/libcore/luni/src/test/java/tests/security/cert/ |
CollectionCertStoreParametersTest.java | 28 import java.security.cert.Certificate; 76 Vector<Certificate> certificates = new Vector<Certificate>(); 88 // a Certificate or CRL 90 certificates.add(new String("Not a Certificate")); 99 Vector<Certificate> certificates = new Vector<Certificate>(); 130 Vector<Certificate> certificates = new Vector<Certificate>(); 144 Vector<Certificate> certificates = new Vector<Certificate>() [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
CertificateValidator.java | 31 import java.security.cert.Certificate; 48 * Allows specifying Certificate Revocation List (CRL), as well as enabling 49 * CRL Distribution Points Protocol (CRLDP) certificate extension support, 50 * and also enabling On-Line Certificate Status Protocol (OCSP) support. 53 * operational, otherwise certificate validation *WILL FAIL* unconditionally. 67 /** On-Line Certificate Status Protocol (OCSP) support */ 73 * creates an instance of the certificate validator 137 throw new CertificateException("Unable to validate certificate" + 147 * validates a specific certificate inside of the keystore being passed in 153 public void validate(KeyStore keyStore, Certificate cert) throws CertificateExceptio [all...] |
/libcore/luni/src/main/java/java/security/ |
Identity.java | 43 private Vector<Certificate> certificates; 83 * Adds a {@code Certificate} to this {@code Identity}. 85 * @param certificate 86 * the {@code Certificate} to be added to this {@code Identity}. 88 * if the certificate is not valid. 90 public void addCertificate(Certificate certificate) throws KeyManagementException { 91 PublicKey certPK = certificate.getPublicKey(); 100 certificates = new Vector<Certificate>(); 102 certificates.add(certificate); [all...] |
package.html | 9 and defining services such as {@link java.security.Certificate Certificates},
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CertSelectorTest.java | 417 // Certificate Policies Extension (as specified in rfc 3280) 446 * setCertificate(X509Certificate certificate) method testing. 451 TestCert cert_1 = new TestCert("same certificate"); 452 TestCert cert_2 = new TestCert("other certificate"); 460 assertTrue("The certificate should match the selection criteria.", 462 assertFalse("The certificate should not match the selection criteria.", 465 assertTrue("The certificate should match the selection criteria.", 475 TestCert cert_1 = new TestCert("same certificate"); 476 TestCert cert_2 = new TestCert("other certificate"); 481 assertEquals("The returned certificate should be equal to specified" 1803 TestCert certificate = new TestCert(alt_names_extension); local 1955 TestCert certificate = new TestCert(alt_names_extension); local 2033 TestCert certificate = new TestCert(alt_names_extension); local 2142 org.apache.harmony.security.x509.Certificate certificate = local [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
ExtendedPKIXParameters.java | 155 * This model uses the following validity model. Each certificate must have 157 * certificate must have been valid at the time the signature was done. The 158 * CA certificate which signed the end certificate must have been valid, 159 * when the end certificate was signed. The CA (or Root CA) certificate must 160 * have been valid, when the CA certificate was signed and so on. So the 162 * the <em>end certificate</em> must have been valid. 386 * Returns the required constraints on the target certificate or attribute 387 * certificate. The constraints are returned as an instance o [all...] |
/external/vboot_reference/tests/testkeys/ |
key_rsa4096.crt | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE-----
|
/frameworks/base/media/java/android/media/ |
NotProvisionedException.java | 21 * and the device does not have a certificate. The app should obtain and 22 * install a certificate using the MediaDrm provisioning methods then retry
|
/libcore/luni/src/main/java/java/security/cert/ |
CertPathValidatorException.java | 23 * The exception that is thrown when a certification path (or certificate chain) 28 * certificate. 40 * the index of the certificate. 46 * message , cause, certification path and certificate index in the 56 * the index of the failed certificate. 62 * referencing an certificate in the certification path. 130 * Returns the index of the failed certificate in the certification path. 132 * @return the index of the failed certificate in the certification path, or
|
CertificateRevokedException.java | 30 * Exception that is thrown when a certificate is invalid because it has been 50 * @param revocationDate date the certificate was revoked 51 * @param reason reason the certificate was revoked if available 52 * @param authority authority that revoked the certificate 78 * Returns the date when the certificate was known to become invalid if 103 StringBuffer sb = new StringBuffer("Certificate was revoked"); 114 * Returns the date the certificate was revoked. 121 * Returns the reason the certificate was revoked if available.
|
CertPath.java | 29 * An immutable certificate path that can be validated. All certificates in the 39 * @see Certificate 48 * Creates a new {@code CertPath} instance for the specified certificate 52 * the certificate type. 59 * Returns the type of {@code Certificate} in this instance. 61 * @return the certificate type. 68 * Returns {@code true} if {@code Certificate}s in the list are the same 109 * Certificate}s in the {@code List}. 119 for (Iterator<? extends Certificate> i=getCertificates().iterator(); i.hasNext(); n++) { 120 sb.append("---------------certificate "); [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStoreSpi.java | 35 import java.security.cert.Certificate; 53 public Certificate[] engineGetCertificateChain(String alias) { 57 public Certificate engineGetCertificate(String alias) { 69 Certificate[] chain) throws KeyStoreException { 74 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) 80 public void engineSetCertificateEntry(String alias, Certificate cert) 124 public String engineGetCertificateAlias(Certificate cert) { 146 class MyCertificate extends Certificate {
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
https_svn_python_org_root.pem | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE-----
|
keycert.pem | 17 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE-----
|
wrongcert.pem | 16 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE-----
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
https_svn_python_org_root.pem | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE-----
|
keycert.pem | 17 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE-----
|
wrongcert.pem | 16 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE-----
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertStoreCollectionSpi.java | 10 import java.security.cert.Certificate; 47 if (obj instanceof Certificate) 59 if ((obj instanceof Certificate) && selector.match((Certificate)obj))
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample | 13 # racoon will look for certificate file in the directory, 14 # if the certificate/certificate request payload is received. 15 #path certificate "/usr/local/openssl/certs" ;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 1 path certificate "/etc/openssl/certs";
|
racoon.conf-radius | 1 path certificate "/etc/openssl/certs";
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CertificatePinning.java | 23 import java.security.cert.Certificate; 47 for (Certificate certificate : response.handshake().peerCertificates()) { 48 System.out.println(CertificatePinner.pin(certificate));
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 35 import java.security.cert.Certificate; 90 * Intent extra: install the certificate bundle as this UID instead of 106 * Intent extra: name for the user's certificate. 111 * Intent extra: data for the user's certificate in PEM-encoded X.509. 116 * Intent extra: name for CA certificate chain 121 * Intent extra: data for CA certificate chain in PEM-encoded X.509. 129 public static byte[] convertToPem(Certificate... objects) 134 for (Certificate o : objects) { 135 pw.writeObject(new PemObject("CERTIFICATE", o.getEncoded())); 155 if (o.getType().equals("CERTIFICATE")) { [all...] |