/external/cronet/stable/third_party/boringssl/src/pki/ |
D | parsed_certificate_unittest.cc | 42 std::shared_ptr<const ParsedCertificate> cert = ParsedCertificate::Create( in ParseCertificateFromFile() local 56 if (!cert) { in ParseCertificateFromFile() 60 return cert; in ParseCertificateFromFile() 73 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 75 ASSERT_TRUE(cert); in TEST() 80 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 89 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 91 ASSERT_TRUE(cert); in TEST() 96 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 153 std::shared_ptr<const ParsedCertificate> cert = in TEST() local [all …]
|
D | verify_certificate_chain.cc | 27 const ParsedCertificate &cert) { in IsHandledCriticalExtension() argument 78 return cert.has_extended_key_usage(); in IsHandledCriticalExtension() 86 void VerifyNoUnconsumedCriticalExtensions(const ParsedCertificate &cert, in VerifyNoUnconsumedCriticalExtensions() argument 89 for (const auto &it : cert.extensions()) { in VerifyNoUnconsumedCriticalExtensions() 94 if (extension.critical && !IsHandledCriticalExtension(extension, cert)) { in VerifyNoUnconsumedCriticalExtensions() 113 [[nodiscard]] bool IsSelfIssued(const ParsedCertificate &cert) { in IsSelfIssued() argument 114 return cert.normalized_subject() == cert.normalized_issuer(); in IsSelfIssued() 124 void VerifyTimeValidity(const ParsedCertificate &cert, in VerifyTimeValidity() argument 126 if (time < cert.tbs().validity_not_before) { in VerifyTimeValidity() 130 if (cert.tbs().validity_not_after < time) { in VerifyTimeValidity() [all …]
|
D | trust_store_in_memory.cc | 17 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchor() argument 18 AddCertificate(std::move(cert), CertificateTrust::ForTrustAnchor()); in AddTrustAnchor() 22 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithExpiration() argument 23 AddCertificate(std::move(cert), in AddTrustAnchorWithExpiration() 28 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithConstraints() argument 30 std::move(cert), in AddTrustAnchorWithConstraints() 35 std::shared_ptr<const ParsedCertificate> cert) { in AddDistrustedCertificateForTest() argument 36 AddCertificate(std::move(cert), CertificateTrust::ForDistrusted()); in AddDistrustedCertificateForTest() 44 std::shared_ptr<const ParsedCertificate> cert) { in AddCertificateWithUnspecifiedTrust() argument 45 AddCertificate(std::move(cert), CertificateTrust::ForUnspecified()); in AddCertificateWithUnspecifiedTrust() [all …]
|
/external/cronet/tot/third_party/boringssl/src/pki/ |
D | parsed_certificate_unittest.cc | 42 std::shared_ptr<const ParsedCertificate> cert = ParsedCertificate::Create( in ParseCertificateFromFile() local 56 if (!cert) { in ParseCertificateFromFile() 60 return cert; in ParseCertificateFromFile() 73 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 75 ASSERT_TRUE(cert); in TEST() 80 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 89 std::shared_ptr<const ParsedCertificate> cert = in TEST() local 91 ASSERT_TRUE(cert); in TEST() 96 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST() 153 std::shared_ptr<const ParsedCertificate> cert = in TEST() local [all …]
|
D | verify_certificate_chain.cc | 27 const ParsedCertificate &cert) { in IsHandledCriticalExtension() argument 78 return cert.has_extended_key_usage(); in IsHandledCriticalExtension() 86 void VerifyNoUnconsumedCriticalExtensions(const ParsedCertificate &cert, in VerifyNoUnconsumedCriticalExtensions() argument 89 for (const auto &it : cert.extensions()) { in VerifyNoUnconsumedCriticalExtensions() 94 if (extension.critical && !IsHandledCriticalExtension(extension, cert)) { in VerifyNoUnconsumedCriticalExtensions() 113 [[nodiscard]] bool IsSelfIssued(const ParsedCertificate &cert) { in IsSelfIssued() argument 114 return cert.normalized_subject() == cert.normalized_issuer(); in IsSelfIssued() 124 void VerifyTimeValidity(const ParsedCertificate &cert, in VerifyTimeValidity() argument 126 if (time < cert.tbs().validity_not_before) { in VerifyTimeValidity() 130 if (cert.tbs().validity_not_after < time) { in VerifyTimeValidity() [all …]
|
D | trust_store_in_memory.cc | 17 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchor() argument 18 AddCertificate(std::move(cert), CertificateTrust::ForTrustAnchor()); in AddTrustAnchor() 22 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithExpiration() argument 23 AddCertificate(std::move(cert), in AddTrustAnchorWithExpiration() 28 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithConstraints() argument 30 std::move(cert), in AddTrustAnchorWithConstraints() 35 std::shared_ptr<const ParsedCertificate> cert) { in AddDistrustedCertificateForTest() argument 36 AddCertificate(std::move(cert), CertificateTrust::ForDistrusted()); in AddDistrustedCertificateForTest() 44 std::shared_ptr<const ParsedCertificate> cert) { in AddCertificateWithUnspecifiedTrust() argument 45 AddCertificate(std::move(cert), CertificateTrust::ForUnspecified()); in AddCertificateWithUnspecifiedTrust() [all …]
|
/external/rust/crates/openssl/src/x509/ |
D | tests.rs | 46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable 47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable 48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading() 58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable 59 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable 60 let debugged = format!("{:#?}", cert); in test_debug() 74 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable 75 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable 76 let not_before = cert.not_before().to_string(); in test_cert_issue_validity() 77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/external/libcups/scheduler/ |
D | cert.c | 40 cupsd_cert_t *cert; /* Current certificate */ in cupsdAddCert() local 53 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL) in cupsdAddCert() 60 cert->pid = pid; in cupsdAddCert() 61 cert->type = type; in cupsdAddCert() 62 strlcpy(cert->username, username, sizeof(cert->username)); in cupsdAddCert() 65 cert->certificate[i] = hex[CUPS_RAND() & 15]; in cupsdAddCert() 80 free(cert); in cupsdAddCert() 247 write(fd, cert->certificate, strlen(cert->certificate)); in cupsdAddCert() 254 cert->next = Certs; in cupsdAddCert() 255 Certs = cert; in cupsdAddCert() [all …]
|
/external/rust/android-crates-io/crates/quiche/examples/ |
D | gen-certs.sh | 5 openssl req -new -batch -nodes -sha256 -keyout cert.key -out cert.csr -subj '/C=GB/CN=quic.tech' 6 openssl x509 -req -days 10000 -in cert.csr -CA rootca.crt -CAkey rootca.key -CAcreateserial -out ce… 7 openssl verify -CAfile rootca.crt cert.crt 8 cp cert.crt cert-big.crt 9 cat cert.crt >> cert-big.crt 10 cat cert.crt >> cert-big.crt 11 cat cert.crt >> cert-big.crt 12 cat cert.crt >> cert-big.crt 13 rm cert.csr
|
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_cert.cc | 150 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument 151 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 156 if (cert->chain) { in ssl_cert_dup() 158 cert->chain.get(), buffer_up_ref, CRYPTO_BUFFER_free)); in ssl_cert_dup() 164 ret->privatekey = UpRef(cert->privatekey); in ssl_cert_dup() 165 ret->key_method = cert->key_method; in ssl_cert_dup() 167 if (!ret->sigalgs.CopyFrom(cert->sigalgs)) { in ssl_cert_dup() 171 ret->cert_cb = cert->cert_cb; in ssl_cert_dup() 172 ret->cert_cb_arg = cert->cert_cb_arg; in ssl_cert_dup() 174 ret->x509_method->cert_dup(ret.get(), cert); in ssl_cert_dup() [all …]
|
D | ssl_x509.cc | 203 static bool ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() argument 206 if (cert->chain != nullptr) { in ssl_cert_set_chain() 213 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain.get(), 0); in ssl_cert_set_chain() 234 cert->chain = std::move(new_chain); in ssl_cert_set_chain() 238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument 239 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf() 240 cert->x509_leaf = nullptr; in ssl_crypto_x509_cert_flush_cached_leaf() 243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() argument 244 sk_X509_pop_free(cert->x509_chain, X509_free); in ssl_crypto_x509_cert_flush_cached_chain() 245 cert->x509_chain = nullptr; in ssl_crypto_x509_cert_flush_cached_chain() [all …]
|
/external/cronet/stable/net/tools/cert_verify_tool/ |
D | cert_verify_tool_util.cc | 33 CertInput cert; in ExtractCertificatesFromData() local 34 cert.der_cert = pem_tokenizer.data(); in ExtractCertificatesFromData() 35 cert.source_file_path = file_path; in ExtractCertificatesFromData() 36 cert.source_details = in ExtractCertificatesFromData() 38 certs->push_back(cert); in ExtractCertificatesFromData() 51 CertInput cert; in ExtractCertificatesFromData() local 52 cert.der_cert = std::string( in ExtractCertificatesFromData() 54 cert.source_file_path = file_path; in ExtractCertificatesFromData() 55 cert.source_details = base::StringPrintf("PKCS #7 cert %i", n); in ExtractCertificatesFromData() 56 certs->push_back(cert); in ExtractCertificatesFromData() [all …]
|
/external/cronet/tot/net/tools/cert_verify_tool/ |
D | cert_verify_tool_util.cc | 33 CertInput cert; in ExtractCertificatesFromData() local 34 cert.der_cert = pem_tokenizer.data(); in ExtractCertificatesFromData() 35 cert.source_file_path = file_path; in ExtractCertificatesFromData() 36 cert.source_details = in ExtractCertificatesFromData() 38 certs->push_back(cert); in ExtractCertificatesFromData() 51 CertInput cert; in ExtractCertificatesFromData() local 52 cert.der_cert = std::string( in ExtractCertificatesFromData() 54 cert.source_file_path = file_path; in ExtractCertificatesFromData() 55 cert.source_details = base::StringPrintf("PKCS #7 cert %i", n); in ExtractCertificatesFromData() 56 certs->push_back(cert); in ExtractCertificatesFromData() [all …]
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 28 CERT *cert; in __ssl_cert_new() local 33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 34 if (!cert) { in __ssl_cert_new() 47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new() 48 if (!cert->pkey) { in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 59 return cert; in __ssl_cert_new() 62 EVP_PKEY_free(cert->pkey); in __ssl_cert_new() 64 ssl_mem_free(cert); in __ssl_cert_new() [all …]
|
/external/conscrypt/api/platform/ |
D | current.txt | 77 …od public void checkClientTrusted(java.security.cert.X509Certificate[], String) throws java.securi… 78 … void checkClientTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav… 79 …d checkClientTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws… 80 …od public void checkServerTrusted(java.security.cert.X509Certificate[], String) throws java.securi… 81 …t<java.security.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], Str… 82 …ecurity.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], byte[], byt… 83 … void checkServerTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav… 84 …d checkServerTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws… 85 method public java.security.cert.X509Certificate[] getAcceptedIssuers(); 86 …security.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], Stri… [all …]
|
D | last-api.txt | 59 …od public void checkClientTrusted(java.security.cert.X509Certificate[], String) throws java.securi… 60 … void checkClientTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav… 61 …d checkClientTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws… 62 …t<java.security.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], Str… 63 …security.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], Stri… 64 …rity.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], String, … 70 …method public java.util.Set<java.security.cert.TrustAnchor> findAllByIssuerAndSignature(java.secur… 71 …method public java.security.cert.TrustAnchor findByIssuerAndSignature(java.security.cert.X509Certi… 72 …method public java.security.cert.TrustAnchor findBySubjectAndPublicKey(java.security.cert.X509Cert… 73 method public java.security.cert.TrustAnchor index(java.security.cert.X509Certificate); [all …]
|
/external/cronet/tot/net/cert/ |
D | x509_util_unittest.cc | 37 scoped_refptr<X509Certificate> cert( in TEST() local 39 ASSERT_TRUE(cert.get()); in TEST() 41 EXPECT_EQ("subject", cert->subject().common_name); in TEST() 42 EXPECT_EQ("org unit", cert->subject().organization_unit_names[0]); in TEST() 43 EXPECT_EQ("org", cert->subject().organization_names[0]); in TEST() 44 EXPECT_EQ("CA", cert->subject().country_name); in TEST() 45 EXPECT_FALSE(cert->HasExpired()); in TEST() 146 scoped_refptr<X509Certificate> cert = in TEST() local 148 ASSERT_TRUE(cert.get()); in TEST() 150 EXPECT_EQ("subject", cert->subject().GetDisplayName()); in TEST() [all …]
|
D | nss_cert_database.cc | 81 bool IsUntrustedUsingTrustStore(const CERTCertificate* cert, in IsUntrustedUsingTrustStore() argument 92 if (SECITEM_CompareItem(&cert->derIssuer, &cert->derSubject) == SECEqual) { in IsUntrustedUsingTrustStore() 108 ScopedCERTCertificate cert, in ImportCertFailure() argument 110 : certificate(std::move(cert)), net_error(err) {} in ImportCertFailure() 171 bool NSSCertDatabase::IsCertificateOnSlot(CERTCertificate* cert, in IsCertificateOnSlot() argument 176 return PK11_FindCertInSlot(slot, cert, nullptr) != CK_INVALID_HANDLE; in IsCertificateOnSlot() 214 bool NSSCertDatabase::SetCertTrust(CERTCertificate* cert, in SetCertTrust() argument 217 bool success = psm::SetCertTrust(cert, type, trust_bits); in SetCertTrust() 290 int NSSCertDatabase::ImportUserCert(CERTCertificate* cert) { in ImportUserCert() argument 291 int result = psm::ImportUserCert(cert, GetPublicSlot()); in ImportUserCert() [all …]
|
/external/cronet/stable/net/cert/ |
D | x509_util_unittest.cc | 37 scoped_refptr<X509Certificate> cert( in TEST() local 39 ASSERT_TRUE(cert.get()); in TEST() 41 EXPECT_EQ("subject", cert->subject().common_name); in TEST() 42 EXPECT_EQ("org unit", cert->subject().organization_unit_names[0]); in TEST() 43 EXPECT_EQ("org", cert->subject().organization_names[0]); in TEST() 44 EXPECT_EQ("CA", cert->subject().country_name); in TEST() 45 EXPECT_FALSE(cert->HasExpired()); in TEST() 146 scoped_refptr<X509Certificate> cert = in TEST() local 148 ASSERT_TRUE(cert.get()); in TEST() 150 EXPECT_EQ("subject", cert->subject().GetDisplayName()); in TEST() [all …]
|
D | nss_cert_database.cc | 81 bool IsUntrustedUsingTrustStore(const CERTCertificate* cert, in IsUntrustedUsingTrustStore() argument 92 if (SECITEM_CompareItem(&cert->derIssuer, &cert->derSubject) == SECEqual) { in IsUntrustedUsingTrustStore() 108 ScopedCERTCertificate cert, in ImportCertFailure() argument 110 : certificate(std::move(cert)), net_error(err) {} in ImportCertFailure() 171 bool NSSCertDatabase::IsCertificateOnSlot(CERTCertificate* cert, in IsCertificateOnSlot() argument 176 return PK11_FindCertInSlot(slot, cert, nullptr) != CK_INVALID_HANDLE; in IsCertificateOnSlot() 214 bool NSSCertDatabase::SetCertTrust(CERTCertificate* cert, in SetCertTrust() argument 217 bool success = psm::SetCertTrust(cert, type, trust_bits); in SetCertTrust() 290 int NSSCertDatabase::ImportUserCert(CERTCertificate* cert) { in ImportUserCert() argument 291 int result = psm::ImportUserCert(cert, GetPublicSlot()); in ImportUserCert() [all …]
|
/external/python/asn1crypto/tests/ |
D | test_x509.py | 72 def is_valid_domain_ip(self, cert, domain_ip, result): argument 73 cert = self._load_cert(cert) 74 self.assertEqual(result, cert.is_valid_domain_ip(domain_ip)) 470 cert = self._load_cert('chromium/ndn.ca.crt') 471 tbs_cert = cert['tbs_certificate'] 488 cert = self._load_cert('chromium/subjectAltName_sanity_check.pem') 489 alt_names = cert.subject_alt_name_value 506 cert = self._load_cert('geotrust_certs/codex.crt') 507 …self.assertEqual('78 1C 9F 87 59 93 52 08 D2 21 FA 70 6C C5 F9 76 12 C9 6D 8B', cert.sha1_fingerpr… 510 cert = self._load_cert('geotrust_certs/codex.crt') [all …]
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate; 49 for (X509Certificate cert : chain) { in check() 51 checkCert(cert); in check() 54 + cert.getSubjectX500Principal(), e); in check() 60 for (X509Certificate cert : chain) { in check() 62 checkCert(cert); in check() 65 + cert.getSubjectX500Principal(), e); in check() 70 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument 71 checkKeyLength(cert); in checkCert() [all …]
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate; 51 for (X509Certificate cert : chain) { in check() 53 checkCert(cert); in check() 56 + cert.getSubjectX500Principal(), e); in check() 62 for (X509Certificate cert : chain) { in check() 64 checkCert(cert); in check() 67 + cert.getSubjectX500Principal(), e); in check() 72 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument 73 checkKeyLength(cert); in checkCert() [all …]
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
D | TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 180 X509Certificate cert = readCertificate(file); in getCertificate() local 181 if (cert == null || (isSystem(alias) in getCertificate() 183 && isDeletedSystemCertificate(cert))) { in getCertificate() 187 return cert; in getCertificate() 232 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument 241 os.write(cert.getEncoded()); in writeCertificate() [all …]
|