/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslauth.c | 4 #include "cert.h" 36 CERTCertificate *cert; local 53 cert = CERT_DupCertificate(ss->sec.peerCert); 54 if (CERT_AddCertToListTail(chain, cert) != SECSuccess) { 58 cert = CERT_DupCertificate(cur->cert); 59 if (CERT_AddCertToListTail(chain, cert) != SECSuccess) { 155 CERTCertificate *cert; local 157 cert = ss->sec.peerCert; 158 if (cert) { [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLSessionImpl.java | 21 import java.security.cert.Certificate; 22 import java.security.cert.CertificateEncodingException; 23 import java.security.cert.X509Certificate; 31 import javax.security.cert.CertificateException; 46 private volatile javax.security.cert.X509Certificate[] peerCertificateChain; 208 public javax.security.cert.X509Certificate[] getPeerCertificateChain() 211 javax.security.cert.X509Certificate[] result = peerCertificateChain; 223 private javax.security.cert.X509Certificate[] createPeerCertificateChain() 226 javax.security.cert.X509Certificate[] chain 227 = new javax.security.cert [all...] |
/external/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 112 if(!pkey && !cert && !ca) 118 if (pkey && cert) 120 if(!X509_check_private_key(cert, pkey)) 122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 125 if (cert) 127 bag = PKCS12_add_cert(&bags, cert); 198 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 207 if(!(bag = PKCS12_x5092certbag(cert))) 214 name = (char *)X509_alias_get0(cert, [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | PKIXCertPathBuilderResultTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 26 import java.security.cert.CertPath; 27 import java.security.cert.CertPathBuilderResult; 28 import java.security.cert.PKIXCertPathBuilderResult; 29 import java.security.cert.TrustAnchor; 32 import org.apache.harmony.security.tests.support.cert.MyCertPath; 33 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/external/chromium_org/net/cert/ |
H A D | x509_util_openssl_unittest.cc | 9 #include "net/cert/x509_util.h" 10 #include "net/cert/x509_util_openssl.h" 28 ScopedX509 cert(d2i_X509(NULL, &cert_data, cert_data_len)); 29 ASSERT_TRUE(cert.get()); 40 EXPECT_EQ(1, X509_verify(cert.get(), pub_key.get())); 57 ScopedX509 cert(d2i_X509(NULL, &cert_data, cert_data_len)); 58 ASSERT_TRUE(cert.get()); 61 int ext_pos = X509_get_ext_by_OBJ(cert.get(), oid_obj.get(), -1); 63 X509_EXTENSION* ext = X509_get_ext(cert.get(), ext_pos);
|
H A D | cert_verify_proc_openssl.cc | 5 #include "net/cert/cert_verify_proc_openssl.h" 18 #include "net/cert/asn1_util.h" 19 #include "net/cert/cert_status_flags.h" 20 #include "net/cert/cert_verifier.h" 21 #include "net/cert/cert_verify_result.h" 22 #include "net/cert/test_root_certs.h" 23 #include "net/cert/x509_certificate.h" 29 // Maps X509_STORE_CTX_get_error() return values to our cert status flags. 105 X509* cert = sk_X509_value(chain, i); local 107 verified_cert = cert; 161 X509* cert = sk_X509_value(chain, i); local 193 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | multi_log_ct_verifier.cc | 5 #include "net/cert/multi_log_ct_verifier.h" 14 #include "net/cert/ct_log_verifier.h" 15 #include "net/cert/ct_objects_extractor.h" 16 #include "net/cert/ct_serialization.h" 17 #include "net/cert/ct_signed_certificate_timestamp_log_param.h" 18 #include "net/cert/ct_verify_result.h" 19 #include "net/cert/sct_status_flags.h" 20 #include "net/cert/x509_certificate.h" 85 X509Certificate* cert, 90 DCHECK(cert); 84 Verify( X509Certificate* cert, const std::string& stapled_ocsp_response, const std::string& sct_list_from_tls_extension, ct::CTVerifyResult* result, const BoundNetLog& net_log) argument [all...] |
H A D | cert_verify_proc_android.cc | 5 #include "net/cert/cert_verify_proc_android.h" 19 #include "net/cert/asn1_util.h" 20 #include "net/cert/cert_status_flags.h" 21 #include "net/cert/cert_verify_result.h" 22 #include "net/cert/x509_certificate.h" 125 bool GetChainDEREncodedBytes(X509Certificate* cert, argument 127 X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); 129 cert->GetIntermediateCertificates(); 131 // Make sure the peer's own cert is the first in the chain, if it's not 158 X509Certificate* cert, 157 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
H A D | generate-aia-certs.sh | 29 try openssl genrsa -out out/aia-test-cert.key 2048 79 -key out/aia-test-cert.key \ 80 -out out/aia-test-cert.csr \ 89 -in out/aia-test-cert.csr \ 90 -out out/aia-test-cert.pem \ 95 try cp out/aia-test-cert.pem ../certificates/aia-cert.pem
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
H A D | TestUtils.java | 22 package org.apache.harmony.security.tests.support.cert; 32 import java.security.cert.CertPathValidatorException; 33 import java.security.cert.CertStore; 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.CollectionCertStoreParameters; 38 import java.security.cert.PKIXCertPathChecker; 39 import java.security.cert.PolicyNode; 40 import java.security.cert [all...] |
/external/chromium_org/chrome/browser/ui/webui/options/ |
H A D | certificate_manager_handler.cc | 32 #include "net/cert/x509_certificate.h" 117 explicit CertEquals(const net::X509Certificate* cert) : cert_(cert) {} argument 118 bool operator()(const scoped_refptr<net::X509Certificate> cert) const { 119 return cert_->Equals(cert.get()); 127 net::X509Certificate* cert) { 129 CertEquals(cert)) != web_trust_certs.end(); 135 net::X509Certificate* cert) { 136 CertificateViewerModalDialog* dialog = new CertificateViewerModalDialog(cert); 153 std::string CertToId(net::X509Certificate* cert); 125 IsPolicyInstalledWithWebTrust( const net::CertificateList& web_trust_certs, net::X509Certificate* cert) argument 133 ShowCertificateViewerModalDialog(content::WebContents* web_contents, gfx::NativeWindow parent, net::X509Certificate* cert) argument 169 CertToId(net::X509Certificate* cert) argument 541 net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args); local 556 net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args); local 576 net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args); local 610 net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args); local 983 net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args); local 990 net::X509Certificate* cert = cert_id_map_->CallbackArgsToCert(args); local 1075 net::X509Certificate* cert = org_cert_it->get(); local [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertSelectorTest.java | 22 package java.security.cert; 32 import java.security.cert.CertificateEncodingException; 33 import java.security.cert.CertificateException; 34 import java.security.cert.CertificateExpiredException; 35 import java.security.cert.CertificateNotYetValidException; 36 import java.security.cert.X509Certificate; 222 public boolean equals(Object cert) { argument 223 if (cert == null) { 227 || (((TestCert) cert).equalCriteria == null)) { 230 return equalCriteria.equals(((TestCert) cert) [all...] |
/external/openssl/ssl/ |
H A D | ssl_cert.c | 180 CERT *ssl_cert_dup(CERT *cert) argument 194 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 195 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 198 ret->valid = cert->valid; 199 ret->mask_k = cert->mask_k; 200 ret->mask_a = cert->mask_a; 201 ret->export_mask_k = cert->export_mask_k; 202 ret->export_mask_a = cert [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_cred.c | 32 x509_certificate_chain_free(cred->cert); 43 struct x509_certificate *cert, *p; local 46 cert = x509_certificate_parse(buf, len); 47 if (cert == NULL) { 56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 61 p->next = cert; 64 cert->next = *chain; 65 *chain = cert; 68 x509_name_string(&cert->subject, name, sizeof(name)); 153 const char *cert, cons 152 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 189 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 216 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_cred.c | 32 x509_certificate_chain_free(cred->cert); 43 struct x509_certificate *cert, *p; local 46 cert = x509_certificate_parse(buf, len); 47 if (cert == NULL) { 56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 61 p->next = cert; 64 cert->next = *chain; 65 *chain = cert; 68 x509_name_string(&cert->subject, name, sizeof(name)); 153 const char *cert, cons 152 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 189 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 216 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_cred.c | 32 x509_certificate_chain_free(cred->cert); 43 struct x509_certificate *cert, *p; local 46 cert = x509_certificate_parse(buf, len); 47 if (cert == NULL) { 56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 61 p->next = cert; 64 cert->next = *chain; 65 *chain = cert; 68 x509_name_string(&cert->subject, name, sizeof(name)); 153 const char *cert, cons 152 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 189 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 216 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | AbstractVerifier.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateParsingException; 40 import java.security.cert.X509Certificate; 115 public final void verify(String host, X509Certificate cert) argument 117 String[] cns = getCNs(cert); 118 String[] subjectAlts = getDNSSubjectAlts(cert); 209 public static String[] getCNs(X509Certificate cert) { argument 211 new DistinguishedNameParser(cert.getSubjectX500Principal()); 235 * @param cert X509Certificate 238 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument [all...] |
/external/chromium_org/native_client_sdk/src/build_tools/sdk_tools/third_party/fancy_urllib/ |
H A D | __init__.py | 6 """A HTTPSConnection/Handler with additional proxy and cert validation features. 9 proxies and adds SSL cert validation if the ssl module is present. 28 def __init__(self, host, cert, reason): 33 cert: The SSL certificate (as a dictionary) the host returned. 37 self.cert = cert 44 (self.host, self.reason, self.cert)) 101 def _get_valid_hosts_for_cert(self, cert): 105 cert: A dictionary representing an SSL certificate. 109 if 'subjectAltName' in cert [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 194 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 317 if (priv->cert) 318 CertFreeCertificateContext(priv->cert); 345 if (strncmp(name, "cert://", 7) == 0) { 380 X509 *cert = NULL; local 386 (strncmp(name, "cert://", 7) != 0 && 400 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 401 if (priv->cert == NULL) { 402 priv->cert = cryptoapi_find_cert( 405 if (priv->cert 482 X509 *cert; local 1112 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1135 tls_match_altsubject(X509 *cert, const char *match) argument 1211 tls_match_suffix(X509 *cert, const char *match) argument 1315 get_x509_cert(X509 *cert) argument 1340 struct wpabuf *cert = NULL; local 1363 struct wpabuf *cert = NULL; local 1450 struct wpabuf *cert; local 1622 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1945 X509 *cert; local 2070 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 2077 X509 *cert; member in struct:__anon33604 2104 X509 *cert; local 2131 X509 *cert; local 2985 debug_print_cert(X509 *cert, const char *title) argument 3071 X509 *cert; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 194 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 317 if (priv->cert) 318 CertFreeCertificateContext(priv->cert); 345 if (strncmp(name, "cert://", 7) == 0) { 380 X509 *cert = NULL; local 386 (strncmp(name, "cert://", 7) != 0 && 400 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 401 if (priv->cert == NULL) { 402 priv->cert = cryptoapi_find_cert( 405 if (priv->cert 482 X509 *cert; local 1112 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1135 tls_match_altsubject(X509 *cert, const char *match) argument 1211 tls_match_suffix(X509 *cert, const char *match) argument 1315 get_x509_cert(X509 *cert) argument 1340 struct wpabuf *cert = NULL; local 1363 struct wpabuf *cert = NULL; local 1450 struct wpabuf *cert; local 1622 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1945 X509 *cert; local 2070 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 2077 X509 *cert; member in struct:__anon33857 2104 X509 *cert; local 2131 X509 *cert; local 2985 debug_print_cert(X509 *cert, const char *title) argument 3071 X509 *cert; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 194 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 317 if (priv->cert) 318 CertFreeCertificateContext(priv->cert); 345 if (strncmp(name, "cert://", 7) == 0) { 380 X509 *cert = NULL; local 386 (strncmp(name, "cert://", 7) != 0 && 400 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 401 if (priv->cert == NULL) { 402 priv->cert = cryptoapi_find_cert( 405 if (priv->cert 482 X509 *cert; local 1112 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1135 tls_match_altsubject(X509 *cert, const char *match) argument 1211 tls_match_suffix(X509 *cert, const char *match) argument 1315 get_x509_cert(X509 *cert) argument 1340 struct wpabuf *cert = NULL; local 1363 struct wpabuf *cert = NULL; local 1450 struct wpabuf *cert; local 1622 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1945 X509 *cert; local 2070 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 2077 X509 *cert; member in struct:__anon34108 2104 X509 *cert; local 2131 X509 *cert; local 2985 debug_print_cert(X509 *cert, const char *title) argument 3071 X509 *cert; local [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssidentity.cc | 23 #include "cert.h" 84 NSSCertificate::NSSCertificate(CERTCertificate* cert) argument 85 : certificate_(CERT_DupCertificate(cert)) { 89 static void DeleteCert(SSLCertificate* cert) { argument 90 delete cert; 94 // Copy the first cert into certificate_. 96 certificate_ = CERT_DupCertificate(node->cert); 102 certs.push_back(new NSSCertificate(node->cert)); 113 NSSCertificate::NSSCertificate(CERTCertificate* cert, SSLCertChain* chain) argument 114 : certificate_(CERT_DupCertificate(cert)) { 130 CERTCertificate *cert = CERT_NewTempCertificate(CERT_GetDefaultCertDB(), local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | AttributeCertificateIssuer.java | 5 import java.security.cert.CertSelector; 6 import java.security.cert.Certificate; 7 import java.security.cert.X509Certificate; 24 * @deprecated use org.bouncycastle.cert.AttributeCertificateIssuer 141 public boolean match(Certificate cert) argument 143 if (!(cert instanceof X509Certificate)) 148 X509Certificate x509Cert = (X509Certificate)cert;
|
/external/chromium_org/net/ssl/ |
H A D | client_cert_store_win.cc | 18 #include "net/cert/x509_util.h" 132 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( local 134 selected_certs->push_back(cert); 185 PCCERT_CONTEXT cert = NULL; local 188 CERT_STORE_ADD_NEW, &cert)) { 195 if (!CertSetCertificateContextProperty(cert, 202 if (!CertFreeCertificateContext(cert))
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | pkcs7.c | 80 CBS cert; local 84 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) { 88 inp = CBS_data(&cert); 89 x509 = d2i_X509(NULL, &inp, CBS_len(&cert)); 94 if (inp != CBS_data(&cert) + CBS_len(&cert)) {
|