/external/sl4a/Common/src/com/googlecode/android_scripting/facade/ |
CertInstallerHelper.java | 45 import java.security.cert.Certificate; 55 * Certificate installer helper to extract information from a provided file 64 private X509Certificate mUserCert; // user certificate 109 Log.e(TAG, "failed to extract certificate" + e); 111 Log.e(TAG, "failed to extract certificate" + e); 113 Log.e(TAG, "failed to extract certificate" + e); 115 Log.e(TAG, "failed to extract certificate" + e); 135 Certificate[] certs = entry.getCertificateChain(); 138 for (Certificate c : certs) { 166 * Extract certificate from the given file, and install it to keystor [all...] |
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
AbstractVerifier.java | 37 import java.security.cert.Certificate; 75 * that CA's would never foolishly allow such a certificate to happen? 99 Certificate[] certs = session.getPeerCertificates(); 106 Certificate[] certs = session.getPeerCertificates(); 145 String msg = "Certificate for <" + host + "> doesn't contain CN or DNS subjectAlt"; 153 // establish the socket to the hostname in the certificate. 191 throw new SSLException("hostname in certificate didn't match: <" + host + "> !=" + buf); 237 * @return Array of SubjectALT DNS names stored in the certificate. 247 .log(Level.FINE, "Error parsing certificate.", cpe);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
WiFiKeyManager.java | 12 import java.security.cert.Certificate; 45 Certificate cert = mKeyStore.getCertificate(alias); 151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) { 152 if (certificate instanceof X509Certificate) { 153 certs.add((X509Certificate) certificate);
|
OSUSocketFactory.java | 24 import java.security.cert.Certificate; 173 for (X509Certificate certificate : mTrustManager.getTrustChain()) { 174 for (List<?> name : certificate.getSubjectAlternativeNames()) { 178 return certificate; 293 Certificate cert = keyStore.getCertificate(alias); 304 Certificate cert = keyStore.getCertificate( 333 public void check(Certificate cert, Collection<String> unresolvedCritExts)
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory4Test.java | 35 import java.security.cert.Certificate; 59 // Test for method java.security.cert.Certificate 95 Collection<? extends Certificate> certs = fact.generateCertificates(is); 100 // the certificate could not be found, skip it 121 // the certificate could not be found, skip it 143 // the certificate could not be found, skip it 251 * extends Certificate> certificates) 257 (List<Certificate>) null); 290 "-----BEGIN CERTIFICATE-----\n" 304 + "-----END CERTIFICATE-----\n" [all...] |
/libcore/ojluni/src/main/java/sun/net/www/protocol/jar/ |
URLJarFile.java | 38 import java.security.cert.Certificate; 274 public java.security.cert.Certificate[] getCertificates() { 275 Certificate[] certs = je.getCertificates();
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 67 import java.security.cert.Certificate; 208 .subject("CN=Test Root Certificate Authority") 215 .subject("CN=Test Intermediate Certificate Authority ECDSA") 223 .subject("CN=Test Intermediate Certificate Authority") 259 .subject("CN=Test Root Certificate Authority 2") 264 .subject("CN=Test Intermediate Certificate Authority") 297 * Return a server keystore with a matched RSA certificate and 298 * private key as well as a CA certificate. 306 * Return a keystore with a CA certificate 314 * Return a client keystore with a matched RSA certificate an 841 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 894 Certificate certificate = certificateEntry.getTrustedCertificate(); local 986 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
CertInstallerHelper.java | 46 import java.security.cert.Certificate; 56 * Certificate installer helper to extract information from a provided file 65 private X509Certificate mUserCert; // user certificate 110 Log.e(TAG, "failed to extract certificate" + e); 112 Log.e(TAG, "failed to extract certificate" + e); 114 Log.e(TAG, "failed to extract certificate" + e); 116 Log.e(TAG, "failed to extract certificate" + e); 136 Certificate[] certs = entry.getCertificateChain(); 139 for (Certificate c : certs) { 167 * Extract certificate from the given file, and install it to keystor [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
common.go | 114 // Certificate types (for certificateRequestMsg) 116 certTypeRSASign = 1 // A certificate containing an RSA key 117 certTypeDSSSign = 2 // A certificate containing a DSA key 118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key 119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key 122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_windows.go | 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory 14 // certificate store containing itself and all of the intermediate certificates specified 20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) { 58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. 59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) { 83 // checkChainTrustStatus checks the trust status of the certificate chain, translating 85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error { 98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for 99 // use as a certificate chain for a SSL/TLS server. 100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error [all...] |
root_darwin_arm_gen.go | 11 // exists for a certificate, but the x509 API requires returning the entire 50 Type: "CERTIFICATE", 68 func selectCerts() ([]*x509.Certificate, error) { 79 var certs []*x509.Certificate 105 func sysCerts() (certs []*x509.Certificate, err error) { 106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain") 117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
common.go | 114 // Certificate types (for certificateRequestMsg) 116 certTypeRSASign = 1 // A certificate containing an RSA key 117 certTypeDSSSign = 2 // A certificate containing a DSA key 118 certTypeRSAFixedDH = 3 // A certificate containing a static DH key 119 certTypeDSSFixedDH = 4 // A certificate containing a static DH key 122 certTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 123 certTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 124 certTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 169 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_windows.go | 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory 14 // certificate store containing itself and all of the intermediate certificates specified 20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) { 58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. 59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) { 83 // checkChainTrustStatus checks the trust status of the certificate chain, translating 85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error { 98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for 99 // use as a certificate chain for a SSL/TLS server. 100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error [all...] |
root_darwin_arm_gen.go | 11 // exists for a certificate, but the x509 API requires returning the entire 50 Type: "CERTIFICATE", 68 func selectCerts() ([]*x509.Certificate, error) { 79 var certs []*x509.Certificate 105 func sysCerts() (certs []*x509.Certificate, err error) { 106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain") 117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
|
/external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 33 import java.security.cert.Certificate; 347 * SSLContext with certificate and key as well as SSLServerSocket 362 * certificate chain from the given KeyStore and a TrustManager 391 public static void assertCertificateInKeyStore(Certificate certificate, KeyStore keyStore) 398 Certificate keyStoreCertificate = keyStore.getCertificate(alias); 399 if (certificate.equals(keyStoreCertificate)) { 407 X509TrustManager trustManager, Certificate[] serverChain) throws CertificateException { 412 X509TrustManager trustManager, Certificate[] clientChain) throws CertificateException {
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PairingSession.java | 39 import java.security.cert.Certificate; 209 Certificate clientCert = mPairingContext.getClientCertificate(); 210 Certificate serverCert = mPairingContext.getServerCertificate(); 379 Certificate clientCert = mPairingContext.getClientCertificate(); 381 logDebug("Client certificate:"); 385 Certificate serverCert = mPairingContext.getServerCertificate(); 388 logDebug("Server certificate:");
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 33 import java.security.cert.Certificate; 241 * SSLContext with certificate and key as well as SSLServerSocket 314 * certificate chain from the given KeyStore and a TrustManager 347 public static void assertCertificateInKeyStore(Certificate certificate, 354 Certificate keyStoreCertificate = keyStore.getCertificate(alias); 355 if (certificate.equals(keyStoreCertificate)) { 364 Certificate[] serverChain) 371 Certificate[] clientChain)
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Cache.java | 30 import java.security.cert.Certificate; 520 * is the length of the peer certificate chain. These certificates are 522 * contains the length of the local certificate chain. These 555 List<Certificate> peerCertificates = readCertificateList(source); 556 List<Certificate> localCertificates = readCertificateList(source); 618 private List<Certificate> readCertificateList(BufferedSource source) throws IOException { 624 List<Certificate> result = new ArrayList<>(length); 637 private void writeCertList(BufferedSink sink, List<Certificate> certificates)
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
ConfigParser.java | 33 import java.security.cert.Certificate; 125 * [base64 encoded X509 CA certificate data] 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 135 * (required), CA (Certificate Authority) certificate (optional), and client 136 * certificate chain (optional). 185 // Parse CA (Certificate Authority) certificate. 191 throw new IOException("Failed to parse CA Certificate"); 195 // Parse PKCS12 data for client private key and certificate chain [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
KeyManagerFactoryTest.java | 26 import java.security.cert.Certificate; 237 X509Certificate certificate = certificateChain[0]; local 238 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm()); 240 String sigAlgName = certificate.getSigAlgName(); 245 Arrays.<Certificate>asList(privateKeyEntry.getCertificateChain()), 246 Arrays.<Certificate>asList(certificateChain));
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 23 import java.security.Certificate; 45 public static class CertificateImpl implements java.security.Certificate { 84 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 98 + "-----END CERTIFICATE-----\n"; 100 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 102 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 116 + "-----END CERTIFICATE-----\n"; 253 java.security.Certificate[] certs = sub.certificates(); 254 assertEquals("Certificate not contained in the identity" [all...] |
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Efi/Protocol/Bis/ |
Bis.h | 66 // authorization certificate.
84 // platform Boot Object Authorization Certificate to create the certificateID.
156 OUT EFI_BIS_DATA **Certificate // Pointer to certificate.
197 IN EFI_BIS_DATA * AuthorityCertificate, // Certificate for credentials.
|
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Bis.h | 3 against a digital certificate for the purpose of an integrity and authorization check.
98 /// platform Boot Object Authorization Certificate to create the certificateID.
220 Retrieves the certificate that has been configured as the identity of the organization designated as
225 @param Certificate The function writes an allocated EFI_BIS_DATA* containing the Boot
226 Object Authorization Certificate object. The caller must
232 @retval EFI_NOT_FOUND There is no Boot Object Authorization Certificate currently installed.
234 @retval EFI_INVALID_PARAMETER The Certificate parameter supplied by the caller is NULL or
242 OUT EFI_BIS_DATA **Certificate
347 certificate's key algorithm, or while attempting to retrieve
348 the public key algorithm of the manifest's signer's certificate,
[all...] |
/frameworks/base/core/java/android/security/net/config/ |
KeyStoreCertificateSource.java | 22 import java.security.cert.Certificate; 31 * {@link CertificateSource} which provides certificates from trusted certificate entries of a
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertStore.java | 41 * A class for retrieving {@code Certificate}s and {@code CRL}s 51 * retrieve {@code Certificate}s and {@code CRL}s by calling its 134 * Returns a {@code Collection} of {@code Certificate}s that 135 * match the specified selector. If no {@code Certificate}s 140 * {@code Certificate}s that match the selector. For instance, 143 * contain the {@code Certificate}s it is looking for. 152 * {@code Certificate}s should be returned. Specify {@code null} 153 * to return all {@code Certificate}s (if supported). 154 * @return A {@code Collection} of {@code Certificate}s that 158 public final Collection<? extends Certificate> getCertificate [all...] |