/libcore/luni/src/main/java/javax/security/cert/ |
CertificateEncodingException.java | 22 * The exception that is thrown when an error occurs while a {@code Certificate}
|
CertificateException.java | 22 * The base class for all {@code Certificate} related exceptions.
|
CertificateExpiredException.java | 21 * The exception that is thrown when a {@code Certificate} has expired.
|
CertificateNotYetValidException.java | 21 * The exception that is thrown when a {@code Certificate} is not yet valid.
|
CertificateParsingException.java | 21 * The exception that is thrown when a {@code Certificate} can not be parsed.
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
InhibitAnyPolicy.java | 25 * InhibitAnyPolicy Certificate Extension (OID = 2.5.29.54)
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory2Test.java | 38 import java.security.cert.Certificate; 132 Certificate cert = certFactory.generateCertificate(dis); 134 Collection<? extends Certificate> col = certFactory.generateCertificates(dis); 152 List<Certificate> list = null;
|
/packages/apps/Email/res/layout/ |
client_certificate_selector.xml | 17 <!-- A layout to select a certificate, akin to a file selector on web pages. -->
|
/packages/services/Telephony/src/com/android/phone/common/mail/ |
MailTransport.java | 148 * Verify the hostname of the certificate used by the other end of a 153 * so "foo.bar.example.com" is verified if the peer has a certificate 172 // we should be reporting the bad name in the certificate. Unfortunately this is buried 177 "Certificate hostname not useable for server: " + hostname);
|
/system/extras/verity/ |
VeritySigner.java | 29 "<sigfile> | <contentfile> <certificate.x509.pem> <sigfile> " +
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
TestUtils.java | 42 import java.security.cert.Certificate; 143 Certificate cert; 155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 165 "Public key used to sign certificate should have the same algorithm as in KeyPair", 168 Certificate[] chain = privEntry.getCertificateChain(); 170 fail("Empty certificate chain"); 405 Certificate certificate, 410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate}) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreSpiTest.java | 32 import java.security.cert.Certificate; 126 ksSpi.engineSetKeyEntry("", null, new char[0], new Certificate[0]); 131 ksSpi.engineSetKeyEntry("", new byte[0], new Certificate[0]);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CollectionCertStoreParametersTest.java | 96 * that is not a <code>Certificate</code> or <code>CRL</code>, that object 102 // a Certificate or CRL 104 certificates.add(new String("Not a Certificate"));
|
X509CRLTest.java | 32 import java.security.cert.Certificate; 62 public boolean isRevoked(Certificate cert) { 241 * getRevokedCertificate(X509Certificate certificate) method testing.
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
CertPinManager.java | 62 * certificate chain includes certificates from the pinned list iff the 67 * certificate chain validation should fail. 182 * @param cn certificate host name. May include wildcards like
|
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustedCertificateStoreTest.java | 32 import java.security.cert.Certificate; 235 * The construction below is to build a certificate chain that has a loop 249 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1 703 assertEquals("System certificate stored in the wrong file", 706 // The two statements below indirectly assert that the certificate can be looked up 710 assertNotNull("Issuer certificate not found for system certificate " + actualFile, 712 assertNotNull("Trust anchor not found for system certificate " + actualFile, 724 // Checking that the certificate is stored in a file is extraneous given the current 730 fail("Missing certificate file for alias " + alia [all...] |
/external/ipsec-tools/src/racoon/ |
remoteconf.h | 74 int certtype; /* certificate type if need */ 75 char *mycertfile; /* file name of my certificate */ 78 int getcert_method; /* the way to get peer's certificate */
|
/external/vboot_reference/ |
README | 84 certificate) in a format suitable for use by 112 dumpRSAPublicKey. This utility expects an x509 certificate as 127 .crt X509 Key Certificate
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 165 /* Read the certificate */ 167 fprintf(stderr, "Couldn't read certificate.\n"); 171 /* Get the public key from the certificate. */
|
/external/wpa_supplicant_8/hs20/server/ca/ |
openssl.cnf | 26 certificate = $dir/cacert.pem # The CA certificate 37 cert_opt = ca_default # Certificate field options
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 312 tlsv1_server_log(conn, "Too short Certificate message (len=%lu)", 325 tlsv1_server_log(conn, "Unexpected Certificate message length (len=%lu != left=%lu)", 334 tlsv1_server_log(conn, "Client did not include Certificate"); 344 tlsv1_server_log(conn, "Received unexpected handshake message %d (expected Certificate/ClientKeyExchange)", 351 tlsv1_server_log(conn, "Received Certificate (certificate_list len %lu)", 359 * } Certificate; 365 tlsv1_server_log(conn, "Too short Certificate (left=%lu)", 398 tlsv1_server_log(conn, "Unexpected certificate length (len=%lu left=%lu)", 407 tlsv1_server_log(conn, "Certificate %lu (len %lu)", 414 tlsv1_server_log(conn, "Failed to parse the certificate"); [all...] |
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
X509HostnameVerifier.java | 43 * server's X.509 certificate. Implements javax.net.ssl.HostnameVerifier, but 81 * certificate. 83 * from the X.509 certificate.
|
/frameworks/base/keystore/java/android/security/ |
KeyStoreParameter.java | 43 * self-signed X.509 certificate will be attached to generated entries, but that 44 * may be replaced at a later time by a certificate signed by a real Certificate
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyPairGeneratorSpi.java | 37 import com.android.org.bouncycastle.asn1.x509.Certificate; 504 throw new ProviderException("Failed to generate self-signed certificate", e); 512 "Failed to obtain encoded form of self-signed certificate", e); 521 throw new ProviderException("Failed to store self-signed certificate", 552 // Key cannot be used to sign a certificate 555 // Key can be used to sign a certificate 560 // Failed to generate the self-signed certificate with valid signature. Fall back 561 // to generating a self-signed certificate with a fake signature. This is done for 563 // producing a self-signed certificate with an invalid signature to key pair 627 return new X509CertificateObject(Certificate.getInstance(new DERSequence(result))) [all...] |
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
AndroidAppAsset.java | 32 * <p>An Android app can be named by its package name and certificate fingerprints using this JSON 44 * representing the certificate SHA-256 fingerprint. 147 * @param certFingerprints at least one of the Android app signing certificate sha-256
|