/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 34 import com.android.org.bouncycastle.cert.X509CertificateHolder; 35 import com.android.org.bouncycastle.cert.X509v3CertificateBuilder; 36 import com.android.org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 37 import com.android.org.bouncycastle.cert.ocsp.BasicOCSPResp; 38 import com.android.org.bouncycastle.cert.ocsp.BasicOCSPRespBuilder; 39 import com.android.org.bouncycastle.cert.ocsp.CertificateID; 40 import com.android.org.bouncycastle.cert.ocsp.CertificateStatus; 41 import com.android.org.bouncycastle.cert.ocsp.OCSPResp; 42 import com.android.org.bouncycastle.cert.ocsp.OCSPRespBuilder; 43 import com.android.org.bouncycastle.cert.ocsp.RevokedStatus 885 X509Certificate cert = (X509Certificate) c; local 1052 X509Certificate cert = (X509Certificate)src.getCertificate(alias); local 1075 X509Certificate cert = (X509Certificate)src.getCertificate(alias); local [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
KeyStoreTestSupport.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException;
|
/system/vold/ |
Android.mk | 78 # TODO: include "cert-err34-c" once we move to Binder 79 # TODO: include "cert-err58-cpp" once 36656327 is fixed 80 common_local_tidy_flags := -warnings-as-errors=clang-analyzer-security*,cert-* 81 common_local_tidy_checks := -*,clang-analyzer-security*,cert-*,-cert-err34-c,-cert-err58-cpp
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CertImpl.java | 32 import java.security.cert.*; 33 import java.security.cert.Certificate; 301 * @param derVal the der value containing the encoded cert. 319 * @param derVal the der value containing the encoded cert. 517 * Called from java.security.cert.X509Certificate.verify(PublicKey key, 520 public static void verify(X509Certificate cert, PublicKey key, 523 cert.verify(key, sigProvider); 832 // the strongly typed gets, as per java.security.cert.X509Certificate [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 301 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 424 if (priv->cert) 425 CertFreeCertificateContext(priv->cert); 452 if (strncmp(name, "cert://", 7) == 0) { 487 X509 *cert = NULL; local 493 (strncmp(name, "cert://", 7) != 0 && 507 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 508 if (priv->cert == NULL) { 509 priv->cert = cryptoapi_find_cert( 512 if (priv->cert == NULL) 590 X509 *cert; local 1674 struct wpabuf *cert = NULL; local 1697 struct wpabuf *cert = NULL; local 1840 struct wpabuf *cert; local 2056 X509 *cert = d2i_X509(NULL, local 2465 X509 *cert; local 2653 X509 *cert; member in struct:__anon39433 2684 X509 *cert; local 2711 X509 *cert; local 3814 X509 *cert; local [all...] |
/external/libcups/cups/ |
tls-gnutls.c | 35 /* Server cert keychain path */ 73 cups_file_t *fp; /* Key/cert file */ 370 gnutls_x509_crt_t cert; /* Certificate */ local 374 cert = http_gnutls_create_credential((http_credential_t *)cupsArrayFirst(credentials)); 375 if (cert) 377 result = gnutls_x509_crt_check_hostname(cert, common_name) != 0; 385 size_t cserial_size, /* Size of cert serial number */ 395 gnutls_x509_crt_get_serial(cert, cserial, &cserial_size); 411 gnutls_x509_crt_deinit(cert); 431 gnutls_x509_crt_t cert; /* Certificate * local 604 gnutls_x509_crt_t cert; \/* Certificate *\/ local 632 gnutls_x509_crt_t cert; \/* Certificate *\/ local 872 gnutls_x509_crt_t cert; \/* Certificate *\/ local [all...] |
/external/python/cpython2/Lib/test/ |
test_ssl.py | 63 # cert with all kinds of subject alt names 388 """Wrapping with an empty cert file""" 400 def ok(cert, hostname): 401 ssl.match_hostname(cert, hostname) 402 def fail(cert, hostname): 404 ssl.match_hostname, cert, hostname) 406 cert = {'subject': ((('commonName', 'example.com'),),)} 407 ok(cert, 'example.com') 408 ok(cert, 'ExAmple.cOm') 409 fail(cert, 'www.example.com' [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
CaCertManagementTest.java | 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.X509Certificate; 52 * Test: a valid cert should be installable and also removable. 119 * Whether a given cert, or one a lot like it, has been installed system-wide and is available
|
/external/boringssl/src/crypto/x509/ |
x509_test.cc | 455 for (auto cert : certs) { 456 if (!sk_X509_push(stack.get(), cert)) { 459 X509_up_ref(cert); [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
RespData.java | 1 package org.bouncycastle.cert.ocsp;
|
RevokedStatus.java | 1 package org.bouncycastle.cert.ocsp;
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustManagerFactoryImpl.java | 42 import java.security.cert.CertificateException;
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CTPolicyImpl.java | 19 import java.security.cert.X509Certificate;
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CertificatePinning.java | 23 import java.security.cert.Certificate;
|
/external/vboot_reference/tests/ |
gen_test_keys.sh | 33 ${BIN_DIR}/dumpRSAPublicKey -cert ${key_base}.crt \
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 139 X509* cert = NULL; local 144 if (argc != 3 || (strcmp(argv[1], "-cert") && strcmp(argv[1], "-pub"))) { 150 fprintf(stderr, "Usage: %s <-cert | -pub> <file>\n", progname); 154 if (!strcmp(argv[1], "-cert")) 166 if (!PEM_read_X509(fp, &cert, NULL, NULL)) { 172 key = X509_get_pubkey(cert); 192 X509_free(cert);
|
/frameworks/base/keystore/java/android/security/keystore/ |
AttestationUtils.java | 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 184 for (final byte[] cert : rawChain) { 185 concatenatedRawChain.write(cert);
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
CertPathTrustManagerParametersTest.java | 20 import java.security.cert.CertPathParameters; 34 * CertPathTrustManagerParameters(java.security.cert.CertPathParameters)
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateRevocationExceptionTest.java | 17 package tests.security.cert; 24 import java.security.cert.CRLReason; 25 import java.security.cert.CertificateRevokedException; 26 import java.security.cert.Extension;
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertificateFactorySpi.java | 26 package java.security.cert; 48 * instance of {@code java.security.cert.X509Certificate}, and CRLs 49 * that are an instance of {@code java.security.cert.X509CRL}. 239 * java.security.cert.Certificate objects 308 * java.security.cert.CRL objects initialized with the data from the input
|
LDAPCertStoreParameters.java | 26 package java.security.cert;
|
PKIXBuilderParameters.java | 26 package java.security.cert; 99 * {@code java.security.cert.TrustAnchor}
|
PKIXCertPathBuilderResult.java | 26 package java.security.cert;
|
PKIXCertPathValidatorResult.java | 26 package java.security.cert;
|
/libcore/ojluni/src/main/java/java/util/jar/ |
JarEntry.java | 31 import java.security.cert.Certificate;
|