/external/chromium_org/net/ssl/ |
H A D | ssl_info.h | 12 #include "net/cert/cert_status_flags.h" 13 #include "net/cert/sct_status_flags.h" 14 #include "net/cert/x509_cert_types.h" 43 bool is_valid() const { return cert.get() != NULL; } 45 // Adds the specified |error| to the cert status. 49 scoped_refptr<X509Certificate> cert; member in class:net::SSLInfo 51 // Bitmask of status info of |cert|, representing, for example, known errors
|
H A D | client_cert_store_mac.cc | 24 #include "net/cert/x509_util.h" 25 #include "net/cert/x509_util_mac.h" 33 // Gets the issuer for a given cert, starting with the cert itself and 43 // Create an SSL policy ref configured for client cert evaluation. 64 // Evaluate trust, which creates the cert chain. 80 // Returns true if |*cert| is issued by an authority in |valid_issuers| 81 // according to Keychain Services, rather than using |cert|'s intermediate 82 // certificates. If it is, |*cert| is updated to point to the completed 85 scoped_refptr<X509Certificate>* cert) { 84 IsIssuedByInKeychain(const std::vector<std::string>& valid_issuers, scoped_refptr<X509Certificate>* cert) argument 103 SecCertificateRef cert = reinterpret_cast<SecCertificateRef>( local 139 scoped_refptr<X509Certificate>& cert = preliminary_list[i]; local [all...] |
/external/openssl/crypto/asn1/ |
H A D | x_nx509.c | 68 ASN1_OPT(NETSCAPE_X509, cert, X509)
|
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | ocsp-req.sh | 5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
|
H A D | ocsp-update-cache.sh | 8 -cert server.pem \
|
/external/chromium_org/net/cert/ |
H A D | nss_profile_filter_chromeos.cc | 5 #include "net/cert/nss_profile_filter_chromeos.h" 9 #include "net/cert/x509_certificate.h" 15 std::string CertSlotsString(CERTCertificate* cert) { argument 18 PK11_GetAllSlotsForCert(cert, NULL)); 113 bool NSSProfileFilterChromeOS::IsCertAllowed(CERTCertificate* cert) const { 115 PK11_GetAllSlotsForCert(cert, NULL)); 117 DVLOG(2) << "cert no slots: " << base::StringPiece(cert->nickname); 127 DVLOG(3) << "cert from " << CertSlotsString(cert) [all...] |
H A D | cert_verify_proc_android.h | 8 #include "net/cert/cert_verify_proc.h" 24 virtual int VerifyInternal(X509Certificate* cert,
|
H A D | cert_verify_proc_mac.h | 8 #include "net/cert/cert_verify_proc.h" 24 virtual int VerifyInternal(X509Certificate* cert,
|
/external/smack/src/org/xbill/DNS/ |
H A D | CERTRecord.java | 111 private byte [] cert; field in class:CERTRecord 125 * @param cert Binary data representing the certificate 129 int alg, byte [] cert) 135 this.cert = cert; 143 cert = in.readByteArray(); 158 cert = st.getBase64(); 172 if (cert != null) { 175 sb.append(base64.formatString(cert, 64, "\t", true)); 178 sb.append(base64.toString(cert)); 128 CERTRecord(Name name, int dclass, long ttl, int certType, int keyTag, int alg, byte [] cert) argument [all...] |
/external/chromium_org/net/http/ |
H A D | disk_based_cert_cache_unittest.cc | 33 "root_ca_cert.pem", "cert:738D348A8AFCEC4F79C3E4B1845D985AF601AB0F"}; 36 "ok_cert.pem", "cert:6C9DFD2CFA9885C71BE6DE0EA0CF962AC8F9131B"}; 133 scoped_refptr<X509Certificate> cert( 137 X509Certificate::GetDEREncoded(cert->os_cert_handle(), &write_data); 163 scoped_refptr<X509Certificate> cert( 167 X509Certificate::GetDEREncoded(cert->os_cert_handle(), &write_data); 181 cert->os_cert_handle())); 195 scoped_refptr<X509Certificate> cert( 197 ASSERT_TRUE(cert.get()); 200 cache.SetCertificate(cert [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | X509Certificate2Test.java | 18 package org.apache.harmony.security.tests.java.security.cert; 22 import java.security.cert.CertificateFactory; 23 import java.security.cert.X509Certificate; 28 import org.apache.harmony.security.tests.support.cert.TestUtils; 35 * @tests java.security.cert.X509Certificate#getExtensionValue(java.lang.String)
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/ |
H A D | CertPathTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 25 import java.security.cert.CertPath; 26 import java.security.cert.CertificateFactory; 30 import org.apache.harmony.security.tests.support.cert.MyCertPath; 44 private static final String certPathFileName = "java/security/cert/CertPath.PkiPath"; 87 // try to serialize/deserialize cert 103 // Try to serialize cert
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
H A D | CertException.java | 1 package org.bouncycastle.cert; 4 * General checked Exception thrown in the cert package and its sub-packages.
|
H A D | CertIOException.java | 1 package org.bouncycastle.cert; 6 * General IOException thrown in the cert package and its sub-packages.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoGeneratorBuilder.java | 3 import java.security.cert.CertificateEncodingException; 4 import java.security.cert.X509Certificate; 6 import org.bouncycastle.cert.X509CertificateHolder; 7 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
H A D | ContentVerifierProvider.java | 4 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | ExtCRLException.java | 3 import java.security.cert.CRLException;
|
H A D | PKIXCertPath.java | 10 import java.security.cert.CertPath; 11 import java.security.cert.Certificate; 12 import java.security.cert.CertificateEncodingException; 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateFactory; 15 import java.security.cert.X509Certificate; 81 X509Certificate cert = (X509Certificate)certs.get(i); 83 if (issuer.equals(cert.getSubjectX500Principal())) 99 // find end-entity cert 105 X509Certificate cert 352 toASN1Object( X509Certificate cert) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 9 import java.security.cert.CRLException; 10 import java.security.cert.CertPath; 11 import java.security.cert.CertPathValidatorException; 12 import java.security.cert.CertStore; 13 import java.security.cert.CertStoreException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.PKIXParameters; 17 import java.security.cert.PolicyQualifierInfo; 18 import java.security.cert 136 findTrustAnchor( X509Certificate cert, Set trustAnchors) argument 158 findTrustAnchor( X509Certificate cert, Set trustAnchors, String sigProvider) argument 243 addAdditionalStoresFromAltNames( X509Certificate cert, ExtendedPKIXParameters pkixParams) argument 273 getEncodedIssuerPrincipal( Object cert) argument 298 getSubjectPrincipal(X509Certificate cert) argument 303 isSelfIssued(X509Certificate cert) argument 965 getSerialNumber( Object cert) argument 978 getCertStatus( Date validDate, X509CRL crl, Object cert, CertStatus certStatus) argument 1186 getCompleteCRLs(DistributionPoint dp, Object cert, Date currentDate, ExtendedPKIXParameters paramsPKIX) argument 1380 findIssuerCerts( X509Certificate cert, ExtendedPKIXBuilderParameters pkixParams) argument 1425 verifyX509Certificate(X509Certificate cert, PublicKey publicKey, String sigProvider) argument [all...] |
H A D | ExtCRLException.java | 3 import java.security.cert.CRLException;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | ExtCertificateEncodingException.java | 3 import java.security.cert.CertificateEncodingException;
|
H A D | X509AttributeCertificate.java | 10 import java.security.cert.CertificateException; 11 import java.security.cert.CertificateExpiredException; 12 import java.security.cert.CertificateNotYetValidException; 13 import java.security.cert.X509Extension;
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_ssl_host_state_delegate.h | 13 #include "net/cert/cert_status_flags.h" 14 #include "net/cert/x509_certificate.h" 27 bool Check(const net::X509Certificate& cert, net::CertStatus error) const; 31 void Allow(const net::X509Certificate& cert, net::CertStatus error); 46 // Records that |cert| is permitted to be used for |host| in the future, for 49 const net::X509Certificate& cert, 54 // Queries whether |cert| is allowed or denied for |host| and |error|. 57 const net::X509Certificate& cert,
|
/external/chromium_org/chrome/browser/ |
H A D | certificate_viewer.h | 24 // Opens a certificate viewer under |parent| to display |cert|. 27 net::X509Certificate* cert);
|
/external/chromium_org/chrome/browser/ui/views/ |
H A D | certificate_viewer_win.cc | 14 #include "net/cert/x509_certificate.h" 22 net::X509Certificate* cert) { 23 // Create a new cert context and store containing just the certificate 25 PCCERT_CONTEXT cert_list = cert->CreateOSCertChainForCert(); 30 // We set our parent to the tab window. This makes the cert dialog created 57 net::X509Certificate* cert) { 62 parent->GetHost()->GetAcceleratedWidget(), cert); 20 ShowCertificateViewerImpl(content::WebContents* web_contents, HWND parent, net::X509Certificate* cert) argument 55 ShowCertificateViewer(content::WebContents* web_contents, gfx::NativeWindow parent, net::X509Certificate* cert) argument
|