/libcore/ojluni/src/main/java/javax/security/cert/ |
CertificateException.java | 30 * This exception indicates one of a variety of certificate problems. 35 * use the standard Java SE certificate classes located in 40 * @see Certificate 46 * Constructs a certificate exception with no detail message. A detail 54 * Constructs a certificate exception with the given detail
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CertImpl.java | 33 import java.security.cert.Certificate; 43 * The X509CertImpl class represents an X.509 certificate. These certificates 51 * <P>These certificates are managed and vouched for by <em>Certificate 121 // Certificate data, and its envelope 152 * the signature of this certificate. Null if the certificate has not 158 * successfully verify the signature of this certificate, or the 175 * Unmarshals a certificate from its encoded form, parsing the 177 * need to examine and use certificate contents. That is, this is 179 * must include only a certificate, and no "garbage" may be left a [all...] |
/external/curl/docs/examples/ |
usercertinmem.c | 23 /* Example using an in memory PEM user certificate and RSA key to retrieve an 28 * Note that to maintain simplicity this example does not use a CA certificate 54 "-----BEGIN CERTIFICATE-----\n"\ 94 "-----END CERTIFICATE-----\n"; 127 /* use it to read the PEM formatted certificate from memory into an X509 135 /*tell SSL to use the X509 certificate*/ 138 printf("Use certificate failed\n"); 194 no CA certificate*/ 201 /* first try: retrieve page without user certificate and key -> will fail 211 /* second try: retrieve page using user certificate and key -> will succee [all...] |
/external/libmtp/logs/ |
mtp-detect-samsung-yh-925.txt | 55 0xd102: Device Certificate 185 Device Certificate: 187 <CERTIFICATE type="DEVICE"> 194 ATE><FALLBACK><SECURITYVERSION>2.4.101.87</SECURITYVERSION><CERTIFICATE 196 jbFZ7WahsQQA5H3rHOsWhSOI53bGHDrw2rkd/jGmz0524DR0</CERTIFICATE></FALLBACK> 197 <CERTIFICATE type="GROUP"> 208 </CERTIFICATE> 209 <CERTIFICATE type="AUTHORIZATION"> 213 t5BGPhVjPybFaDKnzNQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE [all...] |
mtp-detect-iriver-h10-20GB.txt | 57 0xd102: Device Certificate 112 Device Certificate: 113 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID 118 MSIGNATURE>261d87MS77pUbix3Cnfuq5eNH94=</SYMSIGNATURE></CERTIFICATE><FALLBACK><S 119 ECURITYVERSION>2.4.101.59</SECURITYVERSION><CERTIFICATE private="1">FQBk2GzllIEz 121 KESFyhpVZDJoyWVin7RD</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NA 135 TIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLE 138 wAyKCKxBSNdFD20ArIxGnT+SqwQeg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT 142 XtUmpZCbsbD4NRLzgHHU6zEKzdYA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE></DEVCERT [all...] |
mtp-detect-sandisk-sansa-e260.txt | 62 0xd102: Device Certificate 201 Device Certificate: 202 <DEVCERT version="1.0"><CERTIFICATE 209 ATE><FALLBACK><SECURITYVERSION>2.4.104.93</SECURITYVERSION><CERTIFICATE 211 oRMryFIUqED6nkYnGenqOCshcvAMIe7siWZZFHpJZAlHGYJ3</CERTIFICATE></FALLBACK><CE 238 iCoKLhBIer0k3ablA4Zg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 242 fWrf+XXA+RNASNDpnTg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 246 NATURE_VALUE></CERTIFICATE></DEVCERT [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
KeyChecker.java | 38 * certificate. It also checks whether the final certificate in a 59 * on the target certificate 99 * the specified certificate. 101 * @param cert the Certificate 103 * @throws CertPathValidatorException if certificate does not verify 106 public void check(Certificate cert, Collection<String> unresCritExts) 113 // if final certificate, check that target constraints are satisfied 117 throw new CertPathValidatorException("target certificate " + 121 // otherwise, verify that keyCertSign bit is set in CA certificate [all...] |
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 7 import java.security.cert.Certificate; 24 // creating a certificate 25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl 39 + "-----END CERTIFICATE-----\n"; 41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 44 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 58 + "-----END CERTIFICATE-----\n"; 63 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n" [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509CRLEntryHolder.java | 39 * Return the serial number of the certificate associated with this CRLEntry. 41 * @return the revoked certificate's serial number. 49 * Return the date on which the certificate associated with this CRLEntry was revoked. 51 * @return the revocation date for the revoked certificate. 69 * Return the available names for the certificate issuer for the certificate referred to by this CRL entry. 76 * @return the revoked certificate's issuer.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/ |
X509CertificateHolderSelector.java | 36 * certificate. 38 * @param issuer the issuer of the signer's associated certificate. 39 * @param serialNumber the serial number of the signer's associated certificate. 48 * certificate. 50 * @param issuer the issuer of the signer's associated certificate. 51 * @param serialNumber the serial number of the signer's associated certificate. 52 * @param subjectKeyId the subject key identifier to use to match the signers associated certificate.
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_PROXY_SSL_VERIFYHOST.3 | 25 CURLOPT_PROXY_SSL_VERIFYHOST \- verify the proxy certificate's name against host 37 When negotiating TLS and SSL connections, the server sends a certificate 40 When \fICURLOPT_SSL_VERIFYHOST(3)\fP is 2, that certificate must indicate that 42 fails. Simply put, it means it has to have the same name in the certificate as 46 Subject Alternate Name field in the certificate matches the host name in the 56 names in the certificate. Use that ability with caution! 60 This option controls checking the server's certificate's claimed identity.
|
CURLOPT_SSL_VERIFYHOST.3 | 25 CURLOPT_SSL_VERIFYHOST \- verify the certificate's name against host 36 When negotiating TLS and SSL connections, the server sends a certificate 39 When \fICURLOPT_SSL_VERIFYHOST(3)\fP is 2, that certificate must indicate that 41 fails. Simply put, it means it has to have the same name in the certificate as 45 Subject Alternate Name field in the certificate matches the host name in the 55 names in the certificate. Use that ability with caution! 59 This option controls checking the server's certificate's claimed identity.
|
/external/apache-http/android/src/android/net/http/ |
CertificateChainValidator.java | 32 import java.security.cert.Certificate; 47 * Class responsible for all server certificate validation functionality 54 * The singleton instance of the certificate chain validator. 75 * Creates a new certificate chain validator. This is a private constructor. 76 * If you need a Certificate chain validator, call getInstance(). 103 * And if the last traced certificate is self issued and it is expired, it 119 Certificate[] peerCertificates = 126 // update the SSL certificate associated with the connection 151 throw new IllegalArgumentException("bad certificate chain"); 163 throw new IOException("can't read certificate", e) [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
CertificateRevokedException.java | 41 * An exception that indicates an X.509 certificate is revoked. A 43 * about the revoked certificate, such as the date on which the 44 * certificate was revoked and the reason it was revoked. 55 * @serial the date on which the certificate was revoked 64 * authority that signed the certificate's revocation status information 75 * @param revocationDate the date on which the certificate was revoked. The 82 * of the authority that signed the certificate's revocation status 104 * Returns the date on which the certificate was revoked. A new copy is 115 * Returns the reason the certificate was revoked. 124 * Returns the name of the authority that signed the certificate' [all...] |
CertPath.java | 43 * {@code Certificate}s, and one or more supported encodings. Because the 50 * {@code Certificate}s in the certification path. For each 51 * certificate {@code cert} in a certification path {@code certPath}, 55 * The list of {@code Certificate}s is an ordered {@code List} of 56 * zero or more {@code Certificate}s. This {@code List} and all 57 * of the {@code Certificate}s contained in it must be immutable. 79 * certificate and ending with a certificate issued by the trust anchor. That 80 * is, the issuer of one certificate is the subject of the following one. The 81 * certificate representing the {@link TrustAnchor TrustAnchor} should not b [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 64 Certificate[] certificates = session.getPeerCertificates(); 71 public boolean verify(String host, X509Certificate certificate) { 73 ? verifyIpAddress(host, certificate) 74 : verifyHostName(host, certificate); 82 * Returns true if {@code certificate} matches {@code ipAddress}. 84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); 95 * Returns true if {@code certificate} matches {@code hostName}. 97 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 76 // creating a certificate 77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 91 + "-----END CERTIFICATE-----\n"; 93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 95 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 109 + "-----END CERTIFICATE-----\n"; 113 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 132 + "-----END CERTIFICATE-----\n" [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyStoreSpi.java | 33 import java.security.cert.Certificate; 79 * Returns the certificate chain associated with the given alias. 80 * The certificate chain must have been associated with the alias 87 * @return the certificate chain (ordered with the user's certificate first 88 * and the root certificate authority last), or null if the given alias 89 * does not exist or does not contain a certificate chain 91 public abstract Certificate[] engineGetCertificateChain(String alias); 94 * Returns the certificate associated with the given alias. 100 * then the trusted certificate contained in that entry is returned [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
common.go | 114 // Certificate types (for certificateRequestMsg) 116 certTypeRSASign = 1 // A certificate containing an RSA key 117 certTypeDSSSign = 2 // A certificate containing a DSA key 118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key 119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key 122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
common.go | 114 // Certificate types (for certificateRequestMsg) 116 certTypeRSASign = 1 // A certificate containing an RSA key 117 certTypeDSSSign = 2 // A certificate containing a DSA key 118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key 119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key 122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
KeyManagementTest.java | 39 import java.security.cert.Certificate; 84 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); 108 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); 111 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 113 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 135 final Collection<Certificate> certs = loadCertificatesFromAsset("user-cert-chain.crt"); 136 final Certificate[] certChain = certs.toArray(new Certificate[certs.size()]); 153 // Verify the certificate chain is correct 167 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate) [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
ChainStrengthAnalyzerTest.java | 32 "-----BEGIN CERTIFICATE-----\n" + 52 "-----END CERTIFICATE-----"; 58 "-----BEGIN CERTIFICATE-----\n" + 69 "-----END CERTIFICATE-----\n"; 75 "-----BEGIN CERTIFICATE-----\n" + 93 "-----END CERTIFICATE-----"; 98 "-----BEGIN CERTIFICATE-----\n" + 119 "-----END CERTIFICATE-----"; 124 "-----BEGIN CERTIFICATE-----\n" + 144 "-----END CERTIFICATE-----" [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactorySpiTest.java | 35 import java.security.cert.Certificate; 68 List<Certificate> list = null; 78 Certificate cc = certFactorySpi.engineGenerateCertificate(bais); 85 Collection<? extends Certificate> col = certFactorySpi.engineGenerateCertificates(bais); 148 Certificate cert = certFactorySpi 151 Collection<? extends Certificate> col = certFactorySpi 170 List<Certificate> list = null; 218 Certificate cert = certFactorySpi 221 Collection<? extends Certificate> col = certFactorySpi 240 List<Certificate> list = null [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 55 * <p>If you have a CA certificate which needs to be trusted by a particular app/service, 60 * <p>If you have a CA certificate that you believe should be present on all Android devices, 93 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local 94 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID()); 95 assertNotNull(certificate.getSubjectDN()); 96 assertNotNull(certificate.getIssuerDN()); 97 String fingerprint = getFingerprint(certificate); 103 private String getFingerprint(X509Certificate certificate) throws CertificateEncodingException, 106 messageDigest.update(certificate.getEncoded()) [all...] |
/external/syslinux/gpxe/src/include/gpxe/efi/Uefi/ |
UefiMultiPhase.h | 78 /// The length of the entire certificate, 88 /// The certificate type. See WIN_CERT_TYPE_xxx for the UEFI 89 /// certificate types. The UEFI specification reserves the range of 90 /// certificate type values from 0x0EF0 to 0x0EFF. 94 /// The following is the actual certificate. The format of 95 /// the certificate depends on wCertificateType. 118 /// Certificate which encapsulates a GUID-specific digital signature 133 /// The following is the certificate data. The format of 143 /// Certificate which encapsulates the RSASSA_PKCS1-v1_5 digital signature. 166 /// from the total length of the certificate as found i [all...] |