HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 176 - 200 of 402) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/sl4a/Common/src/com/googlecode/android_scripting/facade/
CertInstallerHelper.java 45 import java.security.cert.Certificate;
55 * Certificate installer helper to extract information from a provided file
64 private X509Certificate mUserCert; // user certificate
109 Log.e(TAG, "failed to extract certificate" + e);
111 Log.e(TAG, "failed to extract certificate" + e);
113 Log.e(TAG, "failed to extract certificate" + e);
115 Log.e(TAG, "failed to extract certificate" + e);
135 Certificate[] certs = entry.getCertificateChain();
138 for (Certificate c : certs) {
166 * Extract certificate from the given file, and install it to keystor
    [all...]
  /frameworks/base/core/java/org/apache/http/conn/ssl/
AbstractVerifier.java 37 import java.security.cert.Certificate;
75 * that CA's would never foolishly allow such a certificate to happen?
99 Certificate[] certs = session.getPeerCertificates();
106 Certificate[] certs = session.getPeerCertificates();
145 String msg = "Certificate for <" + host + "> doesn't contain CN or DNS subjectAlt";
153 // establish the socket to the hostname in the certificate.
191 throw new SSLException("hostname in certificate didn't match: <" + host + "> !=" + buf);
237 * @return Array of SubjectALT DNS names stored in the certificate.
247 .log(Level.FINE, "Error parsing certificate.", cpe);
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
WiFiKeyManager.java 12 import java.security.cert.Certificate;
45 Certificate cert = mKeyStore.getCertificate(alias);
151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) {
152 if (certificate instanceof X509Certificate) {
153 certs.add((X509Certificate) certificate);
OSUSocketFactory.java 24 import java.security.cert.Certificate;
173 for (X509Certificate certificate : mTrustManager.getTrustChain()) {
174 for (List<?> name : certificate.getSubjectAlternativeNames()) {
178 return certificate;
293 Certificate cert = keyStore.getCertificate(alias);
304 Certificate cert = keyStore.getCertificate(
333 public void check(Certificate cert, Collection<String> unresolvedCritExts)
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory4Test.java 35 import java.security.cert.Certificate;
59 // Test for method java.security.cert.Certificate
95 Collection<? extends Certificate> certs = fact.generateCertificates(is);
100 // the certificate could not be found, skip it
121 // the certificate could not be found, skip it
143 // the certificate could not be found, skip it
251 * extends Certificate> certificates)
257 (List<Certificate>) null);
290 "-----BEGIN CERTIFICATE-----\n"
304 + "-----END CERTIFICATE-----\n"
    [all...]
  /libcore/ojluni/src/main/java/sun/net/www/protocol/jar/
URLJarFile.java 38 import java.security.cert.Certificate;
274 public java.security.cert.Certificate[] getCertificates() {
275 Certificate[] certs = je.getCertificates();
  /libcore/support/src/test/java/libcore/java/security/
TestKeyStore.java 67 import java.security.cert.Certificate;
208 .subject("CN=Test Root Certificate Authority")
215 .subject("CN=Test Intermediate Certificate Authority ECDSA")
223 .subject("CN=Test Intermediate Certificate Authority")
259 .subject("CN=Test Root Certificate Authority 2")
264 .subject("CN=Test Intermediate Certificate Authority")
297 * Return a server keystore with a matched RSA certificate and
298 * private key as well as a CA certificate.
306 * Return a keystore with a CA certificate
314 * Return a client keystore with a matched RSA certificate an
841 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local
894 Certificate certificate = certificateEntry.getTrustedCertificate(); local
986 Certificate certificate = certificateEntry.getTrustedCertificate(); local
    [all...]
  /packages/apps/Settings/tests/app/src/com/android/settings/vpn2/
CertInstallerHelper.java 46 import java.security.cert.Certificate;
56 * Certificate installer helper to extract information from a provided file
65 private X509Certificate mUserCert; // user certificate
110 Log.e(TAG, "failed to extract certificate" + e);
112 Log.e(TAG, "failed to extract certificate" + e);
114 Log.e(TAG, "failed to extract certificate" + e);
116 Log.e(TAG, "failed to extract certificate" + e);
136 Certificate[] certs = entry.getCertificateChain();
139 for (Certificate c : certs) {
167 * Extract certificate from the given file, and install it to keystor
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
common.go 114 // Certificate types (for certificateRequestMsg)
116 certTypeRSASign = 1 // A certificate containing an RSA key
117 certTypeDSSSign = 2 // A certificate containing a DSA key
118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key
119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key
122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_windows.go 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory
14 // certificate store containing itself and all of the intermediate certificates specified
20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) {
58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain.
59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) {
83 // checkChainTrustStatus checks the trust status of the certificate chain, translating
85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error {
98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for
99 // use as a certificate chain for a SSL/TLS server.
100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error
    [all...]
root_darwin_arm_gen.go 11 // exists for a certificate, but the x509 API requires returning the entire
50 Type: "CERTIFICATE",
68 func selectCerts() ([]*x509.Certificate, error) {
79 var certs []*x509.Certificate
105 func sysCerts() (certs []*x509.Certificate, err error) {
106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
  /prebuilts/go/linux-x86/src/crypto/tls/
common.go 114 // Certificate types (for certificateRequestMsg)
116 certTypeRSASign = 1 // A certificate containing an RSA key
117 certTypeDSSSign = 2 // A certificate containing a DSA key
118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key
119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key
122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
root_windows.go 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory
14 // certificate store containing itself and all of the intermediate certificates specified
20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) {
58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain.
59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) {
83 // checkChainTrustStatus checks the trust status of the certificate chain, translating
85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error {
98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for
99 // use as a certificate chain for a SSL/TLS server.
100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error
    [all...]
root_darwin_arm_gen.go 11 // exists for a certificate, but the x509 API requires returning the entire
50 Type: "CERTIFICATE",
68 func selectCerts() ([]*x509.Certificate, error) {
79 var certs []*x509.Certificate
105 func sysCerts() (certs []*x509.Certificate, err error) {
106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
  /external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/
TestSSLContext.java 33 import java.security.cert.Certificate;
347 * SSLContext with certificate and key as well as SSLServerSocket
362 * certificate chain from the given KeyStore and a TrustManager
391 public static void assertCertificateInKeyStore(Certificate certificate, KeyStore keyStore)
398 Certificate keyStoreCertificate = keyStore.getCertificate(alias);
399 if (certificate.equals(keyStoreCertificate)) {
407 X509TrustManager trustManager, Certificate[] serverChain) throws CertificateException {
412 X509TrustManager trustManager, Certificate[] clientChain) throws CertificateException {
  /external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PairingSession.java 39 import java.security.cert.Certificate;
209 Certificate clientCert = mPairingContext.getClientCertificate();
210 Certificate serverCert = mPairingContext.getServerCertificate();
379 Certificate clientCert = mPairingContext.getClientCertificate();
381 logDebug("Client certificate:");
385 Certificate serverCert = mPairingContext.getServerCertificate();
388 logDebug("Server certificate:");
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestSSLContext.java 33 import java.security.cert.Certificate;
241 * SSLContext with certificate and key as well as SSLServerSocket
314 * certificate chain from the given KeyStore and a TrustManager
347 public static void assertCertificateInKeyStore(Certificate certificate,
354 Certificate keyStoreCertificate = keyStore.getCertificate(alias);
355 if (certificate.equals(keyStoreCertificate)) {
364 Certificate[] serverChain)
371 Certificate[] clientChain)
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
Cache.java 30 import java.security.cert.Certificate;
520 * is the length of the peer certificate chain. These certificates are
522 * contains the length of the local certificate chain. These
555 List<Certificate> peerCertificates = readCertificateList(source);
556 List<Certificate> localCertificates = readCertificateList(source);
618 private List<Certificate> readCertificateList(BufferedSource source) throws IOException {
624 List<Certificate> result = new ArrayList<>(length);
637 private void writeCertList(BufferedSink sink, List<Certificate> certificates)
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/
ConfigParser.java 33 import java.security.cert.Certificate;
125 * [base64 encoded X509 CA certificate data]
130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain]
135 * (required), CA (Certificate Authority) certificate (optional), and client
136 * certificate chain (optional).
185 // Parse CA (Certificate Authority) certificate.
191 throw new IOException("Failed to parse CA Certificate");
195 // Parse PKCS12 data for client private key and certificate chain
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyManagerFactoryTest.java 26 import java.security.cert.Certificate;
237 X509Certificate certificate = certificateChain[0]; local
238 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm());
240 String sigAlgName = certificate.getSigAlgName();
245 Arrays.<Certificate>asList(privateKeyEntry.getCertificateChain()),
246 Arrays.<Certificate>asList(certificateChain));
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Identity2Test.java 23 import java.security.Certificate;
45 public static class CertificateImpl implements java.security.Certificate {
84 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test
98 + "-----END CERTIFICATE-----\n";
100 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes());
102 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
116 + "-----END CERTIFICATE-----\n";
253 java.security.Certificate[] certs = sub.certificates();
254 assertEquals("Certificate not contained in the identity"
    [all...]
  /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Efi/Protocol/Bis/
Bis.h 66 // authorization certificate.
84 // platform Boot Object Authorization Certificate to create the certificateID.
156 OUT EFI_BIS_DATA **Certificate // Pointer to certificate.
197 IN EFI_BIS_DATA * AuthorityCertificate, // Certificate for credentials.
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Bis.h 3 against a digital certificate for the purpose of an integrity and authorization check.
98 /// platform Boot Object Authorization Certificate to create the certificateID.
220 Retrieves the certificate that has been configured as the identity of the organization designated as
225 @param Certificate The function writes an allocated EFI_BIS_DATA* containing the Boot
226 Object Authorization Certificate object. The caller must
232 @retval EFI_NOT_FOUND There is no Boot Object Authorization Certificate currently installed.
234 @retval EFI_INVALID_PARAMETER The Certificate parameter supplied by the caller is NULL or
242 OUT EFI_BIS_DATA **Certificate
347 certificate's key algorithm, or while attempting to retrieve
348 the public key algorithm of the manifest's signer's certificate,
    [all...]
  /frameworks/base/core/java/android/security/net/config/
KeyStoreCertificateSource.java 22 import java.security.cert.Certificate;
31 * {@link CertificateSource} which provides certificates from trusted certificate entries of a
  /libcore/ojluni/src/main/java/java/security/cert/
CertStore.java 41 * A class for retrieving {@code Certificate}s and {@code CRL}s
51 * retrieve {@code Certificate}s and {@code CRL}s by calling its
134 * Returns a {@code Collection} of {@code Certificate}s that
135 * match the specified selector. If no {@code Certificate}s
140 * {@code Certificate}s that match the selector. For instance,
143 * contain the {@code Certificate}s it is looking for.
152 * {@code Certificate}s should be returned. Specify {@code null}
153 * to return all {@code Certificate}s (if supported).
154 * @return A {@code Collection} of {@code Certificate}s that
158 public final Collection<? extends Certificate> getCertificate
    [all...]

Completed in 1620 milliseconds

1 2 3 4 5 6 78 91011>>