/libcore/ojluni/src/main/java/javax/security/cert/ |
CertificateParsingException.java | 30 * Certificate Parsing Exception. This is thrown whenever 31 * invalid DER encoded certificate is parsed or unsupported DER features 32 * are found in the Certificate. 37 * use the standard Java SE certificate classes located in
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 35 import java.security.cert.Certificate; 71 public Certificate[] engineGetCertificateChain(String alias) { 73 return (Certificate[]) Chain.get(alias); 78 public Certificate engineGetCertificate(String alias) { 80 return (Certificate) Cert.get(alias); 93 Certificate[] chain) throws KeyStoreException { 104 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) 125 public void engineSetCertificateEntry(String alias, Certificate cert) 174 public String engineGetCertificateAlias(Certificate cert) {
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_linux.go | 7 // Possible certificate files; stop after finding one.
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_linux.go | 7 // Possible certificate files; stop after finding one.
|
/libcore/ojluni/src/main/java/java/security/cert/ |
X509CRL.java | 46 * Abstract class for an X.509 Certificate Revocation List (CRL). 48 * It is signed by a Certificate Authority (CA) and made freely 51 * <p>Each revoked certificate is 52 * identified in a CRL by its certificate serial number. When a 53 * certificate-using system uses a certificate (e.g., for verifying a 55 * certificate signature and validity but also acquires a suitably- 56 * recent CRL and checks that the certificate serial number is not on 61 * entry may be removed when the certificate expiration date is reached. 73 * Public Key Infrastructure Certificate and CRL Profile</a> [all...] |
PolicyQualifierInfo.java | 44 * A certificate policies extension, if present in an X.509 version 3 45 * certificate, contains a sequence of one or more policy information terms, 47 * qualifiers. In an end-entity certificate, these policy information terms 48 * indicate the policy under which the certificate has been issued and the 49 * purposes for which the certificate may be used. In a CA certificate, these 51 * which include this certificate. 64 * that any policy qualifier in a certificate policies extension that is
|
/libcore/ojluni/src/main/java/java/security/ |
KeyStore.java | 30 import java.security.cert.Certificate; 52 * unauthorized access. It is also accompanied by a certificate chain 55 * <p> Private keys and certificate chains are used by a given entity for 66 * <p> This type of entry contains a single public key {@code Certificate} 67 * belonging to another party. It is called a <i>trusted certificate</i> 68 * because the keystore owner trusts that the public key in the certificate 70 * of the certificate. 76 * case of private keys and their associated certificate chains, these strings 79 * certificate authorities, or using different public key algorithms. 206 * @see java.security.cert.Certificate [all...] |
/device/linaro/bootloader/arm-trusted-firmware/bl2/ |
bl2_main.c | 51 * key_cert_blob: key certificate blob id (see auth.h) 52 * key_cert_name: key certificate filename 53 * cont_cert_blob: content certificate blob id (see auth.h) 54 * cont_cert_name: content certificate filename 67 /* Load Key certificate */ 78 ERROR("Invalid key certificate %s.\n", key_cert_name); 82 /* Load Content certificate */ 93 ERROR("Invalid content certificate %s.\n", cont_cert_name); 101 * Load and authenticate the Trusted Key certificate the key and content 116 /* Load the Trusted Key certificate in the BL31 region * [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 62 * A trust manager specific to a particular HostAuth. The first time a server certificate is 63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether 64 * the PublicKey of the certificate presented matches that of the saved certificate 109 Certificate storedCert = 154 * Optionally bypass all SSL certificate checks. 156 * @param insecure if true, bypass all SSL certificate checks 283 * a client certificate. 317 * for a client certificate (in millis since epoch) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
AttributeCertificateHolder.java | 30 * -- the holder's Public Key Certificate 59 * @param issuerName name of associated certificate's issuer. 60 * @param serialNumber serial number of associated certificate. 71 * Create a holder using the baseCertificateID option based on the passed in associated certificate, 73 * @param cert the certificate to be associated with this holder. 84 * @param principal the entityName to be associated with the attribute certificate. 99 * <li>1 - publicKeyCert - A hash of the public key certificate of the 105 * This cannot be used if a v1 attribute certificate is used. 128 * <li>1 - publicKeyCert - A hash of the public key certificate of the 230 * Return any principal objects inside the attribute certificate holde [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXExtendedParameters.java | 37 * This model uses the following validity model. Each certificate must have 39 * certificate must have been valid at the time the signature was done. The 40 * CA certificate which signed the end certificate must have been valid, 41 * when the end certificate was signed. The CA (or Root CA) certificate must 42 * have been valid, when the CA certificate was signed and so on. So the 44 * the <em>end certificate</em> must have been valid. <p/> It is used e.g. 281 * Returns the required constraints on the target certificate. 287 * target certificate or attribute certificate (or <code>null</code> [all...] |
/frameworks/base/core/java/android/security/net/config/ |
NetworkSecurityConfig.java | 58 // non-override pin entries. This allows us to handle the case where a certificate is in 59 // multiple entry refs by returning the certificate from the first entry ref. 78 // If we see the same certificate in two TrustAnchors, one with overridesPins and one 81 // this can be simplified to just using the first occurrence of a certificate. 86 X509Certificate cert = anchor.certificate; 170 * <li>No certificate pinning is used.</li> 171 * <li>The system certificate store is trusted for connections.</li> 172 * <li>If the application targets API level 23 (Android M) or lower then the user certificate 181 // System certificate store, does not bypass static pins. 186 // Applications targeting N and above must opt in into trusting the user added certificate [all...] |
/frameworks/base/core/java/android/util/jar/ |
StrictJarVerifier.java | 27 import java.security.cert.Certificate; 78 private final Hashtable<String, Certificate[]> certificates = 79 new Hashtable<String, Certificate[]>(5); 81 private final Hashtable<String, Certificate[][]> verifiedEntries = 82 new Hashtable<String, Certificate[][]>(); 96 private final Certificate[][] certChains; 98 private final Hashtable<String, Certificate[][]> verifiedEntries; 101 Certificate[][] certChains, Hashtable<String, Certificate[][]> verifedEntries) { 207 ArrayList<Certificate[]> certChains = new ArrayList<Certificate[]>() [all...] |
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
ConfigParser.java | 33 import java.security.cert.Certificate; 125 * [base64 encoded X509 CA certificate data] 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 135 * (required), CA (Certificate Authority) certificate (optional), and client 136 * certificate chain (optional). 185 // Parse CA (Certificate Authority) certificate. 191 throw new IOException("Failed to parse CA Certificate"); 195 // Parse PKCS12 data for client private key and certificate chain [all...] |
/cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/res/raw/ |
valid_ca.pem | 1 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE-----
|
/external/autotest/client/site_tests/network_VPNConnect/ |
control.l2tpipsec_cert | 13 Tests that we can complete L2TP/IPSec certificate VPN authentication. 21 L2TP/IPSec certificate-based VPN server running at the other end of a
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
CertPinManager.java | 24 * Interface for classes that implement certificate pinning for use in {@link TrustManagerImpl}. 32 * certificate chain includes pinned certificates if pinning is requested
|
/external/curl/docs/cmdline-opts/ |
pinnedpubkey.d | 11 When negotiating a TLS or SSL connection, the server sends a certificate 12 indicating its identity. A public key is extracted from this certificate and
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_SSL_CTX_FUNCTION.3 | 75 "-----BEGIN CERTIFICATE-----\n" 83 "-----END CERTIFICATE-----\n"; 86 /* use it to read the PEM formatted certificate from memory into an X509 93 /* get a pointer to the X509 certificate store (which may be empty!) */ 96 /* add our certificate to this store */ 98 printf("error adding certificate\n"); 119 /* Retrieve page using cacerts' certificate -> will succeed 120 * load the certificate by installing a function doing the nescessary
|
/external/libmicrohttpd/src/testcurl/https/ |
tls_test_keys.h | 25 /* Certificate Authority key */ 54 /* Certificate Authority cert */ 55 const char ca_cert_pem[] = "-----BEGIN CERTIFICATE-----\n" 72 "-----END CERTIFICATE-----\n"; 75 const char srv_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n" 93 "-----END CERTIFICATE-----\n"; 125 const char srv_self_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n" 142 "-----END CERTIFICATE-----\n";
|
/external/vboot_reference/tests/testkeys/ |
key_rsa8192.crt | 1 -----BEGIN CERTIFICATE----- 54 -----END CERTIFICATE-----
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 11 # Certificate Object, type = X.509 cert 14 # Certificate Object, type = X.509 cert
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
X509CertificateTest.java | 53 import javax.security.cert.Certificate; 73 private static String base64cert = "-----BEGIN CERTIFICATE-----\n" 90 + "-----END CERTIFICATE-----"; 93 * a self-signed certificate 95 private static final String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" + 114 "-----END CERTIFICATE-----"; 126 private java.security.cert.Certificate javaSSCert; 130 private Certificate javaxSSCert; 158 // The requested certificate type is not available. 161 Logger.global.warning("Error in test setup: Certificate type not supported") [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateFactoryTestX509.java | 27 "-----BEGIN CERTIFICATE-----\n" 49 + "-----END CERTIFICATE-----\n";
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
CertificateIssuerExtension.java | 35 * Represents the CRL Certificate Issuer Extension (OID = 2.5.29.29). 37 * The CRL certificate issuer extension identifies the certificate issuer 41 * certificate issuer defaults to the CRL issuer. On subsequent entries 42 * in an indirect CRL, if this extension is not present, the certificate 91 * @param issuer the certificate issuer 169 * Returns a printable representation of the certificate issuer. 172 return super.toString() + "Certificate Issuer [\n" +
|