/external/cronet/stable/third_party/boringssl/src/pki/ |
D | parsed_certificate_unittest.cc | 42 std::shared_ptr<const ParsedCertificate> cert = ParsedCertificate::Create( in ParseCertificateFromFile() local 56 if (!cert) { in ParseCertificateFromFile() 60 return cert; in ParseCertificateFromFile() 73 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 75 ASSERT_TRUE(cert); in TEST() 80 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 89 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 91 ASSERT_TRUE(cert); in TEST() 96 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 153 std::shared_ptr<const ParsedCertificate> cert = in TEST() local [all …]
|
D | trust_store_in_memory.cc | 17 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchor() argument 18 AddCertificate(std::move(cert), CertificateTrust::ForTrustAnchor()); in AddTrustAnchor() 22 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithExpiration() argument 23 AddCertificate(std::move(cert), in AddTrustAnchorWithExpiration() 28 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithConstraints() argument 30 std::move(cert), in AddTrustAnchorWithConstraints() 35 std::shared_ptr<const ParsedCertificate> cert) { in AddDistrustedCertificateForTest() argument 36 AddCertificate(std::move(cert), CertificateTrust::ForDistrusted()); in AddDistrustedCertificateForTest() 44 std::shared_ptr<const ParsedCertificate> cert) { in AddCertificateWithUnspecifiedTrust() argument 45 AddCertificate(std::move(cert), CertificateTrust::ForUnspecified()); in AddCertificateWithUnspecifiedTrust() [all …]
|
/external/cronet/tot/third_party/boringssl/src/pki/ |
D | parsed_certificate_unittest.cc | 42 std::shared_ptr<const ParsedCertificate> cert = ParsedCertificate::Create( in ParseCertificateFromFile() local 56 if (!cert) { in ParseCertificateFromFile() 60 return cert; in ParseCertificateFromFile() 73 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 75 ASSERT_TRUE(cert); in TEST() 80 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 89 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 91 ASSERT_TRUE(cert); in TEST() 96 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 153 std::shared_ptr<const ParsedCertificate> cert = in TEST() local [all …]
|
D | trust_store_in_memory.cc | 17 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchor() argument 18 AddCertificate(std::move(cert), CertificateTrust::ForTrustAnchor()); in AddTrustAnchor() 22 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithExpiration() argument 23 AddCertificate(std::move(cert), in AddTrustAnchorWithExpiration() 28 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithConstraints() argument 30 std::move(cert), in AddTrustAnchorWithConstraints() 35 std::shared_ptr<const ParsedCertificate> cert) { in AddDistrustedCertificateForTest() argument 36 AddCertificate(std::move(cert), CertificateTrust::ForDistrusted()); in AddDistrustedCertificateForTest() 44 std::shared_ptr<const ParsedCertificate> cert) { in AddCertificateWithUnspecifiedTrust() argument 45 AddCertificate(std::move(cert), CertificateTrust::ForUnspecified()); in AddCertificateWithUnspecifiedTrust() [all …]
|
/external/conscrypt/api/platform/ |
D | current.txt | 77 …od public void checkClientTrusted(java.security.cert.X509Certificate[], String) throws java.securi… 78 … void checkClientTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav… 79 …d checkClientTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws… 80 …od public void checkServerTrusted(java.security.cert.X509Certificate[], String) throws java.securi… 81 …t<java.security.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], Str… 82 …ecurity.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], byte[], byt… 83 … void checkServerTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav… 84 …d checkServerTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws… 85 method public java.security.cert.X509Certificate[] getAcceptedIssuers(); 86 …security.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], Stri… [all …]
|
D | last-api.txt | 59 …od public void checkClientTrusted(java.security.cert.X509Certificate[], String) throws java.securi… 60 … void checkClientTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav… 61 …d checkClientTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws… 62 …t<java.security.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], Str… 63 …security.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], Stri… 64 …rity.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], String, … 70 …method public java.util.Set<java.security.cert.TrustAnchor> findAllByIssuerAndSignature(java.secur… 71 …method public java.security.cert.TrustAnchor findByIssuerAndSignature(java.security.cert.X509Certi… 72 …method public java.security.cert.TrustAnchor findBySubjectAndPublicKey(java.security.cert.X509Cert… 73 method public java.security.cert.TrustAnchor index(java.security.cert.X509Certificate); [all …]
|
/external/rust/crates/openssl/src/x509/ |
D | tests.rs | 46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable 47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable 48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading() 58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable 59 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable 60 let debugged = format!("{:#?}", cert); in test_debug() 74 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable 75 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable 76 let not_before = cert.not_before().to_string(); in test_cert_issue_validity() 77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity() [all …]
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 26 CERT *__ssl_cert_new(CERT *ic, void *rngctx) in __ssl_cert_new() 28 CERT *cert; in __ssl_cert_new() local 33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 34 if (!cert) { in __ssl_cert_new() 35 SSL_DEBUG(SSL_CERT_ERROR_LEVEL, "no enough memory > (cert)"); in __ssl_cert_new() 47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new() 48 if (!cert->pkey) { in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 59 return cert; in __ssl_cert_new() [all …]
|
/external/cronet/stable/net/tools/cert_verify_tool/ |
D | cert_verify_tool_util.cc | 14 #include "net/cert/x509_certificate.h" 15 #include "net/cert/x509_util.h" 23 // Parses |data_string| as a single DER cert or a PEM certificate list. 33 CertInput cert; in ExtractCertificatesFromData() local 34 cert.der_cert = pem_tokenizer.data(); in ExtractCertificatesFromData() 35 cert.source_file_path = file_path; in ExtractCertificatesFromData() 36 cert.source_details = in ExtractCertificatesFromData() 38 certs->push_back(cert); in ExtractCertificatesFromData() 51 CertInput cert; in ExtractCertificatesFromData() local 52 cert.der_cert = std::string( in ExtractCertificatesFromData() [all …]
|
/external/cronet/tot/net/tools/cert_verify_tool/ |
D | cert_verify_tool_util.cc | 14 #include "net/cert/x509_certificate.h" 15 #include "net/cert/x509_util.h" 23 // Parses |data_string| as a single DER cert or a PEM certificate list. 33 CertInput cert; in ExtractCertificatesFromData() local 34 cert.der_cert = pem_tokenizer.data(); in ExtractCertificatesFromData() 35 cert.source_file_path = file_path; in ExtractCertificatesFromData() 36 cert.source_details = in ExtractCertificatesFromData() 38 certs->push_back(cert); in ExtractCertificatesFromData() 51 CertInput cert; in ExtractCertificatesFromData() local 52 cert.der_cert = std::string( in ExtractCertificatesFromData() [all …]
|
/external/vboot_reference/scripts/image_signing/ |
D | verify_uefi.sh | 42 die "No PK cert" 47 die "No DB cert" 50 local cert="${key_dir}/db/db.pem" 53 local gsetup_cert="${working_dir}/cert.pem" 61 sbverify --cert "${cert}" "${efi_file}" || 62 die "Verification failed. file:${efi_file} cert:${cert}" 63 sbverify --cert "${gsetup_cert}" "${efi_file}" || 64 die "Verification failed. file:${efi_file} cert:${gsetup_cert}" 71 sbverify --cert "${cert}" "${syslinux_kernel_file}" || 72 warn "Verification failed. file:${syslinux_kernel_file} cert:${cert}" [all …]
|
/external/rust/android-crates-io/crates/quiche/examples/ |
D | gen-certs.sh | 5 openssl req -new -batch -nodes -sha256 -keyout cert.key -out cert.csr -subj '/C=GB/CN=quic.tech' 6 openssl x509 -req -days 10000 -in cert.csr -CA rootca.crt -CAkey rootca.key -CAcreateserial -out ce… 7 openssl verify -CAfile rootca.crt cert.crt 8 cp cert.crt cert-big.crt 9 cat cert.crt >> cert-big.crt 10 cat cert.crt >> cert-big.crt 11 cat cert.crt >> cert-big.crt 12 cat cert.crt >> cert-big.crt 13 rm cert.csr
|
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_cert.cc | 137 CERT::CERT(const SSL_X509_METHOD *x509_method_arg) in CERT() function in CERT 140 CERT::~CERT() { in ~CERT() 150 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument 151 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 156 if (cert->chain) { in ssl_cert_dup() 158 cert->chain.get(), buffer_up_ref, CRYPTO_BUFFER_free)); in ssl_cert_dup() 164 ret->privatekey = UpRef(cert->privatekey); in ssl_cert_dup() 165 ret->key_method = cert->key_method; in ssl_cert_dup() 167 if (!ret->sigalgs.CopyFrom(cert->sigalgs)) { in ssl_cert_dup() 171 ret->cert_cb = cert->cert_cb; in ssl_cert_dup() [all …]
|
D | ssl_x509.cc | 199 // ssl_cert_set_chain sets elements 1.. of |cert->chain| to the serialised 201 // which case no change to |cert->chain| is made. It preverses the existing 202 // leaf from |cert->chain|, if any. 203 static bool ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() argument 206 if (cert->chain != nullptr) { in ssl_cert_set_chain() 213 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain.get(), 0); in ssl_cert_set_chain() 234 cert->chain = std::move(new_chain); in ssl_cert_set_chain() 238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument 239 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf() 240 cert->x509_leaf = nullptr; in ssl_crypto_x509_cert_flush_cached_leaf() [all …]
|
/external/tpm2-tss/script/ekca/ |
D | create_ca.sh | 44 -out root-ca.cert.pem \ 50 openssl x509 -outform der -in root-ca.cert.pem -out root-ca.cert.crt 52 openssl verify -verbose -CAfile root-ca.cert.pem \ 53 root-ca.cert.pem 55 openssl ca -gencrl -cert root-ca.cert.pem \ 56 -out root-ca.cert.crl.pem -passin file:pass.txt 57 openssl crl -in root-ca.cert.crl.pem -outform DER -out root-ca.cert.crl 100 -out certs/intermed-ca.cert.pem \ 106 openssl x509 -outform der -in certs/intermed-ca.cert.pem \ 107 -out certs/intermed-ca.cert.crt [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_cert.cc | 33 CERT::CERT(const SSL_X509_METHOD *x509_method_arg) in CERT() function in CERT 37 CERT::~CERT() { x509_method->cert_free(this); } in ~CERT() 39 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument 40 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 46 for (const auto &cred : cert->credentials) { in ssl_cert_dup() 54 ret->legacy_credential = cert->legacy_credential->Dup(); in ssl_cert_dup() 59 ret->cert_cb = cert->cert_cb; in ssl_cert_dup() 60 ret->cert_cb_arg = cert->cert_cb_arg; in ssl_cert_dup() 62 ret->x509_method->cert_dup(ret.get(), cert); in ssl_cert_dup() 64 ret->sid_ctx = cert->sid_ctx; in ssl_cert_dup() [all …]
|
D | ssl_x509.cc | 57 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument 58 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf() 59 cert->x509_leaf = nullptr; in ssl_crypto_x509_cert_flush_cached_leaf() 62 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() argument 63 sk_X509_pop_free(cert->x509_chain, X509_free); in ssl_crypto_x509_cert_flush_cached_chain() 64 cert->x509_chain = nullptr; in ssl_crypto_x509_cert_flush_cached_chain() 67 // ssl_cert_set1_chain sets elements 1.. of |cert->chain| to the serialised 69 // which case no change to |cert->chain| is made. It preverses the existing 70 // leaf from |cert->chain|, if any. 71 static bool ssl_cert_set1_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set1_chain() argument [all …]
|
/external/cronet/tot/net/cert/ |
D | nss_cert_database.cc | 5 #include "net/cert/nss_cert_database.h" 7 #include <cert.h> 30 #include "net/cert/cert_database.h" 31 #include "net/cert/internal/trust_store_nss.h" 32 #include "net/cert/x509_certificate.h" 33 #include "net/cert/x509_util_nss.h" 81 bool IsUntrustedUsingTrustStore(const CERTCertificate* cert, in IsUntrustedUsingTrustStore() argument 92 if (SECITEM_CompareItem(&cert->derIssuer, &cert->derSubject) == SECEqual) { in IsUntrustedUsingTrustStore() 108 ScopedCERTCertificate cert, in ImportCertFailure() argument 110 : certificate(std::move(cert)), net_error(err) {} in ImportCertFailure() [all …]
|
/external/cronet/stable/net/cert/ |
D | nss_cert_database.cc | 5 #include "net/cert/nss_cert_database.h" 7 #include <cert.h> 30 #include "net/cert/cert_database.h" 31 #include "net/cert/internal/trust_store_nss.h" 32 #include "net/cert/x509_certificate.h" 33 #include "net/cert/x509_util_nss.h" 81 bool IsUntrustedUsingTrustStore(const CERTCertificate* cert, in IsUntrustedUsingTrustStore() argument 92 if (SECITEM_CompareItem(&cert->derIssuer, &cert->derSubject) == SECEqual) { in IsUntrustedUsingTrustStore() 108 ScopedCERTCertificate cert, in ImportCertFailure() argument 110 : certificate(std::move(cert)), net_error(err) {} in ImportCertFailure() [all …]
|
/external/cronet/stable/third_party/boringssl/src/pki/testdata/ocsp_unittest/ |
D | make_ocsp.py | 52 cert = crypto.X509() 53 cert.set_version(2) 54 cert.get_subject().CN = name 55 cert.set_pubkey(pkey) 56 cert.set_serial_number(NEXT_SERIAL) 58 cert.set_notBefore(CERT_DATE.strftime('%Y%m%d%H%M%SZ')) 59 cert.set_notAfter(CERT_EXPIRE.strftime('%Y%m%d%H%M%SZ')) 61 cert.add_extensions( 64 cert.set_issuer(signer[1].get_subject()) 65 cert.sign(signer[2], 'sha1') [all …]
|
/external/cronet/tot/third_party/boringssl/src/pki/testdata/ocsp_unittest/ |
D | make_ocsp.py | 52 cert = crypto.X509() 53 cert.set_version(2) 54 cert.get_subject().CN = name 55 cert.set_pubkey(pkey) 56 cert.set_serial_number(NEXT_SERIAL) 58 cert.set_notBefore(CERT_DATE.strftime('%Y%m%d%H%M%SZ')) 59 cert.set_notAfter(CERT_EXPIRE.strftime('%Y%m%d%H%M%SZ')) 61 cert.add_extensions( 64 cert.set_issuer(signer[1].get_subject()) 65 cert.sign(signer[2], 'sha1') [all …]
|
/external/pigweed/third_party/chromium_verifier/ |
D | sources.gni | 32 "net/cert/internal/cert_error_id.cc", 33 "net/cert/internal/cert_error_params.cc", 34 "net/cert/internal/cert_errors.cc", 35 "net/cert/internal/cert_issuer_source_static.cc", 36 "net/cert/internal/certificate_policies.cc", 37 "net/cert/internal/common_cert_errors.cc", 38 "net/cert/internal/extended_key_usage.cc", 39 "net/cert/internal/general_names.cc", 40 "net/cert/internal/name_constraints.cc", 41 "net/cert/internal/parse_certificate.cc", [all …]
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
D | TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 180 X509Certificate cert = readCertificate(file); in getCertificate() local 181 if (cert == null || (isSystem(alias) in getCertificate() 183 && isDeletedSystemCertificate(cert))) { in getCertificate() 187 return cert; in getCertificate() 224 // reading a cert while its being installed can lead to this. in readCertificate() 232 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument [all …]
|
/external/libcups/scheduler/ |
D | cert.c | 40 cupsd_cert_t *cert; /* Current certificate */ in cupsdAddCert() local 53 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL) in cupsdAddCert() 60 cert->pid = pid; in cupsdAddCert() 61 cert->type = type; in cupsdAddCert() 62 strlcpy(cert->username, username, sizeof(cert->username)); in cupsdAddCert() 65 cert->certificate[i] = hex[CUPS_RAND() & 15]; in cupsdAddCert() 80 free(cert); in cupsdAddCert() 247 write(fd, cert->certificate, strlen(cert->certificate)); in cupsdAddCert() 254 cert->next = Certs; in cupsdAddCert() 255 Certs = cert; in cupsdAddCert() [all …]
|