/libcore/luni/src/test/java/tests/security/cert/ |
CRLTest.java | 28 import java.security.cert.Certificate; 88 // that are abstract in <code>Certificate</code> 115 public boolean isRevoked(Certificate cert) {
|
/libcore/ojluni/src/main/java/javax/security/cert/ |
CertificateEncodingException.java | 30 * Certificate Encoding Exception. This is thrown whenever an error 31 * occurs whilst attempting to encode a certificate. 36 * use the standard Java SE certificate classes located in
|
CertificateExpiredException.java | 30 * Certificate Expired Exception. This is thrown whenever the current 33 * of the certificate. 38 * use the standard Java SE certificate classes located in
|
CertificateNotYetValidException.java | 30 * Certificate is not yet valid exception. This is thrown whenever 32 * is before the {@code notBefore} date/time in the Certificate 38 * use the standard Java SE certificate classes located in
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
State.java | 36 * certificate is added to the current path. 46 * Update the state with the next certificate added to the path. 48 * @param cert the certificate which is used to update the state
|
/prebuilts/go/darwin-x86/misc/ios/ |
README | 15 certificate and have setup your iDevice properly to run apps signed by your 16 developer certificate. Then install https://github.com/phonegap/ios-deploy. 24 # sign the executable using your developer certificate
|
/prebuilts/go/linux-x86/misc/ios/ |
README | 15 certificate and have setup your iDevice properly to run apps signed by your 16 developer certificate. Then install https://github.com/phonegap/ios-deploy. 24 # sign the executable using your developer certificate
|
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-acm/1.11.18/ |
aws-java-sdk-acm-1.11.18.pom | 12 <name>AWS Java SDK for AWS Certificate Manager</name> 13 <description>The AWS Java SDK for AWS Certificate Manager module holds the client classes that are used for communicating with AWS Certificate Manager service.</description>
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 63 "<p>Make sure the certificate is valid for the planned lifetime of the product.</p>" 64 + "<p>If the certificate expires, you will be forced to sign your application with " 66 + "<p>Applications cannot be upgraded if their certificate changes from " 87 setTitle("Destination and key/certificate checks"); 181 String.format("<p>Certificate expires in %d years.</p>", 231 "<p>Certificate expired on %s</p>", 237 setErrorMessage("Certificate is expired."); 244 "<p>Certificate expires on %s.</p>", 254 sb.append("<p>The certificate expires this year.</p>"); 258 "<p>The Certificate expires in %1$s %2$s.</p>" [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Bis.h | 3 against a digital certificate for the purpose of an integrity and authorization check.
98 /// platform Boot Object Authorization Certificate to create the certificateID.
220 Retrieves the certificate that has been configured as the identity of the organization designated as
225 @param Certificate The function writes an allocated EFI_BIS_DATA* containing the Boot
226 Object Authorization Certificate object. The caller must
232 @retval EFI_NOT_FOUND There is no Boot Object Authorization Certificate currently installed.
234 @retval EFI_INVALID_PARAMETER The Certificate parameter supplied by the caller is NULL or
242 OUT EFI_BIS_DATA **Certificate
347 certificate's key algorithm, or while attempting to retrieve
348 the public key algorithm of the manifest's signer's certificate,
[all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
RFC3280CertPathUtilities.java | 84 * extension, verify that the certificate does not include the basic 89 * extension, verify that the certificate includes the basic constraints 97 * @param cert The certificate. 180 throw new AnnotatedException("Could not read certificate issuer.", e); 209 "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point."); 234 "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point."); 277 * certificate issuer. 280 * @param cert The certificate ot attribute certificate. 352 throw new AnnotatedException("Cannot find matching CRL issuer for certificate.") [all...] |
/external/boringssl/src/crypto/x509/ |
x509_test.cc | 34 "-----BEGIN CERTIFICATE-----\n" 49 "-----END CERTIFICATE-----\n"; 52 "-----BEGIN CERTIFICATE-----\n" 66 "-----END CERTIFICATE-----\n"; 69 "-----BEGIN CERTIFICATE-----\n" 83 "-----END CERTIFICATE-----\n"; 86 "-----BEGIN CERTIFICATE-----\n" 100 "-----END CERTIFICATE-----\n"; 103 "-----BEGIN CERTIFICATE-----\n" 117 "-----END CERTIFICATE-----\n" [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client.go | 118 // certificate, which would be skipped if session resumption occurred. 276 certs := make([]*x509.Certificate, len(certMsg.certificates)) 281 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 325 // server's identity (i.e. leaf certificate) is unchanged and 375 var chainToSend *Certificate 400 // If the server requested a certificate then we have to send a 401 // Certificate message, even if it's empty because we don't have a 402 // certificate to send. 405 certMsg.certificates = chainToSend.Certificate [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client.go | 118 // certificate, which would be skipped if session resumption occurred. 276 certs := make([]*x509.Certificate, len(certMsg.certificates)) 281 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 325 // server's identity (i.e. leaf certificate) is unchanged and 375 var chainToSend *Certificate 400 // If the server requested a certificate then we have to send a 401 // Certificate message, even if it's empty because we don't have a 402 // certificate to send. 405 certMsg.certificates = chainToSend.Certificate [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 25 import java.security.cert.Certificate; 135 static final int CERTIFICATE = 1; 282 * tricky if a certificate appears in more than one chain... the store method 291 Certificate c = (Certificate)certs.remove(alias); 303 c = (Certificate)keyCerts.remove(id); 315 public Certificate engineGetCertificate( 323 Certificate c = (Certificate)certs.get(alias); 333 c = (Certificate)keyCerts.get(id) [all...] |
/prebuilts/tools/common/mkidentity/ |
mkidentity-prebuilt.jar | |
/system/ca-certificates/google/ |
roots.pem | 2 # Issuer: CN=AAA Certificate Services O=Comodo CA Limited 3 # Subject: CN=AAA Certificate Services O=Comodo CA Limited 9 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE----- 43 -----BEGIN CERTIFICATE----- 66 -----END CERTIFICATE----- 76 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 110 -----BEGIN CERTIFICATE----- 133 -----END CERTIFICATE---- [all...] |
/build/make/core/ |
dpi_specific_apk.mk | 30 $(built_dpi_apk): PRIVATE_CERTIFICATE := $(certificate) 51 $(built_dpi_apk) : $(private_key) $(certificate) $(SIGNAPK_JAR) 79 PACKAGES.$(dpi_apk_name).CERTIFICATE := $(certificate)
|
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstall/ |
AndroidManifest.xml | 21 different certificate.
|
/cts/hostsidetests/appsecurity/test-apps/TargetInstrumentationApp/ |
AndroidManifest.xml | 21 certificate.
|
/cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/ |
AdminActionBookkeepingTest.java | 28 import java.security.cert.Certificate; 39 "-----BEGIN CERTIFICATE-----\n" + 59 "-----END CERTIFICATE-----"; 94 final Certificate cert = CertificateFactory.getInstance("X.509")
|
/device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/ |
tbb_ext.c | 72 .ln = "SoC Firmware content certificate public key", 84 .ln = "SCP Firmware content certificate public key", 96 .ln = "Trusted OS Firmware content certificate public key", 108 .ln = "Non-Trusted Firmware content certificate public key",
|
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/ |
SecureBootConfigNvData.h | 139 BOOLEAN AlwaysRevocation; // If the certificate is always revoked. Revocation time is hidden
140 UINT8 CertificateFormat; // The type of the certificate
141 EFI_HII_DATE RevocationDate; // The revocation date of the certificate
142 EFI_HII_TIME RevocationTime; // The revocation time of the certificate
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
X509.java | 27 // certificate factories.
|
/external/curl/docs/cmdline-opts/ |
capath.d | 6 Tells curl to use the specified certificate directory to verify the
|