/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client_test.go | 118 // cert, if not empty, contains a DER-encoded certificate for the 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { [all...] |
generate_cert.go | 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to 31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for") 33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for") 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 113 template := x509.Certificate{ 142 log.Fatalf("Failed to create certificate: %s", err) 149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|
handshake_client.go | 118 // certificate, which would be skipped if session resumption occurred. 276 certs := make([]*x509.Certificate, len(certMsg.certificates)) 281 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 325 // server's identity (i.e. leaf certificate) is unchanged and 375 var chainToSend *Certificate 400 // If the server requested a certificate then we have to send a 401 // Certificate message, even if it's empty because we don't have a 402 // certificate to send. 405 certMsg.certificates = chainToSend.Certificate [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client_test.go | 118 // cert, if not empty, contains a DER-encoded certificate for the 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { [all...] |
generate_cert.go | 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to 31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for") 33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for") 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 113 template := x509.Certificate{ 142 log.Fatalf("Failed to create certificate: %s", err) 149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|
handshake_client.go | 118 // certificate, which would be skipped if session resumption occurred. 276 certs := make([]*x509.Certificate, len(certMsg.certificates)) 281 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 325 // server's identity (i.e. leaf certificate) is unchanged and 375 var chainToSend *Certificate 400 // If the server requested a certificate then we have to send a 401 // Certificate message, even if it's empty because we don't have a 402 // certificate to send. 405 certMsg.certificates = chainToSend.Certificate [all...] |
/external/nist-pkits/ |
extract-pkits-tests.pl | 145 if ($_ =~ /^\s*4\.8 Certificate Policies\s*$/) {
|
/frameworks/base/keystore/java/android/security/ |
KeyPairGeneratorSpec.java | 30 import java.security.cert.Certificate; 48 * {@link Certificate} chain. 50 * The KeyPair generator will create a self-signed certificate with the subject 55 * The self-signed X.509 certificate may be replaced at a later time by a 56 * certificate signed by a real Certificate Authority. 92 * {@link Certificate} chain. 94 * The KeyPair generator will create a self-signed certificate with the 107 * @param serialNumber X509 v3 certificate serial number 108 * @param startDate the start of the self-signed certificate validity perio [all...] |
KeyChain.java | 46 import java.security.cert.Certificate; 61 * their corresponding certificate chains in credential storage. 74 * certificate chains. The chosen alias will be returned by the 93 * Certificate Authority (CA) certificates will be trusted by all 115 * Package name for the Certificate Installer. 156 * Optional extra to specify an X.509 certificate to install on 163 * name for the installed certificate. 165 // Compatible with old android.security.Credentials.CERTIFICATE 179 * private key and associated certificate chain will be installed. 215 * Broadcast Action: Indicates the contents of the trusted certificate store has changed. Sen [all...] |
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 136 * Specify no certificate type 143 * Specify X.509 certificate type 459 * This event type indicates that the app needs to request a certificate from [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLSessionTest.java | 26 import java.security.cert.Certificate; 144 Certificate cert = store.getCertificate("mykey"); 145 Certificate[] certs = clientSession.getLocalCertificates(); 171 Certificate[] res = clientSession.getPeerCertificates();
|
/libcore/luni/src/test/java/libcore/dalvik/system/ |
PathClassLoaderTest.java | 27 import java.security.cert.Certificate;
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 7 import java.security.cert.Certificate; 24 // creating a certificate 25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl 39 + "-----END CERTIFICATE-----\n"; 41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 44 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 58 + "-----END CERTIFICATE-----\n"; 63 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n" [all...] |
/prebuilts/tools/common/mkidentity/ |
mkidentity-prebuilt.jar | |
/external/boringssl/src/ssl/test/runner/ |
common.go | 165 // Certificate types (for certificateRequestMsg) 167 CertTypeRSASign = 1 // A certificate containing an RSA key 168 CertTypeDSSSign = 2 // A certificate containing a DSA key 169 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key 170 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key 173 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 174 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 175 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 249 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509CRL.java | 31 import java.security.cert.Certificate; 290 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { 291 if (certificate instanceof OpenSSLX509Certificate) { 292 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate; 303 return getRevokedCertificate(certificate.getSerialNumber()); 352 public boolean isRevoked(Certificate cert) { 365 throw new RuntimeException("cannot convert certificate", e);
|
/external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/ |
KeyManagerFactoryTest.java | 32 import java.security.cert.Certificate; 243 X509Certificate certificate = certificateChain[0]; local 244 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm()); 246 String sigAlgName = certificate.getSigAlgName(); 251 Arrays.<Certificate>asList(certificateChain));
|
/external/emma/core/java12/com/vladium/emma/rt/ |
InstrClassLoader.java | 19 import java.security.cert.Certificate; 347 final CodeSource csrc = new CodeSource (srcURL, (Certificate[])null);
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
SslUtil.java | 46 import java.security.cert.Certificate; 89 * Generates a new, self-signed X509 V1 certificate for a KeyPair. 93 * @return the new certificate 94 * @throws GeneralSecurityException on error generating the certificate 126 * Generates a new, self-signed X509 V3 certificate for a KeyPair. 133 * @return the new certificate 134 * @throws GeneralSecurityException on error generating the certificate 153 // about certificate and extension content. Quoting the `man verify`: 156 // the issuer name of the current certificate are subject to further 158 // certificate (if present) must match the subject key identifier (i [all...] |
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
NetworkSecurityConfigTests.java | 28 import java.security.cert.Certificate; 89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); 278 preNCerts.add(anchor.certificate); 282 nCerts.add(anchor.certificate);
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldURLClassLoaderTest.java | 29 import java.security.cert.Certificate; 156 CodeSource codeSource = new CodeSource(url, new Certificate[0]);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 36 import java.security.cert.Certificate; 142 * Test for <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code> 155 Certificate certs[] = {
|
/libcore/luni/src/test/java/tests/java/security/ |
SecureClassLoaderTest.java | 37 import java.security.cert.Certificate; 183 CodeSource cs = new CodeSource(url, (Certificate[]) null);
|
/libcore/ojluni/src/main/java/java/util/jar/ |
JarFile.java | 36 import java.security.cert.Certificate; 58 * certificate. A caller should inspect the return value of 288 public Certificate[] getCertificates() {
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 39 import java.security.cert.Certificate; 63 * specified certificate contains the required algorithm constraints. 65 * Certificate fields such as the subject public key, the signature 107 * certificate 118 * path where the trust anchor is unknown, or a certificate list which may 134 * certificate 149 // Check for anchor certificate restrictions 203 public void check(Certificate cert, 208 // ignore the check for non-x.509 certificate or null constraints 360 * certificate [all...] |