/development/testrunner/ |
create_test.py | 75 LOCAL_PACKAGE_NAME := ${MODULE_NAME}Tests${CERTIFICATE} 152 # include certificate definition if existent in makefile 153 certificate = mk.GetVariable(mk.CERTIFICATE) 154 if certificate: 155 cert_definition = ("\n%s := %s" % (mk.CERTIFICATE, certificate)) 160 mapping = {"MODULE_NAME":module_name, "CERTIFICATE":cert_definition}
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
X509CertFactoryImplTest.java | 27 import java.security.cert.Certificate; 51 Certificate cert; 53 // DER encoded certificate generation testing 58 assertNotNull("First generated certificate is null", cert); 60 assertNotNull("Second generated certificate is null", cert); 72 assertNotNull("First generated certificate is null", cert); 74 assertNotNull("Second generated certificate is null", cert); 89 // DER encoded certificate generation testing 203 X509Certificate certificate = test.certificate; local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 38 import org.apache.harmony.security.x509.Certificate; 55 * Certificate and Certificate Revocation List (CRL) Profile. 59 * Certificate ::= SEQUENCE { 115 * Certificate(TBSCertificate tbsCertificate, AlgorithmIdentifier 117 * Makes the certificate, gets its encoded form, makes new certificate 122 // make the TBSCertificate for Certificate 126 Name issuer = new Name("O=Certificate Issuer"); 167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]) local [all...] |
/external/webkit/Source/WebCore/platform/network/cf/ |
ResourceErrorCF.cpp | 49 ResourceError::ResourceError(const String& domain, int errorCode, const String& failingURL, const String& localizedDescription, CFDataRef certificate) 52 , m_certificate(certificate) 56 PCCERT_CONTEXT ResourceError::certificate() const function in class:WebCore::ResourceError
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/ |
BuildPreferencePage.java | 41 import java.security.cert.Certificate; 301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local 303 if (key == null || certificate == null) { 310 FingerprintUtils.getFingerprint(certificate, "MD5")); 315 FingerprintUtils.getFingerprint(certificate, "SHA1")); 319 if (certificate.getNotAfter().compareTo(today) < 0) { 320 showErrorMessage("Certificate is expired!"); 324 if (certificate.getNotBefore().compareTo(today) > 0) { 325 showErrorMessage("Certificate validity is in the future!");
|
/external/chromium/net/base/ |
test_root_certs_win.cc | 31 // certificate stores before the one provided internally by Crypt32.dll. 81 // Certificate verification happens on a non-joinable worker thread, which 125 // Attempting to add an individual certificate to |memory_store| causes 129 // trust the certificate. However, appending a store to the collection 132 // searched to see if a certificate is in the Root store, all the 133 // underlying stores in the collection will be searched, and any certificate 141 bool TestRootCerts::Add(X509Certificate* certificate) { 143 // If a test certificate is never added, then no interception should 148 temporary_roots_, certificate->os_cert_handle(), 151 // If the certificate is already added, return successfully [all...] |
cert_database.h | 26 // certificate store. 30 // certificate store. 35 // A CertDatabase::Observer will be notified on certificate database changes. 36 // The change could be either a new user certificate is added or trust on 37 // a certificate is changed. Observers can register themselves 44 // Will be called when a new user certificate is added. 48 // Will be called when a certificate's trust is changed. 59 // Stores per-certificate error codes for import failures. 65 scoped_refptr<X509Certificate> certificate; member in struct:net::CertDatabase::ImportCertFailure 70 // Constants that define which usages a certificate is trusted for [all...] |
cert_database_nss_unittest.cc | 297 EXPECT_EQ(certs[0], failed[0].certificate); 320 EXPECT_EQ("www.us.army.mil", failed[0].certificate->subject().common_name); 355 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name); 357 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name); 376 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name); 425 EXPECT_EQ("DOD CA-13", failed[0].certificate->subject().common_name); 427 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertSelectorTest.java | 22 import java.security.cert.Certificate; 133 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { 134 byte[] encoded = certificate.getEncoded();
|
CertificateFactoryTest.java | 40 import java.security.cert.Certificate; 61 "-----BEGIN CERTIFICATE-----\n" 79 + "-----END CERTIFICATE-----\n"; 82 "-----BEGIN CERTIFICATE-----\r\n" 100 + "-----END CERTIFICATE-----\r\n"; 102 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n" 124 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n" 128 "-----BEGIN CERTIFICATE-----\n" 163 + "-----END CERTIFICATE-----"; 184 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid)) 284 Certificate certificate = cf.generateCertificate(certStream); local 515 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
X509CRL2Test.java | 26 import java.security.cert.Certificate; 41 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRL2Test 63 + "-----END CERTIFICATE-----\n"; 68 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 194 public boolean isRevoked(Certificate cert) {
|
X509CRLTest.java | 40 import java.security.cert.Certificate; 59 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRLTest 73 + "-----END CERTIFICATE-----\n"; 75 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 86 public boolean isRevoked(Certificate cert) { 269 * getRevokedCertificate(X509Certificate certificate) method testing.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 55 public ContentVerifierProvider build(final X509Certificate certificate) 62 certHolder = new JcaX509CertificateHolder(certificate); 66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 90 sig.initVerify(certificate.getPublicKey()); 99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/external/webkit/Tools/Scripts/ |
new-run-webkit-websocketserver | 56 option_parser.add_option('-c', '--certificate', dest='certificate', 57 default='', help='TLS certificate file.') 89 if options.certificate: 90 kwds['certificate'] = options.certificate
|
/frameworks/base/core/java/android/net/http/ |
HttpConnection.java | 51 // Update the certificate info (connection not secure - set to null) 54 eventHandler.certificate(mCertificate);
|
/libcore/luni/src/main/java/javax/crypto/ |
Cipher.java | 31 import java.security.cert.Certificate; 713 * certificate. 719 * It the type of the certificate is X.509 and the certificate has a <i>key 725 * the certificate can not provide, the underlying implementation of this 737 * @param certificate 738 * the certificate. 740 * if the public key in the certificate can not be used to 743 public final void init(int opmode, Certificate certificate) [all...] |
/frameworks/base/keystore/java/android/security/ |
AndroidKeyStore.java | 39 import java.security.cert.Certificate; 63 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 68 * with a single certificate. 95 public Certificate[] engineGetCertificateChain(String alias) { 105 final Certificate[] caList; 111 caList = new Certificate[caChain.size() + 1]; 119 caList = new Certificate[1]; 128 public Certificate engineGetCertificate(String alias) { 133 byte[] certificate = mKeyStore.get(Credentials.USER_CERTIFICATE + alias); 134 if (certificate != null) [all...] |
/external/openssl/android.testssl/ |
CAss.cnf | 3 # This is mostly being used for generation of certificate requests. 42 certificate = $dir/cacert.pem # The CA certificate 51 cert_opt = ca_default # Certificate field options
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 7 import java.security.cert.Certificate; 24 // creating a certificate 25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl 39 + "-----END CERTIFICATE-----\n"; 41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 44 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 58 + "-----END CERTIFICATE-----\n"; 63 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n" [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CRLImpl.java | 36 import java.security.cert.Certificate; 209 // null means that revoked certificate issuer is the same as CRL issuer 216 // certificate issuer differs from CRL issuer 230 * Searches for certificate in CRL. 232 * into account serial number and issuer of the certificate, 234 * by serial number of the specified certificate. 238 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { 239 if (certificate == null) { 240 throw new NullPointerException("certificate == null"); 248 BigInteger serialN = certificate.getSerialNumber() [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLX509CRL.java | 34 import java.security.cert.Certificate; 290 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { 291 if (certificate instanceof OpenSSLX509Certificate) { 292 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate; 303 return getRevokedCertificate(certificate.getSerialNumber()); 347 public boolean isRevoked(Certificate cert) { 360 throw new RuntimeException("cannot convert certificate", e);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslidentity.cc | 49 // Random bits for certificate serial number 52 // Certificate validity lifetime 87 // Generate a self-signed certificate, with the public key from the 90 LOG(LS_INFO) << "Making certificate for " << common_name; 115 // (through the secure XMPP channel), and so the certificate 117 // arbitrary common_name. Note that this certificate goes out in 136 LOG(LS_INFO) << "Returning certificate"; 174 // Print a certificate to the log, for debugging. 198 LogSSLErrors("Generating certificate"); 254 OpenSSLCertificate *certificate local [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 51 import java.security.cert.Certificate; 148 .subject("CN=Test Root Certificate Authority") 153 .subject("CN=Test Intermediate Certificate Authority") 172 .subject("CN=Test Root Certificate Authority 2") 195 * Return a server keystore with a matched RSA certificate and 196 * private key as well as a CA certificate. 204 * Return a keystore with a CA certificate 212 * Return a client keystore with a matched RSA certificate and 213 * private key as well as a CA certificate. 221 * Return a keystore with a second CA certificate that does no 673 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 725 Certificate certificate = certificateEntry.getTrustedCertificate(); local 770 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 31 import java.security.cert.Certificate; 161 Certificate intermediate1 = pke1.getCertificateChain()[1]; 162 Certificate root1 = TestKeyStore.getClientCertificate().getRootCertificate("RSA"); 172 Certificate intermediate2 = pke2.getCertificateChain()[1]; 173 Certificate root2 = TestKeyStore.getServer().getRootCertificate("RSA"); 210 byte[] certificate = mService.getCertificate(alias1); 211 assertNotNull(certificate); 213 Arrays.toString(certificate));
|
/external/webkit/Source/WebKit2/Shared/cf/ |
ArgumentCodersCF.cpp | 195 RetainPtr<SecCertificateRef> certificate; local 196 if (!decode(decoder, certificate)) 198 result.adoptCF(certificate.leakRef()); 484 void encode(ArgumentEncoder* encoder, SecCertificateRef certificate) 486 RetainPtr<CFDataRef> data(AdoptCF, SecCertificateCopyData(certificate));
|