/external/webrtc/webrtc/base/ |
sslfingerprint.h | 29 const rtc::SSLCertificate* cert);
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 126 void x509_certificate_free(struct x509_certificate *cert); 137 void x509_certificate_chain_free(struct x509_certificate *cert); 143 struct x509_certificate *cert); 150 int x509_certificate_self_signed(struct x509_certificate *cert);
|
tlsv1_client_ocsp.c | 111 struct x509_certificate *cert, 233 if (serial_number_len != cert->serial_number_len || 234 os_memcmp(serial_number, cert->serial_number, 319 struct x509_certificate *cert, 339 if (tls_process_ocsp_single_response(conn, cert, issuer, 454 struct x509_certificate *cert; local 465 cert = x509_certificate_parse(hdr.payload, hdr.length); 466 if (!cert) 469 last_cert->next = cert; 470 last_cert = cert; 687 struct x509_certificate *cert; local [all...] |
/frameworks/base/core/java/android/content/pm/ |
Signature.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.X509Certificate; 176 final Certificate cert = certFactory.generateCertificate(bais); local 177 return cert.getPublicKey(); 296 final X509Certificate cert = (X509Certificate) cf.generateCertificate(is); local 297 final Signature sPrime = new Signature(cert.getEncoded()); 300 throw new CertificateException("Bounced cert length looks fishy; before [all...] |
/frameworks/base/core/java/android/net/http/ |
X509TrustManagerExtensions.java | 27 import java.security.cert.CertificateException; 28 import java.security.cert.X509Certificate; 129 public boolean isUserAddedCertificate(X509Certificate cert) { 130 return UserCertificateSource.getInstance().findBySubjectAndPublicKey(cert) != null;
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
X509TrustManagerTest.java | 4 import java.security.cert.CertificateException; 5 import java.security.cert.CertificateFactory; 6 import java.security.cert.X509Certificate; 9 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertPathHelperImpl.java | 26 package java.security.cert;
|
CollectionCertStoreParameters.java | 26 package java.security.cert;
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
X509KeyManager.java | 30 import java.security.cert.X509Certificate;
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
CertStoreHelper.java | 37 import java.security.cert.CertStore; 38 import java.security.cert.CertStoreException; 39 import java.security.cert.X509CertSelector; 40 import java.security.cert.X509CRLSelector;
|
SunCertPathBuilderException.java | 29 import java.security.cert.CertPathBuilderException;
|
OCSPResponse.java | 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateParsingException; 32 import java.security.cert.CertPathValidatorException; 33 import java.security.cert.CertPathValidatorException.BasicReason; 34 import java.security.cert.CRLReason; 35 import java.security.cert.TrustAnchor; 36 import java.security.cert.X509Certificate; 373 X509CertImpl cert = local 375 certs.add(cert); 378 debug.println("OCSP response cert #" + (i + 1) + ": " [all...] |
SunCertPathBuilder.java | 32 import java.security.cert.*; 33 import java.security.cert.CertPathValidatorException.BasicReason; 34 import java.security.cert.PKIXReason; 180 // as the first cert in the certpath - i.e. reverse 272 * For each cert in the collection, verify anything 275 * recursively for each good cert. 284 * the cert eventually fails to lead to the target and 285 * the next matching cert is tried. 288 X509Certificate cert = vertex.getCertificate(); local 291 builder.verifyCert(cert, nextState, cpList) [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
CertAttrSet.java | 30 import java.security.cert.CertificateException;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStoreSpi.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 80 public void engineSetCertificateEntry(String alias, Certificate cert) 124 public String engineGetCertificateAlias(Certificate cert) {
|
/packages/apps/Dialer/java/com/android/voicemail/impl/transcribe/grpc/ |
TranscriptionClientFactory.java | 52 private final String cert; field in class:TranscriptionClientFactory 62 this.cert = getCertificateFingerprint(context); 73 packageName, cert, configProvider.getApiKey(), configProvider.getAuthToken())); 139 private final String cert; field in class:TranscriptionClientFactory.Interceptor 148 Metadata.Key.of("X-Android-Cert", Metadata.ASCII_STRING_MARSHALLER); 152 public Interceptor(String packageName, String cert, String apiKey, String authToken) { 154 this.cert = cert; 176 if (!TextUtils.isEmpty(cert)) { 177 LogUtil.i("TranscriptionClientFactory.interceptCall", "attaching android cert"); [all...] |
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
CertInstallerHelper.java | 46 import java.security.cert.Certificate; 47 import java.security.cert.CertificateEncodingException; 48 import java.security.cert.CertificateException; 49 import java.security.cert.X509Certificate; 140 X509Certificate cert = (X509Certificate) c; local 141 if (isCa(cert)) { 142 mCaCerts.add(cert); 149 private boolean isCa(X509Certificate cert) { 151 byte[] asn1EncodedBytes = cert.getExtensionValue("2.5.29.19");
|
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 25 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch > /tmp/cert-rsa-req.pem 26 openssl req -in /tmp/cert-rsa-req.pem -pubkey -noout | openssl rsa -pubin -pubout -outform der > "$DIR/cert-rsa-pubkey.der" 27 openssl x509 -extfile "$DIR/default.cnf" -days 3650 -extensions usr_cert -req -signkey "$DIR/privkey.pem" -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > "$DIR/cert-rsa.der" 28 rm /tmp/cert-rsa-req.pem 30 openssl asn1parse -in "$DIR/cert-rsa.der" -inform d -out "$DIR/cert-rsa-tbs.der" -noout -strparse 4 31 SIG_OFFSET=$(openssl asn1parse -in "$DIR/cert-rsa.der" -inform d | tail -1 | cut -f1 -d:) 32 openssl asn1parse -in "$DIR/cert-rsa.der" -inform d -strparse "$SIG_OFFSET" -noout -out "$DIR/cert-rsa-sig.der [all...] |
/external/openssh/ |
ssh-add.c | 111 struct sshkey *public, *cert = NULL; local 132 xasprintf(&certpath, "%s-cert.pub", filename); 133 if ((r = sshkey_load_public(certpath, &cert, &comment)) != 0) { 140 if (!sshkey_equal_public(cert, public)) 144 if ((r = ssh_remove_identity(agent_fd, cert)) == 0) { 153 sshkey_free(cert); 183 struct sshkey *private, *cert; local 280 /* Skip trying to load the cert if requested */ 285 xasprintf(&certpath, "%s-cert.pub", filename); 286 if ((r = sshkey_load_public(certpath, &cert, NULL)) != 0) [all...] |
auth2-pubkey.c | 239 fp = sshkey_fingerprint(key->cert->signature_key, 242 key_type(key), key->cert->key_id, 243 (unsigned long long)key->cert->serial, 244 key_type(key->cert->signature_key), 542 match_principals_option(const char *principal_list, struct sshkey_cert *cert) 549 for (i = 0; i < cert->nprincipals; i++) { 550 if ((result = match_list(cert->principals[i], 563 const struct sshkey_cert *cert) 597 for (i = 0; i < cert->nprincipals; i++) { 598 if (strcmp(cp, cert->principals[i]) == 0) 638 const struct sshkey_cert *cert = key->cert; local [all...] |
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.Certificate; 28 import java.security.cert.X509Certificate; 219 private static PublicKey createPublicKey(String cert) throws Exception { 220 byte[] derCert = Base64.decode(cert.getBytes()); 226 private static BigInteger createSerialNumber(String cert) throws Exception { 227 byte[] derCert = Base64.decode(cert.getBytes()); 433 private static void printHash(String cert) throws Exception { 434 System.out.println("CERTIFICATE PUBLIC KEY HASH: " + getHash(createPublicKey(cert))); 437 private static void printSerial(String cert) throws Exception [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactorySpiTest.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 33 import java.security.cert.CRL; 34 import java.security.cert.CRLException; 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactorySpi; 148 Certificate cert = certFactorySpi local 150 assertNull("Result must be null", cert); 218 Certificate cert = certFactorySp local [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustManagerImpl.java | 43 import java.security.cert.CertPath; 44 import java.security.cert.CertPathValidator; 45 import java.security.cert.CertPathValidatorException; 46 import java.security.cert.Certificate; 47 import java.security.cert.CertificateException; 48 import java.security.cert.CertificateFactory; 49 import java.security.cert.CertificateParsingException; 50 import java.security.cert.PKIXCertPathChecker; 51 import java.security.cert.PKIXParameters; 52 import java.security.cert.PKIXRevocationChecker 244 final X509Certificate cert = (X509Certificate) ks.getCertificate(alias); local [all...] |
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 33 def cert_uses_sha256(cert): 34 """Check if the cert uses SHA-256 hashing algorithm.""" 36 cmd = ['openssl', 'x509', '-text', '-noout', '-in', cert] 49 def verify_package(cert, package): 65 print('Certificate: %s' % (cert,)) 93 use_sha256 = cert_uses_sha256(cert) 125 cmd = ['openssl', 'rsautl', '-verify', '-certin', '-inkey', cert,
|
/development/apps/PushApiAuthenticator/ |
Android.mk | 15 LOCAL_CERTIFICATE := $(LOCAL_PATH)/cert
|