HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 326 - 350 of 423) sorted by null

<<11121314151617

  /prebuilts/go/linux-x86/src/crypto/x509/pkix/
pkix.go 163 // 5280, section 5.1. Use Certificate.CheckCRLSignature to verify the
  /frameworks/base/keystore/java/android/security/keystore/
KeyGenParameterSpec.java 30 import java.security.cert.Certificate;
61 * {@link Certificate#getPublicKey()}.
69 * <p>For asymmetric key pairs, a self-signed X.509 certificate will be also generated and stored in
71 * support storing key pairs without a certificate. The subject, serial number, and validity dates
72 * of the certificate can be customized in this spec. The self-signed certificate may be replaced at
73 * a later time by a certificate signed by a Certificate Authority (CA).
75 * <p>NOTE: If a private key is not authorized to sign the self-signed certificate, then the
76 * certificate will be created with an invalid signature which will not verify. Such a certificat
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/updates/
CertPinInstallReceiverTest.java 36 import java.security.cert.Certificate;
  /libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/
CertBlacklistTest.java 27 import java.security.cert.Certificate;
434 System.out.println("CERTIFICATE PUBLIC KEY HASH: " + getHash(createPublicKey(cert)));
438 System.out.println("CERTIFICATE SERIAL NUMBER: " + createSerialNumber(cert).toString(16));
  /libcore/luni/src/test/java/tests/java/security/
IdentityTest.java 118 * verify addCertificate(Certificate certificate) adds a certificate for this identity.
119 * If the identity has a public key, the public key in the certificate must be the same
130 // try Certificate with different key
138 * verify addCertificate(Certificate certificate) adds a certificate for this identity.
139 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate.
152 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul
    [all...]
  /libcore/ojluni/src/main/java/java/lang/
ClassLoader.java 43 import java.security.cert.Certificate;
    [all...]
  /libcore/ojluni/src/main/java/sun/security/validator/
PKIXValidator.java 208 ("null or zero-length certificate chain");
313 List<? extends java.security.cert.Certificate> list =
320 ("TrustAnchor must be specified as certificate");
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/
BuildPreferencePage.java 41 import java.security.cert.Certificate;
301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local
303 if (key == null || certificate == null) {
310 FingerprintUtils.getFingerprint(certificate, "MD5"));
315 FingerprintUtils.getFingerprint(certificate, "SHA1"));
319 if (certificate.getNotAfter().compareTo(today) < 0) {
320 showErrorMessage("Certificate is expired!");
324 if (certificate.getNotBefore().compareTo(today) > 0) {
325 showErrorMessage("Certificate validity is in the future!");
  /system/extras/verity/
BootSignature.java 27 import java.security.cert.Certificate;
51 * certificate ::= Certificate
67 private ASN1Encodable certificate; field in class:BootSignature
101 certificate = sequence.getObjectAt(1);
102 byte[] encoded = ((ASN1Object) certificate).getEncoded();
151 certificate = s.readObject();
182 v.add(certificate);
302 if (args.length >= 4 && "-certificate".equals(args[2])) {
303 /* args[3] is the path to a public key certificate */
    [all...]
Utils.java 35 import java.security.cert.Certificate;
  /external/boringssl/src/ssl/test/runner/
handshake_client.go 382 var leaf *x509.Certificate
396 certs := make([]*x509.Certificate, len(certMsg.certificates))
401 return errors.New("tls: failed to parse certificate from server: " + err.Error())
433 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", leaf.PublicKey)
478 var chainToSend *Certificate
485 // A list of the distinguished names of acceptable certificate
491 // send any certificate of the appropriate
516 for j, cert := range chain.Certificate {
518 // parse the certificate if this isn't the leaf
523 return errors.New("tls: failed to parse client certificate #" + strconv.Itoa(i) + ": " + err.Error()
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 14 import java.security.cert.Certificate;
125 * issuer of the given X509 certificate. Uses the default provider
128 * @param cert the X509 certificate
133 * on the given certificate has thrown an exception.
145 * issuer of the given X509 certificate. Uses the specified
149 * @param cert the X509 certificate
155 * on the given certificate has thrown an exception.
236 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx);
545 throw new AnnotatedException("Certificate policies cannot be decoded.", e);
686 "Problem while picking certificates from certificate store."
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 42 import java.security.cert.Certificate;
698 Certificate[] serverCertificates = connection.getServerCertificates();
699 Certificate[] localCertificates = request.getSslLocalCertificates();
    [all...]
  /libcore/ojluni/src/main/java/javax/crypto/
Cipher.java 40 import java.security.cert.Certificate;
687 // The OID for the KeyUsage extension in an X.509 v3 certificate
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
SSLSocketTest.java 37 import java.security.cert.Certificate;
360 Certificate[] localCertificates = server.getSession().getLocalCertificates();
375 Certificate[] peerCertificates = client.getSession().getPeerCertificates();
538 Certificate[] localCertificates = event.getLocalCertificates();
539 Certificate[] peerCertificates = event.getPeerCertificates();
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyStoreTest.java 42 import java.security.cert.Certificate;
75 private static final String ALIAS_CERTIFICATE = "certificate";
80 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe";
192 // RI can't handle certificate in PKCS12, but BC can
374 public static void setCertificate(KeyStore ks, String alias, Certificate certificate)
376 ks.setCertificateEntry(alias, certificate);
417 public static void assertCertificate(Certificate actual)
421 public static void assertCertificate2(Certificate actual)
432 public static void assertCertificateChain(Certificate[] actual
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
360 certMsg.certificates = hs.cert.Certificate
384 // Request a client certificate
396 // the client that it may send any certificate in response
399 // an appropriate certificate to give to us.
419 // If we requested a client certificate, then the client must send a
420 // certificate message, even if it's empty.
429 // The client didn't actually send a certificate
433 return errors.New("tls: client didn't provide a certificate")
463 // If we received a client cert in response to our certificate request message
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
360 certMsg.certificates = hs.cert.Certificate
384 // Request a client certificate
396 // the client that it may send any certificate in response
399 // an appropriate certificate to give to us.
419 // If we requested a client certificate, then the client must send a
420 // certificate message, even if it's empty.
429 // The client didn't actually send a certificate
433 return errors.New("tls: client didn't provide a certificate")
463 // If we received a client cert in response to our certificate request message
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/
WifiConfigStore.java 53 import java.security.cert.Certificate;
71 * We use keystore for certificate/key management operations.
187 // Certificate and private key management for EnterpriseConfig
196 private static boolean hasHardwareBackedKey(Certificate certificate) {
197 return KeyChain.isBoundKeyAlgorithm(certificate.getPublicKey().getAlgorithm());
203 // a valid client certificate is configured
206 // taking WIFI_UID as a parameter. It always looks for certificate
546 private boolean putCertInKeyStore(String name, Certificate cert) {
549 if (DBG) Log.d(TAG, "putting certificate " + name + " in keystore")
    [all...]
  /bootable/recovery/
install.cpp 548 std::vector<Certificate> loadedKeys;
  /external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
X509CRLSelectorTest.java 91 public boolean isRevoked(Certificate cert) {
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
cryptxml.h 263 CRYPT_XML_DATA_BLOB Certificate;
  /frameworks/base/core/java/android/content/pm/
PackageParser.java 63 import java.security.cert.Certificate;
389 public final Certificate[][] certificates;
397 Signature[] signatures, Certificate[][] certificates, boolean coreApp,
632 private static Certificate[][] loadCertificates(StrictJarFile jarFile, ZipEntry entry)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 76 private org.bouncycastle.asn1.x509.Certificate c;
86 org.bouncycastle.asn1.x509.Certificate c)
146 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
151 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
246 * the certificate.
824 throw new SignatureException("certificate does not verify with supplied key");
  /external/conscrypt/src/test/java/org/conscrypt/
TrustedCertificateStoreTest.java 32 import java.security.cert.Certificate;
276 * The construction below is to build a certificate chain that has a loop
290 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1
334 * The construction below creates a certificate with multiple possible issuer certs.
801 assertEquals("System certificate stored in the wrong file",
804 // The two statements below indirectly assert that the certificate can be looked up
808 assertNotNull("Issuer certificate not found for system certificate " + actualFile,
810 assertNotNull("Trust anchor not found for system certificate " + actualFile,
822 // Checking that the certificate is stored in a file is extraneous given the curren
    [all...]

Completed in 876 milliseconds

<<11121314151617