HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 226 - 250 of 423) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server_test.go 53 Certificates: make([]Certificate, 2),
59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
149 serverConfig.Certificates = make([]Certificate, 1)
150 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
179 serverConfig.Certificates = make([]Certificate, 1)
180 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
373 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
375 Certificates: []Certificate{{
376 Certificate: [][]byte{testRSACertificate}
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server_test.go 53 Certificates: make([]Certificate, 2),
59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
149 serverConfig.Certificates = make([]Certificate, 1)
150 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
179 serverConfig.Certificates = make([]Certificate, 1)
180 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
373 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
375 Certificates: []Certificate{{
376 Certificate: [][]byte{testRSACertificate}
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl3Test.java 31 import java.security.cert.Certificate;
109 Certificate certs[] = {
159 assertEquals("Incorrect Certificate",
169 "Incorrect Certificate",
177 assertEquals("Incorrect Certificate",
KSBuilder_ImplTest.java 36 import java.security.cert.Certificate;
139 Certificate certs[] = {
491 * Additional class for creation Certificate object
493 public class MCertificate extends Certificate {
  /external/apache-http/android/src/android/net/http/
CertificateChainValidator.java 32 import java.security.cert.Certificate;
47 * Class responsible for all server certificate validation functionality
54 * The singleton instance of the certificate chain validator.
75 * Creates a new certificate chain validator. This is a private constructor.
76 * If you need a Certificate chain validator, call getInstance().
103 * And if the last traced certificate is self issued and it is expired, it
119 Certificate[] peerCertificates =
126 // update the SSL certificate associated with the connection
151 throw new IllegalArgumentException("bad certificate chain");
163 throw new IOException("can't read certificate", e)
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java 27 import org.bouncycastle.asn1.x509.Certificate;
178 certList.add(new X509CertificateHolder(Certificate.getInstance(obj)));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 11 import java.security.cert.Certificate;
204 Certificate cert;
318 // pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded()));
325 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path");
349 * Return a DERObject containing the encoded certificate.
365 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V1CertificateGenerator.java 27 import org.bouncycastle.asn1.x509.Certificate;
37 * class to produce an X.509 Version 1 certificate.
61 * set the serial number for the certificate.
76 * certificate.
93 * certificate.
177 * generate an X509 certificate, based on the current issuer and subject
196 * generate an X509 certificate, based on the current issuer and subject
216 * generate an X509 certificate, based on the current issuer and subject,
230 * generate an X509 certificate, based on the current issuer and subject,
264 * generate an X509 certificate, based on the current issuer and subjec
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/pyasn1_modules/
rfc2560.py 12 # * request and response works only for a single certificate
42 # This should be in PKIX Certificate Extensions module
46 # end of PKIX Certificate Extensions module
120 namedtype.OptionalNamedType('certs', univ.SequenceOf(rfc2459.Certificate()).subtype(explicitTag=tag.Tag(tag.tagClassContext, tag.tagFormatSimple, 0)))
156 namedtype.OptionalNamedType('certs', univ.SequenceOf(rfc2459.Certificate()).subtype(explicitTag=tag.Tag(tag.tagClassContext, tag.tagFormatSimple, 0)))
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLX509CertPath.java 23 import java.security.cert.Certificate;
88 public List<? extends Certificate> getCertificates() {
  /external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/
CoverageTransformerTest.java 26 import java.security.cert.Certificate;
81 CodeSource cs = new CodeSource(null, new Certificate[0]);
  /libcore/luni/src/test/java/tests/security/cert/
X509CRLTest.java 38 import java.security.cert.Certificate;
57 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRLTest
71 + "-----END CERTIFICATE-----\n";
73 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
84 public boolean isRevoked(Certificate cert) {
267 * getRevokedCertificate(X509Certificate certificate) method testing.
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
AlgorithmChecker.java 41 import java.security.cert.Certificate;
62 * specified certificate contains the required algorithm constraints.
64 * Certificate fields such as the subject public key, the signature
90 * certificate
101 * path where the trust anchor is unknown, or a certificate list which may
117 * certificate
168 public void check(Certificate cert,
173 // ignore the check for non-x.509 certificate or null constraints
306 * certificate
BasicChecker.java 36 import java.security.cert.Certificate;
54 * on a PKIX certificate, namely the signature, timestamp, and subject/issuer
74 * @param anchor the anchor selected to validate the target certificate
75 * @param testDate the time for which the validity of the certificate
129 * checks on the certificate using its internal state. This method does
132 * @param cert the Certificate
135 * @throws CertPathValidatorException if certificate does not verify
138 public void check(Certificate cert, Collection<String> unresolvedCritExts)
153 * Verifies the signature on the certificate using the previous public key.
156 * @throws CertPathValidatorException if certificate does not verif
    [all...]
Builder.java 47 * matching certificates and is able to verify a particular certificate.
95 * @param cert the certificate to be verified
104 * Verifies whether the input certificate completes the path.
106 * When building reverse, the target certificate will complete the path.
108 * @param cert the certificate to test
114 * Adds the certificate to the certPathList
116 * @param cert the certificate to be added
123 * Removes final certificate from the certPathList
241 * Determine how close a given certificate gets you toward
246 * independently, realizing that this certificate
    [all...]
PKIX.java 129 // cert is the last certificate
258 Collection<? extends Certificate> certs =
259 (Collection<? extends Certificate>)
X509CertPath.java 33 import java.security.cert.Certificate;
55 * That is, the issuer of one certificate is the subject of the following
104 public X509CertPath(List<? extends Certificate> certs) throws CertificateException {
109 // Note; The certs parameter is not necessarily to be of Certificate
113 // for (Certificate obj : certs)
299 ("Duplicate Certificate");
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
imagehlp.h 92 WINBOOL IMAGEAPI ImageAddCertificate(HANDLE FileHandle,LPWIN_CERTIFICATE Certificate,PDWORD Index);
95 WINBOOL IMAGEAPI ImageGetCertificateData(HANDLE FileHandle,DWORD CertificateIndex,LPWIN_CERTIFICATE Certificate,PDWORD RequiredLength);
  /system/ca-certificates/
Android.mk 19 # Definitions for installing Certificate Authority (CA) certificates
  /external/conscrypt/src/platform/java/org/conscrypt/
TrustedCertificateStore.java 26 import java.security.cert.Certificate;
41 * A source for trusted root certificate authority (CA) certificates
73 * deleted system certificate simply removes the copy from the deleted
131 public Certificate getCertificate(String alias) {
135 public Certificate getCertificate(String alias, boolean includeDeletedSystem) {
279 public String getCertificateAlias(Certificate c) {
283 public String getCertificateAlias(Certificate c, boolean includeDeletedSystem) {
303 * Returns true to indicate that the certificate was added by the
311 * Returns a File for where the certificate is found if it exists
331 * TrustManagerImpl} to locate a CA certificate with the same nam
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/security/
KeyChainTest.java 51 import java.security.cert.Certificate;
209 final Certificate[] chain = new Certificate[2];
236 Log.w(TAG, "Certificate generation failed", gse);
241 // Create a PKCS12 keystore populated with key + certificate chain
307 * The server authenticates itself to the client using the key pair and certificate from the
334 * The client authenticates itself to the server using a private key and certificate
336 * Server authentication only trusts the root certificate of the credentials generated
383 log("Certificate alias: \"" + aliasCaptor.getValue() + "\"");
402 log("Null certificate chain!")
    [all...]
  /external/conscrypt/src/test/java/org/conscrypt/
TrustManagerImplTest.java 21 import java.security.cert.Certificate;
105 // We should ignore duplicate cruft in the certificate chain
313 public Certificate[] getLocalCertificates() {
334 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/
ConfigBuilder.java 31 import java.security.cert.Certificate;
144 Certificate[] chain = ks.getCertificateChain(alias);
147 for (Certificate certificate : chain) {
148 if (!(certificate instanceof X509Certificate)) {
150 certificate.getClass());
152 clientChain.add((X509Certificate) certificate);
213 Certificate cert = ks.getCertificate(alias);
294 throw new IOException("Invalid certificate type for TLS: " +
300 for (X509Certificate certificate : clientChain)
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/
X509CertificateTest.java 53 import javax.security.cert.Certificate;
73 private static String base64cert = "-----BEGIN CERTIFICATE-----\n"
90 + "-----END CERTIFICATE-----";
93 * a self-signed certificate
95 private static final String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" +
114 "-----END CERTIFICATE-----";
126 private java.security.cert.Certificate javaSSCert;
130 private Certificate javaxSSCert;
158 // The requested certificate type is not available.
161 Logger.global.warning("Error in test setup: Certificate type not supported")
    [all...]
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CredentialHelper.java 46 import java.security.cert.Certificate;
405 Certificate[] certs = entry.getCertificateChain();
408 for (Certificate c : certs) {

Completed in 456 milliseconds

1 2 3 4 5 6 7 8 91011>>