/libcore/luni/src/main/java/java/security/cert/ |
PKIXBuilderParameters.java | 29 * certificate chains validated with the PKIX certification path validation. 31 * The parameters must be created with <i>trusted</i> certificate authorities 38 // Maximum certificate path length (5 by default) 43 * set of {@code TrustAnchor} and certificate constraints. 48 * the certificate constraints. 69 * the certificate constraints. 74 * certificate entry.
|
PKIXParameters.java | 35 * The parameters must be created with <i>trusted</i> certificate authorities 55 // Required constraints on the target certificate 66 // qualifiers in a certificate policies extension that 72 * <i>trusted</i> certificate authorities. 98 * certificate entry. 116 // this is trusted certificate entry 118 Certificate c = keyStore.getCertificate(alias); 130 * Returns a unmodifiable set of the <i>trusted</i> certificate authorities. 132 * @return a unmodifiable set of the <i>trusted</i> certificate authorities. 139 * Sets the set of <i>trusted</i> certificate authorities [all...] |
X509CRLEntry.java | 29 * Abstract base class for entries in a certificate revocation list (CRL). 90 * Returns the serial number of the revoked certificate. 92 * @return the serial number of the revoked certificate. 97 * Returns the issuer of the revoked certificate. 99 * @return the issuer of the revoked certificate, or {@code null} if the 107 * Returns the date when the certificate is revoked. 109 * @return the date when the certificate is revoked.
|
X509CRL.java | 34 * Abstract base class for X.509 certificate revocation lists (CRL). 37 * "Internet X.509 Public Key Infrastructure Certificate and CRL Profile" at <a 171 // TODO if there is no X.509 certificate provider installed 202 * Returns the CRL entry with the specified certificate serial number. 205 * the certificate serial number to search for a CRL entry. 206 * @return the entry for the specified certificate serial number, or {@code 212 * Returns the CRL entry for the specified certificate. 214 * @param certificate 215 * the certificate to search a CRL entry for. 216 * @return the entry for the specified certificate, or {@code null} if no [all...] |
CertificateFactorySpi.java | 28 * certificate type a security provider wishes to support. 40 * Generates and initializes a {@code Certificate} from the provided input 45 * certificate. 46 * @return an initialized certificate. 50 public abstract Certificate engineGenerateCertificate(InputStream inStream) 63 public abstract Collection<? extends Certificate> 67 * Generates and initializes a <i>Certificate Revocation List</i> (CRL) from 80 * Generates and initializes a collection of <i>Certificate Revocation 108 * Generates a {@code CertPath} (a certificate chain) from the given 135 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
HandshakeCompletedEvent.java | 21 import java.security.cert.Certificate; 70 * the local identity certificate followed by CAs, or {@code null} 73 public Certificate[] getLocalCertificates() { 82 * identity certificate followed by CAs. 86 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 92 * identity certificate is followed by the validated certificate authority
|
/external/apache-http/android/src/android/net/http/ |
CertificateChainValidator.java | 31 import java.security.cert.Certificate; 46 * Class responsible for all server certificate validation functionality 53 * The singleton instance of the certificate chain validator. 74 * Creates a new certificate chain validator. This is a private constructor. 75 * If you need a Certificate chain validator, call getInstance(). 102 * And if the last traced certificate is self issued and it is expired, it 118 Certificate[] peerCertificates = 125 // update the SSL certificate associated with the connection 150 throw new IllegalArgumentException("bad certificate chain"); 162 throw new IOException("can't read certificate", e) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 25 import org.bouncycastle.asn1.x509.Certificate; 31 * At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----" 38 private static final PEMUtil PEM_CERT_PARSER = new PEMUtil("CERTIFICATE"); 49 private java.security.cert.Certificate readDERCertificate( 68 Certificate.getInstance(seq)); 71 private java.security.cert.Certificate getCertificate() 83 Certificate.getInstance(obj)); 91 private java.security.cert.Certificate readPEMCertificate( 100 Certificate.getInstance(seq)) [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 64 Certificate[] certificates = session.getPeerCertificates(); 71 public boolean verify(String host, X509Certificate certificate) { 73 ? verifyIpAddress(host, certificate) 74 : verifyHostName(host, certificate); 82 * Returns true if {@code certificate} matches {@code ipAddress}. 84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); 95 * Returns true if {@code certificate} matches {@code hostName}. 97 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 76 // creating a certificate 77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 91 + "-----END CERTIFICATE-----\n"; 93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 95 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 109 + "-----END CERTIFICATE-----\n"; 113 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 132 + "-----END CERTIFICATE-----\n" [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 29 import org.bouncycastle.asn1.x509.Certificate; 41 * class to produce an X.509 Version 3 certificate. 68 * set the serial number for the certificate. 83 * certificate. 100 * certificate. 270 * copying the extension value from another certificate. 300 * copying the extension value from another certificate. 313 * generate an X509 certificate, based on the current issuer and subject 332 * generate an X509 certificate, based on the current issuer and subject 353 * generate an X509 certificate, based on the current issuer and subject [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
ChainStrengthAnalyzerTest.java | 32 "-----BEGIN CERTIFICATE-----\n" + 52 "-----END CERTIFICATE-----"; 58 "-----BEGIN CERTIFICATE-----\n" + 69 "-----END CERTIFICATE-----\n"; 75 "-----BEGIN CERTIFICATE-----\n" + 93 "-----END CERTIFICATE-----"; 98 "-----BEGIN CERTIFICATE-----\n" + 119 "-----END CERTIFICATE-----"; 124 "-----BEGIN CERTIFICATE-----\n" + 144 "-----END CERTIFICATE-----" [all...] |
/libcore/luni/src/main/java/javax/security/cert/ |
X509Certificate.java | 46 public abstract class X509Certificate extends Certificate { 69 * input stream containing data to initialize the certificate. 70 * @return the certificate initialized from the specified input stream 72 * if the certificate cannot be created or initialized. 202 * byte array containing data to initialize the certificate. 203 * @return the certificate initialized from the specified byte array 205 * if the certificate cannot be created or initialized. 217 * Checks whether the certificate is currently valid. 234 * if the certificate has expired. 236 * if the certificate is not yet valid [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactorySpiTest.java | 35 import java.security.cert.Certificate; 68 List<Certificate> list = null; 78 Certificate cc = certFactorySpi.engineGenerateCertificate(bais); 85 Collection<? extends Certificate> col = certFactorySpi.engineGenerateCertificates(bais); 148 Certificate cert = certFactorySpi 151 Collection<? extends Certificate> col = certFactorySpi 170 List<Certificate> list = null; 218 Certificate cert = certFactorySpi 221 Collection<? extends Certificate> col = certFactorySpi 240 List<Certificate> list = null [all...] |
CertificateFactory4Test.java | 35 import java.security.cert.Certificate; 59 // Test for method java.security.cert.Certificate 95 Collection<? extends Certificate> certs = fact.generateCertificates(is); 100 // the certificate could not be found, skip it 121 // the certificate could not be found, skip it 143 // the certificate could not be found, skip it 251 * extends Certificate> certificates) 257 (List<Certificate>) null); 290 "-----BEGIN CERTIFICATE-----\n" 304 + "-----END CERTIFICATE-----\n" [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 47 public static class CertificateImpl implements java.security.Certificate { 86 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 100 + "-----END CERTIFICATE-----\n"; 104 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 118 + "-----END CERTIFICATE-----\n"; 124 certArray = new ByteArrayInputStream(certificate 224 java.security.Certificate[] certs = sub.certificates(); 225 assertEquals("Certificate not contained in the identity", 230 * @tests java.security.Identity#addCertificate(java.security.Certificate) [all...] |
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 28 import java.security.cert.Certificate; 62 * Returns an input stream containing one or more certificate PEM files. This implementation just 72 + "-----BEGIN CERTIFICATE-----\n" 105 + "-----END CERTIFICATE-----\n"; 107 + "-----BEGIN CERTIFICATE-----\n" 133 + "-----END CERTIFICATE-----\n"; 146 * set. This is useful in development where certificate authority-trusted certificates aren't 147 * available. Or in production, to avoid reliance on third-party certificate authorities. 155 * operational complexity and limit your ability to migrate between certificate authorities. Do 162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
CertificatesToPlayWith.java | 41 * find 花子.co.jp. So would the CN in the certificate contain 52 "-----BEGIN CERTIFICATE-----\n" + 76 "-----END CERTIFICATE-----\n").getBytes(); 82 "-----BEGIN CERTIFICATE-----\n" + 106 "-----END CERTIFICATE-----\n").getBytes(); 112 "-----BEGIN CERTIFICATE-----\n" + 137 "-----END CERTIFICATE-----\n").getBytes(); 144 "-----BEGIN CERTIFICATE-----\n" + 169 "-----END CERTIFICATE-----\n").getBytes(); 175 "-----BEGIN CERTIFICATE-----\n" [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 52 import java.security.cert.Certificate; 149 .subject("CN=Test Root Certificate Authority") 154 .subject("CN=Test Intermediate Certificate Authority") 178 .subject("CN=Test Root Certificate Authority 2") 183 .subject("CN=Test Intermediate Certificate Authority") 216 * Return a server keystore with a matched RSA certificate and 217 * private key as well as a CA certificate. 225 * Return a keystore with a CA certificate 233 * Return a client keystore with a matched RSA certificate and 234 * private key as well as a CA certificate 725 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 778 Certificate certificate = certificateEntry.getTrustedCertificate(); local 823 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
IdentityTest.java | 111 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 112 * If the identity has a public key, the public key in the certificate must be the same 122 // try Certificate with different key 131 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 132 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate. 145 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul [all...] |
/libcore/luni/src/test/java/tests/java/security/ |
IdentityTest.java | 117 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 118 * If the identity has a public key, the public key in the certificate must be the same 129 // try Certificate with different key 137 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 138 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate. 151 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
HostnameVerifierTest.java | 49 + "-----BEGIN CERTIFICATE-----\n" 73 + "-----END CERTIFICATE-----\n"); 82 + "-----BEGIN CERTIFICATE-----\n" 106 + "-----END CERTIFICATE-----\n"); 114 + "-----BEGIN CERTIFICATE-----\n" 139 + "-----END CERTIFICATE-----\n"); 155 + "-----BEGIN CERTIFICATE-----\n" 180 + "-----END CERTIFICATE-----\n"); 196 + "-----BEGIN CERTIFICATE-----\n" 220 + "-----END CERTIFICATE-----\n") 396 X509Certificate certificate = certificate("" local 546 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
SSLNullSession.java | 24 import java.security.cert.Certificate; 82 public Certificate[] getLocalCertificates() { 99 throw new SSLPeerUnverifiedException("No peer certificate"); 103 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 104 throw new SSLPeerUnverifiedException("No peer certificate"); 119 throw new SSLPeerUnverifiedException("No peer certificate");
|
/external/openssh/ |
ssherr.c | 59 return "plain key provided where certificate required"; 61 return "key lacks certificate data"; 63 return "unknown/unsupported certificate type"; 65 return "invalid certificate signing key"; 77 return "invalid certificate"; 117 return "certificate does not match key";
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
SslCertificateTest.java | 30 * Problematic certificate from Issue 1597 34 "-----BEGIN CERTIFICATE-----\n"+ 44 "-----END CERTIFICATE-----\n"; 55 * Problematic certificate from Issue 41662 59 "-----BEGIN CERTIFICATE-----\n"+ 97 "-----END CERTIFICATE-----\n";
|