Searched defs:cert (Results 226 - 250 of 319) sorted by relevance

1234567891011>>

/external/webkit/Source/WebKit/android/WebCoreSupport/
H A DWebUrlLoaderClient.cpp235 sCertificateTypeSet.insert("application/x-x509-ca-cert");
236 sCertificateTypeSet.insert("application/x-x509-user-cert");
376 ssl_info.cert->GetChainDEREncodedBytes(&chain_bytes);
475 void WebUrlLoaderClient::reportSslCertError(int cert_error, net::X509Certificate* cert) argument
481 cert->GetChainDEREncodedBytes(&chain_bytes);
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dx509v3.h94 void x509_certificate_free(struct x509_certificate *cert);
98 void x509_certificate_chain_free(struct x509_certificate *cert);
100 struct x509_certificate *cert);
107 int x509_certificate_self_signed(struct x509_certificate *cert);
111 static inline void x509_certificate_free(struct x509_certificate *cert) argument
128 static inline void x509_certificate_chain_free(struct x509_certificate *cert) argument
147 static inline int x509_certificate_self_signed(struct x509_certificate *cert) argument
H A Dx509v3.c42 * @cert: Certificate to be freed
44 void x509_certificate_free(struct x509_certificate *cert) argument
46 if (cert == NULL)
48 if (cert->next) {
51 cert, cert->next);
53 x509_free_name(&cert->issuer);
54 x509_free_name(&cert->subject);
55 os_free(cert->public_key);
56 os_free(cert
65 x509_certificate_chain_free(struct x509_certificate *cert) argument
222 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
622 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
696 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
733 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
818 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
844 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
926 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
956 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1216 struct x509_certificate *cert; local
1318 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
1537 x509_valid_issuer(const struct x509_certificate *cert) argument
1578 struct x509_certificate *cert, *trust; local
1704 struct x509_certificate *cert; local
1719 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls.h52 const struct wpabuf *cert; member in struct:tls_event_data::__anon16023
58 const struct wpabuf *cert; member in struct:tls_event_data::__anon16024
H A Dtls_nss.c291 CERTCertificate *cert; local
301 cert = SSL_PeerCertificate(fd);
302 subject = CERT_NameToAscii(&cert->subject);
303 issuer = CERT_NameToAscii(&cert->issuer);
306 CERT_DestroyCertificate(cert);
/external/wpa_supplicant_8/src/crypto/
H A Dtls.h52 const struct wpabuf *cert; member in struct:tls_event_data::__anon16247
58 const struct wpabuf *cert; member in struct:tls_event_data::__anon16248
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls.h52 const struct wpabuf *cert; member in struct:tls_event_data::__anon16473
58 const struct wpabuf *cert; member in struct:tls_event_data::__anon16474
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
H A DX509CertFactoryPerfTest.java21 package org.apache.harmony.security.tests.provider.cert;
31 import java.security.cert.CertificateFactory;
32 import java.security.cert.CertificateExpiredException;
33 import java.security.cert.CertificateNotYetValidException;
42 import java.security.cert.CertificateEncodingException;
43 import java.security.cert.X509Certificate;
49 import java.security.cert.CertificateParsingException;
343 Certificate cert =
346 certEncoding = cert.getEncoded();
369 java.security.cert
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DCertPathValidatorUtilities.java9 import java.security.cert.CRLException;
10 import java.security.cert.CertPath;
11 import java.security.cert.CertPathValidatorException;
12 import java.security.cert.CertStore;
13 import java.security.cert.CertStoreException;
14 import java.security.cert.Certificate;
15 import java.security.cert.CertificateParsingException;
16 import java.security.cert.PKIXParameters;
17 import java.security.cert.PolicyQualifierInfo;
18 import java.security.cert
133 findTrustAnchor( X509Certificate cert, Set trustAnchors) argument
155 findTrustAnchor( X509Certificate cert, Set trustAnchors, String sigProvider) argument
240 addAdditionalStoresFromAltNames( X509Certificate cert, ExtendedPKIXParameters pkixParams) argument
272 getEncodedIssuerPrincipal( Object cert) argument
297 getSubjectPrincipal(X509Certificate cert) argument
302 isSelfIssued(X509Certificate cert) argument
962 getSerialNumber( Object cert) argument
975 getCertStatus( Date validDate, X509CRL crl, Object cert, CertStatus certStatus) argument
1183 getCompleteCRLs(DistributionPoint dp, Object cert, Date currentDate, ExtendedPKIXParameters paramsPKIX) argument
1377 findIssuerCerts( X509Certificate cert, ExtendedPKIXBuilderParameters pkixParams) argument
1422 verifyX509Certificate(X509Certificate cert, PublicKey publicKey, String sigProvider) argument
[all...]
H A DRFC3280CertPathUtilities.java7 import java.security.cert.CertPath;
8 import java.security.cert.CertPathBuilder;
9 import java.security.cert.CertPathBuilderException;
10 import java.security.cert.CertPathValidatorException;
11 import java.security.cert.CertificateExpiredException;
12 import java.security.cert.CertificateNotYetValidException;
13 import java.security.cert.PKIXCertPathChecker;
14 import java.security.cert.X509CRL;
15 import java.security.cert.X509Certificate;
16 import java.security.cert
95 processCRLB2( DistributionPoint dp, Object cert, X509CRL crl) argument
282 processCRLB1( DistributionPoint dp, Object cert, X509CRL crl) argument
434 processCRLF( X509CRL crl, Object cert, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, ExtendedPKIXParameters paramsPKIX, List certPathCerts) argument
617 processCRLA1i( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument
674 processCRLA1ii( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument
831 processCRLI( Date validDate, X509CRL deltacrl, Object cert, CertStatus certStatus, ExtendedPKIXParameters pkixParams) argument
845 processCRLJ( Date validDate, X509CRL completecrl, Object cert, CertStatus certStatus) argument
1728 checkCRL( DistributionPoint dp, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, Date validDate, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, CertStatus certStatus, ReasonsMask reasonMask, List certPathCerts) argument
1899 checkCRLs( ExtendedPKIXParameters paramsPKIX, X509Certificate cert, Date validDate, X509Certificate sign, PublicKey workingPublicKey, List certPathCerts) argument
2294 wrapupCertA( int explicitPolicy, X509Certificate cert) argument
[all...]
/external/chromium/chrome/browser/ui/gtk/
H A Dcertificate_viewer.cc91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert);
95 net::X509Certificate::OSCertHandle cert);
106 // The certificate hierarchy (leaf cert first).
185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local
199 x509_certificate_model::GetUsageStrings(cert, &usages);
226 cert, alternative_text)));
230 cert, alternative_text));
234 cert, alternative_text));
238 cert, alternative_text));
248 cert, alternative_tex
319 FillTreeStoreWithCertFields( GtkTreeStore* store, net::X509Certificate::OSCertHandle cert) argument
449 cert, &extensions); local
518 CreateFieldsTreeStore( net::X509Certificate::OSCertHandle cert) argument
710 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate::OSCertHandle cert) argument
717 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate* cert) argument
[all...]
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
H A DOAuth.php184 // Fetch the private key cert based on the request
185 $cert = $this->fetch_private_cert($request); variable
188 $privatekeyid = openssl_get_privatekey($cert);
204 // Fetch the public key cert based on the request
205 $cert = $this->fetch_public_cert($request); variable
208 $publickeyid = openssl_get_publickey($cert);
/external/chromium/chrome/common/net/
H A Dx509_certificate_model_nss.cc7 #include <cert.h>
44 std::string HashCert(CERTCertificate* cert, HASH_HashType algorithm, int len) { argument
47 DCHECK(NULL != cert->derCert.data);
48 DCHECK_NE(0U, cert->derCert.len);
51 SECStatus rv = HASH_HashBuf(algorithm, fingerprint, cert->derCert.data,
52 cert->derCert.len);
243 // Would like to use CERT_GetCertNicknameWithValidity on each cert
315 cert_handles->push_back(CERT_DupCertificate(node->cert));
/external/chromium/net/base/
H A Dx509_certificate.cc28 // Returns true if this cert fingerprint is the null (all zero) fingerprint.
60 void Insert(X509Certificate* cert);
86 // Insert |cert| into the cache. The cache does NOT AddRef |cert|.
88 void X509CertificateCache::Insert(X509Certificate* cert) { argument
91 DCHECK(!IsNullFingerprint(cert->fingerprint())) <<
97 cache_[cert->fingerprint()] = cert;
177 // Else the new cert is better and will replace the old one in the cache.
181 scoped_refptr<X509Certificate> cert local
218 scoped_refptr<X509Certificate> cert = local
392 HasIntermediateCertificate(OSCertHandle cert) argument
[all...]
H A Dx509_certificate_openssl.cc46 certs = pkcs7_cert.get()->d.sign->cert;
48 certs = pkcs7_cert.get()->d.signed_and_enveloped->cert;
72 void ParsePrincipal(X509Certificate::OSCertHandle cert, argument
97 void ParseSubjectAltNames(X509Certificate::OSCertHandle cert, argument
99 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1);
100 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index);
122 // Maps X509_STORE_CTX_get_error() return values to our cert status flags.
244 DERCache* SetDERCache(X509Certificate::OSCertHandle cert, argument
252 // |cert|.
259 X509_set_ex_data(cert, x509_der_cache_inde
266 GetDERAndCacheIfNeeded(X509Certificate::OSCertHandle cert, DERCache* der_cache) argument
337 CalculateFingerprint(OSCertHandle cert) argument
356 X509* cert = d2i_X509(NULL, &d2i_data, length); local
463 X509* cert = sk_X509_value(chain, i); local
[all...]
H A Dx509_certificate_unittest.cc24 // properly verify the EV-ness of a cert, we need to check for its revocation
53 // Google's cert.
59 // webkit.org's cert.
65 // thawte.com's cert (it's EV-licious!).
303 // Test that the wildcard cert matches properly.
361 // EV cert verification requires revocation checking.
365 // any cert is EV.
491 scoped_refptr<X509Certificate> cert = local
493 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local
504 X509Certificate::CreateFromHandle(cert
525 scoped_refptr<X509Certificate> cert = local
527 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local
546 scoped_refptr<X509Certificate> cert = local
548 ASSERT_NE(static_cast<X509Certificate*>(NULL), cert); local
685 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local
859 scoped_refptr<X509Certificate> cert = local
966 scoped_refptr<X509Certificate> cert = local
1012 const X509Certificate* cert = certs[i]; local
[all...]
/external/chromium/third_party/libjingle/source/talk/base/
H A Dopenssladapter.cc784 X509* cert = X509_STORE_CTX_get_current_cert(store); local
789 X509_NAME_oneline(X509_get_issuer_name(cert), data, sizeof(data));
791 X509_NAME_oneline(X509_get_subject_name(cert), data, sizeof(data));
807 void* cert = local
809 if (custom_verify_callback_(cert)) {
817 LOG(LS_WARNING) << "Ignoring cert error while verifying cert chain";
825 // Add the root cert to the SSL context
826 // TODO: this cert appears to be the wrong one.
834 X509* cert local
[all...]
/external/ipsec-tools/src/racoon/
H A Doakley.h169 vchar_t cert; /* pointer to the CERT */ member in struct:cert_t_tag
/external/openssl/apps/
H A Dcms.c117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
591 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n");
652 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
723 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
726 sk_X509_push(encerts, cert);
727 cert = NULL;
1210 X509_free(cert);
H A Dpkcs12.c82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
517 /* If chaining get chain from user cert */
827 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument
836 X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
874 X509 *cert; local
877 CRYPTO_push_info("cert_load(): reading one cert");
879 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
884 sk_X509_push(sk, cert);
886 CRYPTO_push_info("cert_load(): reading one cert");
/external/openssl/crypto/pkcs12/
H A Dpkcs12.h245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
/external/openssl/include/openssl/
H A Dpkcs12.h245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Dikev2.c530 const u8 *cert, size_t cert_len)
534 if (cert == NULL) {
547 cert_encoding = cert[0];
548 cert++;
552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
677 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
529 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.c564 const u8 *cert, size_t cert_len)
568 if (cert == NULL) {
581 cert_encoding = cert[0];
582 cert++;
586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
709 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
563 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c525 const u8 *cert, size_t cert_len)
529 if (cert == NULL) {
542 cert_encoding = cert[0];
543 cert++;
547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
672 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
524 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument

Completed in 600 milliseconds

1234567891011>>