HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 251 - 275 of 1381) sorted by null

<<11121314151617181920>>

  /libcore/luni/src/main/java/javax/net/ssl/
HttpsURLConnection.java 23 import java.security.cert.Certificate;
30 * negotiated cipher suite, the server certificate chain, and the
31 * client certificate chain if any.
35 * If an application wants to trust Certificate Authority (CA)
63 * case of allowing all certificate chains to pass verification,
74 * certificate and its associated private key to authenticate a
95 * can allow an application to return a certificate and private key
211 * the local identity certificate followed by CAs, or {@code null}
216 public abstract Certificate[] getLocalCertificates();
223 * identity certificate followed by CAs
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Identity2Test.java 24 import java.security.Certificate;
46 public static class CertificateImpl implements java.security.Certificate {
85 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test
99 + "-----END CERTIFICATE-----\n";
101 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes());
103 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
117 + "-----END CERTIFICATE-----\n";
254 java.security.Certificate[] certs = sub.certificates();
255 assertEquals("Certificate not contained in the identity"
    [all...]
  /docs/source.android.com/src/devices/tech/security/enhancements/
enhancements42.jd 24 <li><strong>Certificate Pinning</strong> - The Android core libraries now support
25 <a href="https://developer.android.com/reference/android/net/http/X509TrustManagerExtensions.html">certificate pinning</a>.
26 Pinned domains will receive a certificate validation
27 failure if the certificate does not chain to a set of expected certificates.
28 This protects against possible compromise of Certificate Authorities.</li>
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 34 import java.security.cert.Certificate;
55 // Certificate type used during testing
79 * constructed using self signed test certificate
117 * containing single element (self signed test certificate).
197 public void check(Certificate arg0, Collection arg1)
289 // X.509 encoded certificate
290 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n"
305 + "JDSM\n" + "-----END CERTIFICATE-----\n";
318 * Returns X.509 certificate encoding corresponding to version v1.
320 * Certificate encoding was created by hands according to X.509 Certificat
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
AttributeCertificateIssuer.java 6 import java.security.cert.Certificate;
23 * Carrying class for an attribute certificate issuer.
89 * Return any principal objects inside the attribute certificate issuer
141 public boolean match(Certificate cert)
206 return match((Certificate)obj);
  /frameworks/base/docs/html/tools/publishing/
app-signing-eclipse.jd 23 <p>Android requires that all apps be digitally signed with a certificate before they can be
24 installed. Android uses this certificate to identify the author of an app, and the certificate
25 does not need to be signed by a certificate authority.</p>
28 ADT plugin for Eclipse. For information about how to obtain a certificate for signing your app, see
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/
CertificateTest.java 35 import javax.security.cert.Certificate;
44 private class TBTCert extends Certificate {
70 * Test for <code>Certificate()</code> constructor<br>
76 assertEquals("Wrong string representation for Certificate", "TBTCert", tbt_cert.toString());
133 + "which is not an instance of Certificate", tbt_cert
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertPathValidatorTestPKIX.java 27 import java.security.cert.Certificate;
70 List<Certificate> certList = new ArrayList<Certificate>();
106 private String selfSignedCert = "-----BEGIN CERTIFICATE-----\n"
117 + "DC9BBx1sVKoji17RP4R8CTf1\n" + "-----END CERTIFICATE-----";
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestCertUtils.java 60 * Returns new instance of test certificate each time the method is called.
62 * @return test certificate
64 public static Certificate getCert() {
76 public static Certificate[] getCertChain() {
77 Certificate[] chain = { new TestCertificate(), new TestCertificate(),
96 * The second arguments shows which number will have the first Certificate
97 * in the CertPath. The second certificate will have (startID+1) number
101 * @param startID - specifies the starting ID which the first certificate will have
105 Certificate[] certs = new Certificate[howMany]
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreSpi.java 47 import java.security.cert.Certificate;
74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
79 * with a single certificate.
106 public Certificate[] engineGetCertificateChain(String alias) {
116 final Certificate[] caList;
122 caList = new Certificate[caChain.size() + 1];
130 caList = new Certificate[1];
139 public Certificate engineGetCertificate(String alias) {
154 // This entry/alias does not contain a certificate.
158 private Certificate getCertificateForTrustedCertificateEntry(byte[] encodedCert)
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HttpsURLConnectionTest.java 24 import java.security.cert.Certificate;
85 Certificate[] cert = con.getLocalCertificates();
183 Certificate[] cert = con.getServerCertificates();
285 public Certificate[] getLocalCertificates() {
290 Certificate cert = cf.generateCertificate(bis);
291 return new Certificate[] { cert };
300 public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException {
305 Certificate cert = cf.generateCertificate(bis);
306 return new Certificate[] { cert };
308 throw new SSLPeerUnverifiedException("No server's end-entity certificate");
    [all...]
  /external/boringssl/src/ssl/test/runner/
common.go 117 // Certificate types (for certificateRequestMsg)
119 CertTypeRSASign = 1 // A certificate containing an RSA key
120 CertTypeDSSSign = 2 // A certificate containing a DSA key
121 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key
122 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key
125 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
126 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
127 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
187 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /frameworks/base/keystore/java/android/security/
KeyPairGeneratorSpec.java 30 import java.security.cert.Certificate;
48 * {@link Certificate} chain.
50 * The KeyPair generator will create a self-signed certificate with the subject
55 * The self-signed X.509 certificate may be replaced at a later time by a
56 * certificate signed by a real Certificate Authority.
92 * {@link Certificate} chain.
94 * The KeyPair generator will create a self-signed certificate with the
107 * @param serialNumber X509 v3 certificate serial number
108 * @param startDate the start of the self-signed certificate validity perio
    [all...]
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
SslUtil.java 46 import java.security.cert.Certificate;
89 * Generates a new, self-signed X509 V1 certificate for a KeyPair.
93 * @return the new certificate
94 * @throws GeneralSecurityException on error generating the certificate
126 * Generates a new, self-signed X509 V3 certificate for a KeyPair.
133 * @return the new certificate
134 * @throws GeneralSecurityException on error generating the certificate
153 // about certificate and extension content. Quoting the `man verify`:
156 // the issuer name of the current certificate are subject to further
158 // certificate (if present) must match the subject key identifier (i
    [all...]
  /external/sepolicy/tools/
insertkeys.py 42 # Are we starting the certificate?
43 if line == "-----BEGIN CERTIFICATE-----":
45 sys.exit("Encountered another BEGIN CERTIFICATE without END CERTIFICATE on " +
51 elif line == "-----END CERTIFICATE-----":
53 sys.exit("Encountered END CERTIFICATE before BEGIN CERTIFICATE on line: "
56 # If we ended the certificate trip the flag
61 sys.exit("Empty certficate , certificate "+ str(certNo) + " found in file: "
64 # ... and append the certificate to the lis
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/
ConfigBuilder.java 32 import java.security.cert.Certificate;
141 Certificate[] chain = ks.getCertificateChain(alias);
144 for (Certificate certificate : chain) {
145 if (!(certificate instanceof X509Certificate)) {
147 certificate.getClass());
149 clientChain.add((X509Certificate) certificate);
217 Certificate cert = ks.getCertificate(alias);
273 throw new IOException("Invalid certificate type for TLS: " +
279 for (X509Certificate certificate : clientChain)
    [all...]
  /packages/apps/Browser/src/com/android/browser/
PageDialogsHandler.java 130 * this dialog was opened from the SSL-certificate-on-error dialog or
203 // if we have a main top-level page SSL certificate set or a certificate
207 // add a 'View Certificate' button
224 // otherwise, display the top-most certificate from
236 * Displays the main top-level page SSL certificate dialog
238 * @param tab The tab to show certificate for.
272 * Displays the SSL error certificate dialog.
336 * Creates an AlertDialog to display the given certificate. If error is
339 * certificate. In this case, error is used to add text describing th
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/
WifiEnterpriseConfig.java 402 * Set CA certificate alias.
405 * a certificate
407 * @param alias identifies the certificate
415 * Get CA certificate alias
416 * @return alias to the CA certificate
424 * Specify a X.509 certificate that identifies the server.
426 * <p>A default name is automatically assigned to the certificate and used
428 * certificate when the config is saved and removing the certificate when
431 * @param cert X.509 CA certificate
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
DefaultHostnameVerifierTest.java 25 import java.security.cert.Certificate;
146 new Certificate[] {new StubX509Certificate("cn=www.example.com")};
255 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
272 + "-----END CERTIFICATE-----");
280 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
296 + "-----END CERTIFICATE-----");
305 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
323 + "-----END CERTIFICATE-----");
334 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
351 + "-----END CERTIFICATE-----")
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.c 48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate",
58 * The new certificate is the issuer of the last certificate in
59 * the chain - add the new certificate to the end.
69 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
75 static const char *pem_cert_begin = "-----BEGIN CERTIFICATE-----";
76 static const char *pem_cert_end = "-----END CERTIFICATE-----";
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
116 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
124 "certificate end tag (%s)", pem_cert_end)
    [all...]
  /libcore/luni/src/main/java/java/util/jar/
JarVerifier.java 28 import java.security.cert.Certificate;
71 private final Hashtable<String, Certificate[]> certificates =
72 new Hashtable<String, Certificate[]>(5);
74 private final Hashtable<String, Certificate[][]> verifiedEntries =
75 new Hashtable<String, Certificate[][]>();
89 private final Certificate[][] certChains;
91 private final Hashtable<String, Certificate[][]> verifiedEntries;
94 Certificate[][] certChains, Hashtable<String, Certificate[][]> verifedEntries) {
187 ArrayList<Certificate[]> certChains = new ArrayList<Certificate[]>()
    [all...]
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
TestCertUtils.java 58 * Returns new instance of test certificate each time the method is called.
60 * @return test certificate
62 public static Certificate getCert() {
74 public static Certificate[] getCertChain() {
75 Certificate[] chain = { new TestCertificate(), new TestCertificate(),
94 * The second arguments shows which number will have the first Certificate
95 * in the CertPath. The second certificate will have (startID+1) number
99 * @param startID - specifies the starting ID which the first certificate will have
103 Certificate[] certs = new Certificate[howMany]
    [all...]
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 25 // Tests reading an X509 certificate from a PEM encoded string.
27 std::string pem = "-----BEGIN CERTIFICATE-----\n"
39 "-----END CERTIFICATE-----\n";
51 // Tests converting an X509 certificate to a PEM encoded string.
99 std::string expected = "-----BEGIN CERTIFICATE-----\n"
109 "-----END CERTIFICATE-----\n";
171 // Tests generating a self-signed certificate.
  /external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/
DelegatingHttpsURLConnection.java 28 import java.security.cert.Certificate;
63 @Override public Certificate[] getLocalCertificates() {
66 List<Certificate> result = handshake.localCertificates();
67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException {
73 List<Certificate> result = handshake.peerCertificates();
74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
  /libcore/luni/src/main/files/cacerts/
594f1775.0 1 -----BEGIN CERTIFICATE-----
19 -----END CERTIFICATE-----
20 Certificate:
25 Issuer: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
29 Subject: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
48 DirName: C = US, O = Equifax, OU = Equifax Secure Certificate Authority, CN = CRL1
53 Certificate Sign, CRL Sign

Completed in 271 milliseconds

<<11121314151617181920>>