/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 14 import java.security.cert.Certificate; 124 * issuer of the given X509 certificate. Uses the default provider 127 * @param cert the X509 certificate 132 * on the given certificate has thrown an exception. 144 * issuer of the given X509 certificate. Uses the specified 148 * @param cert the X509 certificate 154 * on the given certificate has thrown an exception. 235 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx); 544 throw new AnnotatedException("Certificate policies cannot be decoded.", e); 685 "Problem while picking certificates from certificate store." [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 2 * X.509v3 certificate parsing and processing (RFC 3280 profile) 42 * x509_certificate_free - Free an X.509 certificate 43 * @cert: Certificate to be freed 63 * x509_certificate_free - Free an X.509 certificate chain 64 * @cert: Pointer to the first certificate in the chain 141 * x509_name_compare - Compare X.509 certificate names 142 * @a: Certificate name 143 * @b: Certificate name 452 wpa_printf(MSG_INFO, "X509: Reject certificate with " 494 * x509_name_string - Convert an X.509 certificate name into a strin [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
Extensions.java | 41 * with the Extensions part of X.509 certificate 44 * Certificate and Certificate Revocation List (CRL) Profile. 248 * it is present but it indicates the certificate is not a 249 * certificate authority. If the certificate is a certificate 328 * Returns the value of Certificate Issuer Extension (OID = 2.5.29.29). 330 * the issuer of revoked certificate. Its ASN.1 notation is as follows: 338 * @return the value of Certificate Issuer Extensio [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
PKIXBuilderParametersTest.java | 48 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:PKIXBuilderParametersTest 62 + "-----END CERTIFICATE-----\n"; 64 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 78 + "-----END CERTIFICATE-----\n"; 213 * <code>keystore</code> does not contain at least one trusted certificate 239 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 270 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 298 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 341 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate [all...] |
X509Certificate2Test.java | 42 * Test for X.509 Certificate provider 96 // Base64 encoded form of ASN.1 DER encoded X.509 Certificate 114 "-----BEGIN CERTIFICATE-----\n" 131 + "-----END CERTIFICATE-----"; 133 private static String CERT_TAMPERED = "-----BEGIN CERTIFICATE-----\n" 150 + "-----END CERTIFICATE-----"; 324 = ("-----BEGIN CERTIFICATE-----\n" 363 + "-----END CERTIFICATE-----\n"); 366 = ("-----BEGIN CERTIFICATE-----\n" 404 + "-----END CERTIFICATE-----\n") [all...] |
CertStore2Test.java | 17 import java.security.cert.Certificate; 216 Collection<? extends Certificate> certificates = certStore.getCertificates(null); 223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector()); 317 public boolean match(Certificate cert) { 328 public boolean match(Certificate crl) { 366 public Collection<? extends Certificate> engineGetCertificates( 372 return new ArrayList<Certificate>();
|
X509CRLTest.java | 40 import java.security.cert.Certificate; 59 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRLTest 73 + "-----END CERTIFICATE-----\n"; 75 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 86 public boolean isRevoked(Certificate cert) { 269 * getRevokedCertificate(X509Certificate certificate) method testing.
|
/external/openssh/ |
ssh-keygen.0 | 163 -h When signing a key, create a host certificate instead of a user 164 certificate. Please see the CERTIFICATES section for details. 192 every key or certificate presented on the command line. 197 -L Prints the contents of a certificate. 221 included in a certificate when signing a key. Multiple 226 Specify a certificate option when signing a key. This option may 237 command specified by the user when the certificate is 271 Restrict the source addresses from which the certificate 331 Specify a validity interval when signing a certificate. A 333 the certificate is valid beginning now and expiring at that time [all...] |
ssh-keygen.1 | 329 When signing a key, create a host certificate instead of a user 330 certificate. 373 flag that revokes every key or certificate presented on the command line. 379 Prints the contents of a certificate. 412 a certificate when signing a key. 418 Specify a certificate option when signing a key. 433 the certificate is used for authentication. 466 Restrict the source addresses from which the certificate is considered valid. 545 Specify a validity interval when signing a certificate. 547 certificate is valid beginning now and expiring at that time, or may consis [all...] |
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverterTest.java | 39 import java.security.cert.Certificate; 70 private static final X509Certificate LOCAL_CERT = certificate("" 71 + "-----BEGIN CERTIFICATE-----\n" 80 + "-----END CERTIFICATE-----"); 83 private static final X509Certificate SERVER_CERT = certificate("" 84 + "-----BEGIN CERTIFICATE-----\n" 94 + "-----END CERTIFICATE-----"); 161 final List<Certificate> localCertificates = Arrays.<Certificate>asList(LOCAL_CERT); 163 final List<Certificate> serverCertificates = Arrays.<Certificate>asList(SERVER_CERT) 622 private static X509Certificate certificate(String certificate) { method in class:JavaApiConverterTest [all...] |
/frameworks/base/docs/html/tools/publishing/ |
app-signing.jd | 25 <li><a href="#expdebug">Expiry of the Debug Certificate</a></li> 40 <p>Android requires that all apps be digitally signed with a certificate before they can be 41 installed. Android uses this certificate to identify the author of an app, and the certificate 42 does not need to be signed by a certificate authority. Android apps often use self-signed 43 certificates. The app developer holds the certificate's private key.</p> 50 certificate to sign apps in debug mode. To sign apps in release mode, you need to generate 51 your own certificate.</p> 55 <p>In debug mode, you sign your app with a debug certificate generated by the Android SDK tools. 56 This certificate has a private key with a known password, so you can run and debug your ap [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLSessionImpl.java | 21 import java.security.cert.Certificate; 171 * @return a X509 certificate or null if no principal was defined 183 * Returns the certificate(s) of the principal (subject) of this concrete SSL 187 * that of the certification authority) or null if no certificate 191 public Certificate[] getLocalCertificates() { 196 * Returns the certificate(s) of the peer in this SSL session 202 * certificate were used during the SSL connection. 203 * @throws SSLPeerUnverifiedException if either a non-X.509 certificate 247 * determined via certificate(s). 250 * certificate were used during the SSL connection [all...] |
OpenSSLX509CRL.java | 33 import java.security.cert.Certificate; 288 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { 289 if (certificate instanceof OpenSSLX509Certificate) { 290 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate; 301 return getRevokedCertificate(certificate.getSerialNumber()); 345 public boolean isRevoked(Certificate cert) { 358 throw new RuntimeException("cannot convert certificate", e);
|
OpenSSLX509CertificateFactory.java | 25 import java.security.cert.Certificate; 176 * there is an error during certificate generation. 270 public Certificate engineGenerateCertificate(InputStream inStream) throws CertificateException { 279 public Collection<? extends Certificate> engineGenerateCertificates( 327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) 331 final Certificate c = certificates.get(i); 334 throw new CertificateException("Certificate not X.509 type at index " + i);
|
/frameworks/base/keystore/java/android/security/ |
KeyChain.java | 41 import java.security.cert.Certificate; 54 * their corresponding certificate chains in credential storage. 67 * certificate chains. The chosen alias will be returned by the 86 * Certificate Authority (CA) certificates will be trusted by all 108 * Package name for the Certificate Installer. 149 * Optional extra to specify an X.509 certificate to install on 156 * name for the installed certificate. 158 // Compatible with old android.security.Credentials.CERTIFICATE 172 * private key and associated certificate chain will be installed. 203 * certificate or a PKCS#12 key store for installation. Thes [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AndroidKeyStoreTest.java | 46 import java.security.cert.Certificate; [all...] |
/external/tcpdump/ |
isakmp.h | 122 #define ISAKMP_NPTYPE_CERT 6 /* Certificate */ 123 #define ISAKMP_NPTYPE_CR 7 /* Certificate Request */ 257 /* 3.9 Certificate Payload */ 261 char cert; /* Certificate Data */ 264 certificate or certificate-related information contained in the 265 Certificate Data field. 269 /* Certificate Type */ 281 /* 3.10 Certificate Request Payload */ 286 Certificate Types (variable length [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
AttributeCertificateHolder.java | 8 import java.security.cert.Certificate; 40 * -- the holder's Public Key Certificate 110 * <li>1 - publicKeyCert - A hash of the public key certificate of the 116 * This cannot be used if a v1 attribute certificate is used. 139 * <li>1 - publicKeyCert - A hash of the public key certificate of the 274 * Return any principal objects inside the attribute certificate holder 309 * @return the certificate serial number, null if no BaseCertificateID is 328 public boolean match(Certificate cert) 418 return match((Certificate)obj);
|
/frameworks/base/core/java/android/content/pm/ |
Signature.java | 28 import java.security.cert.Certificate; 36 * Opaque, immutable representation of a signing certificate associated with an 46 private Certificate[] mCertificateChain; 57 * Create signature from a certificate chain. Used for backward 63 public Signature(Certificate[] certificateChain) throws CertificateEncodingException { 170 * certificate; shouldn't happen. 176 final Certificate cert = certFactory.generateCertificate(bais); 181 * Used for compatibility code that needs to check the certificate chain 196 for (Certificate c : mCertificateChain) {
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
AbstractVerifier.java | 37 import java.security.cert.Certificate; 76 * that CA's would never foolishly allow such a certificate to happen? 100 Certificate[] certs = session.getPeerCertificates(); 107 Certificate[] certs = session.getPeerCertificates(); 146 String msg = "Certificate for <" + host + "> doesn't contain CN or DNS subjectAlt"; 154 // establish the socket to the hostname in the certificate. 192 throw new SSLException("hostname in certificate didn't match: <" + host + "> !=" + buf); 238 * @return Array of SubjectALT DNS names stored in the certificate. 248 .log(Level.FINE, "Error parsing certificate.", cpe);
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 26 import java.security.cert.Certificate; 132 * SSLContext with certificate and key as well as SSLServerSocket 205 * certificate chain from the given KeyStore and a TrustManager 238 public static void assertCertificateInKeyStore(Certificate certificate, 245 Certificate keyStoreCertificate = keyStore.getCertificate(alias); 246 if (certificate.equals(keyStoreCertificate)) { 255 Certificate[] serverChain) 262 Certificate[] clientChain)
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 162 Log.e(TAG, "Failed to import user certificate " + userCertificate); 164 Log.e(TAG, "Failed to delete private key after certificate importing failed"); 214 Log.w(TAG, "Problem removing CA certificate " + alias, e); 217 Log.w(TAG, "Problem removing CA certificate " + alias, e); 295 X509Certificate certificate = (X509Certificate) mTrustedCertificateStore 297 if (certificate == null) { 298 Log.w(TAG, "Could not find CA certificate " + alias); 302 return certificate.getEncoded(); 304 Log.w(TAG, "Error while encoding CA certificate " + alias);
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/ |
BuildPreferencePage.java | 41 import java.security.cert.Certificate; 301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local 303 if (key == null || certificate == null) { 310 FingerprintUtils.getFingerprint(certificate, "MD5")); 315 FingerprintUtils.getFingerprint(certificate, "SHA1")); 319 if (certificate.getNotAfter().compareTo(today) < 0) { 320 showErrorMessage("Certificate is expired!"); 324 if (certificate.getNotBefore().compareTo(today) > 0) { 325 showErrorMessage("Certificate validity is in the future!");
|
/system/extras/verity/ |
BootSignature.java | 27 import java.security.cert.Certificate; 51 * certificate ::= Certificate 67 private ASN1Encodable certificate; field in class:BootSignature 101 certificate = sequence.getObjectAt(1); 102 byte[] encoded = ((ASN1Object) certificate).getEncoded(); 151 certificate = s.readObject(); 181 v.add(certificate); 300 args[3] is the path to the matching public key certificate
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactorySpiTest.java | 30 import java.security.cert.Certificate; 84 Certificate cc = certFactorySpi 157 Certificate cert = certFactorySpi 227 Certificate cert = certFactorySpi 257 public Certificate engineGenerateCertificate(InputStream inStream)
|