HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 701 - 725 of 2776) sorted by null

<<21222324252627282930>>

  /frameworks/base/core/java/org/apache/http/conn/ssl/
AbstractVerifier.java 37 import java.security.cert.Certificate;
75 * that CA's would never foolishly allow such a certificate to happen?
99 Certificate[] certs = session.getPeerCertificates();
106 Certificate[] certs = session.getPeerCertificates();
145 String msg = "Certificate for <" + host + "> doesn't contain CN or DNS subjectAlt";
153 // establish the socket to the hostname in the certificate.
191 throw new SSLException("hostname in certificate didn't match: <" + host + "> !=" + buf);
237 * @return Array of SubjectALT DNS names stored in the certificate.
247 .log(Level.FINE, "Error parsing certificate.", cpe);
  /libcore/ojluni/src/main/java/sun/security/x509/
ExtendedKeyUsageExtension.java 58 * This extension may, at the option of the certificate issuer, be
61 * If the extension is flagged critical, then the certificate MUST be
66 * the correct key/certificate of an entity that has multiple
69 * the purpose indicated. Certificate using applications may
71 * order for the certificate to be acceptable to that application.<p>
73 * If a certificate contains both a critical key usage field and a
75 * processed independently and the certificate MUST only be used for a
77 * consistent with both fields, then the certificate MUST NOT be used
87 * get, set, delete methods of Certificate, x509 type.
PrivateKeyUsageExtension.java 43 * <p>The Private Key Usage Period extension allows the certificate issuer
45 * certificate. This extension is intended for use with digital
48 * certificate should not be used to sign objects before or after the
66 * get, set, delete methods of Certificate, x509 type.
132 * @exception CertificateException on certificate parsing errors.
189 * @exception CertificateExpiredException if the certificate has expired.
190 * @exception CertificateNotYetValidException if the certificate is not
202 * @exception CertificateExpiredException if the certificate has expired
204 * @exception CertificateNotYetValidException if the certificate is not
CertificateVersion.java 36 * This class defines the version of the X509 Certificate.
57 * get, set, delete methods of Certificate, x509 type.
96 * @param version the version for the certificate.
105 throw new IOException("X.509 Certificate version " +
149 * Return the version number of the certificate.
OCSPNoCheckExtension.java 38 * lifetime of the responder's certificate. The CA does so by including
41 * such a certificate should realized that a compromise of the
43 * sign CRLs, at least for the validity period of this certificate. CA's
44 * may choose to issue this type of certificate with a very short
59 * get, set, delete methods of Certificate, x509 type.
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestSSLContext.java 33 import java.security.cert.Certificate;
241 * SSLContext with certificate and key as well as SSLServerSocket
314 * certificate chain from the given KeyStore and a TrustManager
347 public static void assertCertificateInKeyStore(Certificate certificate,
354 Certificate keyStoreCertificate = keyStore.getCertificate(alias);
355 if (certificate.equals(keyStoreCertificate)) {
364 Certificate[] serverChain)
371 Certificate[] clientChain)
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/
BuildPreferencePage.java 41 import java.security.cert.Certificate;
301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local
303 if (key == null || certificate == null) {
310 FingerprintUtils.getFingerprint(certificate, "MD5"));
315 FingerprintUtils.getFingerprint(certificate, "SHA1"));
319 if (certificate.getNotAfter().compareTo(today) < 0) {
320 showErrorMessage("Certificate is expired!");
324 if (certificate.getNotBefore().compareTo(today) > 0) {
325 showErrorMessage("Certificate validity is in the future!");
  /tools/apksig/src/apksigner/java/com/android/apksigner/
help_sign.txt 5 pair and a corresponding certificate. Typically, an APK is signed by just one
7 certificate.
55 PER-SIGNER SIGNING KEY & CERTIFICATE OPTIONS
56 There are two ways to provide the signer's private key and certificate: (1) Java
57 KeyStore (see --ks), or (2) private key file in PKCS #8 format and certificate
60 --ks Load private key and certificate chain from the Java
65 --ks-key-alias Alias under which the private key and certificate are
148 --cert Load certificate chain from the specified file. The file
180 3. Sign an APK using a private key and certificate stored as individual files:
  /device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/
cert.c 110 /* Create the certificate structure */
116 /* If we do not have a key, use the issuer key (the certificate will
122 /* If we do not have an issuer certificate, use our own (the certificate
172 /* Sign the certificate with the issuer key */
  /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Efi/Protocol/Bis/
Bis.h 66 // authorization certificate.
84 // platform Boot Object Authorization Certificate to create the certificateID.
156 OUT EFI_BIS_DATA **Certificate // Pointer to certificate.
197 IN EFI_BIS_DATA * AuthorityCertificate, // Certificate for credentials.
  /device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/
IpSecCryptIo.c 800 Authenticate data with the certificate.
865 Verify the singed data with the public key which is contained in a certificate.
867 @param[in] InCert Pointer to the Certificate which contains the
869 @param[in] CertLen The size of Certificate in bytes.
870 @param[in] InCa Pointer to the CA certificate
871 @param[in] CaLen The size of CA certificate in bytes.
905 // Verify the validity of X509 Certificate
912 // Retrieve the RSA public Key from Certificate
929 Retrieves the RSA Public Key from one X509 certificate (DER format only).
931 @param[in] InCert Pointer to the certificate.
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
SecureBootConfigStrings.uni 41 #string STR_DBX_CERTIFICATE_FORMAT_HELP #language en-US "Select the certificate format used to enroll certificate into database."
48 #string STR_CERTIFICATE_REVOCATION_TIME_HELP #language en-US "Input the revocation time of the certificate"
50 #string STR_CERTIFICATE_REVOCATION_DATE_HELP #language en-US "Input the revocation date of the certificate"
53 #string STR_ALWAYS_CERTIFICATE_REVOCATION_HELP #language en-US "Indicate whether the certificate is always revoked."
  /docs/source.android.com/en/security/enhancements/
enhancements42.html 46 <li><strong>Certificate Pinning</strong> - The Android core libraries now support
47 <a href="https://developer.android.com/reference/android/net/http/X509TrustManagerExtensions.html">certificate pinning</a>.
48 Pinned domains will receive a certificate validation
49 failure if the certificate does not chain to a set of expected certificates.
50 This protects against possible compromise of Certificate Authorities.</li>
  /external/apache-http/android/src/android/net/http/
EventHandler.java 24 * there is an SSL certificate error. error() can occur anywhere
107 * SSL certificate callback called before resource request is
110 public void certificate(SslCertificate certificate); method in interface:EventHandler
120 * SSL certificate error callback. Handles SSL error(s) on the way
  /external/autotest/client/site_tests/security_OpenSSLRegressions/src/
cert.pem 0 Certificate:
11 Subject: C=US, ST=California, L=Mountain View, O=Google, OU=Chrome OS, CN=OpenSSL Test Certificate/emailAddress=security@chromium.org
30 OpenSSL Generated Certificate
45 -----BEGIN CERTIFICATE-----
63 -----END CERTIFICATE-----
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
JcaContentVerifierProviderBuilder.java 56 public ContentVerifierProvider build(final X509Certificate certificate)
63 certHolder = new JcaX509CertificateHolder(certificate);
67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
91 sig.initVerify(certificate.getPublicKey());
100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
  /external/curl/docs/examples/
smtp-tls.c 114 /* If your server doesn't have a valid certificate, then you can disable
121 * the issuer certificate (or the host certificate if the certificate is
125 curl_easy_setopt(curl, CURLOPT_CAINFO, "/path/to/certificate.pem");
  /external/libmicrohttpd/src/examples/
https_fileserver_example.c 27 * The certificate & key are required by the server to operate, Omitting the
28 * path arguments will cause the server to use the hard coded example certificate & key.
50 /* Test Certificate */
52 "-----BEGIN CERTIFICATE-----\n"
67 "RhZvQx74NQnS6g==\n" "-----END CERTIFICATE-----\n";
  /frameworks/base/core/java/android/net/http/
X509TrustManagerExtensions.java 37 * verification of certificate chains after they have been successfully verified
88 * Verifies the given certificate chain.
120 * Checks whether a CA certificate is added by an user.
126 * @return {@code true} to indicate that the certificate authority exists in the user added
127 * certificate store, {@code false} otherwise.
  /frameworks/opt/telephony/src/java/com/google/android/mms/pdu/
PduContentTypes.java 50 "application/vnd.wap.wtls-ca-certificate", /* 0x18 */
51 "application/vnd.wap.wtls-user-certificate", /* 0x19 */
82 "application/vnd.wap.hashed-certificate", /* 0x38 */
83 "application/vnd.wap.signed-certificate", /* 0x39 */
89 "application/vnd.wap.rollover-certificate", /* 0x3F */
  /packages/apps/Messaging/src/android/support/v7/mms/pdu/
PduContentTypes.java 50 "application/vnd.wap.wtls-ca-certificate", /* 0x18 */
51 "application/vnd.wap.wtls-user-certificate", /* 0x19 */
82 "application/vnd.wap.hashed-certificate", /* 0x38 */
83 "application/vnd.wap.signed-certificate", /* 0x39 */
89 "application/vnd.wap.rollover-certificate", /* 0x3F */
  /packages/apps/Messaging/src/com/android/messaging/mmslib/pdu/
PduContentTypes.java 50 "application/vnd.wap.wtls-ca-certificate", /* 0x18 */
51 "application/vnd.wap.wtls-user-certificate", /* 0x19 */
82 "application/vnd.wap.hashed-certificate", /* 0x38 */
83 "application/vnd.wap.signed-certificate", /* 0x39 */
89 "application/vnd.wap.rollover-certificate", /* 0x3F */
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
387 certMsg.certificates = hs.cert.Certificate
417 // Request a client certificate
429 // the client that it may send any certificate in response
432 // an appropriate certificate to give to us.
460 // If we requested a client certificate, then the client must send a
461 // certificate message, even if it's empty.
470 // The client didn't actually send a certificate
474 return errors.New("tls: client didn't provide a certificate")
508 // If we received a client cert in response to our certificate request message
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
387 certMsg.certificates = hs.cert.Certificate
417 // Request a client certificate
429 // the client that it may send any certificate in response
432 // an appropriate certificate to give to us.
460 // If we requested a client certificate, then the client must send a
461 // certificate message, even if it's empty.
470 // The client didn't actually send a certificate
474 return errors.New("tls: client didn't provide a certificate")
508 // If we received a client cert in response to our certificate request message
    [all...]
  /external/boringssl/src/ssl/test/runner/
common.go 165 // Certificate types (for certificateRequestMsg)
167 CertTypeRSASign = 1 // A certificate containing an RSA key
168 CertTypeDSSSign = 2 // A certificate containing a DSA key
169 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key
170 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key
173 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
174 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
175 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
249 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]

Completed in 1235 milliseconds

<<21222324252627282930>>