HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 376 - 400 of 2776) sorted by null

<<11121314151617181920>>

  /libcore/ojluni/src/main/java/javax/security/cert/
CertificateException.java 30 * This exception indicates one of a variety of certificate problems.
35 * use the standard Java SE certificate classes located in
40 * @see Certificate
46 * Constructs a certificate exception with no detail message. A detail
54 * Constructs a certificate exception with the given detail
  /libcore/ojluni/src/main/java/sun/security/x509/
X509CertImpl.java 33 import java.security.cert.Certificate;
43 * The X509CertImpl class represents an X.509 certificate. These certificates
51 * <P>These certificates are managed and vouched for by <em>Certificate
121 // Certificate data, and its envelope
152 * the signature of this certificate. Null if the certificate has not
158 * successfully verify the signature of this certificate, or the
175 * Unmarshals a certificate from its encoded form, parsing the
177 * need to examine and use certificate contents. That is, this is
179 * must include only a certificate, and no "garbage" may be left a
    [all...]
  /external/curl/docs/examples/
usercertinmem.c 23 /* Example using an in memory PEM user certificate and RSA key to retrieve an
28 * Note that to maintain simplicity this example does not use a CA certificate
54 "-----BEGIN CERTIFICATE-----\n"\
94 "-----END CERTIFICATE-----\n";
127 /* use it to read the PEM formatted certificate from memory into an X509
135 /*tell SSL to use the X509 certificate*/
138 printf("Use certificate failed\n");
194 no CA certificate*/
201 /* first try: retrieve page without user certificate and key -> will fail
211 /* second try: retrieve page using user certificate and key -> will succee
    [all...]
  /external/libmtp/logs/
mtp-detect-samsung-yh-925.txt 55 0xd102: Device Certificate
185 Device Certificate:
187 <CERTIFICATE type="DEVICE">
194 ATE><FALLBACK><SECURITYVERSION>2.4.101.87</SECURITYVERSION><CERTIFICATE
196 jbFZ7WahsQQA5H3rHOsWhSOI53bGHDrw2rkd/jGmz0524DR0</CERTIFICATE></FALLBACK>
197 <CERTIFICATE type="GROUP">
208 </CERTIFICATE>
209 <CERTIFICATE type="AUTHORIZATION">
213 t5BGPhVjPybFaDKnzNQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
    [all...]
mtp-detect-iriver-h10-20GB.txt 57 0xd102: Device Certificate
112 Device Certificate:
113 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
118 MSIGNATURE>261d87MS77pUbix3Cnfuq5eNH94=</SYMSIGNATURE></CERTIFICATE><FALLBACK><S
119 ECURITYVERSION>2.4.101.59</SECURITYVERSION><CERTIFICATE private="1">FQBk2GzllIEz
121 KESFyhpVZDJoyWVin7RD</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NA
135 TIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLE
138 wAyKCKxBSNdFD20ArIxGnT+SqwQeg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
142 XtUmpZCbsbD4NRLzgHHU6zEKzdYA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE></DEVCERT
    [all...]
mtp-detect-sandisk-sansa-e260.txt 62 0xd102: Device Certificate
201 Device Certificate:
202 <DEVCERT version="1.0"><CERTIFICATE
209 ATE><FALLBACK><SECURITYVERSION>2.4.104.93</SECURITYVERSION><CERTIFICATE
211 oRMryFIUqED6nkYnGenqOCshcvAMIe7siWZZFHpJZAlHGYJ3</CERTIFICATE></FALLBACK><CE
238 iCoKLhBIer0k3ablA4Zg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
242 fWrf+XXA+RNASNDpnTg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
246 NATURE_VALUE></CERTIFICATE></DEVCERT
    [all...]
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
KeyChecker.java 38 * certificate. It also checks whether the final certificate in a
59 * on the target certificate
99 * the specified certificate.
101 * @param cert the Certificate
103 * @throws CertPathValidatorException if certificate does not verify
106 public void check(Certificate cert, Collection<String> unresCritExts)
113 // if final certificate, check that target constraints are satisfied
117 throw new CertPathValidatorException("target certificate " +
121 // otherwise, verify that keyCertSign bit is set in CA certificate
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
X509KeyManagerImpl.java 7 import java.security.cert.Certificate;
24 // creating a certificate
25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl
39 + "-----END CERTIFICATE-----\n";
41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
44 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
58 + "-----END CERTIFICATE-----\n";
63 String certificate3 = "-----BEGIN CERTIFICATE-----\n"
82 + "-----END CERTIFICATE-----\n"
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
X509CRLEntryHolder.java 39 * Return the serial number of the certificate associated with this CRLEntry.
41 * @return the revoked certificate's serial number.
49 * Return the date on which the certificate associated with this CRLEntry was revoked.
51 * @return the revocation date for the revoked certificate.
69 * Return the available names for the certificate issuer for the certificate referred to by this CRL entry.
76 * @return the revoked certificate's issuer.
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/selector/
X509CertificateHolderSelector.java 36 * certificate.
38 * @param issuer the issuer of the signer's associated certificate.
39 * @param serialNumber the serial number of the signer's associated certificate.
48 * certificate.
50 * @param issuer the issuer of the signer's associated certificate.
51 * @param serialNumber the serial number of the signer's associated certificate.
52 * @param subjectKeyId the subject key identifier to use to match the signers associated certificate.
  /external/curl/docs/libcurl/opts/
CURLOPT_PROXY_SSL_VERIFYHOST.3 25 CURLOPT_PROXY_SSL_VERIFYHOST \- verify the proxy certificate's name against host
37 When negotiating TLS and SSL connections, the server sends a certificate
40 When \fICURLOPT_SSL_VERIFYHOST(3)\fP is 2, that certificate must indicate that
42 fails. Simply put, it means it has to have the same name in the certificate as
46 Subject Alternate Name field in the certificate matches the host name in the
56 names in the certificate. Use that ability with caution!
60 This option controls checking the server's certificate's claimed identity.
CURLOPT_SSL_VERIFYHOST.3 25 CURLOPT_SSL_VERIFYHOST \- verify the certificate's name against host
36 When negotiating TLS and SSL connections, the server sends a certificate
39 When \fICURLOPT_SSL_VERIFYHOST(3)\fP is 2, that certificate must indicate that
41 fails. Simply put, it means it has to have the same name in the certificate as
45 Subject Alternate Name field in the certificate matches the host name in the
55 names in the certificate. Use that ability with caution!
59 This option controls checking the server's certificate's claimed identity.
  /external/apache-http/android/src/android/net/http/
CertificateChainValidator.java 32 import java.security.cert.Certificate;
47 * Class responsible for all server certificate validation functionality
54 * The singleton instance of the certificate chain validator.
75 * Creates a new certificate chain validator. This is a private constructor.
76 * If you need a Certificate chain validator, call getInstance().
103 * And if the last traced certificate is self issued and it is expired, it
119 Certificate[] peerCertificates =
126 // update the SSL certificate associated with the connection
151 throw new IllegalArgumentException("bad certificate chain");
163 throw new IOException("can't read certificate", e)
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
CertificateRevokedException.java 41 * An exception that indicates an X.509 certificate is revoked. A
43 * about the revoked certificate, such as the date on which the
44 * certificate was revoked and the reason it was revoked.
55 * @serial the date on which the certificate was revoked
64 * authority that signed the certificate's revocation status information
75 * @param revocationDate the date on which the certificate was revoked. The
82 * of the authority that signed the certificate's revocation status
104 * Returns the date on which the certificate was revoked. A new copy is
115 * Returns the reason the certificate was revoked.
124 * Returns the name of the authority that signed the certificate'
    [all...]
CertPath.java 43 * {@code Certificate}s, and one or more supported encodings. Because the
50 * {@code Certificate}s in the certification path. For each
51 * certificate {@code cert} in a certification path {@code certPath},
55 * The list of {@code Certificate}s is an ordered {@code List} of
56 * zero or more {@code Certificate}s. This {@code List} and all
57 * of the {@code Certificate}s contained in it must be immutable.
79 * certificate and ending with a certificate issued by the trust anchor. That
80 * is, the issuer of one certificate is the subject of the following one. The
81 * certificate representing the {@link TrustAnchor TrustAnchor} should not b
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
OkHostnameVerifier.java 20 import java.security.cert.Certificate;
64 Certificate[] certificates = session.getPeerCertificates();
71 public boolean verify(String host, X509Certificate certificate) {
73 ? verifyIpAddress(host, certificate)
74 : verifyHostName(host, certificate);
82 * Returns true if {@code certificate} matches {@code ipAddress}.
84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) {
85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME);
95 * Returns true if {@code certificate} matches {@code hostName}.
97 private boolean verifyHostName(String hostName, X509Certificate certificate) {
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore2Test.java 40 import java.security.cert.Certificate;
76 // creating a certificate
77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test
91 + "-----END CERTIFICATE-----\n";
93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes());
95 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
109 + "-----END CERTIFICATE-----\n";
113 String certificate3 = "-----BEGIN CERTIFICATE-----\n"
132 + "-----END CERTIFICATE-----\n"
    [all...]
  /libcore/ojluni/src/main/java/java/security/
KeyStoreSpi.java 33 import java.security.cert.Certificate;
79 * Returns the certificate chain associated with the given alias.
80 * The certificate chain must have been associated with the alias
87 * @return the certificate chain (ordered with the user's certificate first
88 * and the root certificate authority last), or null if the given alias
89 * does not exist or does not contain a certificate chain
91 public abstract Certificate[] engineGetCertificateChain(String alias);
94 * Returns the certificate associated with the given alias.
100 * then the trusted certificate contained in that entry is returned
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
common.go 114 // Certificate types (for certificateRequestMsg)
116 certTypeRSASign = 1 // A certificate containing an RSA key
117 certTypeDSSSign = 2 // A certificate containing a DSA key
118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key
119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key
122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
common.go 114 // Certificate types (for certificateRequestMsg)
116 certTypeRSASign = 1 // A certificate containing an RSA key
117 certTypeDSSSign = 2 // A certificate containing a DSA key
118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key
119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key
122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
KeyManagementTest.java 39 import java.security.cert.Certificate;
84 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate);
108 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate);
111 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert},
113 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert},
135 final Collection<Certificate> certs = loadCertificatesFromAsset("user-cert-chain.crt");
136 final Certificate[] certChain = certs.toArray(new Certificate[certs.size()]);
153 // Verify the certificate chain is correct
167 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate)
    [all...]
  /external/conscrypt/platform/src/test/java/org/conscrypt/
ChainStrengthAnalyzerTest.java 32 "-----BEGIN CERTIFICATE-----\n" +
52 "-----END CERTIFICATE-----";
58 "-----BEGIN CERTIFICATE-----\n" +
69 "-----END CERTIFICATE-----\n";
75 "-----BEGIN CERTIFICATE-----\n" +
93 "-----END CERTIFICATE-----";
98 "-----BEGIN CERTIFICATE-----\n" +
119 "-----END CERTIFICATE-----";
124 "-----BEGIN CERTIFICATE-----\n" +
144 "-----END CERTIFICATE-----"
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactorySpiTest.java 35 import java.security.cert.Certificate;
68 List<Certificate> list = null;
78 Certificate cc = certFactorySpi.engineGenerateCertificate(bais);
85 Collection<? extends Certificate> col = certFactorySpi.engineGenerateCertificates(bais);
148 Certificate cert = certFactorySpi
151 Collection<? extends Certificate> col = certFactorySpi
170 List<Certificate> list = null;
218 Certificate cert = certFactorySpi
221 Collection<? extends Certificate> col = certFactorySpi
240 List<Certificate> list = null
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 55 * <p>If you have a CA certificate which needs to be trusted by a particular app/service,
60 * <p>If you have a CA certificate that you believe should be present on all Android devices,
93 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local
94 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID());
95 assertNotNull(certificate.getSubjectDN());
96 assertNotNull(certificate.getIssuerDN());
97 String fingerprint = getFingerprint(certificate);
103 private String getFingerprint(X509Certificate certificate) throws CertificateEncodingException,
106 messageDigest.update(certificate.getEncoded())
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/efi/Uefi/
UefiMultiPhase.h 78 /// The length of the entire certificate,
88 /// The certificate type. See WIN_CERT_TYPE_xxx for the UEFI
89 /// certificate types. The UEFI specification reserves the range of
90 /// certificate type values from 0x0EF0 to 0x0EFF.
94 /// The following is the actual certificate. The format of
95 /// the certificate depends on wCertificateType.
118 /// Certificate which encapsulates a GUID-specific digital signature
133 /// The following is the certificate data. The format of
143 /// Certificate which encapsulates the RSASSA_PKCS1-v1_5 digital signature.
166 /// from the total length of the certificate as found i
    [all...]

Completed in 493 milliseconds

<<11121314151617181920>>