168 X509Certificate cert = (X509Certificate)certs.get(index); local 2207 X509Certificate cert = (X509Certificate)certs.get(index); local 2230 X509Certificate cert = (X509Certificate)certs.get(index); local 2261 X509Certificate cert = (X509Certificate)certs.get(index); local 2284 X509Certificate cert = (X509Certificate)certs.get(index); local 2307 X509Certificate cert = (X509Certificate)certs.get(index); local 2359 X509Certificate cert = (X509Certificate)certs.get(index); local 2413 X509Certificate cert = (X509Certificate)certs.get(index); local [all...] |
CertPathValidatorUtilities.java | 9 import java.security.cert.CRLException; 10 import java.security.cert.CertPath; 11 import java.security.cert.CertPathValidatorException; 12 import java.security.cert.CertStore; 13 import java.security.cert.CertStoreException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.PolicyQualifierInfo; 17 import java.security.cert.TrustAnchor; 18 import java.security.cert.X509CRL 1211 Certificate cert = (Certificate)certs.get(index); local [all...] |
/external/libchrome/crypto/ |
scoped_test_nss_db.cc | 7 #include <cert.h> 39 if (CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), node->cert, &trust) !=
|