/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
badkey.pem | 4 -----BEGIN CERTIFICATE----- 20 -----END CERTIFICATE----- 24 -----BEGIN CERTIFICATE----- 40 -----END CERTIFICATE-----
|
sha256.pem | 0 # Certificate chain for https://sha256.tbs-internet.com 4 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 42 -----BEGIN CERTIFICATE----- 72 -----END CERTIFICATE----- 75 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 103 -----BEGIN CERTIFICATE----- 128 -----END CERTIFICATE-----
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
badcert.pem | 16 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE----- 34 -----BEGIN CERTIFICATE----- 36 -----END CERTIFICATE-----
|
badkey.pem | 4 -----BEGIN CERTIFICATE----- 20 -----END CERTIFICATE----- 24 -----BEGIN CERTIFICATE----- 40 -----END CERTIFICATE-----
|
sha256.pem | 0 # Certificate chain for https://sha256.tbs-internet.com 4 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 42 -----BEGIN CERTIFICATE----- 72 -----END CERTIFICATE----- 75 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 103 -----BEGIN CERTIFICATE----- 128 -----END CERTIFICATE-----
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyStoreSpi.java | 33 import java.security.cert.Certificate; 49 public Certificate[] engineGetCertificateChain(String alias) { 53 public Certificate engineGetCertificate(String alias) { 62 Certificate[] chain) throws KeyStoreException { 67 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) 73 public void engineSetCertificateEntry(String alias, Certificate cert) 104 public String engineGetCertificateAlias(Certificate cert) {
|
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_DummyPKCS12Keystore.java | 28 import java.security.cert.Certificate; 49 public Certificate[] engineGetCertificateChain(String arg0) { 54 public Certificate engineGetCertificate(String arg0) { 65 Certificate[] arg3) throws KeyStoreException { 69 public void engineSetKeyEntry(String arg0, byte[] arg1, Certificate[] arg2) 74 public void engineSetCertificateEntry(String arg0, Certificate arg1) 108 public String engineGetCertificateAlias(Certificate arg0) {
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustedCertificateKeyStoreSpi.java | 23 import java.security.cert.Certificate; 44 public Certificate[] engineGetCertificateChain(String alias) { 52 public Certificate engineGetCertificate(String alias) { 63 String alias, Key key, char[] password, Certificate[] chain) { 68 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) { 73 public void engineSetCertificateEntry(String alias, Certificate cert) { 114 public String engineGetCertificateAlias(Certificate c) {
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSTrustedCertificateEntryTest.java | 26 import java.security.cert.Certificate; 41 * Test for <codfe>KeyStore.TrustedCertificateEntry(Certificate trustCert)</code> 46 Certificate cert = null; 65 * Assertion: returns trusted Certificate from goven entry 68 Certificate cert = new MyCertificate("TEST", new byte[10]); 71 assertEquals("Incorrect certificate", cert, ksTCE.getTrustedCertificate()); 79 Certificate cert = new MyCertificate("TEST", new byte[10]);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateTest.java | 37 import java.security.cert.Certificate; 49 * Tests for <code>Certificate</code> fields and methods 60 * Test for <code>Certificate(String type)</code> method<br> 63 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding); 74 * Assertion: returns hash of the <code>Certificate</code> instance 78 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding); 79 Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding); 93 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding); 94 Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding); 103 * Assertion: returns this certificate typ [all...] |
/external/conscrypt/src/stub/java/com/android/org/conscrypt/ |
NativeCrypto.java | 26 * Verify that we trust the certificate chain is trusted. 31 * @throws CertificateException if the certificate is untrusted 37 * requires a certificate). The client can respond by using 39 * certificate if has an appropriate one available, similar to 40 * how the server provides its certificate.
|
/external/conscrypt/src/stub/java/org/apache/harmony/xnet/xnet/provider/jsse/ |
NativeCrypto.java | 26 * Verify that we trust the certificate chain is trusted. 31 * @throws CertificateException if the certificate is untrusted 37 * requires a certificate). The client can respond by using 39 * certificate if has an appropriate one available, similar to 40 * how the server provides its certificate.
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 24 import java.security.cert.Certificate; 34 for (Certificate certificate : chain.connection().getHandshake().peerCertificates()) { 35 String pin = CertificatePinner.pin(certificate); 37 throw new IOException("Blacklisted peer certificate: " + pin);
|
/libcore/luni/src/main/java/javax/security/cert/ |
Certificate.java | 38 public abstract class Certificate { 41 * Creates a new {@code Certificate}. 43 public Certificate() {} 46 * Compares the argument to this Certificate. If both have the same bytes 50 * the {@code Certificate} to compare with this object 52 * {@code Certificate}, <code>false</code> otherwise 59 if (!(obj instanceof Certificate)) { 62 Certificate object = (Certificate) obj; 91 * Returns the encoded representation for this certificate [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/ |
X509CertificateTest.java | 52 "-----BEGIN CERTIFICATE-----\n" + 69 "-----END CERTIFICATE-----"; 84 // The requested certificate type is not available. 88 // The requested certificate type is not available. 99 // The requested certificate type is not available. 115 // The requested certificate type is not available. 133 // The requested certificate type is not available. 143 // The requested certificate type is not available. 161 // The requested certificate type is not available. 188 // The requested certificate type is not available [all...] |
/external/lldb/docs/ |
code-signing.txt | 2 builds are set to code sign using a code signing certificate named 20 Keychain Access->Certificate Assistant->Create a Certificate... 26 Certificate Type = Code Signing 32 - Double click on your new lldb_codesign certificate 36 - Drag the new "lldb_codesign" code signing certificate (not the public or private 39 move this certificate to the "System" keychain. You'll have to authorize a few 50 - Drag the "lldb_codesign" certificate from the "System" keychain back into the 61 was built with this code signing certificate, you will need to authenticate once.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathBuilderSpi.java | 106 "Error finding target certificate.", e); 113 "No certificate found matching targetContraints."); 133 "Possible certificate chain could not be validated.", 140 "Unable to find certificate chain."); 158 // step out, the certificate is not allowed to appear in a certification 164 // test if certificate path exceeds maximum length 207 "Certification path could not be constructed from certificate list.", 234 // add additional X.509 stores from locations in certificate 243 "No additional X.509 stores can be added from certificate locations.", 247 // try to get the issuer certificate from on [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 17 import java.security.cert.Certificate; 31 public static final Certificate CERT = new MyCertificate("certtype", 33 public static final Certificate[] CERTCHAIN = new Certificate[] { 78 public Certificate engineGetCertificate(String alias) { 79 return (Certificate) aliases.get(alias); 83 public String engineGetCertificateAlias(Certificate cert) { 98 public Certificate[] engineGetCertificateChain(String alias) { 99 return (Certificate[]) aliases.get(alias); 128 Certificate c = (Certificate) aliases.get(alias) [all...] |
/bootable/recovery/ |
verifier_test.cpp | 160 static Certificate* add_certificate(Certificate** certsp, int* num_keys, 161 Certificate::KeyType key_type) { 164 *certsp = (Certificate*) realloc(*certsp, *num_keys * sizeof(Certificate)); 165 Certificate* certs = *certsp; 178 Certificate* certs = NULL; 189 Certificate* cert = &certs[num_keys - 1]; 193 Certificate* cert = add_certificate(&certs, &num_keys, Certificate::EC) [all...] |
/cts/tests/tests/security/tools/ |
format_cert.sh | 3 # Outputs the provided certificate (PEM or DER) in a format used by CTS tests. 5 # certificate, followed by the SHA-1 fingerprint. 24 # Input file containing the certificate in PEM or DER format 28 # is the certificate's subject hash produced by: 42 echo "Certificate file format is neither PEM nor DER" 53 # Output the certificate in the target format
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 38 import java.security.cert.Certificate; 71 // creating a certificate 72 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 86 + "-----END CERTIFICATE-----\n"; 88 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 91 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 105 + "-----END CERTIFICATE-----\n"; 110 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 129 + "-----END CERTIFICATE-----\n" [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 38 import org.apache.harmony.security.x509.Certificate; 55 * Certificate and Certificate Revocation List (CRL) Profile. 59 * Certificate ::= SEQUENCE { 115 * Certificate(TBSCertificate tbsCertificate, AlgorithmIdentifier 117 * Makes the certificate, gets its encoded form, makes new certificate 122 // make the TBSCertificate for Certificate 126 Name issuer = new Name("O=Certificate Issuer"); 167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]) local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory3Test.java | 28 import java.security.cert.Certificate; 85 * Assertion: returns Certificate 90 Certificate[] certs = new Certificate[3]; 101 * Assertion: returns Collection which consists of 1 Certificate 106 Certificate cert = certFs[0] 115 assertEquals("Incorrect Certificate in Collection", cert, it.next()); 121 * Assertion: returns CertPath with 1 Certificate 126 // create list of certificates with one certificate 127 Certificate cert = certFs[0 [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 25 import java.security.cert.Certificate; 35 * certificate in the benchmark loop, being careful to convert from the 36 * byte[] to the certificate each time. Otherwise the certificate class 38 * each certificate instance is verified once and then released. 73 final Certificate[] certificates = bytesToCertificates(encodedCertificates); 75 @Override public Certificate[] getPeerCertificates() { 83 private byte[][] certificatesToBytes(Certificate[] certificates) throws Exception { 91 private Certificate[] bytesToCertificates(byte[][] encodedCertificates) throws Exception { 93 Certificate[] result = new Certificate[encodedCertificates.length] [all...] |
/libcore/luni/src/main/java/java/util/jar/ |
JarEntry.java | 24 import java.security.cert.Certificate; 113 * Returns an array of {@code Certificate} Objects associated with this 123 * @see java.security.cert.Certificate 125 public Certificate[] getCertificates() { 134 Certificate[][] certChains = jarVerifier.getCertificateChains(getName()); 141 for (Certificate[] chain : certChains) { 146 Certificate[] certs = new Certificate[count]; 148 for (Certificate[] chain : certChains) { 195 private CodeSigner[] getCodeSigners(Certificate[][] certChains) [all...] |