/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 62 * A trust manager specific to a particular HostAuth. The first time a server certificate is 63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether 64 * the PublicKey of the certificate presented matches that of the saved certificate 109 Certificate storedCert = 154 * Optionally bypass all SSL certificate checks. 156 * @param insecure if true, bypass all SSL certificate checks 283 * a client certificate. 317 * for a client certificate (in millis since epoch) [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 71 import java.security.cert.Certificate; 201 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 295 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 391 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 445 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); [all...] |
TestUtils.java | 42 import java.security.cert.Certificate; 143 Certificate cert; 155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 165 "Public key used to sign certificate should have the same algorithm as in KeyPair", 168 Certificate[] chain = privEntry.getCertificateChain(); 170 fail("Empty certificate chain"); 405 Certificate certificate, 410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate}) [all...] |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 17 import java.security.cert.Certificate; 76 private org.bouncycastle.asn1.x509.Certificate c; 85 org.bouncycastle.asn1.x509.Certificate c) 144 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 149 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 599 if (!(o instanceof Certificate)) 604 Certificate other = (Certificate)o; 846 throw new SignatureException("certificate does not verify with supplied key");
|
X509CRLObject.java | 14 import java.security.cert.Certificate; 550 * Checks whether the given certificate is on this CRL. 552 * @param cert the certificate to check for. 553 * @return true if the given certificate is on this CRL, 556 public boolean isRevoked(Certificate cert) 597 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 601 throw new RuntimeException("Cannot process certificate");
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 34 import java.security.cert.Certificate; 237 * <code>setKeyEntry(String alias, Key key, char[] password, Certificate[] chain)</code> 238 * <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code> 239 * <code>setCertificateEntry(String alias, Certificate cert)</code> 246 * <code>getCertificateAlias(Certificate cert)</code> 292 kss[i].setKeyEntry("", null, new char[0], new Certificate[0]); 297 kss[i].setKeyEntry("", new byte[0], new Certificate[0]); 369 * used trusted certificate. 428 assertEquals("Incorrect certificate", 432 assertEquals("Incorrect certificate", kss[i [all...] |
KeyStore_Impl2Test.java | 34 import java.security.cert.Certificate; 253 Certificate[] chain = { mc };
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
OSUManager.java | 38 import java.security.cert.Certificate; 146 Certificate cert = keyStore.getCertificate(alias); 172 Certificate cert = keyStore.getCertificate(alias); 226 Certificate cert = certFactory.generateCertificate(in); [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/ |
JarFileTest.java | 36 import java.security.cert.Certificate; 441 Certificate[] certs = entry.getCertificates(); 668 Certificate[] certs = entry.getCertificates(); 695 public Certificate[] certificates; 715 Certificate[] certs = entry.getCertificates(); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 14 import java.security.cert.Certificate; 554 * Checks whether the given certificate is on this CRL. 556 * @param cert the certificate to check for. 557 * @return true if the given certificate is on this CRL, 560 public boolean isRevoked(Certificate cert) 601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ldap/ |
LDAPCertStore.java | 44 import java.security.cert.Certificate; 68 * server from which <code>Certificate</code>s and <code>CRL</code>s will be 90 * We always request CA certificates, cross certificate pairs, and ARLs in 461 Certificate cert = cf.generateCertificate(bais); 480 * Gets certificate pairs from an attribute id and location in the LDAP 527 * Looks at certificate pairs stored in the crossCertificatePair attribute 571 * Returns a <code>Collection</code> of <code>Certificate</code>s that 572 * match the specified selector. If no <code>Certificate</code>s 576 * matching <code>Certificate</code>s. Instead, the <code>CertSelector</code> 577 * is examined in order to determine where matching <code>Certificate</code> [all...] |
/external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/ |
SerializationTest.java | 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts(); 365 java.security.cert.Certificate[] certs = initPerm
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 30 import java.security.cert.Certificate; 160 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 229 throw new CertificateNotYetValidException("Certificate not valid until " 234 throw new CertificateExpiredException("Certificate expired at " 516 * A modified copy of the certificate is returned. The original object
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyPairGeneratorTest.java | 33 import java.security.cert.Certificate; 369 assertNotNull("The user certificate should exist for the generated entry", userCertBytes); 372 final Certificate userCert = 375 assertTrue("Certificate should be in X.509 format", userCert instanceof X509Certificate); 380 "Public key used to sign certificate should have the same algorithm as in KeyPair", 383 assertEquals("PublicKey used to sign certificate should match one returned in KeyPair",
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 65 + "-----END CERTIFICATE-----\n"; 121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 156 Certificate[] res = event.getPeerCertificates(); 554 * Implements basically a dummy TrustManager. It stores the certificate
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldJarURLConnectionTest.java | 29 import java.security.cert.Certificate; 85 Certificate [] certs = juc.getCertificates();
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Signature2Test.java | 36 import java.security.cert.Certificate; 271 * java.security.Signature#initVerify(java.security.cert.Certificate) 287 Signature.getInstance("DSA").initVerify((Certificate) null);
|
SignatureTest.java | 39 import java.security.cert.Certificate; 132 * Class under test for void initVerify(Certificate) 539 private class MyCertificate extends java.security.cert.Certificate {
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 41 import java.security.cert.Certificate; 66 // Certificate type used during testing 90 * constructed using self signed test certificate 125 * containing single element (self signed test certificate). 209 public void check(Certificate arg0, Collection arg1) 300 // X.509 encoded certificate 301 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n" 316 + "JDSM\n" + "-----END CERTIFICATE-----\n"; 323 * Returns X.509 certificate encoding corresponding to version v1. 325 * Certificate encoding was created by hands according to X.509 Certificat [all...] |
/bootable/recovery/tests/component/ |
verifier_test.cpp | 89 std::vector<Certificate> certs;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
ProtectionDomainTest.java | 60 cs = new CodeSource(url, (java.security.cert.Certificate[]) null);
|
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
IdentityTest.java | 111 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 112 * If the identity has a public key, the public key in the certificate must be the same 122 // try Certificate with different key 131 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 132 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate. 145 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul [all...] |
SignatureTest.java | 71 * Class under test for void initVerify(Certificate) 293 private class MyCertificate extends java.security.cert.Certificate {
|