/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 53 * <p>If you have a CA certificate which needs to be trusted by a particular app/service, 58 * <p>If you have a CA certificate that you believe should be present on all Android devices, 91 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local 92 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID()); 93 assertNotNull(certificate.getSubjectDN()); 94 assertNotNull(certificate.getIssuerDN()); 95 String fingerprint = getFingerprint(certificate); 101 private String getFingerprint(X509Certificate certificate) throws CertificateEncodingException, 104 messageDigest.update(certificate.getEncoded()) [all...] |
/frameworks/base/core/java/android/security/net/config/ |
TrustAnchor.java | 23 public final X509Certificate certificate; field in class:TrustAnchor 26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { 27 if (certificate == null) { 28 throw new NullPointerException("certificate"); 30 this.certificate = certificate;
|
/system/webservd/webservd/ |
config.h | 49 brillo::Blob certificate; member in struct:webservd::final::final
|
/external/apache-http/android/src/android/net/http/ |
LoggingEventHandler.java | 69 public void certificate(SslCertificate certificate) { method in class:LoggingEventHandler 71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
|
EventHandler.java | 24 * there is an SSL certificate error. error() can occur anywhere 107 * SSL certificate callback called before resource request is 110 public void certificate(SslCertificate certificate); method in interface:EventHandler 120 * SSL certificate error callback. Handles SSL error(s) on the way
|
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate"; 76 // Certificate type does not matter for our purposes, using ECDSA because it 86 // Generate a real certificate without specifying the expiration time. 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 90 scoped_refptr<RTCCertificate> certificate = local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); 102 scoped_refptr<RTCCertificate> certificate = local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); 108 // Generate a certificate that expires in 1s 110 scoped_refptr<RTCCertificate> certificate = local [all...] |
fakesslidentity.h | 100 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
|
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory.h | 37 // The certificate to use when setting up DTLS. 38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory 44 // Specifies the certificate to use (only used when secure != SEC_DISABLED). 46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 47 certificate_ = certificate;
|
/libcore/luni/src/test/java/tests/security/ |
CertificateFactoryTest.java | 20 import java.security.cert.Certificate; 43 Certificate certificate = certificateFactory.generateCertificate( local 45 assertNotNull(certificate);
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateTest.java | 27 import java.security.cert.Certificate; 40 * Following certificate chain was taken from https://www.verisign.com and 41 * uses MD2withRSA for the root certificate. This chain stops validating 46 * A selfsigned certificate using MD2withRSA 49 * Certificate: 86 "-----BEGIN CERTIFICATE-----\n" 99 + "-----END CERTIFICATE-----\n"; 102 * A certificate signed by selfSignedCertMD2 105 * Certificate: 145 * Certificate Sign, CRL Sig 596 Certificate certificate = certificateFactory local 609 Certificate certificate = certificateFactory local [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 56 public ContentVerifierProvider build(final X509Certificate certificate) 63 certHolder = new JcaX509CertificateHolder(certificate); 67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 91 sig.initVerify(certificate.getPublicKey()); 100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 38 import org.apache.harmony.security.x509.Certificate; 55 * Certificate and Certificate Revocation List (CRL) Profile. 59 * Certificate ::= SEQUENCE { 115 * Certificate(TBSCertificate tbsCertificate, AlgorithmIdentifier 117 * Makes the certificate, gets its encoded form, makes new certificate 122 // make the TBSCertificate for Certificate 126 Name issuer = new Name("O=Certificate Issuer"); 167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]) local [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 54 If entryType == X509_ENTRY, this is the encoded leaf certificate. */ 55 private final byte[] certificate; field in class:CertificateEntry 57 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { 70 this.certificate = certificate; 84 throw new CertificateException("Certificate does not contain embedded signed timestamps"); 115 return certificate; 129 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
HostnameVerifierTest.java | 49 + "-----BEGIN CERTIFICATE-----\n" 73 + "-----END CERTIFICATE-----\n"); 82 + "-----BEGIN CERTIFICATE-----\n" 106 + "-----END CERTIFICATE-----\n"); 114 + "-----BEGIN CERTIFICATE-----\n" 139 + "-----END CERTIFICATE-----\n"); 155 + "-----BEGIN CERTIFICATE-----\n" 180 + "-----END CERTIFICATE-----\n"); 196 + "-----BEGIN CERTIFICATE-----\n" 220 + "-----END CERTIFICATE-----\n") 395 X509Certificate certificate = certificate("" local 545 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/libcore/luni/src/test/java/tests/targets/security/ |
KeyStoreTest.java | 33 import java.security.cert.Certificate; 103 Certificate certificate = null; local 105 certificate = certificateFactory 114 generator = KeyPairGenerator.getInstance(certificate.getPublicKey() 123 .getPrivate(), new Certificate[] {certificate}); 167 private String encodedCertificate = "-----BEGIN CERTIFICATE-----\n" 189 + "-----END CERTIFICATE-----\n";
|
/system/update_engine/ |
certificate_checker.cc | 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); local 43 TEST_AND_RETURN_FALSE(certificate); 50 bool success = X509_digest(certificate, digest_function, out_digest, &len); 87 // which will be called after each server certificate is validated. However, 89 // callback, the certificate check will have to be done statically. Since we 91 // certificate, we hardcode Chrome OS's two known update servers here, and 140 // certificate. We store a report to UMA and just propagate the fail result. 154 LOG(WARNING) << "Failed to generate digest of X509 certificate " 168 // If there's no stored certificate, we just store the current one and return. 171 LOG(WARNING) << "Failed to store server certificate on storage key [all...] |
/cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/ |
CertInstallerReceiver.java | 32 import java.security.cert.Certificate; 36 * Delegated certificate installer app that responds to specific intents and executes various DPM 37 * certificate manipulation APIs. The following APIs are exercised: 128 Certificate certificate = CertificateFactory.getInstance("X.509") local 138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias), 160 Certificate certificateToMatch = readCertificate(toMatch); 162 Certificate cert = readCertificate(certBuffer); 170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
|