/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 79 * with a single certificate. 107 public Certificate[] engineGetCertificateChain(String alias) { 117 final Certificate[] caList; 123 caList = new Certificate[caChain.size() + 1]; 131 caList = new Certificate[1]; 140 public Certificate engineGetCertificate(String alias) { 155 // This entry/alias does not contain a certificate. 159 private Certificate getCertificateForTrustedCertificateEntry(byte[] encodedCert) [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HttpsURLConnectionTest.java | 24 import java.security.cert.Certificate; 92 Certificate[] cert = con.getLocalCertificates(); 180 Certificate[] cert = con.getServerCertificates(); 271 public Certificate[] getLocalCertificates() { 276 Certificate cert = cf.generateCertificate(bis); 277 return new Certificate[] { cert }; 286 public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException { 291 Certificate cert = cf.generateCertificate(bis); 292 return new Certificate[] { cert }; 294 throw new SSLPeerUnverifiedException("No server's end-entity certificate"); [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
CertificateValidity.java | 36 * This class defines the interval for which the certificate is valid. 45 * get, set, delete methods of Certificate, x509 type. 60 // Returns the first time the certificate is valid. 65 // Returns the last time the certificate is valid. 110 * @param notBefore the date and time before which the certificate 112 * @param notAfter the date and time after which the certificate is 240 * @exception CertificateExpiredException if the certificate has expired. 241 * @exception CertificateNotYetValidException if the certificate is not 255 * @exception CertificateExpiredException if the certificate has expired 257 * @exception CertificateNotYetValidException if the certificate is no [all...] |
/system/tpm/attestation/common/ |
attestation_ca.proto | 62 // The certificate request to be sent to the attestation server. 74 // The certificate profile defines the type of certificate to issue. 77 // the certificate profile. 80 // the certificate profile. 84 // The response from the attestation server for the certificate request. 91 // The issuer intermediate CA certificate in X.509 format. 96 // Certificate chaining order is from the leaf to the root. That is, 180 // If the key is an EUK, this value is the PCA-issued certificate for the key. 181 optional bytes certificate = 4 [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
ForwardBuilder.java | 56 * matching certificates from CertStores and verify a particular certificate 152 * Compose a certificate matching rule to filter out 163 * Match on certificate validity date 223 * certificates, please don't set the certificate valid 224 * criterion unless the trusted certificate matching is 243 * certificates, please don't set the certificate valid 244 * criterion unless the trusted certificate matching is 280 * basic constraints criterion unless the trusted certificate 304 * The trusted certificate matching is completed. We need to match 305 * on certificate validity date [all...] |
BasicChecker.java | 36 import java.security.cert.Certificate; 54 * on a PKIX certificate, namely the signature, timestamp, and subject/issuer 74 * @param anchor the anchor selected to validate the target certificate 75 * @param testDate the time for which the validity of the certificate 129 * checks on the certificate using its internal state. This method does 132 * @param cert the Certificate 135 * @throws CertPathValidatorException if certificate does not verify 138 public void check(Certificate cert, Collection<String> unresolvedCritExts) 153 * Verifies the signature on the certificate using the previous public key. 156 * @throws CertPathValidatorException if certificate does not verif [all...] |
PolicyChecker.java | 30 import java.security.cert.Certificate; 52 * information on a PKIX certificate, namely certificate policies, policy 168 * Performs the policy processing checks on the certificate using its 171 * @param cert the Certificate to be processed 173 * @throws CertPathValidatorException if the certificate does not verify 176 public void check(Certificate cert, Collection<String> unresCritExts) 193 * @param currCert the certificate to be processed 195 * the certificate does not verify 200 String msg = "certificate policies" [all...] |
/frameworks/base/keystore/java/android/security/ |
KeyPairGeneratorSpec.java | 30 import java.security.cert.Certificate; 48 * {@link Certificate} chain. 50 * The KeyPair generator will create a self-signed certificate with the subject 55 * The self-signed X.509 certificate may be replaced at a later time by a 56 * certificate signed by a real Certificate Authority. 92 * {@link Certificate} chain. 94 * The KeyPair generator will create a self-signed certificate with the 107 * @param serialNumber X509 v3 certificate serial number 108 * @param startDate the start of the self-signed certificate validity perio [all...] |
KeyChain.java | 46 import java.security.cert.Certificate; 61 * their corresponding certificate chains in credential storage. 74 * certificate chains. The chosen alias will be returned by the 93 * Certificate Authority (CA) certificates will be trusted by all 115 * Package name for the Certificate Installer. 156 * Optional extra to specify an X.509 certificate to install on 163 * name for the installed certificate. 165 // Compatible with old android.security.Credentials.CERTIFICATE 179 * private key and associated certificate chain will be installed. 215 * Broadcast Action: Indicates the contents of the trusted certificate store has changed. Sen [all...] |
/libcore/ojluni/src/main/java/javax/net/ssl/ |
SSLSession.java | 47 * generally identified by X.509 certificate chains. 219 * Note: This method can be used only when using certificate-based 220 * cipher suites; using it with non-certificate-based cipher suites, 224 * with the peer's own certificate first followed by any 225 * certificate authorities. 230 public java.security.cert.Certificate [] getPeerCertificates() 234 * Returns the certificate(s) that were sent to the peer during 237 * Note: This method is useful only when using certificate-based 242 * "best" certificate chain available, and transmits that to 244 * which certificate chain was actually used [all...] |
/external/boringssl/src/ssl/test/runner/ |
tls.go | 27 // at least one certificate. 64 // at least one certificate. 75 // at least one certificate. 177 func LoadX509KeyPair(certFile, keyFile string) (cert Certificate, err error) { 191 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Certificate, err error) { 198 if certDERBlock.Type == "CERTIFICATE" { 199 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 203 if len(cert.Certificate) == 0 { 204 err = errors.New("crypto/tls: failed to parse certificate PEM data" [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
SslUtil.java | 46 import java.security.cert.Certificate; 89 * Generates a new, self-signed X509 V1 certificate for a KeyPair. 93 * @return the new certificate 94 * @throws GeneralSecurityException on error generating the certificate 126 * Generates a new, self-signed X509 V3 certificate for a KeyPair. 133 * @return the new certificate 134 * @throws GeneralSecurityException on error generating the certificate 153 // about certificate and extension content. Quoting the `man verify`: 156 // the issuer name of the current certificate are subject to further 158 // certificate (if present) must match the subject key identifier (i [all...] |
/system/sepolicy/tools/ |
insertkeys.py | 42 # Are we starting the certificate? 43 if line == "-----BEGIN CERTIFICATE-----": 45 sys.exit("Encountered another BEGIN CERTIFICATE without END CERTIFICATE on " + 51 elif line == "-----END CERTIFICATE-----": 53 sys.exit("Encountered END CERTIFICATE before BEGIN CERTIFICATE on line: " 56 # If we ended the certificate trip the flag 61 sys.exit("Empty certficate , certificate "+ str(certNo) + " found in file: " 64 # ... and append the certificate to the lis [all...] |
/system/tpm/attestation/server/ |
dbus_service_test.cc | 97 reply.set_certificate_chain("certificate"); 110 EXPECT_EQ("certificate", reply.certificate_chain()); 152 reply.set_certificate("certificate"); 168 EXPECT_EQ("certificate", reply.certificate()); 182 reply.set_ek_certificate("certificate"); 195 EXPECT_EQ("certificate", reply.ek_certificate()); 210 reply.set_certificate("certificate"); 226 EXPECT_EQ("certificate", reply.certificate()); [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
DefaultHostnameVerifierTest.java | 25 import java.security.cert.Certificate; 146 new Certificate[] {new StubX509Certificate("cn=www.example.com")}; 255 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 272 + "-----END CERTIFICATE-----"); 280 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 296 + "-----END CERTIFICATE-----"); 305 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 323 + "-----END CERTIFICATE-----"); 334 X509Certificate cert = parseCertificate("-----BEGIN CERTIFICATE-----\n" 351 + "-----END CERTIFICATE-----") [all...] |
/external/curl/lib/vtls/ |
darwinssl.c | 811 /* Apple provides a myriad of ways of getting information about a certificate 813 a unified function for getting a string describing the certificate that 831 /* Snow Leopard: Get the certificate summary. */ 872 /* If we found a certificate, does it have a private key? */ 896 to find the certificate. */ 905 values[0] = kSecClassIdentity; /* we want a certificate and a key */ 915 /* match the name of the certificate (doesn't work in macOS 10.12.1) */ [all...] |
/external/webrtc/webrtc/base/ |
sslidentity_unittest.cc | 20 const char kTestCertificate[] = "-----BEGIN CERTIFICATE-----\n" 32 "-----END CERTIFICATE-----\n"; 90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( 94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( 98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( 102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( 106 // The test certificate has an MD5-based signature. 122 rv = identity->certificate().ComputeDigest(algorithm, digest, 129 rv = identity->certificate().ComputeDigest(algorithm, digest1, 242 "-----BEGIN CERTIFICATE-----\n [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/ |
CryptPkcs7VerifyNull.c | 30 @param[out] TrustedCert Pointer to a trusted certificate from Signer's certificates.
32 @param[out] CertLength Length of the trusted certificate in bytes.
71 Cryptographic Message Syntax Standard", and outputs two certificate lists chained and
78 certificate. It's caller's responsiblity to free the buffer.
112 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which
113 is used for certificate chain verification.
114 @param[in] CertLength Length of the trusted certificate in bytes.
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/ |
CryptPkcs7VerifyNull.c | 30 @param[out] TrustedCert Pointer to a trusted certificate from Signer's certificates.
32 @param[out] CertLength Length of the trusted certificate in bytes.
71 Cryptographic Message Syntax Standard", and outputs two certificate lists chained and
78 certificate. It's caller's responsiblity to free the buffer.
112 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which
113 is used for certificate chain verification.
114 @param[in] CertLength Length of the trusted certificate in bytes.
|
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 25 // Tests reading an X509 certificate from a PEM encoded string. 27 std::string pem = "-----BEGIN CERTIFICATE-----\n" 39 "-----END CERTIFICATE-----\n"; 51 // Tests converting an X509 certificate to a PEM encoded string. 99 std::string expected = "-----BEGIN CERTIFICATE-----\n" 109 "-----END CERTIFICATE-----\n"; 171 // Tests generating a self-signed certificate.
|
/external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/ |
DelegatingHttpsURLConnection.java | 28 import java.security.cert.Certificate; 63 @Override public Certificate[] getLocalCertificates() { 66 List<Certificate> result = handshake.localCertificates(); 67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null; 70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException { 73 List<Certificate> result = handshake.peerCertificates(); 74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
|
/libcore/ojluni/src/main/java/java/security/ |
CodeSigner.java | 44 * The signer's certificate path. 65 * @param signerCertPath The signer's certificate path. 82 * Returns the signer's certificate path. 84 * @return A certificate path. 101 * The hash code is generated using the signer's certificate path and the 120 * signer certificate paths are equal and if their timestamps are equal, 153 * @return A string comprising the signer's certificate and a timestamp,
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to 31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for") 33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for") 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 113 template := x509.Certificate{ 142 log.Fatalf("Failed to create certificate: %s", err) 149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_darwin_arm_gen.go | 11 // exists for a certificate, but the x509 API requires returning the entire 50 Type: "CERTIFICATE", 68 func selectCerts() ([]*x509.Certificate, error) { 79 var certs []*x509.Certificate 105 func sysCerts() (certs []*x509.Certificate, err error) { 106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain") 117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to 31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for") 33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for") 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 113 template := x509.Certificate{ 142 log.Fatalf("Failed to create certificate: %s", err) 149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|