HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 676 - 700 of 2776) sorted by null

<<21222324252627282930>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 14 import java.security.cert.Certificate;
125 * issuer of the given X509 certificate. Uses the default provider
128 * @param cert the X509 certificate
133 * on the given certificate has thrown an exception.
145 * issuer of the given X509 certificate. Uses the specified
149 * @param cert the X509 certificate
155 * on the given certificate has thrown an exception.
236 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx);
545 throw new AnnotatedException("Certificate policies cannot be decoded.", e);
686 "Problem while picking certificates from certificate store."
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptPkcs7Verify.c 142 Pop single certificate from STACK_OF(X509).
147 @param[out] Cert Pointer to a X509 certificate.
148 @param[out] CertSize Length of output X509 certificate in bytes.
243 @param[out] TrustedCert Pointer to a trusted certificate from Signer's certificates.
245 @param[out] CertLength Length of the trusted certificate in bytes.
432 Cryptographic Message Syntax Standard", and outputs two certificate lists chained and
439 certificate. It's caller's responsiblity to free the buffer.
522 // Obtains Signer's Certificate from PKCS#7 data
524 // should include only one signer's certificate.
547 // Build certificates stack chained from Signer's certificate.
    [all...]
  /external/boringssl/src/ssl/test/runner/
key_agreement.go 40 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
97 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
135 func (ka *rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
139 func (ka *rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
305 signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error)
306 verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, params []byte, sig []byte) error
313 func (ka *nilKeyAgreementAuthentication) signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error) {
319 func (ka *nilKeyAgreementAuthentication) verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, params []byte, sig []byte) error {
331 func (ka *signedKeyAgreement) signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg, params []byte) (*serverKeyExchangeMsg, error) {
379 func (ka *signedKeyAgreement) verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, params []byte, sig []byte) error
    [all...]
  /external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/
JavaApiConverterTest.java 39 import java.security.cert.Certificate;
70 private static final X509Certificate LOCAL_CERT = certificate(""
71 + "-----BEGIN CERTIFICATE-----\n"
80 + "-----END CERTIFICATE-----");
83 private static final X509Certificate SERVER_CERT = certificate(""
84 + "-----BEGIN CERTIFICATE-----\n"
94 + "-----END CERTIFICATE-----");
161 final List<Certificate> localCertificates = Arrays.<Certificate>asList(LOCAL_CERT);
163 final List<Certificate> serverCertificates = Arrays.<Certificate>asList(SERVER_CERT)
622 private static X509Certificate certificate(String certificate) { method in class:JavaApiConverterTest
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
KeyGenParameterSpec.java 30 import java.security.cert.Certificate;
61 * {@link Certificate#getPublicKey()}.
69 * <p>For asymmetric key pairs, a self-signed X.509 certificate will be also generated and stored in
71 * support storing key pairs without a certificate. The subject, serial number, and validity dates
72 * of the certificate can be customized in this spec. The self-signed certificate may be replaced at
73 * a later time by a certificate signed by a Certificate Authority (CA).
75 * <p>NOTE: If a private key is not authorized to sign the self-signed certificate, then the
76 * certificate will be created with an invalid signature which will not verify. Such a certificat
    [all...]
  /external/openssh/
auth-options.c 479 error("Unable to parse certificate options: %s",
483 debug3("found certificate option \"%.100s\" len %zu",
515 error("Certificate has multiple "
531 error("Certificate has multiple "
547 "with valid certificate but not "
553 "certificate for login.",
558 error("Certificate source-address "
568 error("Certificate critical option \"%s\" "
572 logit("Certificate extension \"%s\" "
576 error("Certificate option \"%s\" corrupt
    [all...]
ssh-keygen.0 167 -h When signing a key, create a host certificate instead of a user
168 certificate. Please see the CERTIFICATES section for details.
196 every key or certificate presented on the command line.
225 included in a certificate when signing a key. Multiple
230 Specify a certificate option when signing a key. This option may
241 command specified by the user when the certificate is
275 Restrict the source addresses from which the certificate
335 Specify a validity interval when signing a certificate. A
337 the certificate is valid beginning now and expiring at that time,
366 Specifies a serial number to be embedded in the certificate t
    [all...]
ssh-keygen.1 334 When signing a key, create a host certificate instead of a user
335 certificate.
378 flag that revokes every key or certificate presented on the command line.
418 a certificate when signing a key.
424 Specify a certificate option when signing a key.
439 the certificate is used for authentication.
472 Restrict the source addresses from which the certificate is considered valid.
551 Specify a validity interval when signing a certificate.
553 certificate is valid beginning now and expiring at that time, or may consist
588 Specifies a serial number to be embedded in the certificate to distinguis
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
X509Certificate2Test.java 42 * Test for X.509 Certificate provider
96 // Base64 encoded form of ASN.1 DER encoded X.509 Certificate
114 "-----BEGIN CERTIFICATE-----\n"
131 + "-----END CERTIFICATE-----";
133 private static String CERT_TAMPERED = "-----BEGIN CERTIFICATE-----\n"
150 + "-----END CERTIFICATE-----";
327 = ("-----BEGIN CERTIFICATE-----\n"
366 + "-----END CERTIFICATE-----\n");
369 = ("-----BEGIN CERTIFICATE-----\n"
407 + "-----END CERTIFICATE-----\n")
    [all...]
CertStore2Test.java 17 import java.security.cert.Certificate;
216 Collection<? extends Certificate> certificates = certStore.getCertificates(null);
223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector());
317 public boolean match(Certificate cert) {
328 public boolean match(Certificate crl) {
366 public Collection<? extends Certificate> engineGetCertificates(
372 return new ArrayList<Certificate>();
X509CRLTest.java 38 import java.security.cert.Certificate;
57 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRLTest
71 + "-----END CERTIFICATE-----\n";
73 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
84 public boolean isRevoked(Certificate cert) {
267 * getRevokedCertificate(X509Certificate certificate) method testing.
  /libcore/ojluni/src/main/java/sun/security/x509/
X509CRLEntryImpl.java 41 * <p>Abstract class for a revoked certificate in a CRL.
83 * Constructs a revoked certificate entry using the given
86 * @param num the serial number of the revoked certificate.
95 * Constructs a revoked certificate entry using the given
99 * @param num the serial number of the revoked certificate.
111 * Unmarshals a revoked certificate from its encoded form.
126 * Unmarshals a revoked certificate from its encoded form.
128 * @param derVal the DER value containing the revoked certificate.
141 * Returns true if this revoked certificate entry has
152 * Encodes the revoked certificate to an output stream
    [all...]
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainService.java 155 * @param privateKey The private key associated with the client certificate
156 * @param userCertificate The client certificate to be installed
157 * @param userCertificateChain The rest of the chain for the client certificate
179 Log.e(TAG, "Failed to import user certificate " + userCertificate);
181 Log.e(TAG, "Failed to delete private key after certificate importing failed");
188 Log.e(TAG, "Failed to import certificate chain" + userCertificateChain);
190 Log.e(TAG, "Failed to clean up key chain after certificate chain"
255 Log.w(TAG, "Problem removing CA certificate " + alias, e);
258 Log.w(TAG, "Problem removing CA certificate " + alias, e);
320 X509Certificate certificate = (X509Certificate) mTrustedCertificateStor
    [all...]
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLX509CRL.java 31 import java.security.cert.Certificate;
290 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) {
291 if (certificate instanceof OpenSSLX509Certificate) {
292 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate;
303 return getRevokedCertificate(certificate.getSerialNumber());
352 public boolean isRevoked(Certificate cert) {
365 throw new RuntimeException("cannot convert certificate", e);
OpenSSLX509CertificateFactory.java 25 import java.security.cert.Certificate;
182 * there is an error during certificate generation.
276 public Certificate engineGenerateCertificate(InputStream inStream) throws CertificateException {
285 public Collection<? extends Certificate> engineGenerateCertificates(
333 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates)
337 final Certificate c = certificates.get(i);
340 throw new CertificateException("Certificate not X.509 type at index " + i);
  /external/curl/lib/vtls/
gtls.c 505 /* use system ca certificate store as fallback */
557 /* Sets the priority on the certificate types supported by gnutls. Priority
723 failf(data, "error reading X.509 key or certificate file");
896 /* This function will return the peer's raw certificate (chain) as sent by
898 X.509). In case of a X.509 then a certificate list may be present. The
899 first certificate in the list is the peer's certificate, following the
900 issuer's certificate, then the issuer's issuer etc. */
944 /* This function will try to verify the peer's certificate and return its
948 regarding the certificate key size and chain size are set. To overrid
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
PKIXParameters.java 56 * {@code KeyStore} instance containing trusted certificate entries, each
130 * certificate entries contained in the specified {@code KeyStore}.
132 * are considered; all other certificate types are ignored.
138 * not contain at least one trusted certificate entry
152 Certificate cert = keystore.getCertificate(alias);
216 * policies would be acceptable to the certificate user for the purposes of
234 * policies would be acceptable to the certificate user for the purposes of
360 * acceptable policy needs to be explicitly identified in every certificate.
372 * acceptable policy needs to be explicitly identified in every certificate.
407 * if it is included in a certificate. By default, the any policy OI
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
AndroidKeyStoreTest.java 49 import java.security.cert.Certificate;
    [all...]
  /external/curl/lib/
mk-ca-bundle.vbs 39 Const myCaBakF = TRUE ' Flag: backup existing ca-bundle certificate
44 ' Also: we want our certificate output by default to be as similar as possible
47 Const myAskTiF = FALSE ' Flag: ask to include certificate text info
70 "certificate data." & _
93 MsgBox("OpenSSL was not found so the certificate bundle will not " & _
94 "include the SHA256 hash of the raw certificate data file " & _
97 "This does not have any effect on the certificate output, " & _
108 "each certificate?" & vbLf & _
135 ' Backup exitsing ca-bundle certificate file
164 "## Certificate data from Mozilla as of: " & _
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl_ocsp.c 160 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
515 "OpenSSL: Searching OCSP response for peer certificate serialNumber: %s", txt);
581 "OpenSSL: Could not add certificate to the untrusted stack");
590 "OpenSSL: Could not add issuer to certificate store");
623 "OpenSSL: Could not find OCSP signer certificate");
643 "OpenSSL: Found OCSP signer certificate %s and verified BasicOCSPResponse signature",
654 "OpenSSL: Could not validate OCSP signer certificate");
668 "OpenSSL: OCSP signer certificate delegation OK");
674 "OpenSSL: OCSP signer certificate not trusted");
795 "OpenSSL: This response matches peer certificate");
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/
PasspointConfiguration.java 47 * Number of bytes for certificate SHA-256 fingerprint byte array.
134 * List of HTTPS URL for retrieving trust root certificate and the corresponding SHA-256
135 * fingerprint of the certificate. The certificates are used for verifying AAA server's
507 Log.d(TAG, "Incorrect size of trust root certificate SHA-256 fingerprint: "
544 * Helper function for reading trust root certificate info list from a Parcel.
547 * @return The list of trust root certificate URL with the corresponding certificate
566 * Helper function for writing trust root certificate information list.
569 * @param trustRootCerts The list of trust root certificate URL with the corresponding
570 * certificate fingerprin
    [all...]
  /system/tpm/attestation/client/
dbus_proxy_test.cc 67 reply_proto.set_certificate_chain("certificate");
80 EXPECT_EQ("certificate", reply.certificate_chain());
114 reply_proto.set_certificate("certificate");
131 EXPECT_EQ("certificate", reply.certificate());
155 reply_proto.set_ek_certificate("certificate");
168 EXPECT_EQ("certificate", reply.ek_certificate());
192 reply_proto.set_certificate("certificate");
208 EXPECT_EQ("certificate", reply.certificate());
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
AttributeCertificateHolder.java 8 import java.security.cert.Certificate;
40 * -- the holder's Public Key Certificate
110 * <li>1 - publicKeyCert - A hash of the public key certificate of the
116 * This cannot be used if a v1 attribute certificate is used.
139 * <li>1 - publicKeyCert - A hash of the public key certificate of the
274 * Return any principal objects inside the attribute certificate holder
309 * @return the certificate serial number, null if no BaseCertificateID is
328 public boolean match(Certificate cert)
418 return match((Certificate)obj);
  /frameworks/base/core/java/android/content/pm/
Signature.java 28 import java.security.cert.Certificate;
36 * Opaque, immutable representation of a signing certificate associated with an
46 private Certificate[] mCertificateChain;
57 * Create signature from a certificate chain. Used for backward
63 public Signature(Certificate[] certificateChain) throws CertificateEncodingException {
170 * certificate; shouldn't happen.
176 final Certificate cert = certFactory.generateCertificate(bais);
181 * Used for compatibility code that needs to check the certificate chain
196 for (Certificate c : mCertificateChain) {
  /frameworks/base/core/java/android/util/jar/
StrictJarFile.java 29 import java.security.cert.Certificate;
157 * Return all certificate chains for a given {@link ZipEntry} belonging to this jar.
164 public Certificate[][] getCertificateChains(ZipEntry ze) {
183 public Certificate[] getCertificates(ZipEntry ze) {
185 Certificate[][] certChains = verifier.getCertificateChains(ze.getName());
189 for (Certificate[] chain : certChains) {
194 Certificate[] certs = new Certificate[count];
196 for (Certificate[] chain : certChains) {

Completed in 2797 milliseconds

<<21222324252627282930>>