HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 476 - 500 of 2776) sorted by null

<<11121314151617181920>>

  /libcore/ojluni/src/main/java/javax/security/cert/
CertificateParsingException.java 30 * Certificate Parsing Exception. This is thrown whenever
31 * invalid DER encoded certificate is parsed or unsupported DER features
32 * are found in the Certificate.
37 * use the standard Java SE certificate classes located in
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 35 import java.security.cert.Certificate;
71 public Certificate[] engineGetCertificateChain(String alias) {
73 return (Certificate[]) Chain.get(alias);
78 public Certificate engineGetCertificate(String alias) {
80 return (Certificate) Cert.get(alias);
93 Certificate[] chain) throws KeyStoreException {
104 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain)
125 public void engineSetCertificateEntry(String alias, Certificate cert)
174 public String engineGetCertificateAlias(Certificate cert) {
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_linux.go 7 // Possible certificate files; stop after finding one.
  /prebuilts/go/linux-x86/src/crypto/x509/
root_linux.go 7 // Possible certificate files; stop after finding one.
  /libcore/ojluni/src/main/java/java/security/cert/
X509CRL.java 46 * Abstract class for an X.509 Certificate Revocation List (CRL).
48 * It is signed by a Certificate Authority (CA) and made freely
51 * <p>Each revoked certificate is
52 * identified in a CRL by its certificate serial number. When a
53 * certificate-using system uses a certificate (e.g., for verifying a
55 * certificate signature and validity but also acquires a suitably-
56 * recent CRL and checks that the certificate serial number is not on
61 * entry may be removed when the certificate expiration date is reached.
73 * Public Key Infrastructure Certificate and CRL Profile</a>
    [all...]
PolicyQualifierInfo.java 44 * A certificate policies extension, if present in an X.509 version 3
45 * certificate, contains a sequence of one or more policy information terms,
47 * qualifiers. In an end-entity certificate, these policy information terms
48 * indicate the policy under which the certificate has been issued and the
49 * purposes for which the certificate may be used. In a CA certificate, these
51 * which include this certificate.
64 * that any policy qualifier in a certificate policies extension that is
  /libcore/ojluni/src/main/java/java/security/
KeyStore.java 30 import java.security.cert.Certificate;
52 * unauthorized access. It is also accompanied by a certificate chain
55 * <p> Private keys and certificate chains are used by a given entity for
66 * <p> This type of entry contains a single public key {@code Certificate}
67 * belonging to another party. It is called a <i>trusted certificate</i>
68 * because the keystore owner trusts that the public key in the certificate
70 * of the certificate.
76 * case of private keys and their associated certificate chains, these strings
79 * certificate authorities, or using different public key algorithms.
206 * @see java.security.cert.Certificate
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/bl2/
bl2_main.c 51 * key_cert_blob: key certificate blob id (see auth.h)
52 * key_cert_name: key certificate filename
53 * cont_cert_blob: content certificate blob id (see auth.h)
54 * cont_cert_name: content certificate filename
67 /* Load Key certificate */
78 ERROR("Invalid key certificate %s.\n", key_cert_name);
82 /* Load Content certificate */
93 ERROR("Invalid content certificate %s.\n", cont_cert_name);
101 * Load and authenticate the Trusted Key certificate the key and content
116 /* Load the Trusted Key certificate in the BL31 region *
    [all...]
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLUtils.java 40 import java.security.cert.Certificate;
62 * A trust manager specific to a particular HostAuth. The first time a server certificate is
63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether
64 * the PublicKey of the certificate presented matches that of the saved certificate
109 Certificate storedCert =
154 * Optionally bypass all SSL certificate checks.
156 * @param insecure if true, bypass all SSL certificate checks
283 * a client certificate.
317 * for a client certificate (in millis since epoch)
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
AttributeCertificateHolder.java 30 * -- the holder's Public Key Certificate
59 * @param issuerName name of associated certificate's issuer.
60 * @param serialNumber serial number of associated certificate.
71 * Create a holder using the baseCertificateID option based on the passed in associated certificate,
73 * @param cert the certificate to be associated with this holder.
84 * @param principal the entityName to be associated with the attribute certificate.
99 * <li>1 - publicKeyCert - A hash of the public key certificate of the
105 * This cannot be used if a v1 attribute certificate is used.
128 * <li>1 - publicKeyCert - A hash of the public key certificate of the
230 * Return any principal objects inside the attribute certificate holde
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKIXExtendedParameters.java 37 * This model uses the following validity model. Each certificate must have
39 * certificate must have been valid at the time the signature was done. The
40 * CA certificate which signed the end certificate must have been valid,
41 * when the end certificate was signed. The CA (or Root CA) certificate must
42 * have been valid, when the CA certificate was signed and so on. So the
44 * the <em>end certificate</em> must have been valid. <p/> It is used e.g.
281 * Returns the required constraints on the target certificate.
287 * target certificate or attribute certificate (or <code>null</code>
    [all...]
  /frameworks/base/core/java/android/security/net/config/
NetworkSecurityConfig.java 58 // non-override pin entries. This allows us to handle the case where a certificate is in
59 // multiple entry refs by returning the certificate from the first entry ref.
78 // If we see the same certificate in two TrustAnchors, one with overridesPins and one
81 // this can be simplified to just using the first occurrence of a certificate.
86 X509Certificate cert = anchor.certificate;
170 * <li>No certificate pinning is used.</li>
171 * <li>The system certificate store is trusted for connections.</li>
172 * <li>If the application targets API level 23 (Android M) or lower then the user certificate
181 // System certificate store, does not bypass static pins.
186 // Applications targeting N and above must opt in into trusting the user added certificate
    [all...]
  /frameworks/base/core/java/android/util/jar/
StrictJarVerifier.java 27 import java.security.cert.Certificate;
78 private final Hashtable<String, Certificate[]> certificates =
79 new Hashtable<String, Certificate[]>(5);
81 private final Hashtable<String, Certificate[][]> verifiedEntries =
82 new Hashtable<String, Certificate[][]>();
96 private final Certificate[][] certChains;
98 private final Hashtable<String, Certificate[][]> verifiedEntries;
101 Certificate[][] certChains, Hashtable<String, Certificate[][]> verifedEntries) {
207 ArrayList<Certificate[]> certChains = new ArrayList<Certificate[]>()
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/
ConfigParser.java 33 import java.security.cert.Certificate;
125 * [base64 encoded X509 CA certificate data]
130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain]
135 * (required), CA (Certificate Authority) certificate (optional), and client
136 * certificate chain (optional).
185 // Parse CA (Certificate Authority) certificate.
191 throw new IOException("Failed to parse CA Certificate");
195 // Parse PKCS12 data for client private key and certificate chain
    [all...]
  /cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/res/raw/
valid_ca.pem 1 -----BEGIN CERTIFICATE-----
18 -----END CERTIFICATE-----
  /external/autotest/client/site_tests/network_VPNConnect/
control.l2tpipsec_cert 13 Tests that we can complete L2TP/IPSec certificate VPN authentication.
21 L2TP/IPSec certificate-based VPN server running at the other end of a
  /external/conscrypt/platform/src/main/java/org/conscrypt/
CertPinManager.java 24 * Interface for classes that implement certificate pinning for use in {@link TrustManagerImpl}.
32 * certificate chain includes pinned certificates if pinning is requested
  /external/curl/docs/cmdline-opts/
pinnedpubkey.d 11 When negotiating a TLS or SSL connection, the server sends a certificate
12 indicating its identity. A public key is extracted from this certificate and
  /external/curl/docs/libcurl/opts/
CURLOPT_SSL_CTX_FUNCTION.3 75 "-----BEGIN CERTIFICATE-----\n"
83 "-----END CERTIFICATE-----\n";
86 /* use it to read the PEM formatted certificate from memory into an X509
93 /* get a pointer to the X509 certificate store (which may be empty!) */
96 /* add our certificate to this store */
98 printf("error adding certificate\n");
119 /* Retrieve page using cacerts' certificate -> will succeed
120 * load the certificate by installing a function doing the nescessary
  /external/libmicrohttpd/src/testcurl/https/
tls_test_keys.h 25 /* Certificate Authority key */
54 /* Certificate Authority cert */
55 const char ca_cert_pem[] = "-----BEGIN CERTIFICATE-----\n"
72 "-----END CERTIFICATE-----\n";
75 const char srv_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n"
93 "-----END CERTIFICATE-----\n";
125 const char srv_self_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n"
142 "-----END CERTIFICATE-----\n";
  /external/vboot_reference/tests/testkeys/
key_rsa8192.crt 1 -----BEGIN CERTIFICATE-----
54 -----END CERTIFICATE-----
  /external/wpa_supplicant_8/wpa_supplicant/examples/
openCryptoki.conf 11 # Certificate Object, type = X.509 cert
14 # Certificate Object, type = X.509 cert
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/
X509CertificateTest.java 53 import javax.security.cert.Certificate;
73 private static String base64cert = "-----BEGIN CERTIFICATE-----\n"
90 + "-----END CERTIFICATE-----";
93 * a self-signed certificate
95 private static final String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" +
114 "-----END CERTIFICATE-----";
126 private java.security.cert.Certificate javaSSCert;
130 private Certificate javaxSSCert;
158 // The requested certificate type is not available.
161 Logger.global.warning("Error in test setup: Certificate type not supported")
    [all...]
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertificateFactoryTestX509.java 27 "-----BEGIN CERTIFICATE-----\n"
49 + "-----END CERTIFICATE-----\n";
  /libcore/ojluni/src/main/java/sun/security/x509/
CertificateIssuerExtension.java 35 * Represents the CRL Certificate Issuer Extension (OID = 2.5.29.29).
37 * The CRL certificate issuer extension identifies the certificate issuer
41 * certificate issuer defaults to the CRL issuer. On subsequent entries
42 * in an indirect CRL, if this extension is not present, the certificate
91 * @param issuer the certificate issuer
169 * Returns a printable representation of the certificate issuer.
172 return super.toString() + "Certificate Issuer [\n" +

Completed in 586 milliseconds

<<11121314151617181920>>