/frameworks/base/core/java/android/security/net/config/ |
TrustAnchor.java | 23 public final X509Certificate certificate; field in class:TrustAnchor 26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { 27 if (certificate == null) { 28 throw new NullPointerException("certificate"); 30 this.certificate = certificate;
|
/external/syslinux/gpxe/src/crypto/ |
x509.c | 41 * Identify X.509 certificate public key 43 * @v certificate Certificate 48 static int x509_public_key ( const struct asn1_cursor *certificate, 55 memcpy ( &cursor, certificate, sizeof ( cursor ) ); 56 rc = ( asn1_enter ( &cursor, ASN1_SEQUENCE ), /* Certificate */ 67 DBG_HDA ( 0, certificate->data, certificate->len ); 76 DBG_HDA ( 0, certificate->data, certificate->len ) [all...] |
/frameworks/base/core/java/android/net/http/ |
SslError.java | 23 * certificate. 32 * The certificate is not yet valid 36 * The certificate has expired 44 * The certificate authority is not trusted 48 * The date of the certificate is invalid 73 * The SSL certificate associated with the error set 83 * Creates a new SslError object using the supplied error and certificate. 86 * @param certificate The associated SSL certificate 90 public SslError(int error, SslCertificate certificate) { [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
AuthorityKeyIdentifierStructure.java | 63 X509Certificate certificate) 68 if (certificate.getVersion() != 3) 70 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 71 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded()); 74 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); 78 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 80 byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()); 87 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); 91 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded()); 94 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive() [all...] |
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate"; 76 // Certificate type does not matter for our purposes, using ECDSA because it 86 // Generate a real certificate without specifying the expiration time. 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 90 scoped_refptr<RTCCertificate> certificate = local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); 102 scoped_refptr<RTCCertificate> certificate = local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); 108 // Generate a certificate that expires in 1s 110 scoped_refptr<RTCCertificate> certificate = local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
CertificatePinnerTest.java | 49 certA1Pin = CertificatePinner.pin(certA1.certificate); 55 certB1Pin = CertificatePinner.pin(certB1.certificate); 61 certC1Pin = CertificatePinner.pin(certC1.certificate); 95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); 101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); 113 certificatePinner.check("example.com", certA1.certificate); 121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); 130 certificatePinner.check("example.com", certB1.certificate); 141 certificatePinner.check("example.com", certA1.certificate); [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 64 Certificate[] certificates = session.getPeerCertificates(); 71 public boolean verify(String host, X509Certificate certificate) { 73 ? verifyIpAddress(host, certificate) 74 : verifyHostName(host, certificate); 82 * Returns true if {@code certificate} matches {@code ipAddress}. 84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); 95 * Returns true if {@code certificate} matches {@code hostName}. 97 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory.h | 37 // The certificate to use when setting up DTLS. 38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory 44 // Specifies the certificate to use (only used when secure != SEC_DISABLED). 46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 47 certificate_ = certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
IssuerAndSerialNumber.java | 12 import org.bouncycastle.asn1.x509.Certificate; 73 Certificate certificate) 75 this.name = certificate.getIssuer(); 76 this.serialNumber = certificate.getSerialNumber(); 80 * @deprecated use constructor taking Certificate 83 X509CertificateStructure certificate) 85 this.name = certificate.getIssuer(); 86 this.serialNumber = certificate.getSerialNumber();
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 54 If entryType == X509_ENTRY, this is the encoded leaf certificate. */ 55 private final byte[] certificate; field in class:CertificateEntry 57 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { 70 this.certificate = certificate; 84 throw new CertificateException("Certificate does not contain embedded signed timestamps"); 115 return certificate; 129 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
|
/system/keymaster/ |
asymmetric_key.cpp | 45 X509* certificate) { 104 if (!X509_add_ext(certificate, key_usage_extension.get() /* Don't release; copied */, 175 static bool add_public_key(EVP_PKEY* key, X509* certificate, keymaster_error_t* error) { 176 if (!X509_set_pubkey(certificate, key)) { 186 const KeymasterContext& context, X509* certificate, 194 if (!X509_add_ext(certificate, attest_extension.get() /* Don't release; copied */, 203 static keymaster_error_t get_certificate_blob(X509* certificate, keymaster_blob_t* blob) { 204 int len = i2d_X509(certificate, nullptr); 213 i2d_X509(certificate, &p); 239 // certificate [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 55 * <p>If you have a CA certificate which needs to be trusted by a particular app/service, 60 * <p>If you have a CA certificate that you believe should be present on all Android devices, 93 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local 94 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID()); 95 assertNotNull(certificate.getSubjectDN()); 96 assertNotNull(certificate.getIssuerDN()); 97 String fingerprint = getFingerprint(certificate); 103 private String getFingerprint(X509Certificate certificate) throws CertificateEncodingException, 106 messageDigest.update(certificate.getEncoded()) [all...] |
/external/apache-http/android/src/android/net/http/ |
EventHandler.java | 24 * there is an SSL certificate error. error() can occur anywhere 107 * SSL certificate callback called before resource request is 110 public void certificate(SslCertificate certificate); method in interface:EventHandler 120 * SSL certificate error callback. Handles SSL error(s) on the way
|
/libcore/luni/src/test/java/tests/security/ |
CertificateFactoryTest.java | 20 import java.security.cert.Certificate; 43 Certificate certificate = certificateFactory.generateCertificate( local 45 assertNotNull(certificate);
|
/external/avb/libavb_atx/ |
avb_atx_validate.c | 77 /* Verifies the format, key version, usage, and signature of a certificate. */ 78 static bool verify_certificate(AvbAtxCertificate* certificate, 85 if (certificate->signed_data.version != 1) { 86 avb_error("Unsupported certificate format.\n"); 90 sha512((const uint8_t*)&certificate->signed_data, 95 certificate->signature, 101 avb_error("Invalid certificate signature.\n"); 104 if (certificate->signed_data.key_version < minimum_key_version) { 108 if (0 != avb_safe_memcmp(certificate->signed_data.usage, 111 avb_error("Invalid certificate usage.\n") [all...] |
/external/boringssl/src/ssl/test/runner/ |
alert.go | 59 alertNoCertificate: "no certificate", 60 alertBadCertificate: "bad certificate", 61 alertUnsupportedCertificate: "unsupported certificate", 62 alertCertificateRevoked: "revoked certificate", 63 alertCertificateExpired: "expired certificate", 64 alertCertificateUnknown: "unknown certificate", 66 alertUnknownCA: "unknown certificate authority", 80 alertCertificateRequired: "certificate required",
|
/external/syslinux/gpxe/src/include/gpxe/ |
x509.h | 38 extern int x509_rsa_public_key ( const struct asn1_cursor *certificate,
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
HeldCertificate.java | 34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on 35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other 36 * held certificates, as done in practice by certificate authorities. 39 public final X509Certificate certificate; field in class:HeldCertificate 42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) { 43 this.certificate = certificate; 65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is 66 * the CN (common name) in the certificate. Will be a random string if no value is provided. 79 * Set the certificate that signs this certificate. If unset, a self-signed certificate will b 132 X509Certificate certificate = generator.generateX509Certificate( local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
CertificateChainCleanerTest.java | 20 import java.security.cert.Certificate; 36 new RealTrustRootIndex(root.certificate)); 67 new RealTrustRootIndex(root.certificate)); 85 new RealTrustRootIndex(root.certificate)); 107 new RealTrustRootIndex(root.certificate)); 129 new RealTrustRootIndex(root.certificate)); 150 new RealTrustRootIndex(root.certificate)); 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); 194 HeldCertificate certificate = new HeldCertificate.Builder( local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/ |
CERT.py | 55 @ivar certificate_type: certificate type 61 @ivar certificate: the certificate or CRL 62 @type certificate: string 65 __slots__ = ['certificate_type', 'key_tag', 'algorithm', 'certificate'] 68 certificate): 73 self.certificate = certificate 79 dns.rdata._base64ify(self.certificate)) 96 certificate = b64.decode('base64_codec' [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CertificatePinning.java | 23 import java.security.cert.Certificate; 47 for (Certificate certificate : response.handshake().peerCertificates()) { 48 System.out.println(CertificatePinner.pin(certificate));
|
/libcore/ojluni/src/main/java/java/security/ |
Identity.java | 99 Vector<Certificate> certificates; 189 certificates = new Vector<Certificate>(); 225 * Adds a certificate for this identity. If the identity has a public 226 * key, the public key in the certificate must be the same, and if 228 * public key is set to be that specified in the certificate. 232 * as its argument to see if it's ok to add a certificate. 234 * @param certificate the certificate to be added. 236 * @exception KeyManagementException if the certificate is not valid, 237 * if the public key in the certificate being added conflicts wit [all...] |