/libcore/ojluni/src/main/java/java/util/jar/ |
JarFile.java | 35 import java.security.cert.Certificate; 269 public Certificate[] getCertificates() {
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 62 * A trust manager specific to a particular HostAuth. The first time a server certificate is 63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether 64 * the PublicKey of the certificate presented matches that of the saved certificate 109 Certificate storedCert = 154 * Optionally bypass all SSL certificate checks. 156 * @param insecure if true, bypass all SSL certificate checks 283 * a client certificate. 317 * for a client certificate (in millis since epoch) [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 26 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 27 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 33 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 34 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 45 // certificate is ECDSA. If this is not set then the cipher suite is
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 26 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 27 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 33 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 34 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 45 // certificate is ECDSA. If this is not set then the cipher suite is
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 71 import java.security.cert.Certificate; 201 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 295 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 391 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 445 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); [all...] |
TestUtils.java | 42 import java.security.cert.Certificate; 143 Certificate cert; 155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 165 "Public key used to sign certificate should have the same algorithm as in KeyPair", 168 Certificate[] chain = privEntry.getCertificateChain(); 170 fail("Empty certificate chain"); 405 Certificate certificate, 410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate}) [all...] |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 17 import java.security.cert.Certificate; 76 private org.bouncycastle.asn1.x509.Certificate c; 85 org.bouncycastle.asn1.x509.Certificate c) 144 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 149 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 599 if (!(o instanceof Certificate)) 604 Certificate other = (Certificate)o; 846 throw new SignatureException("certificate does not verify with supplied key");
|
X509CRLObject.java | 14 import java.security.cert.Certificate; 550 * Checks whether the given certificate is on this CRL. 552 * @param cert the certificate to check for. 553 * @return true if the given certificate is on this CRL, 556 public boolean isRevoked(Certificate cert) 597 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 601 throw new RuntimeException("Cannot process certificate");
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test.go | 203 c := &Certificate{ 216 c = &Certificate{ 227 c = &Certificate{ 345 template := Certificate{ 405 t.Errorf("%s: failed to create certificate: %s", test.name, err) 411 t.Errorf("%s: failed to parse certificate: %s", test.name, err) 463 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL) 513 template := Certificate{ 538 t.Fatalf("failed to create certificate: %s", err) 543 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err [all...] |
x509.go | 110 type certificate struct { type 460 // A Certificate represents an X.509 certificate. 461 type Certificate struct { 462 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 463 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 542 // a certificate. For example: checking a signature when the public key isn't a 543 // certificate signing key. 547 return "x509: invalid signature: parent certificate cannot sign this kind of certificate" [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test.go | 203 c := &Certificate{ 216 c = &Certificate{ 227 c = &Certificate{ 345 template := Certificate{ 405 t.Errorf("%s: failed to create certificate: %s", test.name, err) 411 t.Errorf("%s: failed to parse certificate: %s", test.name, err) 463 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL) 513 template := Certificate{ 538 t.Fatalf("failed to create certificate: %s", err) 543 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err [all...] |
x509.go | 110 type certificate struct { type 460 // A Certificate represents an X.509 certificate. 461 type Certificate struct { 462 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 463 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 542 // a certificate. For example: checking a signature when the public key isn't a 543 // certificate signing key. 547 return "x509: invalid signature: parent certificate cannot sign this kind of certificate" [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 34 import java.security.cert.Certificate; 237 * <code>setKeyEntry(String alias, Key key, char[] password, Certificate[] chain)</code> 238 * <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code> 239 * <code>setCertificateEntry(String alias, Certificate cert)</code> 246 * <code>getCertificateAlias(Certificate cert)</code> 292 kss[i].setKeyEntry("", null, new char[0], new Certificate[0]); 297 kss[i].setKeyEntry("", new byte[0], new Certificate[0]); 369 * used trusted certificate. 428 assertEquals("Incorrect certificate", 432 assertEquals("Incorrect certificate", kss[i [all...] |
KeyStore_Impl2Test.java | 34 import java.security.cert.Certificate; 253 Certificate[] chain = { mc };
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
OSUManager.java | 38 import java.security.cert.Certificate; 146 Certificate cert = keyStore.getCertificate(alias); 172 Certificate cert = keyStore.getCertificate(alias); 226 Certificate cert = certFactory.generateCertificate(in); [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/ |
JarFileTest.java | 36 import java.security.cert.Certificate; 441 Certificate[] certs = entry.getCertificates(); 668 Certificate[] certs = entry.getCertificates(); 695 public Certificate[] certificates; 715 Certificate[] certs = entry.getCertificates(); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 14 import java.security.cert.Certificate; 554 * Checks whether the given certificate is on this CRL. 556 * @param cert the certificate to check for. 557 * @return true if the given certificate is on this CRL, 560 public boolean isRevoked(Certificate cert) 601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ldap/ |
LDAPCertStore.java | 44 import java.security.cert.Certificate; 68 * server from which <code>Certificate</code>s and <code>CRL</code>s will be 90 * We always request CA certificates, cross certificate pairs, and ARLs in 461 Certificate cert = cf.generateCertificate(bais); 480 * Gets certificate pairs from an attribute id and location in the LDAP 527 * Looks at certificate pairs stored in the crossCertificatePair attribute 571 * Returns a <code>Collection</code> of <code>Certificate</code>s that 572 * match the specified selector. If no <code>Certificate</code>s 576 * matching <code>Certificate</code>s. Instead, the <code>CertSelector</code> 577 * is examined in order to determine where matching <code>Certificate</code> [all...] |
/external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/ |
SerializationTest.java | 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts(); 365 java.security.cert.Certificate[] certs = initPerm
|
/external/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 48 // certificate is ECDSA. If this is not set then the cipher suite is
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 30 import java.security.cert.Certificate; 160 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 229 throw new CertificateNotYetValidException("Certificate not valid until " 234 throw new CertificateExpiredException("Certificate expired at " 516 * A modified copy of the certificate is returned. The original object
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyPairGeneratorTest.java | 33 import java.security.cert.Certificate; 369 assertNotNull("The user certificate should exist for the generated entry", userCertBytes); 372 final Certificate userCert = 375 assertTrue("Certificate should be in X.509 format", userCert instanceof X509Certificate); 380 "Public key used to sign certificate should have the same algorithm as in KeyPair", 383 assertEquals("PublicKey used to sign certificate should match one returned in KeyPair",
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 65 + "-----END CERTIFICATE-----\n"; 121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 156 Certificate[] res = event.getPeerCertificates(); 554 * Implements basically a dummy TrustManager. It stores the certificate
|