/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
H A D | JcaX509CertificateHolder.java | 1 package org.bouncycastle.cert.jcajce; 3 import java.security.cert.CertificateEncodingException; 4 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.X509CertificateHolder; 18 * @param cert certificate to be used a the source for the holder creation. 21 public JcaX509CertificateHolder(X509Certificate cert) argument 24 super(Certificate.getInstance(cert.getEncoded()));
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
H A D | MyCRL.java | 22 package org.apache.harmony.security.tests.support.cert; 24 import java.security.cert.CRL; 25 import java.security.cert.Certificate; 28 * Stub class for <code>java.security.cert.CRL</code> tests 51 * @param cert <code>Certificate</code> to be checked 53 * @see java.security.cert.CRL#isRevoked(java.security.cert.Certificate) 55 public boolean isRevoked(Certificate cert) { argument
|
H A D | MyCertPathBuilderSpi.java | 22 package org.apache.harmony.security.tests.support.cert; 25 import java.security.cert.CertPathBuilderException; 26 import java.security.cert.CertPathBuilderResult; 27 import java.security.cert.CertPathBuilderSpi; 28 import java.security.cert.CertPathParameters;
|
H A D | MyCertPathValidatorSpi.java | 22 package org.apache.harmony.security.tests.support.cert; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertPathParameters; 27 import java.security.cert.CertPathValidatorException; 28 import java.security.cert.CertPathValidatorResult; 29 import java.security.cert.CertPathValidatorSpi;
|
H A D | MyCertStoreParameters.java | 22 package org.apache.harmony.security.tests.support.cert; 24 import java.security.cert.CertStoreParameters;
|
H A D | MyCertStoreSpi.java | 22 package org.apache.harmony.security.tests.support.cert; 25 import java.security.cert.CRLSelector; 26 import java.security.cert.CertSelector; 27 import java.security.cert.CertStoreException; 28 import java.security.cert.CertStoreParameters; 29 import java.security.cert.CertStoreSpi;
|
/external/chromium/net/base/ |
H A D | cert_database_win.cc | 19 int CertDatabase::CheckUserCert(X509Certificate* cert) { argument 20 if (!cert) 22 if (cert->HasExpired()) 27 if (!CryptFindCertificateKeyProvInfo(cert->os_cert_handle(), 0, NULL)) 33 int CertDatabase::AddUserCert(X509Certificate* cert) { argument 44 cert->os_cert_handle(), 53 CertDatabase::NotifyObserversOfUserCertAdded(cert);
|
H A D | cert_database_mac.cc | 20 int CertDatabase::CheckUserCert(X509Certificate* cert) { argument 21 if (!cert) 23 if (cert->HasExpired()) 28 OSStatus err = SecIdentityCreateWithCertificate(NULL, cert->os_cert_handle(), 31 LOG(ERROR) << "CertDatabase couldn't find private key for user cert"; 43 int CertDatabase::AddUserCert(X509Certificate* cert) { argument 47 err = SecCertificateAddToKeychain(cert->os_cert_handle(), NULL); 51 CertDatabase::NotifyObserversOfUserCertAdded(cert); 56 LOG(ERROR) << "CertDatabase failed to add cert to keychain: " << err;
|
H A D | cert_database.cc | 14 X509Certificate* cert, int err) 15 : certificate(cert), net_error(err) { 49 void CertDatabase::NotifyObserversOfUserCertAdded(const X509Certificate* cert) { argument 51 &CertDatabase::Observer::OnUserCertAdded, make_scoped_refptr(cert)); 55 const X509Certificate* cert) { 57 &CertDatabase::Observer::OnCertTrustChanged, make_scoped_refptr(cert)); 13 ImportCertFailure( X509Certificate* cert, int err) argument 54 NotifyObserversOfCertTrustChanged( const X509Certificate* cert) argument
|
H A D | cert_database.h | 45 // Note that |cert| could be NULL when called. 46 virtual void OnUserCertAdded(const X509Certificate* cert) {} argument 49 // Note that |cert| could be NULL when called. 50 virtual void OnCertTrustChanged(const X509Certificate* cert) {} argument 62 ImportCertFailure(X509Certificate* cert, int err); 75 // For SERVER_CERT, only TRUSTED_SSL makes sense, and specifies the cert is 77 // For EMAIL_CERT, only TRUSTED_EMAIL makes sense, and specifies the cert is 88 // Check whether this is a valid user cert that we have the private key for. 90 int CheckUserCert(X509Certificate* cert); 94 // the platform cert databas [all...] |
H A D | cert_database_openssl.cc | 20 int CertDatabase::CheckUserCert(X509Certificate* cert) { argument 21 if (!cert) 23 if (cert->HasExpired()) 27 X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle())))) 33 int CertDatabase::AddUserCert(X509Certificate* cert) { argument 78 bool CertDatabase::DeleteCertAndKey(const X509Certificate* cert) { argument 84 unsigned int CertDatabase::GetCertTrust(const X509Certificate* cert, argument 91 bool CertDatabase::SetCertTrust(const X509Certificate* cert, argument
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KSTrustedCertificateEntryTest.java | 24 import java.security.cert.Certificate; 26 import org.apache.harmony.security.tests.support.cert.MyCertificate; 43 Certificate cert = null; 45 new KeyStore.TrustedCertificateEntry(cert); 56 Certificate cert = new MyCertificate("TEST", new byte[10]); 58 new KeyStore.TrustedCertificateEntry(cert); 59 assertEquals("Incorrect certificate", cert, ksTCE.getTrustedCertificate()); 67 Certificate cert = new MyCertificate("TEST", new byte[10]); 69 new KeyStore.TrustedCertificateEntry(cert);
|
/external/ipsec-tools/src/racoon/ |
H A D | dnssec.c | 62 cert_t *cert = NULL; local 118 /* create cert holder */ 119 cert = oakley_newcert(); 120 if (cert == NULL) { 122 "failed to get cert buffer.\n"); 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 128 "failed to get cert buffer.\n"); 131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen); 132 cert [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/ |
H A D | X509CertificateTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert; 26 import java.security.cert.CertificateFactory; 31 import javax.security.cert.CertificateEncodingException; 32 import javax.security.cert.CertificateException; 33 import javax.security.cert.CertificateExpiredException; 34 import javax.security.cert.CertificateNotYetValidException; 35 import javax.security.cert.X509Certificate; 72 private java.security.cert.X509Certificate cert; field in class:X509CertificateTest 73 private javax.security.cert [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertPathBuilderSpiTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 25 import java.security.cert.CertPathBuilderException; 26 import java.security.cert.CertPathBuilderResult; 27 import java.security.cert.CertPathBuilderSpi; 28 import java.security.cert.CertPathParameters; 30 import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi;
|
H A D | CertStoreSpiTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 26 import java.security.cert.CRL; 27 import java.security.cert.CRLSelector; 28 import java.security.cert.CertSelector; 29 import java.security.cert.CertStoreException; 30 import java.security.cert.CertStoreSpi; 31 import java.security.cert.Certificate; 33 import org.apache.harmony.security.tests.support.cert.MyCertStoreSpi; 34 import org.apache.harmony.security.tests.support.cert.MyCertStoreParameters;
|
/external/chromium/chrome/browser/ssl/ |
H A D | ssl_host_state.cc | 26 void SSLHostState::DenyCertForHost(net::X509Certificate* cert, argument 30 cert_policy_for_host_[host].Deny(cert); 33 void SSLHostState::AllowCertForHost(net::X509Certificate* cert, argument 37 cert_policy_for_host_[host].Allow(cert); 41 net::X509Certificate* cert, const std::string& host) { 44 return cert_policy_for_host_[host].Check(cert); 40 QueryPolicy( net::X509Certificate* cert, const std::string& host) argument
|
H A D | ssl_policy_backend.cc | 26 void SSLPolicyBackend::DenyCertForHost(net::X509Certificate* cert, argument 28 ssl_host_state_->DenyCertForHost(cert, host); 31 void SSLPolicyBackend::AllowCertForHost(net::X509Certificate* cert, argument 33 ssl_host_state_->AllowCertForHost(cert, host); 37 net::X509Certificate* cert, const std::string& host) { 38 return ssl_host_state_->QueryPolicy(cert, host); 36 QueryPolicy( net::X509Certificate* cert, const std::string& host) argument
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 46 cert = x509_certificate_parse((u8 *) buf, len); 47 if (cert == NULL) { 55 certs = cert; 57 last->next = cert; 58 last = cert;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/ |
H A D | CertificateTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateFactory; 31 import org.apache.harmony.security.tests.support.cert.MyCertificate; 32 import org.apache.harmony.security.tests.support.cert.TestUtils; 50 Certificate cert = cf.generateCertificate(new ByteArrayInputStream( 53 SerializationTest.verifySelf(cert); 63 Certificate cert = cf.generateCertificate(new ByteArrayInputStream( 66 SerializationTest.verifyGolden(this, cert); 79 // try to serialize/deserialize cert [all...] |
H A D | CertificateExpiredExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateExpiredException;
|
H A D | CertificateNotYetValidExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateNotYetValidException;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/ |
H A D | CertificateExpiredExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateExpiredException;
|
H A D | CertificateNotYetValidExceptionTest.java | 22 package org.apache.harmony.security.tests.javax.security.cert.serialization; 24 import javax.security.cert.CertificateNotYetValidException;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
H A D | PrincipalUtil.java | 4 import java.security.cert.CRLException; 5 import java.security.cert.CertificateEncodingException; 6 import java.security.cert.X509CRL; 7 import java.security.cert.X509Certificate; 24 * return the issuer of the given cert as an X509PrincipalObject. 27 X509Certificate cert) 33 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); 44 * return the subject of the given cert as an X509PrincipalObject. 47 X509Certificate cert) 53 ASN1Primitive.fromByteArray(cert 26 getIssuerX509Principal( X509Certificate cert) argument 46 getSubjectX509Principal( X509Certificate cert) argument [all...] |