/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509CRL.java | 30 import java.security.cert.CRLException; 31 import java.security.cert.Certificate; 32 import java.security.cert.X509CRL; 33 import java.security.cert.X509CRLEntry; 34 import java.security.cert.X509Certificate; 352 public boolean isRevoked(Certificate cert) { 353 if (!(cert instanceof X509Certificate)) { 358 if (cert instanceof OpenSSLX509Certificate) { 359 osslCert = (OpenSSLX509Certificate) cert; 363 cert.getEncoded())) [all...] |
OpenSSLX509CertificateFactory.java | 22 import java.security.cert.CRL; 23 import java.security.cert.CRLException; 24 import java.security.cert.CertPath; 25 import java.security.cert.Certificate; 26 import java.security.cert.CertificateException; 27 import java.security.cert.CertificateFactorySpi; 28 import java.security.cert.X509Certificate; 37 * An implementation of {@link java.security.cert.CertificateFactory} based on BoringSSL.
|
SSLUtils.java | 44 import java.security.cert.CertificateEncodingException; 45 import java.security.cert.X509Certificate; 51 import javax.security.cert.CertificateException; 244 * Converts the peer certificates into a cert chain. 246 static javax.security.cert.X509Certificate[] toCertificateChain(X509Certificate[] certificates) 249 javax.security.cert.X509Certificate[] chain = 250 new javax.security.cert.X509Certificate[certificates.length]; 254 chain[i] = javax.security.cert.X509Certificate.getInstance(encoded);
|
SslSessionWrapper.java | 29 import java.security.cert.Certificate; 30 import java.security.cert.CertificateEncodingException; 36 import javax.security.cert.X509Certificate; 96 java.security.cert.X509Certificate[] peerCerts = 97 new java.security.cert.X509Certificate[count]; 218 private final java.security.cert.X509Certificate[] peerCertificates; 223 int port, java.security.cert.X509Certificate[] peerCertificates, 309 for (Certificate cert : peerCertificates) { 310 data = cert.getEncoded();
|
OpenSSLX509Certificate.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertificateExpiredException; 35 import java.security.cert.CertificateNotYetValidException; 36 import java.security.cert.CertificateParsingException; 37 import java.security.cert.X509Certificate; 170 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 172 if (cert instanceof OpenSSLX509Certificate) { 173 return (OpenSSLX509Certificate) cert; [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HostnameVerifierTest.java | 22 import java.security.cert.CertificateFactory; 23 import java.security.cert.X509Certificate; 159 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem 160 String cert = "-----BEGIN CERTIFICATE-----\n" local 172 InputStream in = new ByteArrayInputStream(cert.getBytes("UTF-8")); 187 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.com' -newkey rsa:512 -out cert.pem 188 String cert = "-----BEGIN CERTIFICATE-----\n" local 200 InputStream in = new ByteArrayInputStream(cert.getBytes("UTF-8")); 210 * $ cat ./cert.cnf 220 * $ openssl req -x509 -nodes -days 36500 -subj '/CN=foo.com' -config ./cert.cnf 223 String cert = "-----BEGIN CERTIFICATE-----\\n" local 260 String cert = "-----BEGIN CERTIFICATE-----\\n" local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathBuilder1Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi; 29 import org.apache.harmony.security.tests.support.cert.TestUtils; 36 import java.security.cert.CertPath; 37 import java.security.cert.CertPathBuilder; 38 import java.security.cert.CertPathBuilderException; 39 import java.security.cert.CertPathBuilderResult; 40 import java.security.cert.CertPathBuilderSpi; 41 import java.security.cert.CertPathParameters; 42 import java.security.cert.CertificateException [all...] |
CertStore2Test.java | 1 package tests.security.cert; 10 import java.security.cert.CRL; 11 import java.security.cert.CRLSelector; 12 import java.security.cert.CertSelector; 13 import java.security.cert.CertStore; 14 import java.security.cert.CertStoreException; 15 import java.security.cert.CertStoreParameters; 16 import java.security.cert.CertStoreSpi; 17 import java.security.cert.Certificate; 317 public boolean match(Certificate cert) { [all...] |
CertificateFactory2Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi; 35 import java.security.cert.CRL; 36 import java.security.cert.CRLException; 37 import java.security.cert.CertPath; 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 51 private static final String CertificateFactoryProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertificateFactorySpi"; 132 Certificate cert = certFactory.generateCertificate(dis) local [all...] |
X509CRLSelector2Test.java | 1 package tests.security.cert; 5 import org.apache.harmony.security.tests.support.cert.TestUtils; 17 import java.security.cert.CRL; 18 import java.security.cert.CRLException; 19 import java.security.cert.Certificate; 20 import java.security.cert.CertificateException; 21 import java.security.cert.CertificateFactory; 22 import java.security.cert.X509CRL; 23 import java.security.cert.X509CRLEntry; 24 import java.security.cert.X509CRLSelector 314 X509Certificate cert = (X509Certificate) certFact local 432 X509Certificate cert = (X509Certificate) certFact local [all...] |
X509CRLEntryTest.java | 23 package tests.security.cert; 30 import java.security.cert.CRLException; 31 import java.security.cert.X509CRLEntry;
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test.go | 431 cert, err := ParseCertificate(derBytes) 437 if len(cert.PolicyIdentifiers) != 1 || !cert.PolicyIdentifiers[0].Equal(template.PolicyIdentifiers[0]) { 438 t.Errorf("%s: failed to parse policy identifiers: got:%#v want:%#v", test.name, cert.PolicyIdentifiers, template.PolicyIdentifiers) 441 if len(cert.PermittedDNSDomains) != 2 || cert.PermittedDNSDomains[0] != ".example.com" || cert.PermittedDNSDomains[1] != "example.com" { 442 t.Errorf("%s: failed to parse name constraints: %#v", test.name, cert.PermittedDNSDomains) 445 if cert.Subject.CommonName != commonName { 446 t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test.go | 431 cert, err := ParseCertificate(derBytes) 437 if len(cert.PolicyIdentifiers) != 1 || !cert.PolicyIdentifiers[0].Equal(template.PolicyIdentifiers[0]) { 438 t.Errorf("%s: failed to parse policy identifiers: got:%#v want:%#v", test.name, cert.PolicyIdentifiers, template.PolicyIdentifiers) 441 if len(cert.PermittedDNSDomains) != 2 || cert.PermittedDNSDomains[0] != ".example.com" || cert.PermittedDNSDomains[1] != "example.com" { 442 t.Errorf("%s: failed to parse name constraints: %#v", test.name, cert.PermittedDNSDomains) 445 if cert.Subject.CommonName != commonName { 446 t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName [all...] |
/external/curl/lib/vtls/ |
nss.c | 57 #include <cert.h> 459 CERTCertificate *cert; local 471 cert = PK11_FindCertFromNickname(nickname, NULL); 472 if(cert) 473 CERT_DestroyCertificate(cert); 639 failf(data, "unable to load client cert: %d (%s)", err, err_name); 650 /* In case the cert file also has the key */ 830 CERTCertificate *cert) 837 subject = CERT_NameToAscii(&cert->subject); 838 issuer = CERT_NameToAscii(&cert->issuer) 862 CERTCertificate *cert; local 932 CERTCertificate *cert; local 965 CERTCertificate *cert, *cert_issuer, *issuer; local 992 CERTCertificate *cert; local 1051 struct CERTCertificateStr *cert; local [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
ticket.go | 57 for _, cert := range s.certificates { 58 length += 4 + len(cert) 77 for _, cert := range s.certificates { 78 x[0] = byte(len(cert) >> 24) 79 x[1] = byte(len(cert) >> 16) 80 x[2] = byte(len(cert) >> 8) 81 x[3] = byte(len(cert)) 82 copy(x[4:], cert) 83 x = x[4+len(cert):]
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
ticket.go | 57 for _, cert := range s.certificates { 58 length += 4 + len(cert) 77 for _, cert := range s.certificates { 78 x[0] = byte(len(cert) >> 24) 79 x[1] = byte(len(cert) >> 16) 80 x[2] = byte(len(cert) >> 8) 81 x[3] = byte(len(cert)) 82 copy(x[4:], cert) 83 x = x[4+len(cert):]
|
/external/conscrypt/testing/src/main/java/libcore/java/security/ |
TestKeyStore.java | 40 import java.security.cert.Certificate; 41 import java.security.cert.CertificateException; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 70 import org.bouncycastle.cert.X509CertificateHolder; 71 import org.bouncycastle.cert.X509v3CertificateBuilder; 72 import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; 73 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 74 import org.bouncycastle.cert.ocsp.BasicOCSPResp; 75 import org.bouncycastle.cert.ocsp.BasicOCSPRespBuilder 867 X509Certificate cert = (X509Certificate) c; local 1032 X509Certificate cert = (X509Certificate) src.getCertificate(alias); local 1055 X509Certificate cert = (X509Certificate) src.getCertificate(alias); local [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
X509CertificatePair.java | 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.CertificateException; 32 import java.security.cert.X509Certificate; 155 public void setForward(X509Certificate cert) throws CertificateException { 157 forward = cert; 163 public void setReverse(X509Certificate cert) throws CertificateException { 165 reverse = cert;
|
/external/boringssl/src/ssl/test/runner/ |
tls.go | 177 func LoadX509KeyPair(certFile, keyFile string) (cert Certificate, err error) { 191 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Certificate, err error) { 199 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 203 if len(cert.Certificate) == 0 { 220 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes) 227 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 234 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 244 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 255 priv, ok := cert.PrivateKey.(ed25519.PrivateKey [all...] |
key_agreement.go | 40 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 66 sigAlg, err = selectSignatureAlgorithm(ka.version, cert.PrivateKey, config, clientHello.signatureAlgorithms) 72 sig, err := signMessage(ka.version, cert.PrivateKey, config, sigAlg, serverRSAParams) 97 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 117 key := cert.PrivateKey.(*rsa.PrivateKey) 135 func (ka *rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 139 func (ka *rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 161 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), sentPreMasterSecret) 305 signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error) 306 verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, params []byte, sig []byte) erro [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
CertPinInstallReceiverTest.java | 35 import java.security.cert.CertificateFactory; 36 import java.security.cert.Certificate; 37 import java.security.cert.X509Certificate; 176 String signature, X509Certificate cert) throws Exception { 178 signer.initVerify(cert); 195 private String runTest(String cert, String content, String version, String required, String sig) 198 overrideCert(cert); 205 private String runTestWithoutSig(String cert, String content, String version, String required) 208 return runTest(cert, content, version, required, sig);
|
/system/extras/verity/ |
BootSignature.java | 26 import java.security.cert.X509Certificate; 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.CertificateEncodingException; 148 public void setCertificate(X509Certificate cert) 150 ASN1InputStream s = new ASN1InputStream(cert.getEncoded()); 152 publicKey = cert.getPublicKey(); 241 X509Certificate cert = Utils.loadPEMCertificate(certPath); local 242 bootsig.setCertificate(cert);
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 25 import java.security.cert.CertificateEncodingException; 26 import java.security.cert.CertificateException; 27 import java.security.cert.X509Certificate;
|
/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateFactory; 126 public javax.security.cert.X509Certificate[] getPeerCertificateChain() {
|
/libcore/ojluni/src/main/java/java/security/cert/ |
PKIXRevocationChecker.java | 25 package java.security.cert; 141 * @param cert the responder's certificate 143 public void setOcspResponderCert(X509Certificate cert) { 144 this.ocspResponderCert = cert;
|