/prebuilts/go/linux-x86/src/crypto/x509/pkix/ |
pkix.go | 163 // 5280, section 5.1. Use Certificate.CheckCRLSignature to verify the
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyGenParameterSpec.java | 30 import java.security.cert.Certificate; 61 * {@link Certificate#getPublicKey()}. 69 * <p>For asymmetric key pairs, a self-signed X.509 certificate will be also generated and stored in 71 * support storing key pairs without a certificate. The subject, serial number, and validity dates 72 * of the certificate can be customized in this spec. The self-signed certificate may be replaced at 73 * a later time by a certificate signed by a Certificate Authority (CA). 75 * <p>NOTE: If a private key is not authorized to sign the self-signed certificate, then the 76 * certificate will be created with an invalid signature which will not verify. Such a certificat [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
CertPinInstallReceiverTest.java | 36 import java.security.cert.Certificate;
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 27 import java.security.cert.Certificate; 434 System.out.println("CERTIFICATE PUBLIC KEY HASH: " + getHash(createPublicKey(cert))); 438 System.out.println("CERTIFICATE SERIAL NUMBER: " + createSerialNumber(cert).toString(16));
|
/libcore/luni/src/test/java/tests/java/security/ |
IdentityTest.java | 118 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 119 * If the identity has a public key, the public key in the certificate must be the same 130 // try Certificate with different key 138 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 139 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate. 152 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul [all...] |
/libcore/ojluni/src/main/java/java/lang/ |
ClassLoader.java | 43 import java.security.cert.Certificate; [all...] |
/libcore/ojluni/src/main/java/sun/security/validator/ |
PKIXValidator.java | 208 ("null or zero-length certificate chain"); 313 List<? extends java.security.cert.Certificate> list = 320 ("TrustAnchor must be specified as certificate");
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/ |
BuildPreferencePage.java | 41 import java.security.cert.Certificate; 301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local 303 if (key == null || certificate == null) { 310 FingerprintUtils.getFingerprint(certificate, "MD5")); 315 FingerprintUtils.getFingerprint(certificate, "SHA1")); 319 if (certificate.getNotAfter().compareTo(today) < 0) { 320 showErrorMessage("Certificate is expired!"); 324 if (certificate.getNotBefore().compareTo(today) > 0) { 325 showErrorMessage("Certificate validity is in the future!");
|
/system/extras/verity/ |
BootSignature.java | 27 import java.security.cert.Certificate; 51 * certificate ::= Certificate 67 private ASN1Encodable certificate; field in class:BootSignature 101 certificate = sequence.getObjectAt(1); 102 byte[] encoded = ((ASN1Object) certificate).getEncoded(); 151 certificate = s.readObject(); 182 v.add(certificate); 302 if (args.length >= 4 && "-certificate".equals(args[2])) { 303 /* args[3] is the path to a public key certificate */ [all...] |
Utils.java | 35 import java.security.cert.Certificate;
|
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 382 var leaf *x509.Certificate 396 certs := make([]*x509.Certificate, len(certMsg.certificates)) 401 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 433 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", leaf.PublicKey) 478 var chainToSend *Certificate 485 // A list of the distinguished names of acceptable certificate 491 // send any certificate of the appropriate 516 for j, cert := range chain.Certificate { 518 // parse the certificate if this isn't the leaf 523 return errors.New("tls: failed to parse client certificate #" + strconv.Itoa(i) + ": " + err.Error() [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 14 import java.security.cert.Certificate; 125 * issuer of the given X509 certificate. Uses the default provider 128 * @param cert the X509 certificate 133 * on the given certificate has thrown an exception. 145 * issuer of the given X509 certificate. Uses the specified 149 * @param cert the X509 certificate 155 * on the given certificate has thrown an exception. 236 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx); 545 throw new AnnotatedException("Certificate policies cannot be decoded.", e); 686 "Problem while picking certificates from certificate store." [all...] |
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 42 import java.security.cert.Certificate; 698 Certificate[] serverCertificates = connection.getServerCertificates(); 699 Certificate[] localCertificates = request.getSslLocalCertificates(); [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
Cipher.java | 40 import java.security.cert.Certificate; 687 // The OID for the KeyUsage extension in an X.509 v3 certificate [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
SSLSocketTest.java | 37 import java.security.cert.Certificate; 360 Certificate[] localCertificates = server.getSession().getLocalCertificates(); 375 Certificate[] peerCertificates = client.getSession().getPeerCertificates(); 538 Certificate[] localCertificates = event.getLocalCertificates(); 539 Certificate[] peerCertificates = event.getPeerCertificates(); [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 42 import java.security.cert.Certificate; 75 private static final String ALIAS_CERTIFICATE = "certificate"; 80 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe"; 192 // RI can't handle certificate in PKCS12, but BC can 374 public static void setCertificate(KeyStore ks, String alias, Certificate certificate) 376 ks.setCertificateEntry(alias, certificate); 417 public static void assertCertificate(Certificate actual) 421 public static void assertCertificate2(Certificate actual) 432 public static void assertCertificateChain(Certificate[] actual [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server.go | 34 cert *Certificate 360 certMsg.certificates = hs.cert.Certificate 384 // Request a client certificate 396 // the client that it may send any certificate in response 399 // an appropriate certificate to give to us. 419 // If we requested a client certificate, then the client must send a 420 // certificate message, even if it's empty. 429 // The client didn't actually send a certificate 433 return errors.New("tls: client didn't provide a certificate") 463 // If we received a client cert in response to our certificate request message [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server.go | 34 cert *Certificate 360 certMsg.certificates = hs.cert.Certificate 384 // Request a client certificate 396 // the client that it may send any certificate in response 399 // an appropriate certificate to give to us. 419 // If we requested a client certificate, then the client must send a 420 // certificate message, even if it's empty. 429 // The client didn't actually send a certificate 433 return errors.New("tls: client didn't provide a certificate") 463 // If we received a client cert in response to our certificate request message [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiConfigStore.java | 53 import java.security.cert.Certificate; 71 * We use keystore for certificate/key management operations. 187 // Certificate and private key management for EnterpriseConfig 196 private static boolean hasHardwareBackedKey(Certificate certificate) { 197 return KeyChain.isBoundKeyAlgorithm(certificate.getPublicKey().getAlgorithm()); 203 // a valid client certificate is configured 206 // taking WIFI_UID as a parameter. It always looks for certificate 546 private boolean putCertInKeyStore(String name, Certificate cert) { 549 if (DBG) Log.d(TAG, "putting certificate " + name + " in keystore") [all...] |
/bootable/recovery/ |
install.cpp | 548 std::vector<Certificate> loadedKeys;
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CRLSelectorTest.java | 91 public boolean isRevoked(Certificate cert) {
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
cryptxml.h | 263 CRYPT_XML_DATA_BLOB Certificate;
|
/frameworks/base/core/java/android/content/pm/ |
PackageParser.java | 63 import java.security.cert.Certificate; 389 public final Certificate[][] certificates; 397 Signature[] signatures, Certificate[][] certificates, boolean coreApp, 632 private static Certificate[][] loadCertificates(StrictJarFile jarFile, ZipEntry entry) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 76 private org.bouncycastle.asn1.x509.Certificate c; 86 org.bouncycastle.asn1.x509.Certificate c) 146 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 151 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 246 * the certificate. 824 throw new SignatureException("certificate does not verify with supplied key");
|
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustedCertificateStoreTest.java | 32 import java.security.cert.Certificate; 276 * The construction below is to build a certificate chain that has a loop 290 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1 334 * The construction below creates a certificate with multiple possible issuer certs. 801 assertEquals("System certificate stored in the wrong file", 804 // The two statements below indirectly assert that the certificate can be looked up 808 assertNotNull("Issuer certificate not found for system certificate " + actualFile, 810 assertNotNull("Trust anchor not found for system certificate " + actualFile, 822 // Checking that the certificate is stored in a file is extraneous given the curren [all...] |