HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 76 - 100 of 124) sorted by null

1 2 34 5

  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java 27 import org.bouncycastle.asn1.x509.Certificate;
178 certList.add(new X509CertificateHolder(Certificate.getInstance(obj)));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 11 import java.security.cert.Certificate;
201 Certificate cert;
315 // pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded()));
322 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path");
346 * Return a DERObject containing the encoded certificate.
362 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
X509CertificateObject.java 17 import java.security.cert.Certificate;
76 private org.bouncycastle.asn1.x509.Certificate c;
85 org.bouncycastle.asn1.x509.Certificate c)
144 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
149 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
599 if (!(o instanceof Certificate))
604 Certificate other = (Certificate)o;
816 throw new SignatureException("certificate does not verify with supplied key");
X509CRLObject.java 13 import java.security.cert.Certificate;
514 * Checks whether the given certificate is on this CRL.
516 * @param cert the certificate to check for.
517 * @return true if the given certificate is on this CRL,
520 public boolean isRevoked(Certificate cert)
561 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
565 throw new RuntimeException("Cannot process certificate");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V1CertificateGenerator.java 30 import org.bouncycastle.asn1.x509.Certificate;
40 * class to produce an X.509 Version 1 certificate.
64 * set the serial number for the certificate.
79 * certificate.
96 * certificate.
181 * generate an X509 certificate, based on the current issuer and subject
200 * generate an X509 certificate, based on the current issuer and subject
220 * generate an X509 certificate, based on the current issuer and subject,
234 * generate an X509 certificate, based on the current issuer and subject,
268 * generate an X509 certificate, based on the current issuer and subjec
    [all...]
X509V3CertificateGenerator.java 30 import org.bouncycastle.asn1.x509.Certificate;
42 * class to produce an X.509 Version 3 certificate.
69 * set the serial number for the certificate.
84 * certificate.
101 * certificate.
271 * copying the extension value from another certificate.
301 * copying the extension value from another certificate.
314 * generate an X509 certificate, based on the current issuer and subject
333 * generate an X509 certificate, based on the current issuer and subject
354 * generate an X509 certificate, based on the current issuer and subject
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLX509CertPath.java 23 import java.security.cert.Certificate;
88 public List<? extends Certificate> getCertificates() {
OpenSSLX509CRL.java 33 import java.security.cert.Certificate;
288 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) {
289 if (certificate instanceof OpenSSLX509Certificate) {
290 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate;
301 return getRevokedCertificate(certificate.getSerialNumber());
345 public boolean isRevoked(Certificate cert) {
358 throw new RuntimeException("cannot convert certificate", e);
OpenSSLX509Certificate.java 30 import java.security.cert.Certificate;
160 public static OpenSSLX509Certificate fromCertificate(Certificate cert)
229 throw new CertificateNotYetValidException("Certificate not valid until "
234 throw new CertificateExpiredException("Certificate expired at "
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KSBuilder_ImplTest.java 36 import java.security.cert.Certificate;
139 Certificate certs[] = {
491 * Additional class for creation Certificate object
493 public class MCertificate extends Certificate {
KeyStore_Impl1Test.java 34 import java.security.cert.Certificate;
237 * <code>setKeyEntry(String alias, Key key, char[] password, Certificate[] chain)</code>
238 * <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code>
239 * <code>setCertificateEntry(String alias, Certificate cert)</code>
246 * <code>getCertificateAlias(Certificate cert)</code>
292 kss[i].setKeyEntry("", null, new char[0], new Certificate[0]);
297 kss[i].setKeyEntry("", new byte[0], new Certificate[0]);
369 * used trusted certificate.
428 assertEquals("Incorrect certificate",
432 assertEquals("Incorrect certificate", kss[i
    [all...]
KeyStore_Impl2Test.java 34 import java.security.cert.Certificate;
253 Certificate[] chain = { mc };
  /external/conscrypt/src/test/java/org/conscrypt/
TrustManagerImplTest.java 21 import java.security.cert.Certificate;
105 // We should ignore duplicate cruft in the certificate chain
316 public Certificate[] getLocalCertificates() {
337 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
  /external/apache-harmony/security/src/test/impl/java.injected/java/security/
Signature_Impl2Test.java 231 private class MyCertificate extends java.security.cert.Certificate {
  /external/nist-pkits/
extract-pkits-tests.pl 145 if ($_ =~ /^\s*4\.8 Certificate Policies\s*$/) {
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStoreTest.java 35 import java.security.cert.Certificate;
142 * Test for <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code>
155 Certificate certs[] = {
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory2Test.java 32 import java.security.cert.Certificate;
141 Certificate cert = certFactory.generateCertificate(dis);
  /external/apache-harmony/security/src/test/api/java.injected/java/security/
SecureClassLoaderTest.java 27 import java.security.cert.Certificate;
182 CodeSource cs = new CodeSource(url, (Certificate[]) null);
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 34 import java.security.cert.Certificate;
55 // Certificate type used during testing
79 * constructed using self signed test certificate
117 * containing single element (self signed test certificate).
197 public void check(Certificate arg0, Collection arg1)
289 // X.509 encoded certificate
290 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n"
305 + "JDSM\n" + "-----END CERTIFICATE-----\n";
318 * Returns X.509 certificate encoding corresponding to version v1.
320 * Certificate encoding was created by hands according to X.509 Certificat
    [all...]
  /external/emma/core/java12/com/vladium/emma/rt/
InstrClassLoader.java 19 import java.security.cert.Certificate;
347 final CodeSource csrc = new CodeSource (srcURL, (Certificate[])null);
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
SslUtil.java 45 import java.security.cert.Certificate;
88 * Generates a new, self-signed X509 V1 certificate for a KeyPair.
92 * @return the new certificate
93 * @throws GeneralSecurityException on error generating the certificate
125 * Generates a new, self-signed X509 V3 certificate for a KeyPair.
132 * @return the new certificate
133 * @throws GeneralSecurityException on error generating the certificate
152 // about certificate and extension content. Quoting the `man verify`:
155 // the issuer name of the current certificate are subject to further
157 // certificate (if present) must match the subject key identifier (i
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 17 import java.security.cert.Certificate;
74 private org.bouncycastle.asn1.x509.Certificate c;
83 org.bouncycastle.asn1.x509.Certificate c)
142 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
147 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
597 if (!(o instanceof Certificate))
602 Certificate other = (Certificate)o;
814 throw new SignatureException("certificate does not verify with supplied key");
X509CRLObject.java 13 import java.security.cert.Certificate;
512 * Checks whether the given certificate is on this CRL.
514 * @param cert the certificate to check for.
515 * @return true if the given certificate is on this CRL,
518 public boolean isRevoked(Certificate cert)
559 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
563 throw new RuntimeException("Cannot process certificate");
  /external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/
SerializationTest.java 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts();
365 java.security.cert.Certificate[] certs = initPerm
  /external/chromium_org/net/android/java/src/org/chromium/net/
X509Util.java 28 import java.security.cert.Certificate;
124 * Trust manager backed up by the read-only system certificate store.
129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate
135 * Trust manager backed up by a custom certificate store. We need such manager to plant test
174 * Allow disabling registering the observer and recording histograms for the certificate
176 * the system does not allow to interact with the certificate store without user interaction.
181 * Ensures that the trust managers and certificate factory are initialized.
282 * Convert a DER encoded certificate to an X509Certificate.
361 Certificate anchor = sSystemKeyStore.getCertificate("system:" + alias);
363 // that case, the certificate remains in the system directory but is also added t
    [all...]

Completed in 4306 milliseconds

1 2 34 5