HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 226 - 250 of 402) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_client_test.go 118 // cert, if not empty, contains a DER-encoded certificate for the
604 config.Certificates = []Certificate{cert}
640 config.Certificates = []Certificate{cert}
1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
    [all...]
generate_cert.go 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to
31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for")
33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for")
34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
113 template := x509.Certificate{
142 log.Fatalf("Failed to create certificate: %s", err)
149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
handshake_client.go 118 // certificate, which would be skipped if session resumption occurred.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
281 return errors.New("tls: failed to parse certificate from server: " + err.Error())
319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
325 // server's identity (i.e. leaf certificate) is unchanged and
375 var chainToSend *Certificate
400 // If the server requested a certificate then we have to send a
401 // Certificate message, even if it's empty because we don't have a
402 // certificate to send.
405 certMsg.certificates = chainToSend.Certificate
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_client_test.go 118 // cert, if not empty, contains a DER-encoded certificate for the
604 config.Certificates = []Certificate{cert}
640 config.Certificates = []Certificate{cert}
1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
    [all...]
generate_cert.go 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to
31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for")
33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for")
34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
113 template := x509.Certificate{
142 log.Fatalf("Failed to create certificate: %s", err)
149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
handshake_client.go 118 // certificate, which would be skipped if session resumption occurred.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
281 return errors.New("tls: failed to parse certificate from server: " + err.Error())
319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
325 // server's identity (i.e. leaf certificate) is unchanged and
375 var chainToSend *Certificate
400 // If the server requested a certificate then we have to send a
401 // Certificate message, even if it's empty because we don't have a
402 // certificate to send.
405 certMsg.certificates = chainToSend.Certificate
    [all...]
  /external/nist-pkits/
extract-pkits-tests.pl 145 if ($_ =~ /^\s*4\.8 Certificate Policies\s*$/) {
  /frameworks/base/keystore/java/android/security/
KeyPairGeneratorSpec.java 30 import java.security.cert.Certificate;
48 * {@link Certificate} chain.
50 * The KeyPair generator will create a self-signed certificate with the subject
55 * The self-signed X.509 certificate may be replaced at a later time by a
56 * certificate signed by a real Certificate Authority.
92 * {@link Certificate} chain.
94 * The KeyPair generator will create a self-signed certificate with the
107 * @param serialNumber X509 v3 certificate serial number
108 * @param startDate the start of the self-signed certificate validity perio
    [all...]
KeyChain.java 46 import java.security.cert.Certificate;
61 * their corresponding certificate chains in credential storage.
74 * certificate chains. The chosen alias will be returned by the
93 * Certificate Authority (CA) certificates will be trusted by all
115 * Package name for the Certificate Installer.
156 * Optional extra to specify an X.509 certificate to install on
163 * name for the installed certificate.
165 // Compatible with old android.security.Credentials.CERTIFICATE
179 * private key and associated certificate chain will be installed.
215 * Broadcast Action: Indicates the contents of the trusted certificate store has changed. Sen
    [all...]
  /frameworks/base/media/java/android/media/
MediaDrm.java 136 * Specify no certificate type
143 * Specify X.509 certificate type
459 * This event type indicates that the app needs to request a certificate from
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
SSLSessionTest.java 26 import java.security.cert.Certificate;
144 Certificate cert = store.getCertificate("mykey");
145 Certificate[] certs = clientSession.getLocalCertificates();
171 Certificate[] res = clientSession.getPeerCertificates();
  /libcore/luni/src/test/java/libcore/dalvik/system/
PathClassLoaderTest.java 27 import java.security.cert.Certificate;
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
X509KeyManagerImpl.java 7 import java.security.cert.Certificate;
24 // creating a certificate
25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl
39 + "-----END CERTIFICATE-----\n";
41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
44 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
58 + "-----END CERTIFICATE-----\n";
63 String certificate3 = "-----BEGIN CERTIFICATE-----\n"
82 + "-----END CERTIFICATE-----\n"
    [all...]
  /prebuilts/tools/common/mkidentity/
mkidentity-prebuilt.jar 
  /external/boringssl/src/ssl/test/runner/
common.go 165 // Certificate types (for certificateRequestMsg)
167 CertTypeRSASign = 1 // A certificate containing an RSA key
168 CertTypeDSSSign = 2 // A certificate containing a DSA key
169 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key
170 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key
173 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
174 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
175 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
249 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLX509CRL.java 31 import java.security.cert.Certificate;
290 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) {
291 if (certificate instanceof OpenSSLX509Certificate) {
292 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate;
303 return getRevokedCertificate(certificate.getSerialNumber());
352 public boolean isRevoked(Certificate cert) {
365 throw new RuntimeException("cannot convert certificate", e);
  /external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/
KeyManagerFactoryTest.java 32 import java.security.cert.Certificate;
243 X509Certificate certificate = certificateChain[0]; local
244 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm());
246 String sigAlgName = certificate.getSigAlgName();
251 Arrays.<Certificate>asList(certificateChain));
  /external/emma/core/java12/com/vladium/emma/rt/
InstrClassLoader.java 19 import java.security.cert.Certificate;
347 final CodeSource csrc = new CodeSource (srcURL, (Certificate[])null);
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
SslUtil.java 46 import java.security.cert.Certificate;
89 * Generates a new, self-signed X509 V1 certificate for a KeyPair.
93 * @return the new certificate
94 * @throws GeneralSecurityException on error generating the certificate
126 * Generates a new, self-signed X509 V3 certificate for a KeyPair.
133 * @return the new certificate
134 * @throws GeneralSecurityException on error generating the certificate
153 // about certificate and extension content. Quoting the `man verify`:
156 // the issuer name of the current certificate are subject to further
158 // certificate (if present) must match the subject key identifier (i
    [all...]
  /frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
NetworkSecurityConfigTests.java 28 import java.security.cert.Certificate;
89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES));
278 preNCerts.add(anchor.certificate);
282 nCerts.add(anchor.certificate);
  /libcore/luni/src/test/java/libcore/java/net/
OldURLClassLoaderTest.java 29 import java.security.cert.Certificate;
156 CodeSource codeSource = new CodeSource(url, new Certificate[0]);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStoreTest.java 36 import java.security.cert.Certificate;
142 * Test for <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code>
155 Certificate certs[] = {
  /libcore/luni/src/test/java/tests/java/security/
SecureClassLoaderTest.java 37 import java.security.cert.Certificate;
183 CodeSource cs = new CodeSource(url, (Certificate[]) null);
  /libcore/ojluni/src/main/java/java/util/jar/
JarFile.java 36 import java.security.cert.Certificate;
58 * certificate. A caller should inspect the return value of
288 public Certificate[] getCertificates() {
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
AlgorithmChecker.java 39 import java.security.cert.Certificate;
63 * specified certificate contains the required algorithm constraints.
65 * Certificate fields such as the subject public key, the signature
107 * certificate
118 * path where the trust anchor is unknown, or a certificate list which may
134 * certificate
149 // Check for anchor certificate restrictions
203 public void check(Certificate cert,
208 // ignore the check for non-x.509 certificate or null constraints
360 * certificate
    [all...]

Completed in 608 milliseconds

1 2 3 4 5 6 7 8 91011>>