HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 326 - 350 of 1381) sorted by null

<<11121314151617181920>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 14 import java.security.cert.Certificate;
124 * issuer of the given X509 certificate. Uses the default provider
127 * @param cert the X509 certificate
132 * on the given certificate has thrown an exception.
144 * issuer of the given X509 certificate. Uses the specified
148 * @param cert the X509 certificate
154 * on the given certificate has thrown an exception.
235 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx);
544 throw new AnnotatedException("Certificate policies cannot be decoded.", e);
685 "Problem while picking certificates from certificate store."
    [all...]
  /external/wpa_supplicant_8/src/tls/
x509v3.c 2 * X.509v3 certificate parsing and processing (RFC 3280 profile)
42 * x509_certificate_free - Free an X.509 certificate
43 * @cert: Certificate to be freed
63 * x509_certificate_free - Free an X.509 certificate chain
64 * @cert: Pointer to the first certificate in the chain
141 * x509_name_compare - Compare X.509 certificate names
142 * @a: Certificate name
143 * @b: Certificate name
452 wpa_printf(MSG_INFO, "X509: Reject certificate with "
494 * x509_name_string - Convert an X.509 certificate name into a strin
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/
Extensions.java 41 * with the Extensions part of X.509 certificate
44 * Certificate and Certificate Revocation List (CRL) Profile.
248 * it is present but it indicates the certificate is not a
249 * certificate authority. If the certificate is a certificate
328 * Returns the value of Certificate Issuer Extension (OID = 2.5.29.29).
330 * the issuer of revoked certificate. Its ASN.1 notation is as follows:
338 * @return the value of Certificate Issuer Extensio
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
PKIXBuilderParametersTest.java 48 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:PKIXBuilderParametersTest
62 + "-----END CERTIFICATE-----\n";
64 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
78 + "-----END CERTIFICATE-----\n";
213 * <code>keystore</code> does not contain at least one trusted certificate
239 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
270 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
298 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
341 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
    [all...]
X509Certificate2Test.java 42 * Test for X.509 Certificate provider
96 // Base64 encoded form of ASN.1 DER encoded X.509 Certificate
114 "-----BEGIN CERTIFICATE-----\n"
131 + "-----END CERTIFICATE-----";
133 private static String CERT_TAMPERED = "-----BEGIN CERTIFICATE-----\n"
150 + "-----END CERTIFICATE-----";
324 = ("-----BEGIN CERTIFICATE-----\n"
363 + "-----END CERTIFICATE-----\n");
366 = ("-----BEGIN CERTIFICATE-----\n"
404 + "-----END CERTIFICATE-----\n")
    [all...]
CertStore2Test.java 17 import java.security.cert.Certificate;
216 Collection<? extends Certificate> certificates = certStore.getCertificates(null);
223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector());
317 public boolean match(Certificate cert) {
328 public boolean match(Certificate crl) {
366 public Collection<? extends Certificate> engineGetCertificates(
372 return new ArrayList<Certificate>();
X509CRLTest.java 40 import java.security.cert.Certificate;
59 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRLTest
73 + "-----END CERTIFICATE-----\n";
75 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
86 public boolean isRevoked(Certificate cert) {
269 * getRevokedCertificate(X509Certificate certificate) method testing.
  /external/openssh/
ssh-keygen.0 163 -h When signing a key, create a host certificate instead of a user
164 certificate. Please see the CERTIFICATES section for details.
192 every key or certificate presented on the command line.
197 -L Prints the contents of a certificate.
221 included in a certificate when signing a key. Multiple
226 Specify a certificate option when signing a key. This option may
237 command specified by the user when the certificate is
271 Restrict the source addresses from which the certificate
331 Specify a validity interval when signing a certificate. A
333 the certificate is valid beginning now and expiring at that time
    [all...]
ssh-keygen.1 329 When signing a key, create a host certificate instead of a user
330 certificate.
373 flag that revokes every key or certificate presented on the command line.
379 Prints the contents of a certificate.
412 a certificate when signing a key.
418 Specify a certificate option when signing a key.
433 the certificate is used for authentication.
466 Restrict the source addresses from which the certificate is considered valid.
545 Specify a validity interval when signing a certificate.
547 certificate is valid beginning now and expiring at that time, or may consis
    [all...]
  /external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/
JavaApiConverterTest.java 39 import java.security.cert.Certificate;
70 private static final X509Certificate LOCAL_CERT = certificate(""
71 + "-----BEGIN CERTIFICATE-----\n"
80 + "-----END CERTIFICATE-----");
83 private static final X509Certificate SERVER_CERT = certificate(""
84 + "-----BEGIN CERTIFICATE-----\n"
94 + "-----END CERTIFICATE-----");
161 final List<Certificate> localCertificates = Arrays.<Certificate>asList(LOCAL_CERT);
163 final List<Certificate> serverCertificates = Arrays.<Certificate>asList(SERVER_CERT)
622 private static X509Certificate certificate(String certificate) { method in class:JavaApiConverterTest
    [all...]
  /frameworks/base/docs/html/tools/publishing/
app-signing.jd 25 <li><a href="#expdebug">Expiry of the Debug Certificate</a></li>
40 <p>Android requires that all apps be digitally signed with a certificate before they can be
41 installed. Android uses this certificate to identify the author of an app, and the certificate
42 does not need to be signed by a certificate authority. Android apps often use self-signed
43 certificates. The app developer holds the certificate's private key.</p>
50 certificate to sign apps in debug mode. To sign apps in release mode, you need to generate
51 your own certificate.</p>
55 <p>In debug mode, you sign your app with a debug certificate generated by the Android SDK tools.
56 This certificate has a private key with a known password, so you can run and debug your ap
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLSessionImpl.java 21 import java.security.cert.Certificate;
171 * @return a X509 certificate or null if no principal was defined
183 * Returns the certificate(s) of the principal (subject) of this concrete SSL
187 * that of the certification authority) or null if no certificate
191 public Certificate[] getLocalCertificates() {
196 * Returns the certificate(s) of the peer in this SSL session
202 * certificate were used during the SSL connection.
203 * @throws SSLPeerUnverifiedException if either a non-X.509 certificate
247 * determined via certificate(s).
250 * certificate were used during the SSL connection
    [all...]
OpenSSLX509CRL.java 33 import java.security.cert.Certificate;
288 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) {
289 if (certificate instanceof OpenSSLX509Certificate) {
290 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate;
301 return getRevokedCertificate(certificate.getSerialNumber());
345 public boolean isRevoked(Certificate cert) {
358 throw new RuntimeException("cannot convert certificate", e);
OpenSSLX509CertificateFactory.java 25 import java.security.cert.Certificate;
176 * there is an error during certificate generation.
270 public Certificate engineGenerateCertificate(InputStream inStream) throws CertificateException {
279 public Collection<? extends Certificate> engineGenerateCertificates(
327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates)
331 final Certificate c = certificates.get(i);
334 throw new CertificateException("Certificate not X.509 type at index " + i);
  /frameworks/base/keystore/java/android/security/
KeyChain.java 41 import java.security.cert.Certificate;
54 * their corresponding certificate chains in credential storage.
67 * certificate chains. The chosen alias will be returned by the
86 * Certificate Authority (CA) certificates will be trusted by all
108 * Package name for the Certificate Installer.
149 * Optional extra to specify an X.509 certificate to install on
156 * name for the installed certificate.
158 // Compatible with old android.security.Credentials.CERTIFICATE
172 * private key and associated certificate chain will be installed.
203 * certificate or a PKCS#12 key store for installation. Thes
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
AndroidKeyStoreTest.java 46 import java.security.cert.Certificate;
    [all...]
  /external/tcpdump/
isakmp.h 122 #define ISAKMP_NPTYPE_CERT 6 /* Certificate */
123 #define ISAKMP_NPTYPE_CR 7 /* Certificate Request */
257 /* 3.9 Certificate Payload */
261 char cert; /* Certificate Data */
264 certificate or certificate-related information contained in the
265 Certificate Data field.
269 /* Certificate Type */
281 /* 3.10 Certificate Request Payload */
286 Certificate Types (variable length
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
AttributeCertificateHolder.java 8 import java.security.cert.Certificate;
40 * -- the holder's Public Key Certificate
110 * <li>1 - publicKeyCert - A hash of the public key certificate of the
116 * This cannot be used if a v1 attribute certificate is used.
139 * <li>1 - publicKeyCert - A hash of the public key certificate of the
274 * Return any principal objects inside the attribute certificate holder
309 * @return the certificate serial number, null if no BaseCertificateID is
328 public boolean match(Certificate cert)
418 return match((Certificate)obj);
  /frameworks/base/core/java/android/content/pm/
Signature.java 28 import java.security.cert.Certificate;
36 * Opaque, immutable representation of a signing certificate associated with an
46 private Certificate[] mCertificateChain;
57 * Create signature from a certificate chain. Used for backward
63 public Signature(Certificate[] certificateChain) throws CertificateEncodingException {
170 * certificate; shouldn't happen.
176 final Certificate cert = certFactory.generateCertificate(bais);
181 * Used for compatibility code that needs to check the certificate chain
196 for (Certificate c : mCertificateChain) {
  /frameworks/base/core/java/org/apache/http/conn/ssl/
AbstractVerifier.java 37 import java.security.cert.Certificate;
76 * that CA's would never foolishly allow such a certificate to happen?
100 Certificate[] certs = session.getPeerCertificates();
107 Certificate[] certs = session.getPeerCertificates();
146 String msg = "Certificate for <" + host + "> doesn't contain CN or DNS subjectAlt";
154 // establish the socket to the hostname in the certificate.
192 throw new SSLException("hostname in certificate didn't match: <" + host + "> !=" + buf);
238 * @return Array of SubjectALT DNS names stored in the certificate.
248 .log(Level.FINE, "Error parsing certificate.", cpe);
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestSSLContext.java 26 import java.security.cert.Certificate;
132 * SSLContext with certificate and key as well as SSLServerSocket
205 * certificate chain from the given KeyStore and a TrustManager
238 public static void assertCertificateInKeyStore(Certificate certificate,
245 Certificate keyStoreCertificate = keyStore.getCertificate(alias);
246 if (certificate.equals(keyStoreCertificate)) {
255 Certificate[] serverChain)
262 Certificate[] clientChain)
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainService.java 162 Log.e(TAG, "Failed to import user certificate " + userCertificate);
164 Log.e(TAG, "Failed to delete private key after certificate importing failed");
214 Log.w(TAG, "Problem removing CA certificate " + alias, e);
217 Log.w(TAG, "Problem removing CA certificate " + alias, e);
295 X509Certificate certificate = (X509Certificate) mTrustedCertificateStore
297 if (certificate == null) {
298 Log.w(TAG, "Could not find CA certificate " + alias);
302 return certificate.getEncoded();
304 Log.w(TAG, "Error while encoding CA certificate " + alias);
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/
BuildPreferencePage.java 41 import java.security.cert.Certificate;
301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local
303 if (key == null || certificate == null) {
310 FingerprintUtils.getFingerprint(certificate, "MD5"));
315 FingerprintUtils.getFingerprint(certificate, "SHA1"));
319 if (certificate.getNotAfter().compareTo(today) < 0) {
320 showErrorMessage("Certificate is expired!");
324 if (certificate.getNotBefore().compareTo(today) > 0) {
325 showErrorMessage("Certificate validity is in the future!");
  /system/extras/verity/
BootSignature.java 27 import java.security.cert.Certificate;
51 * certificate ::= Certificate
67 private ASN1Encodable certificate; field in class:BootSignature
101 certificate = sequence.getObjectAt(1);
102 byte[] encoded = ((ASN1Object) certificate).getEncoded();
151 certificate = s.readObject();
181 v.add(certificate);
300 args[3] is the path to the matching public key certificate
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactorySpiTest.java 30 import java.security.cert.Certificate;
84 Certificate cc = certFactorySpi
157 Certificate cert = certFactorySpi
227 Certificate cert = certFactorySpi
257 public Certificate engineGenerateCertificate(InputStream inStream)

Completed in 514 milliseconds

<<11121314151617181920>>