/libcore/luni/src/main/java/java/security/cert/ |
CertStoreSpi.java | 43 * Returns the list of {@code Certificate}s for the specified {@code 49 * @return the list of {@code Certificate}s that match the criteria of the 54 public abstract Collection<? extends Certificate> engineGetCertificates(CertSelector selector) 62 * the selector containing the criteria to search for certificate
|
X509CertSelector.java | 47 * A certificate selector ({@code CertSelector} for selecting {@code 83 * Sets the certificate that a matching certificate must be equal to. 85 * @param certificate 86 * the certificate to match, or null to not check this criteria. 88 public void setCertificate(X509Certificate certificate) { 89 certificateEquals = certificate; 93 * Returns the certificate that a matching certificate must be equal to. 95 * @return the certificate to match, or null if this criteria is no [all...] |
/libcore/luni/src/main/java/java/util/jar/ |
StrictJarFile.java | 24 import java.security.cert.Certificate; 98 * Return all certificate chains for a given {@link ZipEntry} belonging to this jar. 105 public Certificate[][] getCertificateChains(ZipEntry ze) { 124 public Certificate[] getCertificates(ZipEntry ze) { 126 Certificate[][] certChains = verifier.getCertificateChains(ze.getName()); 130 for (Certificate[] chain : certChains) { 135 Certificate[] certs = new Certificate[count]; 137 for (Certificate[] chain : certChains) {
|
/libcore/luni/src/main/java/javax/net/ssl/ |
X509ExtendedKeyManager.java | 37 * it with the specified public key type and certificate issuers. 42 * the list of certificate issuers, or {@code null} if any issuer 57 * it with the specified public key type and certificate issuers. 62 * the list of certificate issuers, or {@code null} if any issuer
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
CertificateIssuer.java | 28 * CRL Entry's Certificate Issuer Extension (OID = 2.5.29.29). 30 * the issuer of revoked certificate. Its ASN.1 notation is as follows: 41 /** certificate issuer value */ 59 sb.append(prefix).append("Certificate Issuer: ");
|
NameConstraints.java | 37 * with the following structure which is a part of X.509 certificate 40 * Certificate and Certificate Revocation List (CRL) Profile. 136 * Returns the value of certificate extension 154 * if specified name form is present in the certificate. 158 * names the same (i.e. method does not check if it CA's certificate or not, 161 * @param cert X.509 Certificate to be checked. 162 * @return true if the certificate is acceptable according 177 // the certificate is broken; 202 // presented in the certificate [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateCertificateRepTest.java | 10 import java.security.cert.Certificate; 28 * <code>Certificate.CertificateRep(String type, byte[] data)</code> 74 Certificate obj = (Certificate) rep1.readResolve();
|
/libcore/luni/src/test/java/tests/targets/security/ |
KeyStoreTest.java | 33 import java.security.cert.Certificate; 103 Certificate certificate = null; local 105 certificate = certificateFactory 114 generator = KeyPairGenerator.getInstance(certificate.getPublicKey() 123 .getPrivate(), new Certificate[] {certificate}); 167 private String encodedCertificate = "-----BEGIN CERTIFICATE-----\n" 189 + "-----END CERTIFICATE-----\n";
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 35 import java.security.cert.Certificate; 71 public Certificate[] engineGetCertificateChain(String alias) { 73 return (Certificate[]) Chain.get(alias); 78 public Certificate engineGetCertificate(String alias) { 80 return (Certificate) Cert.get(alias); 93 Certificate[] chain) throws KeyStoreException { 104 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) 125 public void engineSetCertificateEntry(String alias, Certificate cert) 174 public String engineGetCertificateAlias(Certificate cert) {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory4Test.java | 56 // Test for method java.security.cert.Certificate 99 // the certificate could not be found, skip it 120 // the certificate could not be found, skip it 142 // the certificate could not be found, skip it 254 * extends Certificate> certificates) 296 "-----BEGIN CERTIFICATE-----\n" 310 + "-----END CERTIFICATE-----\n", 313 "-----BEGIN CERTIFICATE-----\n" 327 + "-----END CERTIFICATE-----\n", 330 "-----BEGIN CERTIFICATE-----\n [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 73 * ca_cert - File path to CA certificate file (PEM/DER) 76 * and ca_path are not included, server certificate will not be 77 * verified. This is insecure and a trusted CA certificate should 86 * server certificate (SHA-256 hash of the DER encoded X.509 87 * certificate). In this case, the possible CA certificates in the 88 * server certificate chain are ignored and only the server certificate 95 * certificate store by setting this to cert_store://name, e.g., 98 * certificate store (My user account) is used, whereas computer store 104 * ca_path - Directory path for CA certificate files (PEM [all...] |
/external/openssh/ |
PROTOCOL.certkeys | 1 This document describes a simple public-key certificate authentication 15 system already in SSH to allow certificate-based authentication. The 45 algorithm names to add support for certificate authentication without 56 The certificate key types take a similar high-level format (note: data 63 RSA certificate 81 DSA certificate 101 ECDSA certificate 132 serial is an optional certificate serial number set by the CA to 137 type specifies whether this certificate is for identification of a user 146 certificate is valid; hostnames for SSH_CERT_TYPE_HOST certificates an [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 62 * A trust manager specific to a particular HostAuth. The first time a server certificate is 63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether 64 * the PublicKey of the certificate presented matches that of the saved certificate 109 Certificate storedCert = 154 * Optionally bypass all SSL certificate checks. 156 * @param insecure if true, bypass all SSL certificate checks 283 * a client certificate. 317 * for a client certificate (in millis since epoch) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
AttributeCertificateHolder.java | 30 * -- the holder's Public Key Certificate 59 * @param issuerName name of associated certificate's issuer. 60 * @param serialNumber serial number of associated certificate. 71 * Create a holder using the baseCertificateID option based on the passed in associated certificate, 73 * @param cert the certificate to be associated with this holder. 84 * @param principal the entityName to be associated with the attribute certificate. 99 * <li>1 - publicKeyCert - A hash of the public key certificate of the 105 * This cannot be used if a v1 attribute certificate is used. 128 * <li>1 - publicKeyCert - A hash of the public key certificate of the 230 * Return any principal objects inside the attribute certificate holde [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXExtendedParameters.java | 37 * This model uses the following validity model. Each certificate must have 39 * certificate must have been valid at the time the signature was done. The 40 * CA certificate which signed the end certificate must have been valid, 41 * when the end certificate was signed. The CA (or Root CA) certificate must 42 * have been valid, when the CA certificate was signed and so on. So the 44 * the <em>end certificate</em> must have been valid. 281 * Returns the required constraints on the target certificate. 287 * target certificate or attribute certificate (or <code>null</code> [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStore.java | 25 import java.security.cert.Certificate; 46 * @see Certificate 257 * Returns the certificate chain for the entry with the given alias. 261 * @return the certificate chain for the entry with the given alias, or 266 public final Certificate[] getCertificateChain(String alias) throws KeyStoreException { 274 * Returns the trusted certificate for the entry with the given alias. 278 * @return the trusted certificate for the entry with the given alias, or 283 public final Certificate getCertificate(String alias) throws KeyStoreException { 308 * Associates the given alias with the key, password and certificate chain. 319 * the certificate chain [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoGeneratorBuilder.java | 63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) 66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 30 import java.security.cert.Certificate; 42 * self-signed certificate for a single hostname such as "localhost". 84 // Generate public and private keys and use them to make a self-signed certificate. 86 X509Certificate certificate = selfSignedCertificate(keyPair, "1"); local 90 Certificate[] certificateChain = { certificate }; 92 keyStore.setCertificateEntry("cert", certificate); 114 * Generates a certificate for {@code hostName} containing {@code keyPair}'s
|
/external/vboot_reference/tests/testkeys/ |
key_rsa8192.crt | 1 -----BEGIN CERTIFICATE----- 54 -----END CERTIFICATE-----
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 11 # Certificate Object, type = X.509 cert 14 # Certificate Object, type = X.509 cert
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
X509CertificateTest.java | 53 import javax.security.cert.Certificate; 73 private static String base64cert = "-----BEGIN CERTIFICATE-----\n" 90 + "-----END CERTIFICATE-----"; 93 * a self-signed certificate 95 private static final String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" + 114 "-----END CERTIFICATE-----"; 126 private java.security.cert.Certificate javaSSCert; 130 private Certificate javaxSSCert; 158 // The requested certificate type is not available. 161 Logger.global.warning("Error in test setup: Certificate type not supported") [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateFactoryTestX509.java | 27 "-----BEGIN CERTIFICATE-----\n" 49 + "-----END CERTIFICATE-----\n";
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509TrustManagerImpl.java | 13 throw new IllegalArgumentException("null or zero-length certificate chain"); 28 throw new IllegalArgumentException("null or zero-length certificate chain");
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 31 import java.security.cert.Certificate; 161 Certificate intermediate1 = pke1.getCertificateChain()[1]; 162 Certificate root1 = TestKeyStore.getClientCertificate().getRootCertificate("RSA"); 172 Certificate intermediate2 = pke2.getCertificateChain()[1]; 173 Certificate root2 = TestKeyStore.getServer().getRootCertificate("RSA"); 210 byte[] certificate = mService.getCertificate(alias1); 211 assertNotNull(certificate); 213 Arrays.toString(certificate));
|
/packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
VpnInfo.java | 22 * Wrapper for VPN Profile and associated certificate files 27 // Certificate file in PC12 format for user certificates and private keys
|