HomeSort by relevance Sort by last modified time
    Searched refs:certificate (Results 1 - 25 of 697) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/security/net/config/
TrustAnchor.java 23 public final X509Certificate certificate; field in class:TrustAnchor
26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) {
27 if (certificate == null) {
28 throw new NullPointerException("certificate");
30 this.certificate = certificate;
  /external/syslinux/gpxe/src/crypto/
x509.c 41 * Identify X.509 certificate public key
43 * @v certificate Certificate
48 static int x509_public_key ( const struct asn1_cursor *certificate,
55 memcpy ( &cursor, certificate, sizeof ( cursor ) );
56 rc = ( asn1_enter ( &cursor, ASN1_SEQUENCE ), /* Certificate */
67 DBG_HDA ( 0, certificate->data, certificate->len );
76 DBG_HDA ( 0, certificate->data, certificate->len )
    [all...]
  /frameworks/base/core/java/android/net/http/
SslError.java 23 * certificate.
32 * The certificate is not yet valid
36 * The certificate has expired
44 * The certificate authority is not trusted
48 * The date of the certificate is invalid
73 * The SSL certificate associated with the error set
83 * Creates a new SslError object using the supplied error and certificate.
86 * @param certificate The associated SSL certificate
90 public SslError(int error, SslCertificate certificate) {
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
AuthorityKeyIdentifierStructure.java 63 X509Certificate certificate)
68 if (certificate.getVersion() != 3)
70 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
71 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded());
74 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive();
78 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
80 byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId());
87 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive();
91 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded());
94 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive()
    [all...]
  /external/webrtc/webrtc/base/
rtccertificate_unittests.cc 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate";
76 // Certificate type does not matter for our purposes, using ECDSA because it
86 // Generate a real certificate without specifying the expiration time.
87 // Certificate type doesn't matter, using ECDSA because it's fast to generate.
90 scoped_refptr<RTCCertificate> certificate = local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now));
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60));
102 scoped_refptr<RTCCertificate> certificate = local
104 EXPECT_EQ(now, ExpiresSeconds(certificate));
108 // Generate a certificate that expires in 1s
110 scoped_refptr<RTCCertificate> certificate = local
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
CertificatePinnerTest.java 49 certA1Pin = CertificatePinner.pin(certA1.certificate);
55 certB1Pin = CertificatePinner.pin(certB1.certificate);
61 certC1Pin = CertificatePinner.pin(certC1.certificate);
95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate);
101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate);
113 certificatePinner.check("example.com", certA1.certificate);
121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate);
130 certificatePinner.check("example.com", certB1.certificate);
141 certificatePinner.check("example.com", certA1.certificate);
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
OkHostnameVerifier.java 20 import java.security.cert.Certificate;
64 Certificate[] certificates = session.getPeerCertificates();
71 public boolean verify(String host, X509Certificate certificate) {
73 ? verifyIpAddress(host, certificate)
74 : verifyHostName(host, certificate);
82 * Returns true if {@code certificate} matches {@code ipAddress}.
84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) {
85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME);
95 * Returns true if {@code certificate} matches {@code hostName}.
97 private boolean verifyHostName(String hostName, X509Certificate certificate) {
    [all...]
  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory.h 37 // The certificate to use when setting up DTLS.
38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory
44 // Specifies the certificate to use (only used when secure != SEC_DISABLED).
46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
47 certificate_ = certificate;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
IssuerAndSerialNumber.java 12 import org.bouncycastle.asn1.x509.Certificate;
73 Certificate certificate)
75 this.name = certificate.getIssuer();
76 this.serialNumber = certificate.getSerialNumber();
80 * @deprecated use constructor taking Certificate
83 X509CertificateStructure certificate)
85 this.name = certificate.getIssuer();
86 this.serialNumber = certificate.getSerialNumber();
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
CertificateEntry.java 54 If entryType == X509_ENTRY, this is the encoded leaf certificate. */
55 private final byte[] certificate; field in class:CertificateEntry
57 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) {
70 this.certificate = certificate;
84 throw new CertificateException("Certificate does not contain embedded signed timestamps");
115 return certificate;
129 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
  /system/keymaster/
asymmetric_key.cpp 45 X509* certificate) {
104 if (!X509_add_ext(certificate, key_usage_extension.get() /* Don't release; copied */,
175 static bool add_public_key(EVP_PKEY* key, X509* certificate, keymaster_error_t* error) {
176 if (!X509_set_pubkey(certificate, key)) {
186 const KeymasterContext& context, X509* certificate,
194 if (!X509_add_ext(certificate, attest_extension.get() /* Don't release; copied */,
203 static keymaster_error_t get_certificate_blob(X509* certificate, keymaster_blob_t* blob) {
204 int len = i2d_X509(certificate, nullptr);
213 i2d_X509(certificate, &p);
239 // certificate
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 55 * <p>If you have a CA certificate which needs to be trusted by a particular app/service,
60 * <p>If you have a CA certificate that you believe should be present on all Android devices,
93 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local
94 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID());
95 assertNotNull(certificate.getSubjectDN());
96 assertNotNull(certificate.getIssuerDN());
97 String fingerprint = getFingerprint(certificate);
103 private String getFingerprint(X509Certificate certificate) throws CertificateEncodingException,
106 messageDigest.update(certificate.getEncoded())
    [all...]
  /external/apache-http/android/src/android/net/http/
EventHandler.java 24 * there is an SSL certificate error. error() can occur anywhere
107 * SSL certificate callback called before resource request is
110 public void certificate(SslCertificate certificate); method in interface:EventHandler
120 * SSL certificate error callback. Handles SSL error(s) on the way
  /libcore/luni/src/test/java/tests/security/
CertificateFactoryTest.java 20 import java.security.cert.Certificate;
43 Certificate certificate = certificateFactory.generateCertificate( local
45 assertNotNull(certificate);
  /external/avb/libavb_atx/
avb_atx_validate.c 77 /* Verifies the format, key version, usage, and signature of a certificate. */
78 static bool verify_certificate(AvbAtxCertificate* certificate,
85 if (certificate->signed_data.version != 1) {
86 avb_error("Unsupported certificate format.\n");
90 sha512((const uint8_t*)&certificate->signed_data,
95 certificate->signature,
101 avb_error("Invalid certificate signature.\n");
104 if (certificate->signed_data.key_version < minimum_key_version) {
108 if (0 != avb_safe_memcmp(certificate->signed_data.usage,
111 avb_error("Invalid certificate usage.\n")
    [all...]
  /external/boringssl/src/ssl/test/runner/
alert.go 59 alertNoCertificate: "no certificate",
60 alertBadCertificate: "bad certificate",
61 alertUnsupportedCertificate: "unsupported certificate",
62 alertCertificateRevoked: "revoked certificate",
63 alertCertificateExpired: "expired certificate",
64 alertCertificateUnknown: "unknown certificate",
66 alertUnknownCA: "unknown certificate authority",
80 alertCertificateRequired: "certificate required",
  /external/syslinux/gpxe/src/include/gpxe/
x509.h 38 extern int x509_rsa_public_key ( const struct asn1_cursor *certificate,
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 26 import java.security.cert.Certificate;
36 String certificateData = "-----BEGIN CERTIFICATE-----\n"
50 + "-----END CERTIFICATE-----\n";
62 Certificate certificate = cf.generateCertificate(certArray); local
63 assertTrue(certificate instanceof X509Certificate);
65 String algorithm = certificate.getPublicKey().getAlgorithm();
71 // If all the certificate in the chain is X509Certificate,
74 privateKey, new Certificate[] { certificate });
    [all...]
  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
HeldCertificate.java 34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on
35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other
36 * held certificates, as done in practice by certificate authorities.
39 public final X509Certificate certificate; field in class:HeldCertificate
42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) {
43 this.certificate = certificate;
65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is
66 * the CN (common name) in the certificate. Will be a random string if no value is provided.
79 * Set the certificate that signs this certificate. If unset, a self-signed certificate will b
132 X509Certificate certificate = generator.generateX509Certificate( local
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
CertificateChainCleanerTest.java 20 import java.security.cert.Certificate;
36 new RealTrustRootIndex(root.certificate));
67 new RealTrustRootIndex(root.certificate));
85 new RealTrustRootIndex(root.certificate));
107 new RealTrustRootIndex(root.certificate));
129 new RealTrustRootIndex(root.certificate));
150 new RealTrustRootIndex(root.certificate));
173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate));
194 HeldCertificate certificate = new HeldCertificate.Builder( local
    [all...]
  /external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/
CERT.py 55 @ivar certificate_type: certificate type
61 @ivar certificate: the certificate or CRL
62 @type certificate: string
65 __slots__ = ['certificate_type', 'key_tag', 'algorithm', 'certificate']
68 certificate):
73 self.certificate = certificate
79 dns.rdata._base64ify(self.certificate))
96 certificate = b64.decode('base64_codec'
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
JcaSignerInfoVerifierBuilder.java 72 public SignerInformationVerifier build(X509Certificate certificate)
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
JcaSimpleSignerInfoVerifierBuilder.java 42 public SignerInformationVerifier build(X509Certificate certificate)
45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider());
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
65 return new JcaContentVerifierProviderBuilder().build(certificate);
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CertificatePinning.java 23 import java.security.cert.Certificate;
47 for (Certificate certificate : response.handshake().peerCertificates()) {
48 System.out.println(CertificatePinner.pin(certificate));
  /libcore/ojluni/src/main/java/java/security/
Identity.java 99 Vector<Certificate> certificates;
189 certificates = new Vector<Certificate>();
225 * Adds a certificate for this identity. If the identity has a public
226 * key, the public key in the certificate must be the same, and if
228 * public key is set to be that specified in the certificate.
232 * as its argument to see if it's ok to add a certificate.
234 * @param certificate the certificate to be added.
236 * @exception KeyManagementException if the certificate is not valid,
237 * if the public key in the certificate being added conflicts wit
    [all...]

Completed in 1024 milliseconds

1 2 3 4 5 6 7 8 91011>>