/external/chromium_org/net/third_party/mozilla_security_manager/ |
H A D | nsNSSCertificateDB.cpp | 41 #include <cert.h> 48 #include "net/cert/x509_certificate.h" 49 #include "net/cert/x509_util_nss.h" 70 // Mozilla had some code here to check if a perm version of the cert exists 113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local 114 if (cert == root) { 120 // PR_TRUE). Afaict, checking !CERT_IsCACert on each cert is equivalent. 121 if (!CERT_IsCACert(cert->os_cert_handle(), NULL)) { 123 cert, net::ERR_IMPORT_CA_CERT_NOT_CA)); 124 VLOG(1) << "skipping cert (no 180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; local 211 SetCertTrust(const net::X509Certificate* cert, net::CertType type, net::NSSCertDatabase::TrustBits trustBits) argument [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | ChainStrengthAnalyzerTest.java | 21 import java.security.cert.CertificateException; 22 import java.security.cert.CertificateFactory; 23 import java.security.cert.X509Certificate; 118 private static void check(X509Certificate cert) throws Exception { argument 119 X509Certificate[] chain = {cert};
|
/external/chromium_org/chrome/browser/ |
H A D | certificate_manager_model.cc | 21 #include "net/cert/x509_certificate.h" 107 net::X509Certificate* cert = i->get(); local 109 x509_certificate_model::GetType(cert->os_cert_handle()); 114 if (!cert->subject().organization_names.empty()) 115 org = cert->subject().organization_names[0]; 117 org = cert->subject().GetDisplayName(); 119 (*map)[org].push_back(cert); 124 const net::X509Certificate& cert, 130 x509_certificate_model::GetCertNameOrNickname(cert.os_cert_handle())); 133 if (IsHardwareBacked(&cert)) { 123 GetColumnText( const net::X509Certificate& cert, Column column) const argument 190 SetCertTrust( const net::X509Certificate* cert, net::CertType type, net::NSSCertDatabase::TrustBits trust_bits) argument 197 Delete(net::X509Certificate* cert) argument [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CRLTest.java | 22 package org.apache.harmony.security.tests.java.security.cert; 24 import java.security.cert.CRL; 26 import org.apache.harmony.security.tests.support.cert.MyCRL; 31 * Tests for <code>java.security.cert.CRL</code> fields and methods
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
H A D | MyCertPath.java | 22 package org.apache.harmony.security.tests.support.cert; 24 import java.security.cert.CertPath; 25 import java.security.cert.CertificateEncodingException; 33 * Stub class for <code>java.security.cert.CertPath</code> tests 45 * my cert path the only encoding 66 * @see java.security.cert.CertPath#getCertificates() 73 * @return default encoded form of this cert path 74 * @see java.security.cert.CertPath#getEncoded() 81 * @return encoded form of this cert path as specified by 85 * @see java.security.cert [all...] |
/external/chromium_org/net/cert/ |
H A D | mock_cert_verifier.h | 10 #include "net/cert/cert_verifier.h" 11 #include "net/cert/cert_verify_result.h" 18 // result in the cert status being flagged as CERT_STATUS_INVALID and return 28 virtual int Verify(X509Certificate* cert, 44 // Adds a rule that will cause any call to Verify() for |cert| to return rv, 46 // Note: Only the primary certificate of |cert| is checked. Any intermediate 48 void AddResultForCert(X509Certificate* cert, 54 void AddResultForCertAndHost(X509Certificate* cert,
|
H A D | cert_verify_proc_nss.h | 11 #include "net/cert/cert_verify_proc.h" 28 int VerifyInternalImpl(X509Certificate* cert, 37 virtual int VerifyInternal(X509Certificate* cert,
|
/external/chromium_org/net/ssl/ |
H A D | channel_id_store.cc | 17 const std::string& cert) 22 cert_(cert) {} 30 i->expiration_time(), i->private_key(), i->cert()); 12 ChannelID( const std::string& server_identifier, base::Time creation_time, base::Time expiration_time, const std::string& private_key, const std::string& cert) argument
|
H A D | ssl_info.cc | 8 #include "net/cert/cert_status_flags.h" 9 #include "net/cert/signed_certificate_timestamp.h" 10 #include "net/cert/x509_certificate.h" 26 cert = info.cert; 42 cert = NULL;
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | CertificateRequestTest.java | 22 import java.security.cert.CertificateException; 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 60 X509Certificate cert = (X509Certificate) certFactory.generateCertificate(bais); 61 X509Certificate[] accepted = { cert }; 62 X500Principal[] certificate_authorities = { cert.getIssuerX500Principal() };
|
/external/chromium_org/content/browser/ssl/ |
H A D | ssl_client_auth_handler.cc | 12 #include "net/cert/x509_certificate.h" 55 void SSLClientAuthHandler::CertificateSelected(net::X509Certificate* cert) { argument 58 VLOG(1) << this << " CertificateSelected " << cert; 63 make_scoped_refptr(cert))); 73 // DoCertificateSelected. This is for platforms where the client cert matching 74 // is not performed by Chrome, the platform can handle the cert matching 100 void SSLClientAuthHandler::DoCertificateSelected(net::X509Certificate* cert) { argument 101 VLOG(1) << this << " DoCertificateSelected " << cert; 104 // user was choosing a cert, or because we have already responded to the 107 request_->ContinueWithCertificate(cert); [all...] |
H A D | ssl_policy_backend.h | 14 #include "net/cert/cert_status_flags.h" 15 #include "net/cert/x509_certificate.h" 30 // Records that |cert| is permitted to be used for |host| in the future, for 32 void AllowCertForHost(const net::X509Certificate& cert, 36 // Queries whether |cert| is allowed for |host|. Returns true in 40 const net::X509Certificate& cert,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/ |
H A D | CRLExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CRLException;
|
H A D | CertPathBuilderExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertPathBuilderException;
|
H A D | CertStoreExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertStoreException;
|
H A D | CertificateEncodingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateEncodingException;
|
H A D | CertificateExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateException;
|
H A D | CertificateParsingExceptionTest.java | 22 package org.apache.harmony.security.tests.java.security.cert.serialization; 24 import java.security.cert.CertificateParsingException;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | Timestamp_ImplTest.java | 25 import java.security.cert.CertPath; 28 import org.apache.harmony.security.tests.support.cert.MyCertPath;
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 39 import java.security.cert.X509Certificate; 71 void verify(String host, X509Certificate cert) throws SSLException; argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/exception/ |
H A D | ExtCertPathValidatorException.java | 3 import java.security.cert.CertPath; 4 import java.security.cert.CertPathValidatorException;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCRLUtil.java | 3 import java.security.cert.CertStore; 4 import java.security.cert.CertStoreException; 5 import java.security.cert.PKIXParameters; 6 import java.security.cert.X509CRL; 7 import java.security.cert.X509Certificate; 56 X509Certificate cert = crlselect.getCertificateChecking(); 58 if (cert != null) 60 if (crl.getThisUpdate().before(cert.getNotAfter())) 103 * @return a Collection of all found {@link java.security.cert.X509CRL X509CRL} objects. May be
|
/external/chromium_org/chrome/browser/chromeos/options/ |
H A D | cert_library.cc | 26 #include "net/cert/cert_database.h" 27 #include "net/cert/nss_cert_database.h" 39 base::string16 GetDisplayString(net::X509Certificate* cert, argument 42 if (!cert->subject().organization_names.empty()) 43 org = cert->subject().organization_names[0]; 45 org = cert->subject().GetDisplayName(); 47 x509_certificate_model::GetIssuerCommonName(cert->os_cert_handle(), 50 x509_certificate_model::GetCertNameOrNickname(cert->os_cert_handle())); 66 std::string CertToPEM(const net::X509Certificate& cert) { argument 68 if (!net::X509Certificate::GetPEMEncoded(cert 159 net::X509Certificate* cert = GetCertificateAt(type, index); local 169 net::X509Certificate* cert = GetCertificateAt(CERT_TYPE_USER, index); local 174 net::X509Certificate* cert = GetCertificateAt(type, index); local 182 net::X509Certificate* cert = GetCertificateAt(CERT_TYPE_SERVER_CA, index); local 194 net::X509Certificate* cert = GetCertificateAt(CERT_TYPE_USER, index); local [all...] |
/external/chromium_org/chrome/third_party/mozilla_security_manager/ |
H A D | nsUsageArrayHelper.cpp | 45 void GetCertUsageStrings(CERTCertificate* cert, std::vector<std::string>* out) { argument 48 if (CERT_VerifyCertificateNow(CERT_GetDefaultCertDB(), cert, PR_TRUE,
|
/external/chromium_org/content/public/browser/ |
H A D | ssl_host_state_delegate.h | 12 #include "net/cert/x509_certificate.h" 18 // a particular broken cert for use with particular host. We separate this 33 // Records that |cert| is permitted to be used for |host| in the future, for 36 const net::X509Certificate& cert, 42 // Queries whether |cert| is allowed for |host| and |error|. Returns true in 46 const net::X509Certificate& cert,
|