/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509TrustManagerImpl.java | 13 throw new IllegalArgumentException("null or zero-length certificate chain"); 28 throw new IllegalArgumentException("null or zero-length certificate chain");
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 31 import java.security.cert.Certificate; 161 Certificate intermediate1 = pke1.getCertificateChain()[1]; 162 Certificate root1 = TestKeyStore.getClientCertificate().getRootCertificate("RSA"); 172 Certificate intermediate2 = pke2.getCertificateChain()[1]; 173 Certificate root2 = TestKeyStore.getServer().getRootCertificate("RSA"); 210 byte[] certificate = mService.getCertificate(alias1); 211 assertNotNull(certificate); 213 Arrays.toString(certificate));
|
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
VpnInfo.java | 22 * Wrapper for VPN Profile and associated certificate files 27 // Certificate file in PC12 format for user certificates and private keys
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test_import.go | 28 template := x509.Certificate{ 40 panic("failed to create certificate with basic imports: " + err.Error())
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test_import.go | 28 template := x509.Certificate{ 40 panic("failed to create certificate with basic imports: " + err.Error())
|
/prebuilts/tools/common/m2/repository/org/thoughtcrime/ssl/pinning/AndroidPinning/1.0.0/ |
AndroidPinning-1.0.0.pom | 10 <description>An Android library that facilitates certificate pinning for SSL connections in Android apps, in order to minimize dependence on Certificate Authorities.</description>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 29 import org.bouncycastle.asn1.x509.Certificate; 38 * At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----" 47 private static final PEMUtil PEM_CERT_PARSER = new PEMUtil("CERTIFICATE"); 59 private java.security.cert.Certificate readDERCertificate( 66 private java.security.cert.Certificate readPEMCertificate( 73 private java.security.cert.Certificate getCertificate(ASN1Sequence seq) 94 Certificate.getInstance(seq)); 97 private java.security.cert.Certificate getCertificate() 109 Certificate.getInstance(obj)) [all...] |
/external/conscrypt/testing/src/main/java/libcore/java/security/ |
TestKeyStore.java | 40 import java.security.cert.Certificate; 211 .subject("CN=Test Root Certificate Authority") 218 .subject("CN=Test Intermediate Certificate Authority ECDSA") 226 .subject("CN=Test Intermediate Certificate Authority") 262 .subject("CN=Test Root Certificate Authority 2") 267 .subject("CN=Test Intermediate Certificate Authority") 300 * Return a server keystore with a matched RSA certificate and 301 * private key as well as a CA certificate. 309 * Return a keystore with a CA certificate 317 * Return a client keystore with a matched RSA certificate an 824 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 876 Certificate certificate = certificateEntry.getTrustedCertificate(); local 968 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 23 import java.security.Certificate; 45 public static class CertificateImpl implements java.security.Certificate { 84 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 98 + "-----END CERTIFICATE-----\n"; 100 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 102 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 116 + "-----END CERTIFICATE-----\n"; 253 java.security.Certificate[] certs = sub.certificates(); 254 assertEquals("Certificate not contained in the identity" [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 67 import java.security.cert.Certificate; 208 .subject("CN=Test Root Certificate Authority") 215 .subject("CN=Test Intermediate Certificate Authority ECDSA") 223 .subject("CN=Test Intermediate Certificate Authority") 259 .subject("CN=Test Root Certificate Authority 2") 264 .subject("CN=Test Intermediate Certificate Authority") 297 * Return a server keystore with a matched RSA certificate and 298 * private key as well as a CA certificate. 306 * Return a keystore with a CA certificate 314 * Return a client keystore with a matched RSA certificate an 841 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 894 Certificate certificate = certificateEntry.getTrustedCertificate(); local 986 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
ConscryptIntermediateVerificationTest.java | 24 import java.security.cert.Certificate; 42 Collection<? extends Certificate> certs; 54 for (Certificate cert : certs) { 89 // L is a certificate issued by I for example.com 90 // L' is a certificate issued by I for android.com
|
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/ |
SecureBootConfigDxe.inf | 103 gEfiCertPkcs7Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the certificate.
104 gEfiCertTypeRsa2048Sha256Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the certificate.
108 gEfiCertX509Sha256Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the certificate.
109 gEfiCertX509Sha384Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the certificate.
110 gEfiCertX509Sha512Guid ## SOMETIMES_PRODUCES ## GUID # Unique ID for the type of the certificate.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
AttributeCertificateIssuer.java | 6 import java.security.cert.Certificate; 23 * Carrying class for an attribute certificate issuer. 89 * Return any principal objects inside the attribute certificate issuer 141 public boolean match(Certificate cert) 206 return match((Certificate)obj);
|
/external/curl/docs/examples/ |
imap-tls.c | 60 /* If your server doesn't have a valid certificate, then you can disable 68 * the issuer certificate (or the host certificate if the certificate is 72 curl_easy_setopt(curl, CURLOPT_CAINFO, "/path/to/certificate.pem");
|
pop3-tls.c | 59 /* If your server doesn't have a valid certificate, then you can disable 67 * the issuer certificate (or the host certificate if the certificate is 71 curl_easy_setopt(curl, CURLOPT_CAINFO, "/path/to/certificate.pem");
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
CertificateTest.java | 35 import javax.security.cert.Certificate; 44 private class TBTCert extends Certificate { 70 * Test for <code>Certificate()</code> constructor<br> 76 assertEquals("Wrong string representation for Certificate", "TBTCert", tbt_cert.toString()); 133 + "which is not an instance of Certificate", tbt_cert
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathValidatorTestPKIX.java | 27 import java.security.cert.Certificate; 70 List<Certificate> certList = new ArrayList<Certificate>(); 106 private String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" 117 + "DC9BBx1sVKoji17RP4R8CTf1\n" + "-----END CERTIFICATE-----";
|
/libcore/ojluni/src/main/java/java/security/cert/ |
package-info.java | 28 * certificates, certificate revocation lists (CRLs), and 38 * <li>RFC 5280: Internet X.509 Public Key Infrastructure Certificate and 39 * Certificate Revocation List (CRL) Profile 40 * <li>RFC 2560: X.509 Internet Public Key Infrastructure Online Certificate 59 * <b>X.509 Certificates and Certificate Revocation Lists (CRLs)</b></a>
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
example_test.go | 28 // Connecting with a custom root-certificate set. 31 -----BEGIN CERTIFICATE----- 54 -----END CERTIFICATE-----` 62 panic("failed to parse root certificate") 99 InsecureSkipVerify: true, // test server certificate is not trusted.
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
example_test.go | 28 // Connecting with a custom root-certificate set. 31 -----BEGIN CERTIFICATE----- 54 -----END CERTIFICATE-----` 62 panic("failed to parse root certificate") 99 InsecureSkipVerify: true, // test server certificate is not trusted.
|
/system/tpm/attestation/common/ |
common.proto | 21 // Enumerates various certificate profiles supported by the Attestation CA. 23 // A certificate intended for enterprise-owned devices. It has the following 30 // A certificate intended for enterprise-owned user accounts. It has the 36 // A certificate intended for platform verification by providers of protected 47 // A certificate intended for cast devices.
|
/system/tpm/attestation/server/ |
key_store.h | 61 // If a non-empty |certificate| is provided it will be registered along with 69 const std::string& certificate) = 0; 71 // Registers a |certificate| that is not associated to a registered key. The 72 // certificate will be associated with |username|. 74 const std::string& certificate) = 0;
|
/system/update_engine/ |
certificate_checker_unittest.cc | 63 // Parameters of our mock certificate digest. 77 // check certificate change, new 94 // check certificate change, unchanged 112 // check certificate change, changed 130 // check certificate change, failed
|
/external/python/cpython2/Doc/library/ |
ssl.rst | 48 certificate of the other side of the connection, and :meth:`cipher`,which 129 Raised to signal an error with a certificate (such as mismatching 130 hostname). Certificate errors detected by OpenSSL, though, raise 157 contain a certificate to be used to identify the local side of the 159 information on how the certificate is stored in the ``certfile``. 164 The parameter ``cert_reqs`` specifies whether a certificate is required from 243 trust for certificate verification, as in 297 default verification checks that the certificate is signed by a Certificate 299 Alternate Name) on the presented certificate matches the requested host [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 60 * Returns new instance of test certificate each time the method is called. 62 * @return test certificate 64 public static Certificate getCert() { 76 public static Certificate[] getCertChain() { 77 Certificate[] chain = { new TestCertificate(), new TestCertificate(), 96 * The second arguments shows which number will have the first Certificate 97 * in the CertPath. The second certificate will have (startID+1) number 101 * @param startID - specifies the starting ID which the first certificate will have 105 Certificate[] certs = new Certificate[howMany] [all...] |