/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory3Test.java | 22 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.CertPath; 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 38 import org.apache.harmony.security.tests.support.cert.TestUtils; 54 public static String fileCertPathPki = "java/security/cert/CertPath.PkiPath"; 106 Certificate cert = certFs[0] 115 assertEquals("Incorrect Certificate in Collection", cert, it.next()); 127 Certificate cert = certFs[0] 131 list.add(cert); [all...] |
H A D | CertificateFactory4Test.java | 18 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.CRL; 28 import java.security.cert.CRLException; 29 import java.security.cert.CertificateException; 30 import java.security.cert.CertificateFactory; 52 * @tests java.security.cert.CertificateFactory#generateCertificate(java.io.InputStream) 56 // Test for method java.security.cert.Certificate 57 // java.security.cert.CertificateFactory.generateCertificate(java.io.InputStream) 83 * @tests java.security.cert.CertificateFactory#generateCertificates(java.io.InputStream) 106 * @tests java.security.cert [all...] |
H A D | CertificateParsingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertificateParsingException;
|
H A D | CertificateTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException; 32 import org.apache.harmony.security.tests.support.cert.MyCertificate; 42 * Meaningless cert encoding just for testing purposes
|
H A D | CollectionCertStoreParametersTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertStoreParameters; 25 import java.security.cert.CollectionCertStoreParameters; 29 import org.apache.harmony.security.tests.support.cert.MyCertificate;
|
H A D | LDAPCertStoreParametersTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CertStoreParameters; 25 import java.security.cert.LDAPCertStoreParameters; 30 * Tests for <code>java.security.cert.LDAPCertStoreParameters</code>
|
H A D | PKIXCertPathValidatorResultTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 26 import java.security.cert.PKIXCertPathValidatorResult; 27 import java.security.cert.PolicyNode; 28 import java.security.cert.TrustAnchor; 33 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
H A D | PolicyQualifierInfoTest.java | 21 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.PolicyQualifierInfo;
|
H A D | TrustAnchorTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 27 import java.security.cert.TrustAnchor; 28 import java.security.cert.X509Certificate; 35 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
H A D | X509CRLEntryTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 25 import java.security.cert.CRLException; 26 import java.security.cert.X509CRLEntry;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertStore_ImplTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 29 import java.security.cert.CRLSelector; 30 import java.security.cert.CertSelector; 31 import java.security.cert.CertStore; 32 import java.security.cert.CertStoreException; 33 import java.security.cert.CertStoreParameters; 34 import java.security.cert.X509CRLSelector; 35 import java.security.cert.X509CertSelector; 40 import org.apache.harmony.security.tests.support.cert.MyCertStoreParameters; 52 private static final String CertStoreProviderClass = "org.apache.harmony.security.tests.support.cert [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertPathImplTest.java | 22 package org.apache.harmony.security.tests.provider.cert; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 38 import org.apache.harmony.security.provider.cert.X509CertPathImpl; 67 * @tests org.apache.harmony.security.provider.cert.X509CertPathImpl.X509CertPathImpl(List) 75 * @tests org.apache.harmony.security.provider.cert.X509CertPathImpl.getInstance(InputStream) 86 * @tests org.apache.harmony.security.provider.cert [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyKeyStoreSpi.java | 33 import java.security.cert.Certificate; 34 import java.security.cert.CertificateException; 74 public void engineSetCertificateEntry(String alias, Certificate cert) argument 105 public String engineGetCertificateAlias(Certificate cert) { argument
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
H A D | MyCertificateFactorySpi.java | 22 package org.apache.harmony.security.tests.support.cert; 26 import java.security.cert.CRL; 27 import java.security.cert.CRLException; 28 import java.security.cert.CertPath; 29 import java.security.cert.Certificate; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactorySpi;
|
H A D | TestUtils.java | 22 package org.apache.harmony.security.tests.support.cert; 32 import java.security.cert.CertPathValidatorException; 33 import java.security.cert.CertStore; 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.CollectionCertStoreParameters; 38 import java.security.cert.PKIXCertPathChecker; 39 import java.security.cert.PolicyNode; 40 import java.security.cert [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/provider/cert/ |
H A D | CertFactoryTestData.java | 22 package org.apache.harmony.security.tests.support.provider.cert;
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | AbstractVerifier.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateParsingException; 40 import java.security.cert.X509Certificate; 110 public final void verify(String host, X509Certificate cert) argument 112 String[] cns = getCNs(cert); 113 String[] subjectAlts = getDNSSubjectAlts(cert); 204 public static String[] getCNs(X509Certificate cert) { argument 228 String subjectPrincipal = cert.getSubjectX500Principal().toString(); 258 * @param cert X509Certificate 261 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument [all...] |
/external/chromium/chrome/browser/net/ |
H A D | url_request_mock_net_error_job.cc | 85 const std::vector<int>& errors, net::X509Certificate* cert, 89 ssl_cert_(cert) { 84 URLRequestMockNetErrorJob(net::URLRequest* request, const std::vector<int>& errors, net::X509Certificate* cert, const FilePath& file_path) argument
|
/external/chromium/chrome/browser/ |
H A D | plugin_download_helper.cc | 55 net::X509Certificate* cert) { 56 net::URLRequest::Delegate::OnSSLCertificateError(request, cert_error, cert); 52 OnSSLCertificateError( net::URLRequest* request, int cert_error, net::X509Certificate* cert) argument
|
/external/chromium/chrome/browser/ssl/ |
H A D | ssl_client_auth_handler.cc | 53 // thread that we have selected a cert. 54 void SSLClientAuthHandler::CertificateSelected(net::X509Certificate* cert) { argument 55 VLOG(1) << this << " CertificateSelected " << cert; 58 SSLClientAuthNotificationDetails details(cert_request_info_, cert); 64 CertificateSelectedNoNotify(cert); 67 // Notifies the IO thread that we have selected a cert. 69 net::X509Certificate* cert) { 70 VLOG(1) << this << " CertificateSelectedNoNotify " << cert; 74 this, &SSLClientAuthHandler::DoCertificateSelected, cert)); 77 void SSLClientAuthHandler::DoCertificateSelected(net::X509Certificate* cert) { argument 68 CertificateSelectedNoNotify( net::X509Certificate* cert) argument [all...] |
H A D | ssl_error_info.cc | 30 net::X509Certificate* cert, 45 cert->GetDNSNames(&dns_names); 49 if (dns_names[i] == cert->subject().common_name) 66 UTF8ToUTF16(cert->subject().common_name), 73 if (cert->HasExpired()) { 84 // valid as there is still a very unlikely chance that the cert might 260 scoped_refptr<net::X509Certificate> cert = NULL; local 265 if (!cert.get()) { 266 bool r = CertStore::GetInstance()->RetrieveCert(cert_id, &cert); 270 errors->push_back(SSLErrorInfo::CreateError(kErrorTypes[i], cert, ur 29 CreateError(ErrorType error_type, net::X509Certificate* cert, const GURL& request_url) argument [all...] |
/external/chromium/chrome/browser/ui/ |
H A D | crypto_module_password_dialog_nss.cc | 149 void UnlockCertSlotIfNecessary(net::X509Certificate* cert, argument 155 cert->os_cert_handle()->slot));
|
/external/chromium/net/base/ |
H A D | cert_database_openssl.cc | 20 int CertDatabase::CheckUserCert(X509Certificate* cert) { argument 21 if (!cert) 23 if (cert->HasExpired()) 27 X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle())))) 33 int CertDatabase::AddUserCert(X509Certificate* cert) { argument 78 bool CertDatabase::DeleteCertAndKey(const X509Certificate* cert) { argument 84 unsigned int CertDatabase::GetCertTrust(const X509Certificate* cert, argument 91 bool CertDatabase::SetCertTrust(const X509Certificate* cert, argument
|
H A D | ssl_config_service.h | 26 // Returns true if |cert| is one of the certs in |allowed_bad_certs|. 27 bool IsAllowedBadCert(X509Certificate* cert) const; 68 scoped_refptr<X509Certificate> cert; member in struct:net::SSLConfig::CertAndStatus 72 // Add any known-bad SSL certificate (with its cert status) to
|
H A D | x509_cert_types.cc | 56 X509Certificate* cert) const { 60 if (denied_.find(cert->fingerprint()) != denied_.end()) { 62 DCHECK(allowed_.find(cert->fingerprint()) == allowed_.end()); 66 if (allowed_.find(cert->fingerprint()) != allowed_.end()) { 68 DCHECK(denied_.find(cert->fingerprint()) == denied_.end()); 72 // We don't have a policy for this cert. 76 void CertPolicy::Allow(X509Certificate* cert) { argument 77 // Put the cert in the allowed set and (maybe) remove it from the denied set. 78 denied_.erase(cert->fingerprint()); 79 allowed_.insert(cert 82 Deny(X509Certificate* cert) argument [all...] |