Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 25 of 2027) sorted by relevance

12345678910>>...82

/external/cronet/stable/third_party/boringssl/src/pki/
Dparsed_certificate_unittest.cc42 std::shared_ptr<const ParsedCertificate> cert = ParsedCertificate::Create( in ParseCertificateFromFile() local
56 if (!cert) { in ParseCertificateFromFile()
60 return cert; in ParseCertificateFromFile()
73 std::shared_ptr<const ParsedCertificate> cert = in TEST() local
75 ASSERT_TRUE(cert); in TEST()
80 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST()
89 std::shared_ptr<const ParsedCertificate> cert = in TEST() local
91 ASSERT_TRUE(cert); in TEST()
96 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST()
153 std::shared_ptr<const ParsedCertificate> cert = in TEST() local
[all …]
Dverify_certificate_chain.cc27 const ParsedCertificate &cert) { in IsHandledCriticalExtension() argument
78 return cert.has_extended_key_usage(); in IsHandledCriticalExtension()
86 void VerifyNoUnconsumedCriticalExtensions(const ParsedCertificate &cert, in VerifyNoUnconsumedCriticalExtensions() argument
89 for (const auto &it : cert.extensions()) { in VerifyNoUnconsumedCriticalExtensions()
94 if (extension.critical && !IsHandledCriticalExtension(extension, cert)) { in VerifyNoUnconsumedCriticalExtensions()
113 [[nodiscard]] bool IsSelfIssued(const ParsedCertificate &cert) { in IsSelfIssued() argument
114 return cert.normalized_subject() == cert.normalized_issuer(); in IsSelfIssued()
124 void VerifyTimeValidity(const ParsedCertificate &cert, in VerifyTimeValidity() argument
126 if (time < cert.tbs().validity_not_before) { in VerifyTimeValidity()
130 if (cert.tbs().validity_not_after < time) { in VerifyTimeValidity()
[all …]
Dtrust_store_in_memory.cc17 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchor() argument
18 AddCertificate(std::move(cert), CertificateTrust::ForTrustAnchor()); in AddTrustAnchor()
22 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithExpiration() argument
23 AddCertificate(std::move(cert), in AddTrustAnchorWithExpiration()
28 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithConstraints() argument
30 std::move(cert), in AddTrustAnchorWithConstraints()
35 std::shared_ptr<const ParsedCertificate> cert) { in AddDistrustedCertificateForTest() argument
36 AddCertificate(std::move(cert), CertificateTrust::ForDistrusted()); in AddDistrustedCertificateForTest()
44 std::shared_ptr<const ParsedCertificate> cert) { in AddCertificateWithUnspecifiedTrust() argument
45 AddCertificate(std::move(cert), CertificateTrust::ForUnspecified()); in AddCertificateWithUnspecifiedTrust()
[all …]
/external/cronet/tot/third_party/boringssl/src/pki/
Dparsed_certificate_unittest.cc42 std::shared_ptr<const ParsedCertificate> cert = ParsedCertificate::Create( in ParseCertificateFromFile() local
56 if (!cert) { in ParseCertificateFromFile()
60 return cert; in ParseCertificateFromFile()
73 std::shared_ptr<const ParsedCertificate> cert = in TEST() local
75 ASSERT_TRUE(cert); in TEST()
80 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST()
89 std::shared_ptr<const ParsedCertificate> cert = in TEST() local
91 ASSERT_TRUE(cert); in TEST()
96 ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension)); in TEST()
153 std::shared_ptr<const ParsedCertificate> cert = in TEST() local
[all …]
Dverify_certificate_chain.cc27 const ParsedCertificate &cert) { in IsHandledCriticalExtension() argument
78 return cert.has_extended_key_usage(); in IsHandledCriticalExtension()
86 void VerifyNoUnconsumedCriticalExtensions(const ParsedCertificate &cert, in VerifyNoUnconsumedCriticalExtensions() argument
89 for (const auto &it : cert.extensions()) { in VerifyNoUnconsumedCriticalExtensions()
94 if (extension.critical && !IsHandledCriticalExtension(extension, cert)) { in VerifyNoUnconsumedCriticalExtensions()
113 [[nodiscard]] bool IsSelfIssued(const ParsedCertificate &cert) { in IsSelfIssued() argument
114 return cert.normalized_subject() == cert.normalized_issuer(); in IsSelfIssued()
124 void VerifyTimeValidity(const ParsedCertificate &cert, in VerifyTimeValidity() argument
126 if (time < cert.tbs().validity_not_before) { in VerifyTimeValidity()
130 if (cert.tbs().validity_not_after < time) { in VerifyTimeValidity()
[all …]
Dtrust_store_in_memory.cc17 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchor() argument
18 AddCertificate(std::move(cert), CertificateTrust::ForTrustAnchor()); in AddTrustAnchor()
22 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithExpiration() argument
23 AddCertificate(std::move(cert), in AddTrustAnchorWithExpiration()
28 std::shared_ptr<const ParsedCertificate> cert) { in AddTrustAnchorWithConstraints() argument
30 std::move(cert), in AddTrustAnchorWithConstraints()
35 std::shared_ptr<const ParsedCertificate> cert) { in AddDistrustedCertificateForTest() argument
36 AddCertificate(std::move(cert), CertificateTrust::ForDistrusted()); in AddDistrustedCertificateForTest()
44 std::shared_ptr<const ParsedCertificate> cert) { in AddCertificateWithUnspecifiedTrust() argument
45 AddCertificate(std::move(cert), CertificateTrust::ForUnspecified()); in AddCertificateWithUnspecifiedTrust()
[all …]
/external/rust/crates/openssl/src/x509/
Dtests.rs46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable
47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable
48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading()
58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable
59 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable
60 let debugged = format!("{:#?}", cert); in test_debug()
74 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable
75 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable
76 let not_before = cert.not_before().to_string(); in test_cert_issue_validity()
77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity()
[all …]
/external/wpa_supplicant_8/src/tls/
Dx509v3.c45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
59 os_free(cert); in x509_certificate_free()
[all …]
/external/libcups/scheduler/
Dcert.c40 cupsd_cert_t *cert; /* Current certificate */ in cupsdAddCert() local
53 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL) in cupsdAddCert()
60 cert->pid = pid; in cupsdAddCert()
61 cert->type = type; in cupsdAddCert()
62 strlcpy(cert->username, username, sizeof(cert->username)); in cupsdAddCert()
65 cert->certificate[i] = hex[CUPS_RAND() & 15]; in cupsdAddCert()
80 free(cert); in cupsdAddCert()
247 write(fd, cert->certificate, strlen(cert->certificate)); in cupsdAddCert()
254 cert->next = Certs; in cupsdAddCert()
255 Certs = cert; in cupsdAddCert()
[all …]
/external/rust/android-crates-io/crates/quiche/examples/
Dgen-certs.sh5 openssl req -new -batch -nodes -sha256 -keyout cert.key -out cert.csr -subj '/C=GB/CN=quic.tech'
6 openssl x509 -req -days 10000 -in cert.csr -CA rootca.crt -CAkey rootca.key -CAcreateserial -out ce…
7 openssl verify -CAfile rootca.crt cert.crt
8 cp cert.crt cert-big.crt
9 cat cert.crt >> cert-big.crt
10 cat cert.crt >> cert-big.crt
11 cat cert.crt >> cert-big.crt
12 cat cert.crt >> cert-big.crt
13 rm cert.csr
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/
Dssl_cert.cc150 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument
151 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup()
156 if (cert->chain) { in ssl_cert_dup()
158 cert->chain.get(), buffer_up_ref, CRYPTO_BUFFER_free)); in ssl_cert_dup()
164 ret->privatekey = UpRef(cert->privatekey); in ssl_cert_dup()
165 ret->key_method = cert->key_method; in ssl_cert_dup()
167 if (!ret->sigalgs.CopyFrom(cert->sigalgs)) { in ssl_cert_dup()
171 ret->cert_cb = cert->cert_cb; in ssl_cert_dup()
172 ret->cert_cb_arg = cert->cert_cb_arg; in ssl_cert_dup()
174 ret->x509_method->cert_dup(ret.get(), cert); in ssl_cert_dup()
[all …]
Dssl_x509.cc203 static bool ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() argument
206 if (cert->chain != nullptr) { in ssl_cert_set_chain()
213 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain.get(), 0); in ssl_cert_set_chain()
234 cert->chain = std::move(new_chain); in ssl_cert_set_chain()
238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument
239 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf()
240 cert->x509_leaf = nullptr; in ssl_crypto_x509_cert_flush_cached_leaf()
243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() argument
244 sk_X509_pop_free(cert->x509_chain, X509_free); in ssl_crypto_x509_cert_flush_cached_chain()
245 cert->x509_chain = nullptr; in ssl_crypto_x509_cert_flush_cached_chain()
[all …]
/external/cronet/stable/net/tools/cert_verify_tool/
Dcert_verify_tool_util.cc33 CertInput cert; in ExtractCertificatesFromData() local
34 cert.der_cert = pem_tokenizer.data(); in ExtractCertificatesFromData()
35 cert.source_file_path = file_path; in ExtractCertificatesFromData()
36 cert.source_details = in ExtractCertificatesFromData()
38 certs->push_back(cert); in ExtractCertificatesFromData()
51 CertInput cert; in ExtractCertificatesFromData() local
52 cert.der_cert = std::string( in ExtractCertificatesFromData()
54 cert.source_file_path = file_path; in ExtractCertificatesFromData()
55 cert.source_details = base::StringPrintf("PKCS #7 cert %i", n); in ExtractCertificatesFromData()
56 certs->push_back(cert); in ExtractCertificatesFromData()
[all …]
/external/cronet/tot/net/tools/cert_verify_tool/
Dcert_verify_tool_util.cc33 CertInput cert; in ExtractCertificatesFromData() local
34 cert.der_cert = pem_tokenizer.data(); in ExtractCertificatesFromData()
35 cert.source_file_path = file_path; in ExtractCertificatesFromData()
36 cert.source_details = in ExtractCertificatesFromData()
38 certs->push_back(cert); in ExtractCertificatesFromData()
51 CertInput cert; in ExtractCertificatesFromData() local
52 cert.der_cert = std::string( in ExtractCertificatesFromData()
54 cert.source_file_path = file_path; in ExtractCertificatesFromData()
55 cert.source_details = base::StringPrintf("PKCS #7 cert %i", n); in ExtractCertificatesFromData()
56 certs->push_back(cert); in ExtractCertificatesFromData()
[all …]
/external/libwebsockets/lib/tls/mbedtls/wrapper/library/
Dssl_cert.c28 CERT *cert; in __ssl_cert_new() local
33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new()
34 if (!cert) { in __ssl_cert_new()
47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new()
48 if (!cert->pkey) { in __ssl_cert_new()
53 cert->x509 = __X509_new(ix); in __ssl_cert_new()
54 if (!cert->x509) { in __ssl_cert_new()
59 return cert; in __ssl_cert_new()
62 EVP_PKEY_free(cert->pkey); in __ssl_cert_new()
64 ssl_mem_free(cert); in __ssl_cert_new()
[all …]
/external/conscrypt/api/platform/
Dcurrent.txt77 …od public void checkClientTrusted(java.security.cert.X509Certificate[], String) throws java.securi…
78 … void checkClientTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav…
79 …d checkClientTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws…
80 …od public void checkServerTrusted(java.security.cert.X509Certificate[], String) throws java.securi…
81 …t<java.security.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], Str…
82 …ecurity.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], byte[], byt…
83 … void checkServerTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav…
84 …d checkServerTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws…
85 method public java.security.cert.X509Certificate[] getAcceptedIssuers();
86 …security.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], Stri…
[all …]
Dlast-api.txt59 …od public void checkClientTrusted(java.security.cert.X509Certificate[], String) throws java.securi…
60 … void checkClientTrusted(java.security.cert.X509Certificate[], String, java.net.Socket) throws jav…
61 …d checkClientTrusted(java.security.cert.X509Certificate[], String, javax.net.ssl.SSLEngine) throws…
62 …t<java.security.cert.X509Certificate> checkServerTrusted(java.security.cert.X509Certificate[], Str…
63 …security.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], Stri…
64 …rity.cert.X509Certificate> getTrustedChainForServer(java.security.cert.X509Certificate[], String, …
70 …method public java.util.Set<java.security.cert.TrustAnchor> findAllByIssuerAndSignature(java.secur…
71 …method public java.security.cert.TrustAnchor findByIssuerAndSignature(java.security.cert.X509Certi…
72 …method public java.security.cert.TrustAnchor findBySubjectAndPublicKey(java.security.cert.X509Cert…
73 method public java.security.cert.TrustAnchor index(java.security.cert.X509Certificate);
[all …]
/external/cronet/tot/net/cert/
Dx509_util_unittest.cc37 scoped_refptr<X509Certificate> cert( in TEST() local
39 ASSERT_TRUE(cert.get()); in TEST()
41 EXPECT_EQ("subject", cert->subject().common_name); in TEST()
42 EXPECT_EQ("org unit", cert->subject().organization_unit_names[0]); in TEST()
43 EXPECT_EQ("org", cert->subject().organization_names[0]); in TEST()
44 EXPECT_EQ("CA", cert->subject().country_name); in TEST()
45 EXPECT_FALSE(cert->HasExpired()); in TEST()
146 scoped_refptr<X509Certificate> cert = in TEST() local
148 ASSERT_TRUE(cert.get()); in TEST()
150 EXPECT_EQ("subject", cert->subject().GetDisplayName()); in TEST()
[all …]
Dnss_cert_database.cc81 bool IsUntrustedUsingTrustStore(const CERTCertificate* cert, in IsUntrustedUsingTrustStore() argument
92 if (SECITEM_CompareItem(&cert->derIssuer, &cert->derSubject) == SECEqual) { in IsUntrustedUsingTrustStore()
108 ScopedCERTCertificate cert, in ImportCertFailure() argument
110 : certificate(std::move(cert)), net_error(err) {} in ImportCertFailure()
171 bool NSSCertDatabase::IsCertificateOnSlot(CERTCertificate* cert, in IsCertificateOnSlot() argument
176 return PK11_FindCertInSlot(slot, cert, nullptr) != CK_INVALID_HANDLE; in IsCertificateOnSlot()
214 bool NSSCertDatabase::SetCertTrust(CERTCertificate* cert, in SetCertTrust() argument
217 bool success = psm::SetCertTrust(cert, type, trust_bits); in SetCertTrust()
290 int NSSCertDatabase::ImportUserCert(CERTCertificate* cert) { in ImportUserCert() argument
291 int result = psm::ImportUserCert(cert, GetPublicSlot()); in ImportUserCert()
[all …]
/external/cronet/stable/net/cert/
Dx509_util_unittest.cc37 scoped_refptr<X509Certificate> cert( in TEST() local
39 ASSERT_TRUE(cert.get()); in TEST()
41 EXPECT_EQ("subject", cert->subject().common_name); in TEST()
42 EXPECT_EQ("org unit", cert->subject().organization_unit_names[0]); in TEST()
43 EXPECT_EQ("org", cert->subject().organization_names[0]); in TEST()
44 EXPECT_EQ("CA", cert->subject().country_name); in TEST()
45 EXPECT_FALSE(cert->HasExpired()); in TEST()
146 scoped_refptr<X509Certificate> cert = in TEST() local
148 ASSERT_TRUE(cert.get()); in TEST()
150 EXPECT_EQ("subject", cert->subject().GetDisplayName()); in TEST()
[all …]
Dnss_cert_database.cc81 bool IsUntrustedUsingTrustStore(const CERTCertificate* cert, in IsUntrustedUsingTrustStore() argument
92 if (SECITEM_CompareItem(&cert->derIssuer, &cert->derSubject) == SECEqual) { in IsUntrustedUsingTrustStore()
108 ScopedCERTCertificate cert, in ImportCertFailure() argument
110 : certificate(std::move(cert)), net_error(err) {} in ImportCertFailure()
171 bool NSSCertDatabase::IsCertificateOnSlot(CERTCertificate* cert, in IsCertificateOnSlot() argument
176 return PK11_FindCertInSlot(slot, cert, nullptr) != CK_INVALID_HANDLE; in IsCertificateOnSlot()
214 bool NSSCertDatabase::SetCertTrust(CERTCertificate* cert, in SetCertTrust() argument
217 bool success = psm::SetCertTrust(cert, type, trust_bits); in SetCertTrust()
290 int NSSCertDatabase::ImportUserCert(CERTCertificate* cert) { in ImportUserCert() argument
291 int result = psm::ImportUserCert(cert, GetPublicSlot()); in ImportUserCert()
[all …]
/external/python/asn1crypto/tests/
Dtest_x509.py72 def is_valid_domain_ip(self, cert, domain_ip, result): argument
73 cert = self._load_cert(cert)
74 self.assertEqual(result, cert.is_valid_domain_ip(domain_ip))
470 cert = self._load_cert('chromium/ndn.ca.crt')
471 tbs_cert = cert['tbs_certificate']
488 cert = self._load_cert('chromium/subjectAltName_sanity_check.pem')
489 alt_names = cert.subject_alt_name_value
506 cert = self._load_cert('geotrust_certs/codex.crt')
507 …self.assertEqual('78 1C 9F 87 59 93 52 08 D2 21 FA 70 6C C5 F9 76 12 C9 6D 8B', cert.sha1_fingerpr…
510 cert = self._load_cert('geotrust_certs/codex.crt')
[all …]
/external/conscrypt/common/src/main/java/org/conscrypt/
DChainStrengthAnalyzer.java19 import java.security.cert.CertificateException;
20 import java.security.cert.X509Certificate;
49 for (X509Certificate cert : chain) { in check()
51 checkCert(cert); in check()
54 + cert.getSubjectX500Principal(), e); in check()
60 for (X509Certificate cert : chain) { in check()
62 checkCert(cert); in check()
65 + cert.getSubjectX500Principal(), e); in check()
70 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument
71 checkKeyLength(cert); in checkCert()
[all …]
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DChainStrengthAnalyzer.java20 import java.security.cert.CertificateException;
21 import java.security.cert.X509Certificate;
51 for (X509Certificate cert : chain) { in check()
53 checkCert(cert); in check()
56 + cert.getSubjectX500Principal(), e); in check()
62 for (X509Certificate cert : chain) { in check()
64 checkCert(cert); in check()
67 + cert.getSubjectX500Principal(), e); in check()
72 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument
73 checkKeyLength(cert); in checkCert()
[all …]
/external/conscrypt/platform/src/main/java/org/conscrypt/
DTrustedCertificateStore.java26 import java.security.cert.Certificate;
27 import java.security.cert.CertificateException;
28 import java.security.cert.CertificateFactory;
29 import java.security.cert.X509Certificate;
180 X509Certificate cert = readCertificate(file); in getCertificate() local
181 if (cert == null || (isSystem(alias) in getCertificate()
183 && isDeletedSystemCertificate(cert))) { in getCertificate()
187 return cert; in getCertificate()
232 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument
241 os.write(cert.getEncoded()); in writeCertificate()
[all …]

12345678910>>...82