/libcore/luni/src/test/java/tests/security/cert/ |
X509CertSelectorTest.java | 530 assertTrue("Any certificate should match in the case of null " 642 assertTrue("The certificate should match the selection criteria.", [all...] |
CRLTest.java | 28 import java.security.cert.Certificate; 88 // that are abstract in <code>Certificate</code> 115 public boolean isRevoked(Certificate cert) {
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PoloChallengeResponse.java | 24 import java.security.cert.Certificate; 44 * Certificate of the local peer in the protocol. 46 private Certificate mClientCertificate; 49 * Certificate of the remote peer in the protocol. 51 private Certificate mServerCertificate; 56 * @param clientCert the certificate of the client node 57 * @param serverCert the certificate of the server node 60 public PoloChallengeResponse(Certificate clientCert, Certificate serverCert,
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 41 import java.security.cert.Certificate; 66 // Certificate type used during testing 90 * constructed using self signed test certificate 125 * containing single element (self signed test certificate). 209 public void check(Certificate arg0, Collection arg1) 300 // X.509 encoded certificate 301 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n" 316 + "JDSM\n" + "-----END CERTIFICATE-----\n"; 323 * Returns X.509 certificate encoding corresponding to version v1. 325 * Certificate encoding was created by hands according to X.509 Certificat [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/javax/net/ssl/ |
HttpsURLConnection_ImplTest.java | 22 import java.security.cert.Certificate; 73 public Certificate[] getLocalCertificates() { 81 public Certificate[] getServerCertificates()
|
/external/ipsec-tools/src/racoon/ |
netdb_dnssec.h | 62 int ci_type; /* certificate type */ 66 size_t ci_certlen; /* length of certificate */ 67 char *ci_cert; /* certificate */
|
/libcore/luni/src/main/java/java/security/cert/ |
PolicyNode.java | 49 * Returns the expected policies for the next certificate to be valid. 77 * Returns whether the certificate policy extension of the most recently 78 * processed certificate is marked as critical.
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
GeneralSubtrees.java | 34 * with the GeneralSubtrees structure which is a part of X.509 certificate: 37 * Certificate and Certificate Revocation List (CRL) Profile.
|
ORAddress.java | 31 * with the ORAddress structure which is a part of X.509 certificate: 34 * Certificate and Certificate Revocation List (CRL) Profile.
|
Validity.java | 32 * with Validity structure which is the part of X.509 certificate 35 * Certificate and Certificate Revocation List (CRL) Profile.
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 63 "<p>Make sure the certificate is valid for the planned lifetime of the product.</p>" 64 + "<p>If the certificate expires, you will be forced to sign your application with " 66 + "<p>Applications cannot be upgraded if their certificate changes from " 87 setTitle("Destination and key/certificate checks"); 181 String.format("<p>Certificate expires in %d years.</p>", 231 "<p>Certificate expired on %s</p>", 237 setErrorMessage("Certificate is expired."); 244 "<p>Certificate expires on %s.</p>", 254 sb.append("<p>The certificate expires this year.</p>"); 258 "<p>The Certificate expires in %1$s %2$s.</p>" [all...] |
/external/boringssl/src/ssl/ |
ssl_stat.c | 126 str = "SSLv3 read server certificate A"; 130 str = "SSLv3 read server certificate B"; 142 str = "SSLv3 read server certificate request A"; 146 str = "SSLv3 read server certificate request B"; 166 str = "SSLv3 write client certificate A"; 170 str = "SSLv3 write client certificate B"; 174 str = "SSLv3 write client certificate C"; 178 str = "SSLv3 write client certificate D"; 190 str = "SSLv3 write certificate verify A"; 194 str = "SSLv3 write certificate verify B" [all...] |
/bootable/recovery/ |
verifier.cpp | 116 const Certificate* pKeys, unsigned int numKeys) { 253 if (pKeys[i].key_type == Certificate::RSA) { 269 } else if (pKeys[i].key_type == Certificate::EC 316 // A Certificate is a pair of an RSAPublicKey and a particular hash 327 Certificate* 329 Certificate* out = NULL; 343 out = (Certificate*)realloc(out, *numKeys * sizeof(Certificate)); 344 Certificate* cert = out + (*numKeys - 1); 345 memset(cert, '\0', sizeof(Certificate)); [all...] |
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 40 * A source for trusted root certificate authority (CA) certificates 72 * deleted system certificate simply removes the copy from the deleted 130 public Certificate getCertificate(String alias) { 134 public Certificate getCertificate(String alias, boolean includeDeletedSystem) { 278 public String getCertificateAlias(Certificate c) { 282 public String getCertificateAlias(Certificate c, boolean includeDeletedSystem) { 302 * Returns true to indicate that the certificate was added by the 310 * Returns a File for where the certificate is found if it exists 330 * TrustManagerImpl} to locate a CA certificate with the same nam [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
RFC3280CertPathUtilities.java | 84 * extension, verify that the certificate does not include the basic 89 * extension, verify that the certificate includes the basic constraints 97 * @param cert The certificate. 180 throw new AnnotatedException("Could not read certificate issuer.", e); 209 "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point."); 234 "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point."); 277 * certificate issuer. 280 * @param cert The certificate ot attribute certificate. 352 throw new AnnotatedException("Cannot find matching CRL issuer for certificate.") [all...] |
/prebuilts/tools/common/mkidentity/ |
mkidentity-prebuilt.jar | |
/build/core/ |
dpi_specific_apk.mk | 29 $(built_dpi_apk): PRIVATE_CERTIFICATE := $(certificate) 50 $(built_dpi_apk) : $(private_key) $(certificate) $(SIGNAPK_JAR) 79 PACKAGES.$(dpi_apk_name).CERTIFICATE := $(certificate)
|
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstall/ |
AndroidManifest.xml | 21 different certificate.
|
/cts/hostsidetests/appsecurity/test-apps/TargetInstrumentationApp/ |
AndroidManifest.xml | 21 certificate.
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
CertificateMessageTest.java | 35 private static String base64certEncoding = "-----BEGIN CERTIFICATE-----\n" 52 + "-----END CERTIFICATE-----\n"; 61 assertEquals("incorrect type", Handshake.CERTIFICATE, message.getType()); 90 assertEquals("incorrect type", Handshake.CERTIFICATE, message.getType());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
X509.java | 27 // certificate factories.
|
/external/emma/ |
ANDROID-CHANGES.txt | 7 4) Add java.security.cert.Certificate cast to core/java12/com/vladium/emma/rt/InstrClassLoader.java to fix compiler error
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
polochallengeresponsetest.cc | 32 char client_pem[] = "-----BEGIN CERTIFICATE-----\n" 48 "-----END CERTIFICATE-----\n"; 50 char server_pem[] = "-----BEGIN CERTIFICATE-----\n" 66 "-----END CERTIFICATE-----\n";
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 7 path certificate "/etc/racoon";
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
README | 3 gateway authenticates to the client using a certificate, and the client 32 to install a server certificate and key in /etc/openssl/certs/server.crt 44 certificate authority that signed the VPN gateway certificate in
|