/frameworks/base/packages/Osu/src/com/android/anqp/eap/ |
Credential.java | 20 Certificate,
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/ |
Credential.java | 20 Certificate,
|
/libcore/ojluni/src/main/java/java/security/cert/ |
X509Certificate.java | 40 * way to access all the attributes of an X.509 certificate. 45 * Certificate ::= SEQUENCE { 57 * These certificates are managed and vouched for by <em>Certificate 67 * Public Key Infrastructure Certificate and CRL Profile</a>. 88 * Certificates are instantiated using a certificate factory. The following is 89 * an example of how to instantiate an X.509 certificate: 100 * @see Certificate 105 public abstract class X509Certificate extends Certificate 120 * Checks that the certificate is currently valid. It is if 122 * certificate [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
JarVerifier.java | 65 * Verify the JAR file is signed by an entity which has a certificate 137 * framework signing certificate. 141 * the framework signing certificate 143 static void verifyPolicySigned(java.security.cert.Certificate[] certs)
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; [all...] |
/external/okhttp/okhttp-android-support/src/main/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverter.java | 41 import java.security.cert.Certificate; 118 Certificate[] peerCertificates; 125 Certificate[] localCertificates = httpsUrlConnection.getLocalCertificates(); 242 List<Certificate> peerCertificates; 248 List<Certificate> localCertificates = javaSecureCacheResponse.getLocalCertificateChain(); 301 public List<Certificate> getLocalCertificateChain() { 304 List<Certificate> certificates = handshake.localCertificates(); 309 public List<Certificate> getServerCertificateChain() throws SSLPeerUnverifiedException { 312 List<Certificate> certificates = handshake.peerCertificates();
|
/libcore/ojluni/src/main/java/java/util/jar/ |
JarVerifier.java | 326 * Return an array of java.security.cert.Certificate objects for 331 public java.security.cert.Certificate[] getCerts(String name) 336 public java.security.cert.Certificate[] getCerts(JarFile jar, JarEntry entry) 374 * Convert an array of signers into an array of concatenated certificate 377 private static java.security.cert.Certificate[] mapSignersToCertArray( 387 // Convert into a Certificate[] 388 return (java.security.cert.Certificate[]) 390 new java.security.cert.Certificate[certChains.size()]); 602 java.security.cert.Certificate[] vcerts; 612 VerifierCodeSource(Object csdomain, URL location, java.security.cert.Certificate[] certs) [all...] |
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverterTest.java | 39 import java.security.cert.Certificate; 70 private static final X509Certificate LOCAL_CERT = certificate("" 71 + "-----BEGIN CERTIFICATE-----\n" 80 + "-----END CERTIFICATE-----"); 83 private static final X509Certificate SERVER_CERT = certificate("" 84 + "-----BEGIN CERTIFICATE-----\n" 94 + "-----END CERTIFICATE-----"); 161 final List<Certificate> localCertificates = Arrays.<Certificate>asList(LOCAL_CERT); 163 final List<Certificate> serverCertificates = Arrays.<Certificate>asList(SERVER_CERT) 622 private static X509Certificate certificate(String certificate) { method in class:JavaApiConverterTest [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 79 * with a single certificate. 107 public Certificate[] engineGetCertificateChain(String alias) { 117 final Certificate[] caList; 123 caList = new Certificate[caChain.size() + 1]; 131 caList = new Certificate[1]; 140 public Certificate engineGetCertificate(String alias) { 155 // This entry/alias does not contain a certificate. 159 private Certificate getCertificateForTrustedCertificateEntry(byte[] encodedCert) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 76 // creating a certificate 77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 91 + "-----END CERTIFICATE-----\n"; 93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 95 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 109 + "-----END CERTIFICATE-----\n"; 113 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 132 + "-----END CERTIFICATE-----\n" [all...] |
/cts/tests/tests/networksecurityconfig/networksecurityconfig-resourcesrc/src/android/security/net/config/cts/ |
ResourceSourceTest.java | 25 import java.security.cert.Certificate; 77 for (Certificate cert : factory.generateCertificates(is)) {
|
/cts/tests/tests/networksecurityconfig/src/android/security/net/config/cts/ |
TestUtils.java | 27 import java.security.cert.Certificate; 85 for (Certificate c : factory.generateCertificates(is)) {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
X509CRLTest.java | 32 import java.security.cert.Certificate; 62 public boolean isRevoked(Certificate cert) { 241 * getRevokedCertificate(X509Certificate certificate) method testing.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
BasicOCSPResp.java | 16 import org.bouncycastle.asn1.x509.Certificate; 30 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 158 certs[i] = new X509CertificateHolder(Certificate.getInstance(s.getObjectAt(i)));
|
OCSPReq.java | 17 import org.bouncycastle.asn1.x509.Certificate; 41 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL} 195 certs[i] = new X509CertificateHolder(Certificate.getInstance(s.getObjectAt(i)));
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/tools/ |
ocspclient.py | 110 sys.stdin, ('-----BEGIN CERTIFICATE-----', '-----END CERTIFICATE-----') 112 asn1Spec=rfc2459.Certificate() 116 sys.stdin, ('-----BEGIN CERTIFICATE-----', '-----END CERTIFICATE-----') 118 asn1Spec=rfc2459.Certificate() 141 print('Certificate ID %s is %s at %s till %s\n' % (
|
ocspserver.py | 111 asn1Spec=rfc2459.Certificate() 115 asn1Spec=rfc2459.Certificate() 138 print('Certificate ID %s is %s at %s till %s\n' % (
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 30 import java.security.cert.Certificate; 42 * self-signed certificate for a single hostname such as "localhost". 84 // Generate public and private keys and use them to make a self-signed certificate. 86 X509Certificate certificate = selfSignedCertificate(keyPair, "1"); local 90 Certificate[] certificateChain = { certificate }; 92 keyStore.setCertificateEntry("cert", certificate); 114 * Generates a certificate for {@code hostName} containing {@code keyPair}'s
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 64 Certificate[] certificates = session.getPeerCertificates(); 71 public boolean verify(String host, X509Certificate certificate) { 73 ? verifyIpAddress(host, certificate) 74 : verifyHostName(host, certificate); 82 * Returns true if {@code certificate} matches {@code ipAddress}. 84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); 95 * Returns true if {@code certificate} matches {@code hostName}. 97 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
ClientKeyManager.java | 14 import java.security.cert.Certificate; 89 for (Certificate certificate : 91 if (certificate instanceof X509Certificate) { 92 certs.add((X509Certificate) certificate);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 43 import java.security.cert.Certificate; 64 "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n"; 85 "-----BEGIN CERTIFICATE-----\r\n" 103 + "-----END CERTIFICATE-----\r\n"; 105 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n" 127 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n" 131 "-----BEGIN CERTIFICATE-----\n" 166 + "-----END CERTIFICATE-----"; 187 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid)) 287 Certificate certificate = cf.generateCertificate(certStream); local 518 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder [all...] |
/libcore/luni/src/test/java/libcore/java/util/zip/ |
OldAndroidZipStressTest.java | 22 import java.security.cert.Certificate; 50 Certificate[] certs = je != null ? je.getCertificates() : null;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory1Test.java | 41 import java.security.cert.Certificate; 376 assertTrue("Not empty certificate collection", colCer.isEmpty()); 435 Certificate cer; 446 assertNull("Not null certificate was created", cer); 453 assertTrue("Not empty certificate Collection was created", colCer.isEmpty()); 577 List<Certificate> list = null; 598 List<Certificate> list = new Vector<Certificate>(); 601 List<? extends Certificate> list1 = cp.getCertificates(); 609 * incorrect Certificate [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
ConstraintsChecker.java | 29 import java.security.cert.Certificate; 47 * constraints information on a PKIX certificate, namely basic constraints 105 * checks on the certificate using its internal state. 107 * @param cert the <code>Certificate</code> to be checked 110 * @throws CertPathValidatorException if the specified certificate 114 public void check(Certificate cert, Collection<String> unresCritExts) 202 // be sharing it with a Certificate object! 234 // RFC5280: If certificate i is a version 3 certificate, verify 236 // set to TRUE. (If certificate i is a version 1 or version [all...] |
/libcore/ojluni/src/main/java/sun/security/ssl/ |
X509KeyManagerImpl.java | 37 import java.security.cert.Certificate; 54 * is not expired and has the appropriate certificate extensions. 259 // the signature algorithm) of a certificate matches what we need. 265 // supported_signature_algorithms, and the certificate type no longer 266 // restricts the algorithm used to sign the certificate. 267 // However, because we don't support certificate type checking other 283 boolean matches(Certificate[] chain) { 295 // Check the signature algorithm of the certificate itself. 440 // and includes the result of the certificate check 449 Certificate[] chain, CheckResult checkResult) [all...] |