HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 151 - 175 of 1381) sorted by null

1 2 3 4 5 67 8 91011>>

  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCRL.java 26 import java.security.cert.Certificate;
52 * @param cert <code>Certificate</code> to be checked
54 * @see java.security.cert.CRL#isRevoked(java.security.cert.Certificate)
56 public boolean isRevoked(Certificate cert) {
  /packages/apps/Email/res/values-ldrtl/
styles-ldrtl.xml 19 <!-- Client certificate UI -->
20 <!-- Client certificate 'select' button, see also styles.xml -->
28 <!-- Client certificate title, see also styles.xml -->
34 <!-- Client certificate alias, see also styles-ldrtl.xml -->
  /packages/apps/KeyChain/res/values-en-rAU/
strings.xml 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string>
22 <string name="requesting_application" msgid="1589142627467598421">"The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string>
23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
  /packages/apps/KeyChain/res/values-en-rGB/
strings.xml 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string>
22 <string name="requesting_application" msgid="1589142627467598421">"The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string>
23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
  /packages/apps/KeyChain/res/values-en-rIN/
strings.xml 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string>
22 <string name="requesting_application" msgid="1589142627467598421">"The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string>
23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/
FingerprintUtils.java 22 import java.security.cert.Certificate;
28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>.
30 * @param certificate
33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
  /libcore/luni/src/test/java/libcore/java/security/cert/
CertificateFactoryTest.java 43 import java.security.cert.Certificate;
64 "-----BEGIN CERTIFICATE-----\n"
82 + "-----END CERTIFICATE-----\n";
85 "-----BEGIN CERTIFICATE-----\r\n"
103 + "-----END CERTIFICATE-----\r\n";
105 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n"
127 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n"
131 "-----BEGIN CERTIFICATE-----\n"
166 + "-----END CERTIFICATE-----";
187 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid))
287 Certificate certificate = cf.generateCertificate(certStream); local
518 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder
    [all...]
SubjectAlternativeNameTest.java 21 import java.security.cert.Certificate;
53 Certificate root = new TestKeyStore.Builder()
66 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception {
67 byte[] encoded = certificate.getEncoded();
  /bootable/recovery/
verifier.h 38 } Certificate;
46 const Certificate *pKeys, unsigned int numKeys);
48 Certificate* load_keys(const char* filename, int* numKeys);
  /developers/build/prebuilts/gradle/MediaBrowserService/Application/src/main/java/com/example/android/mediabrowserservice/
PackageValidator.java 45 * Map allowed callers' certificate keys to the expected caller information.
66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local
68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
70 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
73 validCertificates.put(certificate, infos);
77 " certificate=", certificate);
107 LogHelper.w(TAG, "Caller has more than one signature certificate!");
126 // Check if the package name is valid for the certificate:
137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any "
    [all...]
  /developers/samples/android/media/MediaBrowserService/Application/src/main/java/com/example/android/mediabrowserservice/
PackageValidator.java 45 * Map allowed callers' certificate keys to the expected caller information.
66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local
68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
70 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
73 validCertificates.put(certificate, infos);
77 " certificate=", certificate);
107 LogHelper.w(TAG, "Caller has more than one signature certificate!");
126 // Check if the package name is valid for the certificate:
137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any "
    [all...]
  /development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/
PackageValidator.java 45 * Map allowed callers' certificate keys to the expected caller information.
66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local
68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
70 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
73 validCertificates.put(certificate, infos);
77 " certificate=", certificate);
107 LogHelper.w(TAG, "Caller has more than one signature certificate!");
126 // Check if the package name is valid for the certificate:
137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any "
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
Holder.java 14 * For an v2 attribute certificate this is:
20 * -- the holder's Public Key Certificate
30 * For an v1 attribute certificate this is:
35 * -- associated with a Public Key Certificate
73 * Constructor for a holder for an V1 attribute certificate.
94 * Constructor for a holder for an V2 attribute certificate.
135 * Constructs a holder from a IssuerSerial for a V1 or V2 certificate.
138 * @param version The version of the attribute certificate.
149 * @return The version of the attribute certificate.
171 * @param version The version of the attribute certificate.
    [all...]
  /libcore/luni/src/main/java/java/security/
CodeSource.java 22 import java.security.cert.Certificate;
28 public CodeSource(URL location, Certificate[] certs) { }
32 public final Certificate[] getCertificates() { return null; }
UnresolvedPermission.java 21 import java.security.cert.Certificate;
27 public UnresolvedPermission(String type, String name, String actions, Certificate[] certs) {
37 public Certificate[] getUnresolvedCerts() { return null; }
  /libcore/luni/src/main/java/javax/net/ssl/
package.html 14 customization of certificate chain verification. The
17 class allows the specification of a server's required certificate or a
18 client's optional client certificate. Android uses code
  /packages/apps/Exchange/src/com/android/exchange/
EasCertificateRequestor.java 26 * can request access to a certificate.
29 * activity requesting the certificate must be running in the process with the UID of who will
30 * actually use the certificate. Since the Exchange process needs to establish connections and use
  /cts/tests/tests/telephony/src/android/telephony/cts/
SimRestrictedApisTest.java 42 * a SecurityException since the test apk is not signed by a certificate on the SIM.
57 * signed by a certificate on the SIM.
72 * not signed by the certificate on the SIM.
87 * by certificate on the SIM.
102 * by certificate on the SIM.
117 * signed by a certificate on the SIM.
132 * signed by a certificate on the SIM.
147 * by certificate on the SIM.
161 * expects a SecurityException since the test apk is not signed by a certificate on the SIM.
175 * expects a SecurityException since the test apk is not signed by a certificate on the SIM
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V1CertificateGenerator.java 30 import org.bouncycastle.asn1.x509.Certificate;
40 * class to produce an X.509 Version 1 certificate.
64 * set the serial number for the certificate.
79 * certificate.
96 * certificate.
181 * generate an X509 certificate, based on the current issuer and subject
200 * generate an X509 certificate, based on the current issuer and subject
220 * generate an X509 certificate, based on the current issuer and subject,
234 * generate an X509 certificate, based on the current issuer and subject,
268 * generate an X509 certificate, based on the current issuer and subjec
    [all...]
  /frameworks/base/docs/html/training/articles/
security-ssl.jd 15 <li><a href="#UnknownCa">Unknown certificate authority</a></li>
16 <li><a href="#SelfSigned">Self-signed server certificate</a></li>
17 <li><a href="#MissingCa">Missing intermediate certificate authority</a></li>
51 <p>In a typical SSL usage scenario, a server is configured with a certificate containing a
53 and server, the server proves it has the private key by signing its certificate with <a
56 <p>However, anyone can generate their own certificate and private key, so a simple handshake
58 matches the public key of the certificate. One way to solve this problem is to have the client
59 have a set of one or more certificates it trusts. If the certificate is not in the set, the
64 certificate with a new one. Unfortunately, now the client app has to be updated due to what
72 href="http://en.wikipedia.org/wiki/Certificate_authority">Certificate Authorities (CAs)</a>
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/
TransactionExt.java 4 import java.security.cert.Certificate;
56 * Get the certificate(s) that were sent to the peer during handshaking.
57 *@return the certificate(s) that were sent to the peer during handshaking.
61 Certificate[] getLocalCertificates() throws UnsupportedOperationException;
68 Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException;
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
FakeSSLSession.java 20 import java.security.cert.Certificate;
27 private final Certificate[] certificates;
29 public FakeSSLSession(Certificate... certificates) throws Exception {
53 public Certificate[] getLocalCertificates() {
65 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
X509KeyManagerImpl.java 7 import java.security.cert.Certificate;
24 // creating a certificate
25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl
39 + "-----END CERTIFICATE-----\n";
41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
44 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
58 + "-----END CERTIFICATE-----\n";
63 String certificate3 = "-----BEGIN CERTIFICATE-----\n"
82 + "-----END CERTIFICATE-----\n"
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
X509CRLEntryHolder.java 39 * Return the serial number of the certificate associated with this CRLEntry.
41 * @return the revoked certificate's serial number.
49 * Return the date on which the certificate associated with this CRLEntry was revoked.
51 * @return the revocation date for the revoked certificate.
69 * Return the available names for the certificate issuer for the certificate referred to by this CRL entry.
76 * @return the revoked certificate's issuer.
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/
X509CertificateHolderSelector.java 36 * certificate.
38 * @param issuer the issuer of the signer's associated certificate.
39 * @param serialNumber the serial number of the signer's associated certificate.
48 * certificate.
50 * @param issuer the issuer of the signer's associated certificate.
51 * @param serialNumber the serial number of the signer's associated certificate.
52 * @param subjectKeyId the subject key identifier to use to match the signers associated certificate.

Completed in 653 milliseconds

1 2 3 4 5 67 8 91011>>