/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCRL.java | 26 import java.security.cert.Certificate; 52 * @param cert <code>Certificate</code> to be checked 54 * @see java.security.cert.CRL#isRevoked(java.security.cert.Certificate) 56 public boolean isRevoked(Certificate cert) {
|
/packages/apps/Email/res/values-ldrtl/ |
styles-ldrtl.xml | 19 <!-- Client certificate UI --> 20 <!-- Client certificate 'select' button, see also styles.xml --> 28 <!-- Client certificate title, see also styles.xml --> 34 <!-- Client certificate alias, see also styles-ldrtl.xml -->
|
/packages/apps/KeyChain/res/values-en-rAU/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
|
/packages/apps/KeyChain/res/values-en-rGB/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
|
/packages/apps/KeyChain/res/values-en-rIN/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 22 import java.security.cert.Certificate; 28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>. 30 * @param certificate 33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 43 import java.security.cert.Certificate; 64 "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n"; 85 "-----BEGIN CERTIFICATE-----\r\n" 103 + "-----END CERTIFICATE-----\r\n"; 105 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n" 127 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n" 131 "-----BEGIN CERTIFICATE-----\n" 166 + "-----END CERTIFICATE-----"; 187 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid)) 287 Certificate certificate = cf.generateCertificate(certStream); local 518 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder [all...] |
SubjectAlternativeNameTest.java | 21 import java.security.cert.Certificate; 53 Certificate root = new TestKeyStore.Builder() 66 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { 67 byte[] encoded = certificate.getEncoded();
|
/bootable/recovery/ |
verifier.h | 38 } Certificate; 46 const Certificate *pKeys, unsigned int numKeys); 48 Certificate* load_keys(const char* filename, int* numKeys);
|
/developers/build/prebuilts/gradle/MediaBrowserService/Application/src/main/java/com/example/android/mediabrowserservice/ |
PackageValidator.java | 45 * Map allowed callers' certificate keys to the expected caller information. 66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 70 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 73 validCertificates.put(certificate, infos); 77 " certificate=", certificate); 107 LogHelper.w(TAG, "Caller has more than one signature certificate!"); 126 // Check if the package name is valid for the certificate: 137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any " [all...] |
/developers/samples/android/media/MediaBrowserService/Application/src/main/java/com/example/android/mediabrowserservice/ |
PackageValidator.java | 45 * Map allowed callers' certificate keys to the expected caller information. 66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 70 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 73 validCertificates.put(certificate, infos); 77 " certificate=", certificate); 107 LogHelper.w(TAG, "Caller has more than one signature certificate!"); 126 // Check if the package name is valid for the certificate: 137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any " [all...] |
/development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/ |
PackageValidator.java | 45 * Map allowed callers' certificate keys to the expected caller information. 66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 70 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 73 validCertificates.put(certificate, infos); 77 " certificate=", certificate); 107 LogHelper.w(TAG, "Caller has more than one signature certificate!"); 126 // Check if the package name is valid for the certificate: 137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any " [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
Holder.java | 14 * For an v2 attribute certificate this is: 20 * -- the holder's Public Key Certificate 30 * For an v1 attribute certificate this is: 35 * -- associated with a Public Key Certificate 73 * Constructor for a holder for an V1 attribute certificate. 94 * Constructor for a holder for an V2 attribute certificate. 135 * Constructs a holder from a IssuerSerial for a V1 or V2 certificate. 138 * @param version The version of the attribute certificate. 149 * @return The version of the attribute certificate. 171 * @param version The version of the attribute certificate. [all...] |
/libcore/luni/src/main/java/java/security/ |
CodeSource.java | 22 import java.security.cert.Certificate; 28 public CodeSource(URL location, Certificate[] certs) { } 32 public final Certificate[] getCertificates() { return null; }
|
UnresolvedPermission.java | 21 import java.security.cert.Certificate; 27 public UnresolvedPermission(String type, String name, String actions, Certificate[] certs) { 37 public Certificate[] getUnresolvedCerts() { return null; }
|
/libcore/luni/src/main/java/javax/net/ssl/ |
package.html | 14 customization of certificate chain verification. The 17 class allows the specification of a server's required certificate or a 18 client's optional client certificate. Android uses code
|
/packages/apps/Exchange/src/com/android/exchange/ |
EasCertificateRequestor.java | 26 * can request access to a certificate. 29 * activity requesting the certificate must be running in the process with the UID of who will 30 * actually use the certificate. Since the Exchange process needs to establish connections and use
|
/cts/tests/tests/telephony/src/android/telephony/cts/ |
SimRestrictedApisTest.java | 42 * a SecurityException since the test apk is not signed by a certificate on the SIM. 57 * signed by a certificate on the SIM. 72 * not signed by the certificate on the SIM. 87 * by certificate on the SIM. 102 * by certificate on the SIM. 117 * signed by a certificate on the SIM. 132 * signed by a certificate on the SIM. 147 * by certificate on the SIM. 161 * expects a SecurityException since the test apk is not signed by a certificate on the SIM. 175 * expects a SecurityException since the test apk is not signed by a certificate on the SIM [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V1CertificateGenerator.java | 30 import org.bouncycastle.asn1.x509.Certificate; 40 * class to produce an X.509 Version 1 certificate. 64 * set the serial number for the certificate. 79 * certificate. 96 * certificate. 181 * generate an X509 certificate, based on the current issuer and subject 200 * generate an X509 certificate, based on the current issuer and subject 220 * generate an X509 certificate, based on the current issuer and subject, 234 * generate an X509 certificate, based on the current issuer and subject, 268 * generate an X509 certificate, based on the current issuer and subjec [all...] |
/frameworks/base/docs/html/training/articles/ |
security-ssl.jd | 15 <li><a href="#UnknownCa">Unknown certificate authority</a></li> 16 <li><a href="#SelfSigned">Self-signed server certificate</a></li> 17 <li><a href="#MissingCa">Missing intermediate certificate authority</a></li> 51 <p>In a typical SSL usage scenario, a server is configured with a certificate containing a 53 and server, the server proves it has the private key by signing its certificate with <a 56 <p>However, anyone can generate their own certificate and private key, so a simple handshake 58 matches the public key of the certificate. One way to solve this problem is to have the client 59 have a set of one or more certificates it trusts. If the certificate is not in the set, the 64 certificate with a new one. Unfortunately, now the client app has to be updated due to what 72 href="http://en.wikipedia.org/wiki/Certificate_authority">Certificate Authorities (CAs)</a> [all...] |
/external/nist-sip/java/gov/nist/javax/sip/ |
TransactionExt.java | 4 import java.security.cert.Certificate; 56 * Get the certificate(s) that were sent to the peer during handshaking. 57 *@return the certificate(s) that were sent to the peer during handshaking. 61 Certificate[] getLocalCertificates() throws UnsupportedOperationException; 68 Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException;
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
FakeSSLSession.java | 20 import java.security.cert.Certificate; 27 private final Certificate[] certificates; 29 public FakeSSLSession(Certificate... certificates) throws Exception { 53 public Certificate[] getLocalCertificates() { 65 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 7 import java.security.cert.Certificate; 24 // creating a certificate 25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl 39 + "-----END CERTIFICATE-----\n"; 41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 44 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 58 + "-----END CERTIFICATE-----\n"; 63 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n" [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509CRLEntryHolder.java | 39 * Return the serial number of the certificate associated with this CRLEntry. 41 * @return the revoked certificate's serial number. 49 * Return the date on which the certificate associated with this CRLEntry was revoked. 51 * @return the revocation date for the revoked certificate. 69 * Return the available names for the certificate issuer for the certificate referred to by this CRL entry. 76 * @return the revoked certificate's issuer.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/ |
X509CertificateHolderSelector.java | 36 * certificate. 38 * @param issuer the issuer of the signer's associated certificate. 39 * @param serialNumber the serial number of the signer's associated certificate. 48 * certificate. 50 * @param issuer the issuer of the signer's associated certificate. 51 * @param serialNumber the serial number of the signer's associated certificate. 52 * @param subjectKeyId the subject key identifier to use to match the signers associated certificate.
|