/libcore/luni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 23 import java.security.cert.Certificate; 30 * negotiated cipher suite, the server certificate chain, and the 31 * client certificate chain if any. 35 * If an application wants to trust Certificate Authority (CA) 63 * case of allowing all certificate chains to pass verification, 74 * certificate and its associated private key to authenticate a 95 * can allow an application to return a certificate and private key 211 * the local identity certificate followed by CAs, or {@code null} 216 public abstract Certificate[] getLocalCertificates(); 223 * identity certificate followed by CAs [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 24 import java.security.Certificate; 46 public static class CertificateImpl implements java.security.Certificate { 85 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 99 + "-----END CERTIFICATE-----\n"; 101 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 103 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 117 + "-----END CERTIFICATE-----\n"; 254 java.security.Certificate[] certs = sub.certificates(); 255 assertEquals("Certificate not contained in the identity" [all...] |
/docs/source.android.com/src/devices/tech/security/enhancements/ |
enhancements42.jd | 24 <li><strong>Certificate Pinning</strong> - The Android core libraries now support 25 <a href="https://developer.android.com/reference/android/net/http/X509TrustManagerExtensions.html">certificate pinning</a>. 26 Pinned domains will receive a certificate validation 27 failure if the certificate does not chain to a set of expected certificates. 28 This protects against possible compromise of Certificate Authorities.</li>
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 34 import java.security.cert.Certificate; 55 // Certificate type used during testing 79 * constructed using self signed test certificate 117 * containing single element (self signed test certificate). 197 public void check(Certificate arg0, Collection arg1) 289 // X.509 encoded certificate 290 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n" 305 + "JDSM\n" + "-----END CERTIFICATE-----\n"; 318 * Returns X.509 certificate encoding corresponding to version v1. 320 * Certificate encoding was created by hands according to X.509 Certificat [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
AttributeCertificateIssuer.java | 6 import java.security.cert.Certificate; 23 * Carrying class for an attribute certificate issuer. 89 * Return any principal objects inside the attribute certificate issuer 141 public boolean match(Certificate cert) 206 return match((Certificate)obj);
|
/frameworks/base/docs/html/tools/publishing/ |
app-signing-eclipse.jd | 23 <p>Android requires that all apps be digitally signed with a certificate before they can be 24 installed. Android uses this certificate to identify the author of an app, and the certificate 25 does not need to be signed by a certificate authority.</p> 28 ADT plugin for Eclipse. For information about how to obtain a certificate for signing your app, see
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
CertificateTest.java | 35 import javax.security.cert.Certificate; 44 private class TBTCert extends Certificate { 70 * Test for <code>Certificate()</code> constructor<br> 76 assertEquals("Wrong string representation for Certificate", "TBTCert", tbt_cert.toString()); 133 + "which is not an instance of Certificate", tbt_cert
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathValidatorTestPKIX.java | 27 import java.security.cert.Certificate; 70 List<Certificate> certList = new ArrayList<Certificate>(); 106 private String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" 117 + "DC9BBx1sVKoji17RP4R8CTf1\n" + "-----END CERTIFICATE-----";
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 60 * Returns new instance of test certificate each time the method is called. 62 * @return test certificate 64 public static Certificate getCert() { 76 public static Certificate[] getCertChain() { 77 Certificate[] chain = { new TestCertificate(), new TestCertificate(), 96 * The second arguments shows which number will have the first Certificate 97 * in the CertPath. The second certificate will have (startID+1) number 101 * @param startID - specifies the starting ID which the first certificate will have 105 Certificate[] certs = new Certificate[howMany] [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 79 * with a single certificate. 106 public Certificate[] engineGetCertificateChain(String alias) { 116 final Certificate[] caList; 122 caList = new Certificate[caChain.size() + 1]; 130 caList = new Certificate[1]; 139 public Certificate engineGetCertificate(String alias) { 154 // This entry/alias does not contain a certificate. 158 private Certificate getCertificateForTrustedCertificateEntry(byte[] encodedCert) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HttpsURLConnectionTest.java | 24 import java.security.cert.Certificate; 85 Certificate[] cert = con.getLocalCertificates(); 183 Certificate[] cert = con.getServerCertificates(); 285 public Certificate[] getLocalCertificates() { 290 Certificate cert = cf.generateCertificate(bis); 291 return new Certificate[] { cert }; 300 public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException { 305 Certificate cert = cf.generateCertificate(bis); 306 return new Certificate[] { cert }; 308 throw new SSLPeerUnverifiedException("No server's end-entity certificate"); [all...] |
/external/boringssl/src/ssl/test/runner/ |
common.go | 117 // Certificate types (for certificateRequestMsg) 119 CertTypeRSASign = 1 // A certificate containing an RSA key 120 CertTypeDSSSign = 2 // A certificate containing a DSA key 121 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key 122 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key 125 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 126 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 127 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 187 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/frameworks/base/keystore/java/android/security/ |
KeyPairGeneratorSpec.java | 30 import java.security.cert.Certificate; 48 * {@link Certificate} chain. 50 * The KeyPair generator will create a self-signed certificate with the subject 55 * The self-signed X.509 certificate may be replaced at a later time by a 56 * certificate signed by a real Certificate Authority. 92 * {@link Certificate} chain. 94 * The KeyPair generator will create a self-signed certificate with the 107 * @param serialNumber X509 v3 certificate serial number 108 * @param startDate the start of the self-signed certificate validity perio [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
SslUtil.java | 46 import java.security.cert.Certificate; 89 * Generates a new, self-signed X509 V1 certificate for a KeyPair. 93 * @return the new certificate 94 * @throws GeneralSecurityException on error generating the certificate 126 * Generates a new, self-signed X509 V3 certificate for a KeyPair. 133 * @return the new certificate 134 * @throws GeneralSecurityException on error generating the certificate 153 // about certificate and extension content. Quoting the `man verify`: 156 // the issuer name of the current certificate are subject to further 158 // certificate (if present) must match the subject key identifier (i [all...] |
/external/sepolicy/tools/ |
insertkeys.py | 42 # Are we starting the certificate? 43 if line == "-----BEGIN CERTIFICATE-----": 45 sys.exit("Encountered another BEGIN CERTIFICATE without END CERTIFICATE on " + 51 elif line == "-----END CERTIFICATE-----": 53 sys.exit("Encountered END CERTIFICATE before BEGIN CERTIFICATE on line: " 56 # If we ended the certificate trip the flag 61 sys.exit("Empty certficate , certificate "+ str(certNo) + " found in file: " 64 # ... and append the certificate to the lis [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
ConfigBuilder.java | 32 import java.security.cert.Certificate; 141 Certificate[] chain = ks.getCertificateChain(alias); 144 for (Certificate certificate : chain) { 145 if (!(certificate instanceof X509Certificate)) { 147 certificate.getClass()); 149 clientChain.add((X509Certificate) certificate); 217 Certificate cert = ks.getCertificate(alias); 273 throw new IOException("Invalid certificate type for TLS: " + 279 for (X509Certificate certificate : clientChain) [all...] |
/packages/apps/Browser/src/com/android/browser/ |
PageDialogsHandler.java | 130 * this dialog was opened from the SSL-certificate-on-error dialog or 203 // if we have a main top-level page SSL certificate set or a certificate 207 // add a 'View Certificate' button 224 // otherwise, display the top-most certificate from 236 * Displays the main top-level page SSL certificate dialog 238 * @param tab The tab to show certificate for. 272 * Displays the SSL error certificate dialog. 336 * Creates an AlertDialog to display the given certificate. If error is 339 * certificate. In this case, error is used to add text describing th [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 402 * Set CA certificate alias. 405 * a certificate 407 * @param alias identifies the certificate 415 * Get CA certificate alias 416 * @return alias to the CA certificate 424 * Specify a X.509 certificate that identifies the server. 426 * <p>A default name is automatically assigned to the certificate and used 428 * certificate when the config is saved and removing the certificate when 431 * @param cert X.509 CA certificate [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
DefaultHostnameVerifierTest.java | 25 import java.security.cert.Certificate; 146 new Certificate[] {new StubX509Certificate("cn=www.example.com")}; 255 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 272 + "-----END CERTIFICATE-----"); 280 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 296 + "-----END CERTIFICATE-----"); 305 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 323 + "-----END CERTIFICATE-----"); 334 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 351 + "-----END CERTIFICATE-----") [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", 58 * The new certificate is the issuer of the last certificate in 59 * the chain - add the new certificate to the end. 69 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 75 static const char *pem_cert_begin = "-----BEGIN CERTIFICATE-----"; 76 static const char *pem_cert_end = "-----END CERTIFICATE-----"; 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 116 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 124 "certificate end tag (%s)", pem_cert_end) [all...] |
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 28 import java.security.cert.Certificate; 71 private final Hashtable<String, Certificate[]> certificates = 72 new Hashtable<String, Certificate[]>(5); 74 private final Hashtable<String, Certificate[][]> verifiedEntries = 75 new Hashtable<String, Certificate[][]>(); 89 private final Certificate[][] certChains; 91 private final Hashtable<String, Certificate[][]> verifiedEntries; 94 Certificate[][] certChains, Hashtable<String, Certificate[][]> verifedEntries) { 187 ArrayList<Certificate[]> certChains = new ArrayList<Certificate[]>() [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 58 * Returns new instance of test certificate each time the method is called. 60 * @return test certificate 62 public static Certificate getCert() { 74 public static Certificate[] getCertChain() { 75 Certificate[] chain = { new TestCertificate(), new TestCertificate(), 94 * The second arguments shows which number will have the first Certificate 95 * in the CertPath. The second certificate will have (startID+1) number 99 * @param startID - specifies the starting ID which the first certificate will have 103 Certificate[] certs = new Certificate[howMany] [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 25 // Tests reading an X509 certificate from a PEM encoded string. 27 std::string pem = "-----BEGIN CERTIFICATE-----\n" 39 "-----END CERTIFICATE-----\n"; 51 // Tests converting an X509 certificate to a PEM encoded string. 99 std::string expected = "-----BEGIN CERTIFICATE-----\n" 109 "-----END CERTIFICATE-----\n"; 171 // Tests generating a self-signed certificate.
|
/external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/ |
DelegatingHttpsURLConnection.java | 28 import java.security.cert.Certificate; 63 @Override public Certificate[] getLocalCertificates() { 66 List<Certificate> result = handshake.localCertificates(); 67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null; 70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException { 73 List<Certificate> result = handshake.peerCertificates(); 74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
|
/libcore/luni/src/main/files/cacerts/ |
594f1775.0 | 1 -----BEGIN CERTIFICATE----- 19 -----END CERTIFICATE----- 20 Certificate: 25 Issuer: C=US, O=Equifax, OU=Equifax Secure Certificate Authority 29 Subject: C=US, O=Equifax, OU=Equifax Secure Certificate Authority 48 DirName: C = US, O = Equifax, OU = Equifax Secure Certificate Authority, CN = CRL1 53 Certificate Sign, CRL Sign
|