HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 526 - 550 of 2776) sorted by null

<<21222324252627282930>>

  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreSpi.java 47 import java.security.cert.Certificate;
74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
79 * with a single certificate.
107 public Certificate[] engineGetCertificateChain(String alias) {
117 final Certificate[] caList;
123 caList = new Certificate[caChain.size() + 1];
131 caList = new Certificate[1];
140 public Certificate engineGetCertificate(String alias) {
155 // This entry/alias does not contain a certificate.
159 private Certificate getCertificateForTrustedCertificateEntry(byte[] encodedCert)
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HttpsURLConnectionTest.java 24 import java.security.cert.Certificate;
92 Certificate[] cert = con.getLocalCertificates();
180 Certificate[] cert = con.getServerCertificates();
271 public Certificate[] getLocalCertificates() {
276 Certificate cert = cf.generateCertificate(bis);
277 return new Certificate[] { cert };
286 public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException {
291 Certificate cert = cf.generateCertificate(bis);
292 return new Certificate[] { cert };
294 throw new SSLPeerUnverifiedException("No server's end-entity certificate");
    [all...]
  /libcore/ojluni/src/main/java/sun/security/x509/
CertificateValidity.java 36 * This class defines the interval for which the certificate is valid.
45 * get, set, delete methods of Certificate, x509 type.
60 // Returns the first time the certificate is valid.
65 // Returns the last time the certificate is valid.
110 * @param notBefore the date and time before which the certificate
112 * @param notAfter the date and time after which the certificate is
240 * @exception CertificateExpiredException if the certificate has expired.
241 * @exception CertificateNotYetValidException if the certificate is not
255 * @exception CertificateExpiredException if the certificate has expired
257 * @exception CertificateNotYetValidException if the certificate is no
    [all...]
  /system/tpm/attestation/common/
attestation_ca.proto 62 // The certificate request to be sent to the attestation server.
74 // The certificate profile defines the type of certificate to issue.
77 // the certificate profile.
80 // the certificate profile.
84 // The response from the attestation server for the certificate request.
91 // The issuer intermediate CA certificate in X.509 format.
96 // Certificate chaining order is from the leaf to the root. That is,
180 // If the key is an EUK, this value is the PCA-issued certificate for the key.
181 optional bytes certificate = 4
    [all...]
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
ForwardBuilder.java 56 * matching certificates from CertStores and verify a particular certificate
152 * Compose a certificate matching rule to filter out
163 * Match on certificate validity date
223 * certificates, please don't set the certificate valid
224 * criterion unless the trusted certificate matching is
243 * certificates, please don't set the certificate valid
244 * criterion unless the trusted certificate matching is
280 * basic constraints criterion unless the trusted certificate
304 * The trusted certificate matching is completed. We need to match
305 * on certificate validity date
    [all...]
BasicChecker.java 36 import java.security.cert.Certificate;
54 * on a PKIX certificate, namely the signature, timestamp, and subject/issuer
74 * @param anchor the anchor selected to validate the target certificate
75 * @param testDate the time for which the validity of the certificate
129 * checks on the certificate using its internal state. This method does
132 * @param cert the Certificate
135 * @throws CertPathValidatorException if certificate does not verify
138 public void check(Certificate cert, Collection<String> unresolvedCritExts)
153 * Verifies the signature on the certificate using the previous public key.
156 * @throws CertPathValidatorException if certificate does not verif
    [all...]
PolicyChecker.java 30 import java.security.cert.Certificate;
52 * information on a PKIX certificate, namely certificate policies, policy
168 * Performs the policy processing checks on the certificate using its
171 * @param cert the Certificate to be processed
173 * @throws CertPathValidatorException if the certificate does not verify
176 public void check(Certificate cert, Collection<String> unresCritExts)
193 * @param currCert the certificate to be processed
195 * the certificate does not verify
200 String msg = "certificate policies"
    [all...]
  /frameworks/base/keystore/java/android/security/
KeyPairGeneratorSpec.java 30 import java.security.cert.Certificate;
48 * {@link Certificate} chain.
50 * The KeyPair generator will create a self-signed certificate with the subject
55 * The self-signed X.509 certificate may be replaced at a later time by a
56 * certificate signed by a real Certificate Authority.
92 * {@link Certificate} chain.
94 * The KeyPair generator will create a self-signed certificate with the
107 * @param serialNumber X509 v3 certificate serial number
108 * @param startDate the start of the self-signed certificate validity perio
    [all...]
KeyChain.java 46 import java.security.cert.Certificate;
61 * their corresponding certificate chains in credential storage.
74 * certificate chains. The chosen alias will be returned by the
93 * Certificate Authority (CA) certificates will be trusted by all
115 * Package name for the Certificate Installer.
156 * Optional extra to specify an X.509 certificate to install on
163 * name for the installed certificate.
165 // Compatible with old android.security.Credentials.CERTIFICATE
179 * private key and associated certificate chain will be installed.
215 * Broadcast Action: Indicates the contents of the trusted certificate store has changed. Sen
    [all...]
  /libcore/ojluni/src/main/java/javax/net/ssl/
SSLSession.java 47 * generally identified by X.509 certificate chains.
219 * Note: This method can be used only when using certificate-based
220 * cipher suites; using it with non-certificate-based cipher suites,
224 * with the peer's own certificate first followed by any
225 * certificate authorities.
230 public java.security.cert.Certificate [] getPeerCertificates()
234 * Returns the certificate(s) that were sent to the peer during
237 * Note: This method is useful only when using certificate-based
242 * "best" certificate chain available, and transmits that to
244 * which certificate chain was actually used
    [all...]
  /external/boringssl/src/ssl/test/runner/
tls.go 27 // at least one certificate.
64 // at least one certificate.
75 // at least one certificate.
177 func LoadX509KeyPair(certFile, keyFile string) (cert Certificate, err error) {
191 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Certificate, err error) {
198 if certDERBlock.Type == "CERTIFICATE" {
199 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
203 if len(cert.Certificate) == 0 {
204 err = errors.New("crypto/tls: failed to parse certificate PEM data"
    [all...]
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
SslUtil.java 46 import java.security.cert.Certificate;
89 * Generates a new, self-signed X509 V1 certificate for a KeyPair.
93 * @return the new certificate
94 * @throws GeneralSecurityException on error generating the certificate
126 * Generates a new, self-signed X509 V3 certificate for a KeyPair.
133 * @return the new certificate
134 * @throws GeneralSecurityException on error generating the certificate
153 // about certificate and extension content. Quoting the `man verify`:
156 // the issuer name of the current certificate are subject to further
158 // certificate (if present) must match the subject key identifier (i
    [all...]
  /system/sepolicy/tools/
insertkeys.py 42 # Are we starting the certificate?
43 if line == "-----BEGIN CERTIFICATE-----":
45 sys.exit("Encountered another BEGIN CERTIFICATE without END CERTIFICATE on " +
51 elif line == "-----END CERTIFICATE-----":
53 sys.exit("Encountered END CERTIFICATE before BEGIN CERTIFICATE on line: "
56 # If we ended the certificate trip the flag
61 sys.exit("Empty certficate , certificate "+ str(certNo) + " found in file: "
64 # ... and append the certificate to the lis
    [all...]
  /system/tpm/attestation/server/
dbus_service_test.cc 97 reply.set_certificate_chain("certificate");
110 EXPECT_EQ("certificate", reply.certificate_chain());
152 reply.set_certificate("certificate");
168 EXPECT_EQ("certificate", reply.certificate());
182 reply.set_ek_certificate("certificate");
195 EXPECT_EQ("certificate", reply.ek_certificate());
210 reply.set_certificate("certificate");
226 EXPECT_EQ("certificate", reply.certificate());
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
DefaultHostnameVerifierTest.java 25 import java.security.cert.Certificate;
146 new Certificate[] {new StubX509Certificate("cn=www.example.com")};
255 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
272 + "-----END CERTIFICATE-----");
280 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
296 + "-----END CERTIFICATE-----");
305 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
323 + "-----END CERTIFICATE-----");
334 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n"
351 + "-----END CERTIFICATE-----")
    [all...]
  /external/curl/lib/vtls/
darwinssl.c 811 /* Apple provides a myriad of ways of getting information about a certificate
813 a unified function for getting a string describing the certificate that
831 /* Snow Leopard: Get the certificate summary. */
872 /* If we found a certificate, does it have a private key? */
896 to find the certificate. */
905 values[0] = kSecClassIdentity; /* we want a certificate and a key */
915 /* match the name of the certificate (doesn't work in macOS 10.12.1) */
    [all...]
  /external/webrtc/webrtc/base/
sslidentity_unittest.cc 20 const char kTestCertificate[] = "-----BEGIN CERTIFICATE-----\n"
32 "-----END CERTIFICATE-----\n";
90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm(
94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm(
98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm(
102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm(
106 // The test certificate has an MD5-based signature.
122 rv = identity->certificate().ComputeDigest(algorithm, digest,
129 rv = identity->certificate().ComputeDigest(algorithm, digest1,
242 "-----BEGIN CERTIFICATE-----\n
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptPkcs7VerifyNull.c 30 @param[out] TrustedCert Pointer to a trusted certificate from Signer's certificates.
32 @param[out] CertLength Length of the trusted certificate in bytes.
71 Cryptographic Message Syntax Standard", and outputs two certificate lists chained and
78 certificate. It's caller's responsiblity to free the buffer.
112 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which
113 is used for certificate chain verification.
114 @param[in] CertLength Length of the trusted certificate in bytes.
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/
CryptPkcs7VerifyNull.c 30 @param[out] TrustedCert Pointer to a trusted certificate from Signer's certificates.
32 @param[out] CertLength Length of the trusted certificate in bytes.
71 Cryptographic Message Syntax Standard", and outputs two certificate lists chained and
78 certificate. It's caller's responsiblity to free the buffer.
112 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which
113 is used for certificate chain verification.
114 @param[in] CertLength Length of the trusted certificate in bytes.
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 25 // Tests reading an X509 certificate from a PEM encoded string.
27 std::string pem = "-----BEGIN CERTIFICATE-----\n"
39 "-----END CERTIFICATE-----\n";
51 // Tests converting an X509 certificate to a PEM encoded string.
99 std::string expected = "-----BEGIN CERTIFICATE-----\n"
109 "-----END CERTIFICATE-----\n";
171 // Tests generating a self-signed certificate.
  /external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/
DelegatingHttpsURLConnection.java 28 import java.security.cert.Certificate;
63 @Override public Certificate[] getLocalCertificates() {
66 List<Certificate> result = handshake.localCertificates();
67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException {
73 List<Certificate> result = handshake.peerCertificates();
74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
  /libcore/ojluni/src/main/java/java/security/
CodeSigner.java 44 * The signer's certificate path.
65 * @param signerCertPath The signer's certificate path.
82 * Returns the signer's certificate path.
84 * @return A certificate path.
101 * The hash code is generated using the signer's certificate path and the
120 * signer certificate paths are equal and if their timestamps are equal,
153 * @return A string comprising the signer's certificate and a timestamp,
  /prebuilts/go/darwin-x86/src/crypto/tls/
generate_cert.go 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to
31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for")
33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for")
34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
113 template := x509.Certificate{
142 log.Fatalf("Failed to create certificate: %s", err)
149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_darwin_arm_gen.go 11 // exists for a certificate, but the x509 API requires returning the entire
50 Type: "CERTIFICATE",
68 func selectCerts() ([]*x509.Certificate, error) {
79 var certs []*x509.Certificate
105 func sysCerts() (certs []*x509.Certificate, err error) {
106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
  /prebuilts/go/linux-x86/src/crypto/tls/
generate_cert.go 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to
31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for")
33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for")
34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
113 template := x509.Certificate{
142 log.Fatalf("Failed to create certificate: %s", err)
149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})

Completed in 440 milliseconds

<<21222324252627282930>>