HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 501 - 525 of 1381) sorted by null

<<21222324252627282930>>

  /libcore/luni/src/main/java/javax/security/cert/
CertificateEncodingException.java 22 * The exception that is thrown when an error occurs while a {@code Certificate}
CertificateException.java 22 * The base class for all {@code Certificate} related exceptions.
CertificateExpiredException.java 21 * The exception that is thrown when a {@code Certificate} has expired.
CertificateNotYetValidException.java 21 * The exception that is thrown when a {@code Certificate} is not yet valid.
CertificateParsingException.java 21 * The exception that is thrown when a {@code Certificate} can not be parsed.
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/
InhibitAnyPolicy.java 25 * InhibitAnyPolicy Certificate Extension (OID = 2.5.29.54)
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory2Test.java 38 import java.security.cert.Certificate;
132 Certificate cert = certFactory.generateCertificate(dis);
134 Collection<? extends Certificate> col = certFactory.generateCertificates(dis);
152 List<Certificate> list = null;
  /packages/apps/Email/res/layout/
client_certificate_selector.xml 17 <!-- A layout to select a certificate, akin to a file selector on web pages. -->
  /packages/services/Telephony/src/com/android/phone/common/mail/
MailTransport.java 148 * Verify the hostname of the certificate used by the other end of a
153 * so "foo.bar.example.com" is verified if the peer has a certificate
172 // we should be reporting the bad name in the certificate. Unfortunately this is buried
177 "Certificate hostname not useable for server: " + hostname);
  /system/extras/verity/
VeritySigner.java 29 "<sigfile> | <contentfile> <certificate.x509.pem> <sigfile> " +
  /cts/tests/tests/keystore/src/android/keystore/cts/
TestUtils.java 42 import java.security.cert.Certificate;
143 Certificate cert;
155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(),
165 "Public key used to sign certificate should have the same algorithm as in KeyPair",
168 Certificate[] chain = privEntry.getCertificateChain();
170 fail("Empty certificate chain");
405 Certificate certificate,
410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate})
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStoreSpiTest.java 32 import java.security.cert.Certificate;
126 ksSpi.engineSetKeyEntry("", null, new char[0], new Certificate[0]);
131 ksSpi.engineSetKeyEntry("", new byte[0], new Certificate[0]);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CollectionCertStoreParametersTest.java 96 * that is not a <code>Certificate</code> or <code>CRL</code>, that object
102 // a Certificate or CRL
104 certificates.add(new String("Not a Certificate"));
X509CRLTest.java 32 import java.security.cert.Certificate;
62 public boolean isRevoked(Certificate cert) {
241 * getRevokedCertificate(X509Certificate certificate) method testing.
  /external/conscrypt/src/platform/java/org/conscrypt/
CertPinManager.java 62 * certificate chain includes certificates from the pinned list iff the
67 * certificate chain validation should fail.
182 * @param cn certificate host name. May include wildcards like
  /external/conscrypt/src/test/java/org/conscrypt/
TrustedCertificateStoreTest.java 32 import java.security.cert.Certificate;
235 * The construction below is to build a certificate chain that has a loop
249 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1
703 assertEquals("System certificate stored in the wrong file",
706 // The two statements below indirectly assert that the certificate can be looked up
710 assertNotNull("Issuer certificate not found for system certificate " + actualFile,
712 assertNotNull("Trust anchor not found for system certificate " + actualFile,
724 // Checking that the certificate is stored in a file is extraneous given the current
730 fail("Missing certificate file for alias " + alia
    [all...]
  /external/ipsec-tools/src/racoon/
remoteconf.h 74 int certtype; /* certificate type if need */
75 char *mycertfile; /* file name of my certificate */
78 int getcert_method; /* the way to get peer's certificate */
  /external/vboot_reference/
README 84 certificate) in a format suitable for use by
112 dumpRSAPublicKey. This utility expects an x509 certificate as
127 .crt X509 Key Certificate
  /external/vboot_reference/utility/
dumpRSAPublicKey.c 165 /* Read the certificate */
167 fprintf(stderr, "Couldn't read certificate.\n");
171 /* Get the public key from the certificate. */
  /external/wpa_supplicant_8/hs20/server/ca/
openssl.cnf 26 certificate = $dir/cacert.pem # The CA certificate
37 cert_opt = ca_default # Certificate field options
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_read.c 312 tlsv1_server_log(conn, "Too short Certificate message (len=%lu)",
325 tlsv1_server_log(conn, "Unexpected Certificate message length (len=%lu != left=%lu)",
334 tlsv1_server_log(conn, "Client did not include Certificate");
344 tlsv1_server_log(conn, "Received unexpected handshake message %d (expected Certificate/ClientKeyExchange)",
351 tlsv1_server_log(conn, "Received Certificate (certificate_list len %lu)",
359 * } Certificate;
365 tlsv1_server_log(conn, "Too short Certificate (left=%lu)",
398 tlsv1_server_log(conn, "Unexpected certificate length (len=%lu left=%lu)",
407 tlsv1_server_log(conn, "Certificate %lu (len %lu)",
414 tlsv1_server_log(conn, "Failed to parse the certificate");
    [all...]
  /frameworks/base/core/java/org/apache/http/conn/ssl/
X509HostnameVerifier.java 43 * server's X.509 certificate. Implements javax.net.ssl.HostnameVerifier, but
81 * certificate.
83 * from the X.509 certificate.
  /frameworks/base/keystore/java/android/security/
KeyStoreParameter.java 43 * self-signed X.509 certificate will be attached to generated entries, but that
44 * may be replaced at a later time by a certificate signed by a real Certificate
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreKeyPairGeneratorSpi.java 37 import com.android.org.bouncycastle.asn1.x509.Certificate;
504 throw new ProviderException("Failed to generate self-signed certificate", e);
512 "Failed to obtain encoded form of self-signed certificate", e);
521 throw new ProviderException("Failed to store self-signed certificate",
552 // Key cannot be used to sign a certificate
555 // Key can be used to sign a certificate
560 // Failed to generate the self-signed certificate with valid signature. Fall back
561 // to generating a self-signed certificate with a fake signature. This is done for
563 // producing a self-signed certificate with an invalid signature to key pair
627 return new X509CertificateObject(Certificate.getInstance(new DERSequence(result)))
    [all...]
  /frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/
AndroidAppAsset.java 32 * <p>An Android app can be named by its package name and certificate fingerprints using this JSON
44 * representing the certificate SHA-256 fingerprint.
147 * @param certFingerprints at least one of the Android app signing certificate sha-256

Completed in 407 milliseconds

<<21222324252627282930>>