/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server_test.go | 53 Certificates: make([]Certificate, 2), 59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 149 serverConfig.Certificates = make([]Certificate, 1) 150 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 179 serverConfig.Certificates = make([]Certificate, 1) 180 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 373 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 375 Certificates: []Certificate{{ 376 Certificate: [][]byte{testRSACertificate} [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 53 Certificates: make([]Certificate, 2), 59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 149 serverConfig.Certificates = make([]Certificate, 1) 150 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 179 serverConfig.Certificates = make([]Certificate, 1) 180 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 373 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 375 Certificates: []Certificate{{ 376 Certificate: [][]byte{testRSACertificate} [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 31 import java.security.cert.Certificate; 109 Certificate certs[] = { 159 assertEquals("Incorrect Certificate", 169 "Incorrect Certificate", 177 assertEquals("Incorrect Certificate",
|
KSBuilder_ImplTest.java | 36 import java.security.cert.Certificate; 139 Certificate certs[] = { 491 * Additional class for creation Certificate object 493 public class MCertificate extends Certificate {
|
/external/apache-http/android/src/android/net/http/ |
CertificateChainValidator.java | 32 import java.security.cert.Certificate; 47 * Class responsible for all server certificate validation functionality 54 * The singleton instance of the certificate chain validator. 75 * Creates a new certificate chain validator. This is a private constructor. 76 * If you need a Certificate chain validator, call getInstance(). 103 * And if the last traced certificate is self issued and it is expired, it 119 Certificate[] peerCertificates = 126 // update the SSL certificate associated with the connection 151 throw new IllegalArgumentException("bad certificate chain"); 163 throw new IOException("can't read certificate", e) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedHelper.java | 27 import org.bouncycastle.asn1.x509.Certificate; 178 certList.add(new X509CertificateHolder(Certificate.getInstance(obj)));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 11 import java.security.cert.Certificate; 204 Certificate cert; 318 // pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded())); 325 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path"); 349 * Return a DERObject containing the encoded certificate. 365 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V1CertificateGenerator.java | 27 import org.bouncycastle.asn1.x509.Certificate; 37 * class to produce an X.509 Version 1 certificate. 61 * set the serial number for the certificate. 76 * certificate. 93 * certificate. 177 * generate an X509 certificate, based on the current issuer and subject 196 * generate an X509 certificate, based on the current issuer and subject 216 * generate an X509 certificate, based on the current issuer and subject, 230 * generate an X509 certificate, based on the current issuer and subject, 264 * generate an X509 certificate, based on the current issuer and subjec [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/pyasn1_modules/ |
rfc2560.py | 12 # * request and response works only for a single certificate 42 # This should be in PKIX Certificate Extensions module 46 # end of PKIX Certificate Extensions module 120 namedtype.OptionalNamedType('certs', univ.SequenceOf(rfc2459.Certificate()).subtype(explicitTag=tag.Tag(tag.tagClassContext, tag.tagFormatSimple, 0))) 156 namedtype.OptionalNamedType('certs', univ.SequenceOf(rfc2459.Certificate()).subtype(explicitTag=tag.Tag(tag.tagClassContext, tag.tagFormatSimple, 0)))
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLX509CertPath.java | 23 import java.security.cert.Certificate; 88 public List<? extends Certificate> getCertificates() {
|
/external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/ |
CoverageTransformerTest.java | 26 import java.security.cert.Certificate; 81 CodeSource cs = new CodeSource(null, new Certificate[0]);
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509CRLTest.java | 38 import java.security.cert.Certificate; 57 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRLTest 71 + "-----END CERTIFICATE-----\n"; 73 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 84 public boolean isRevoked(Certificate cert) { 267 * getRevokedCertificate(X509Certificate certificate) method testing.
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 41 import java.security.cert.Certificate; 62 * specified certificate contains the required algorithm constraints. 64 * Certificate fields such as the subject public key, the signature 90 * certificate 101 * path where the trust anchor is unknown, or a certificate list which may 117 * certificate 168 public void check(Certificate cert, 173 // ignore the check for non-x.509 certificate or null constraints 306 * certificate
|
BasicChecker.java | 36 import java.security.cert.Certificate; 54 * on a PKIX certificate, namely the signature, timestamp, and subject/issuer 74 * @param anchor the anchor selected to validate the target certificate 75 * @param testDate the time for which the validity of the certificate 129 * checks on the certificate using its internal state. This method does 132 * @param cert the Certificate 135 * @throws CertPathValidatorException if certificate does not verify 138 public void check(Certificate cert, Collection<String> unresolvedCritExts) 153 * Verifies the signature on the certificate using the previous public key. 156 * @throws CertPathValidatorException if certificate does not verif [all...] |
Builder.java | 47 * matching certificates and is able to verify a particular certificate. 95 * @param cert the certificate to be verified 104 * Verifies whether the input certificate completes the path. 106 * When building reverse, the target certificate will complete the path. 108 * @param cert the certificate to test 114 * Adds the certificate to the certPathList 116 * @param cert the certificate to be added 123 * Removes final certificate from the certPathList 241 * Determine how close a given certificate gets you toward 246 * independently, realizing that this certificate [all...] |
PKIX.java | 129 // cert is the last certificate 258 Collection<? extends Certificate> certs = 259 (Collection<? extends Certificate>)
|
X509CertPath.java | 33 import java.security.cert.Certificate; 55 * That is, the issuer of one certificate is the subject of the following 104 public X509CertPath(List<? extends Certificate> certs) throws CertificateException { 109 // Note; The certs parameter is not necessarily to be of Certificate 113 // for (Certificate obj : certs) 299 ("Duplicate Certificate");
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
imagehlp.h | 92 WINBOOL IMAGEAPI ImageAddCertificate(HANDLE FileHandle,LPWIN_CERTIFICATE Certificate,PDWORD Index); 95 WINBOOL IMAGEAPI ImageGetCertificateData(HANDLE FileHandle,DWORD CertificateIndex,LPWIN_CERTIFICATE Certificate,PDWORD RequiredLength);
|
/system/ca-certificates/ |
Android.mk | 19 # Definitions for installing Certificate Authority (CA) certificates
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 41 * A source for trusted root certificate authority (CA) certificates 73 * deleted system certificate simply removes the copy from the deleted 131 public Certificate getCertificate(String alias) { 135 public Certificate getCertificate(String alias, boolean includeDeletedSystem) { 279 public String getCertificateAlias(Certificate c) { 283 public String getCertificateAlias(Certificate c, boolean includeDeletedSystem) { 303 * Returns true to indicate that the certificate was added by the 311 * Returns a File for where the certificate is found if it exists 331 * TrustManagerImpl} to locate a CA certificate with the same nam [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
KeyChainTest.java | 51 import java.security.cert.Certificate; 209 final Certificate[] chain = new Certificate[2]; 236 Log.w(TAG, "Certificate generation failed", gse); 241 // Create a PKCS12 keystore populated with key + certificate chain 307 * The server authenticates itself to the client using the key pair and certificate from the 334 * The client authenticates itself to the server using a private key and certificate 336 * Server authentication only trusts the root certificate of the credentials generated 383 log("Certificate alias: \"" + aliasCaptor.getValue() + "\""); 402 log("Null certificate chain!") [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustManagerImplTest.java | 21 import java.security.cert.Certificate; 105 // We should ignore duplicate cruft in the certificate chain 313 public Certificate[] getLocalCertificates() { 334 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
ConfigBuilder.java | 31 import java.security.cert.Certificate; 144 Certificate[] chain = ks.getCertificateChain(alias); 147 for (Certificate certificate : chain) { 148 if (!(certificate instanceof X509Certificate)) { 150 certificate.getClass()); 152 clientChain.add((X509Certificate) certificate); 213 Certificate cert = ks.getCertificate(alias); 294 throw new IOException("Invalid certificate type for TLS: " + 300 for (X509Certificate certificate : clientChain) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
X509CertificateTest.java | 53 import javax.security.cert.Certificate; 73 private static String base64cert = "-----BEGIN CERTIFICATE-----\n" 90 + "-----END CERTIFICATE-----"; 93 * a self-signed certificate 95 private static final String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" + 114 "-----END CERTIFICATE-----"; 126 private java.security.cert.Certificate javaSSCert; 130 private Certificate javaxSSCert; 158 // The requested certificate type is not available. 161 Logger.global.warning("Error in test setup: Certificate type not supported") [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 46 import java.security.cert.Certificate; 405 Certificate[] certs = entry.getCertificateChain(); 408 for (Certificate c : certs) {
|