HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 276 - 300 of 423) sorted by null

<<11121314151617

  /libcore/ojluni/src/main/java/java/util/jar/
JarFile.java 35 import java.security.cert.Certificate;
269 public Certificate[] getCertificates() {
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLUtils.java 40 import java.security.cert.Certificate;
62 * A trust manager specific to a particular HostAuth. The first time a server certificate is
63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether
64 * the PublicKey of the certificate presented matches that of the saved certificate
109 Certificate storedCert =
154 * Optionally bypass all SSL certificate checks.
156 * @param insecure if true, bypass all SSL certificate checks
283 * a client certificate.
317 * for a client certificate (in millis since epoch)
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
cipher_suites.go 26 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
27 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
33 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
34 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
45 // certificate is ECDSA. If this is not set then the cipher suite is
  /prebuilts/go/linux-x86/src/crypto/tls/
cipher_suites.go 26 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
27 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
33 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
34 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
45 // certificate is ECDSA. If this is not set then the cipher suite is
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyAttestationTest.java 71 import java.security.cert.Certificate;
201 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
295 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
391 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
445 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
    [all...]
TestUtils.java 42 import java.security.cert.Certificate;
143 Certificate cert;
155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(),
165 "Public key used to sign certificate should have the same algorithm as in KeyPair",
168 Certificate[] chain = privEntry.getCertificateChain();
170 fail("Empty certificate chain");
405 Certificate certificate,
410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate})
    [all...]
KeyPairGeneratorTest.java 41 import java.security.cert.Certificate;
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 17 import java.security.cert.Certificate;
76 private org.bouncycastle.asn1.x509.Certificate c;
85 org.bouncycastle.asn1.x509.Certificate c)
144 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
149 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
599 if (!(o instanceof Certificate))
604 Certificate other = (Certificate)o;
846 throw new SignatureException("certificate does not verify with supplied key");
X509CRLObject.java 14 import java.security.cert.Certificate;
550 * Checks whether the given certificate is on this CRL.
552 * @param cert the certificate to check for.
553 * @return true if the given certificate is on this CRL,
556 public boolean isRevoked(Certificate cert)
597 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
601 throw new RuntimeException("Cannot process certificate");
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go 203 c := &Certificate{
216 c = &Certificate{
227 c = &Certificate{
345 template := Certificate{
405 t.Errorf("%s: failed to create certificate: %s", test.name, err)
411 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
463 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
513 template := Certificate{
538 t.Fatalf("failed to create certificate: %s", err)
543 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
x509.go 110 type certificate struct { type
460 // A Certificate represents an X.509 certificate.
461 type Certificate struct {
462 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
463 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
542 // a certificate. For example: checking a signature when the public key isn't a
543 // certificate signing key.
547 return "x509: invalid signature: parent certificate cannot sign this kind of certificate"
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test.go 203 c := &Certificate{
216 c = &Certificate{
227 c = &Certificate{
345 template := Certificate{
405 t.Errorf("%s: failed to create certificate: %s", test.name, err)
411 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
463 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
513 template := Certificate{
538 t.Fatalf("failed to create certificate: %s", err)
543 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
x509.go 110 type certificate struct { type
460 // A Certificate represents an X.509 certificate.
461 type Certificate struct {
462 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
463 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
542 // a certificate. For example: checking a signature when the public key isn't a
543 // certificate signing key.
547 return "x509: invalid signature: parent certificate cannot sign this kind of certificate"
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl1Test.java 34 import java.security.cert.Certificate;
237 * <code>setKeyEntry(String alias, Key key, char[] password, Certificate[] chain)</code>
238 * <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code>
239 * <code>setCertificateEntry(String alias, Certificate cert)</code>
246 * <code>getCertificateAlias(Certificate cert)</code>
292 kss[i].setKeyEntry("", null, new char[0], new Certificate[0]);
297 kss[i].setKeyEntry("", new byte[0], new Certificate[0]);
369 * used trusted certificate.
428 assertEquals("Incorrect certificate",
432 assertEquals("Incorrect certificate", kss[i
    [all...]
KeyStore_Impl2Test.java 34 import java.security.cert.Certificate;
253 Certificate[] chain = { mc };
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
OSUManager.java 38 import java.security.cert.Certificate;
146 Certificate cert = keyStore.getCertificate(alias);
172 Certificate cert = keyStore.getCertificate(alias);
226 Certificate cert = certFactory.generateCertificate(in);
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/
JarFileTest.java 36 import java.security.cert.Certificate;
441 Certificate[] certs = entry.getCertificates();
668 Certificate[] certs = entry.getCertificates();
695 public Certificate[] certificates;
715 Certificate[] certs = entry.getCertificates();
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLObject.java 14 import java.security.cert.Certificate;
554 * Checks whether the given certificate is on this CRL.
556 * @param cert the certificate to check for.
557 * @return true if the given certificate is on this CRL,
560 public boolean isRevoked(Certificate cert)
601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/ldap/
LDAPCertStore.java 44 import java.security.cert.Certificate;
68 * server from which <code>Certificate</code>s and <code>CRL</code>s will be
90 * We always request CA certificates, cross certificate pairs, and ARLs in
461 Certificate cert = cf.generateCertificate(bais);
480 * Gets certificate pairs from an attribute id and location in the LDAP
527 * Looks at certificate pairs stored in the crossCertificatePair attribute
571 * Returns a <code>Collection</code> of <code>Certificate</code>s that
572 * match the specified selector. If no <code>Certificate</code>s
576 * matching <code>Certificate</code>s. Instead, the <code>CertSelector</code>
577 * is examined in order to determine where matching <code>Certificate</code>
    [all...]
  /external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/
SerializationTest.java 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts();
365 java.security.cert.Certificate[] certs = initPerm
  /external/boringssl/src/ssl/test/runner/
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
48 // certificate is ECDSA. If this is not set then the cipher suite is
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLX509Certificate.java 30 import java.security.cert.Certificate;
160 public static OpenSSLX509Certificate fromCertificate(Certificate cert)
229 throw new CertificateNotYetValidException("Certificate not valid until "
234 throw new CertificateExpiredException("Certificate expired at "
516 * A modified copy of the certificate is returned. The original object
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 32 import java.security.cert.Certificate;
45 * SSL certificate info (certificate details) class
55 * Name of the entity this certificate is issued to
60 * Name of the entity this certificate is issued by
75 * The original source certificate, if available.
90 private static final String X509_CERTIFICATE = "x509-certificate";
93 * Saves the certificate state to a bundle
94 * @param certificate The SSL certificate to stor
184 certificate); local
    [all...]
  /frameworks/base/keystore/tests/src/android/security/keystore/
AndroidKeyPairGeneratorTest.java 33 import java.security.cert.Certificate;
369 assertNotNull("The user certificate should exist for the generated entry", userCertBytes);
372 final Certificate userCert =
375 assertTrue("Certificate should be in X.509 format", userCert instanceof X509Certificate);
380 "Public key used to sign certificate should have the same algorithm as in KeyPair",
383 assertEquals("PublicKey used to sign certificate should match one returned in KeyPair",
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.cert.Certificate;
51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest
65 + "-----END CERTIFICATE-----\n";
121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes());
156 Certificate[] res = event.getPeerCertificates();
554 * Implements basically a dummy TrustManager. It stores the certificate

Completed in 2584 milliseconds

<<11121314151617