/external/webkit/Source/WebKit/android/WebCoreSupport/ |
H A D | WebUrlLoaderClient.cpp | 235 sCertificateTypeSet.insert("application/x-x509-ca-cert"); 236 sCertificateTypeSet.insert("application/x-x509-user-cert"); 376 ssl_info.cert->GetChainDEREncodedBytes(&chain_bytes); 475 void WebUrlLoaderClient::reportSslCertError(int cert_error, net::X509Certificate* cert) argument 481 cert->GetChainDEREncodedBytes(&chain_bytes);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | x509v3.h | 94 void x509_certificate_free(struct x509_certificate *cert); 98 void x509_certificate_chain_free(struct x509_certificate *cert); 100 struct x509_certificate *cert); 107 int x509_certificate_self_signed(struct x509_certificate *cert); 111 static inline void x509_certificate_free(struct x509_certificate *cert) argument 128 static inline void x509_certificate_chain_free(struct x509_certificate *cert) argument 147 static inline int x509_certificate_self_signed(struct x509_certificate *cert) argument
|
H A D | x509v3.c | 42 * @cert: Certificate to be freed 44 void x509_certificate_free(struct x509_certificate *cert) argument 46 if (cert == NULL) 48 if (cert->next) { 51 cert, cert->next); 53 x509_free_name(&cert->issuer); 54 x509_free_name(&cert->subject); 55 os_free(cert->public_key); 56 os_free(cert 65 x509_certificate_chain_free(struct x509_certificate *cert) argument 222 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 622 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 696 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 733 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument 818 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument 844 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument 926 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument 956 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 1216 struct x509_certificate *cert; local 1318 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument 1537 x509_valid_issuer(const struct x509_certificate *cert) argument 1578 struct x509_certificate *cert, *trust; local 1704 struct x509_certificate *cert; local 1719 x509_certificate_self_signed(struct x509_certificate *cert) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 52 const struct wpabuf *cert; member in struct:tls_event_data::__anon16023 58 const struct wpabuf *cert; member in struct:tls_event_data::__anon16024
|
H A D | tls_nss.c | 291 CERTCertificate *cert; local 301 cert = SSL_PeerCertificate(fd); 302 subject = CERT_NameToAscii(&cert->subject); 303 issuer = CERT_NameToAscii(&cert->issuer); 306 CERT_DestroyCertificate(cert);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 52 const struct wpabuf *cert; member in struct:tls_event_data::__anon16247 58 const struct wpabuf *cert; member in struct:tls_event_data::__anon16248
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 52 const struct wpabuf *cert; member in struct:tls_event_data::__anon16473 58 const struct wpabuf *cert; member in struct:tls_event_data::__anon16474
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertFactoryPerfTest.java | 21 package org.apache.harmony.security.tests.provider.cert; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.CertificateExpiredException; 33 import java.security.cert.CertificateNotYetValidException; 42 import java.security.cert.CertificateEncodingException; 43 import java.security.cert.X509Certificate; 49 import java.security.cert.CertificateParsingException; 343 Certificate cert = 346 certEncoding = cert.getEncoded(); 369 java.security.cert [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 9 import java.security.cert.CRLException; 10 import java.security.cert.CertPath; 11 import java.security.cert.CertPathValidatorException; 12 import java.security.cert.CertStore; 13 import java.security.cert.CertStoreException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.PKIXParameters; 17 import java.security.cert.PolicyQualifierInfo; 18 import java.security.cert 133 findTrustAnchor( X509Certificate cert, Set trustAnchors) argument 155 findTrustAnchor( X509Certificate cert, Set trustAnchors, String sigProvider) argument 240 addAdditionalStoresFromAltNames( X509Certificate cert, ExtendedPKIXParameters pkixParams) argument 272 getEncodedIssuerPrincipal( Object cert) argument 297 getSubjectPrincipal(X509Certificate cert) argument 302 isSelfIssued(X509Certificate cert) argument 962 getSerialNumber( Object cert) argument 975 getCertStatus( Date validDate, X509CRL crl, Object cert, CertStatus certStatus) argument 1183 getCompleteCRLs(DistributionPoint dp, Object cert, Date currentDate, ExtendedPKIXParameters paramsPKIX) argument 1377 findIssuerCerts( X509Certificate cert, ExtendedPKIXBuilderParameters pkixParams) argument 1422 verifyX509Certificate(X509Certificate cert, PublicKey publicKey, String sigProvider) argument [all...] |
H A D | RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilder; 9 import java.security.cert.CertPathBuilderException; 10 import java.security.cert.CertPathValidatorException; 11 import java.security.cert.CertificateExpiredException; 12 import java.security.cert.CertificateNotYetValidException; 13 import java.security.cert.PKIXCertPathChecker; 14 import java.security.cert.X509CRL; 15 import java.security.cert.X509Certificate; 16 import java.security.cert 95 processCRLB2( DistributionPoint dp, Object cert, X509CRL crl) argument 282 processCRLB1( DistributionPoint dp, Object cert, X509CRL crl) argument 434 processCRLF( X509CRL crl, Object cert, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, ExtendedPKIXParameters paramsPKIX, List certPathCerts) argument 617 processCRLA1i( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument 674 processCRLA1ii( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument 831 processCRLI( Date validDate, X509CRL deltacrl, Object cert, CertStatus certStatus, ExtendedPKIXParameters pkixParams) argument 845 processCRLJ( Date validDate, X509CRL completecrl, Object cert, CertStatus certStatus) argument 1728 checkCRL( DistributionPoint dp, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, Date validDate, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, CertStatus certStatus, ReasonsMask reasonMask, List certPathCerts) argument 1899 checkCRLs( ExtendedPKIXParameters paramsPKIX, X509Certificate cert, Date validDate, X509Certificate sign, PublicKey workingPublicKey, List certPathCerts) argument 2294 wrapupCertA( int explicitPolicy, X509Certificate cert) argument [all...] |
/external/chromium/chrome/browser/ui/gtk/ |
H A D | certificate_viewer.cc | 91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert); 95 net::X509Certificate::OSCertHandle cert); 106 // The certificate hierarchy (leaf cert first). 185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local 199 x509_certificate_model::GetUsageStrings(cert, &usages); 226 cert, alternative_text))); 230 cert, alternative_text)); 234 cert, alternative_text)); 238 cert, alternative_text)); 248 cert, alternative_tex 319 FillTreeStoreWithCertFields( GtkTreeStore* store, net::X509Certificate::OSCertHandle cert) argument 449 cert, &extensions); local 518 CreateFieldsTreeStore( net::X509Certificate::OSCertHandle cert) argument 710 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate::OSCertHandle cert) argument 717 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate* cert) argument [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 184 // Fetch the private key cert based on the request 185 $cert = $this->fetch_private_cert($request); variable 188 $privatekeyid = openssl_get_privatekey($cert); 204 // Fetch the public key cert based on the request 205 $cert = $this->fetch_public_cert($request); variable 208 $publickeyid = openssl_get_publickey($cert);
|
/external/chromium/chrome/common/net/ |
H A D | x509_certificate_model_nss.cc | 7 #include <cert.h> 44 std::string HashCert(CERTCertificate* cert, HASH_HashType algorithm, int len) { argument 47 DCHECK(NULL != cert->derCert.data); 48 DCHECK_NE(0U, cert->derCert.len); 51 SECStatus rv = HASH_HashBuf(algorithm, fingerprint, cert->derCert.data, 52 cert->derCert.len); 243 // Would like to use CERT_GetCertNicknameWithValidity on each cert 315 cert_handles->push_back(CERT_DupCertificate(node->cert));
|
/external/chromium/net/base/ |
H A D | x509_certificate.cc | 28 // Returns true if this cert fingerprint is the null (all zero) fingerprint. 60 void Insert(X509Certificate* cert); 86 // Insert |cert| into the cache. The cache does NOT AddRef |cert|. 88 void X509CertificateCache::Insert(X509Certificate* cert) { argument 91 DCHECK(!IsNullFingerprint(cert->fingerprint())) << 97 cache_[cert->fingerprint()] = cert; 177 // Else the new cert is better and will replace the old one in the cache. 181 scoped_refptr<X509Certificate> cert local 218 scoped_refptr<X509Certificate> cert = local 392 HasIntermediateCertificate(OSCertHandle cert) argument [all...] |
H A D | x509_certificate_openssl.cc | 46 certs = pkcs7_cert.get()->d.sign->cert; 48 certs = pkcs7_cert.get()->d.signed_and_enveloped->cert; 72 void ParsePrincipal(X509Certificate::OSCertHandle cert, argument 97 void ParseSubjectAltNames(X509Certificate::OSCertHandle cert, argument 99 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1); 100 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index); 122 // Maps X509_STORE_CTX_get_error() return values to our cert status flags. 244 DERCache* SetDERCache(X509Certificate::OSCertHandle cert, argument 252 // |cert|. 259 X509_set_ex_data(cert, x509_der_cache_inde 266 GetDERAndCacheIfNeeded(X509Certificate::OSCertHandle cert, DERCache* der_cache) argument 337 CalculateFingerprint(OSCertHandle cert) argument 356 X509* cert = d2i_X509(NULL, &d2i_data, length); local 463 X509* cert = sk_X509_value(chain, i); local [all...] |
H A D | x509_certificate_unittest.cc | 24 // properly verify the EV-ness of a cert, we need to check for its revocation 53 // Google's cert. 59 // webkit.org's cert. 65 // thawte.com's cert (it's EV-licious!). 303 // Test that the wildcard cert matches properly. 361 // EV cert verification requires revocation checking. 365 // any cert is EV. 491 scoped_refptr<X509Certificate> cert = local 493 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local 504 X509Certificate::CreateFromHandle(cert 525 scoped_refptr<X509Certificate> cert = local 527 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local 546 scoped_refptr<X509Certificate> cert = local 548 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local 685 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local 859 scoped_refptr<X509Certificate> cert = local 966 scoped_refptr<X509Certificate> cert = local 1012 const X509Certificate* cert = certs[i]; local [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | openssladapter.cc | 784 X509* cert = X509_STORE_CTX_get_current_cert(store); local 789 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data)); 791 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data)); 807 void* cert = local 809 if (custom_verify_callback_(cert)) { 817 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain"; 825 // Add the root cert to the SSL context 826 // TODO: this cert appears to be the wrong one. 834 X509* cert local [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | oakley.h | 169 vchar_t cert; /* pointer to the CERT */ member in struct:cert_t_tag
|
/external/openssl/apps/ |
H A D | cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 591 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n"); 652 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 723 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 726 sk_X509_push(encerts, cert); 727 cert = NULL; 1210 X509_free(cert);
|
H A D | pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 517 /* If chaining get chain from user cert */ 827 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument 836 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 874 X509 *cert; local 877 CRYPTO_push_info("cert_load(): reading one cert"); 879 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 884 sk_X509_push(sk, cert); 886 CRYPTO_push_info("cert_load(): reading one cert");
|
/external/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/external/openssl/include/openssl/ |
H A D | pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 530 const u8 *cert, size_t cert_len) 534 if (cert == NULL) { 547 cert_encoding = cert[0]; 548 cert++; 552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 677 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 529 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 564 const u8 *cert, size_t cert_len) 568 if (cert == NULL) { 581 cert_encoding = cert[0]; 582 cert++; 586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 709 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 563 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 525 const u8 *cert, size_t cert_len) 529 if (cert == NULL) { 542 cert_encoding = cert[0]; 543 cert++; 547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 672 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 524 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|