/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 62 * A trust manager specific to a particular HostAuth. The first time a server certificate is 63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether 64 * the PublicKey of the certificate presented matches that of the saved certificate 109 Certificate storedCert = 154 * Optionally bypass all SSL certificate checks. 156 * @param insecure if true, bypass all SSL certificate checks 283 * a client certificate. 317 * for a client certificate (in millis since epoch) [all...] |
/external/boringssl/src/ssl/test/runner/ |
runner.go | 59 resourceDir = flag.String("resource-dir", ".", "The directory in which to find certificate and key files.") 133 rsaCertificate Certificate 134 rsa1024Certificate Certificate 135 rsaChainCertificate Certificate 136 ecdsaP224Certificate Certificate 137 ecdsaP256Certificate Certificate 138 ecdsaP384Certificate Certificate 139 ecdsaP521Certificate Certificate 140 ed25519Certificate Certificate 146 cert *Certificate [all...] |
cipher_suites.go | 30 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 31 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 37 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 38 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 55 // certificate is ECDSA. If this is not set then the cipher suite is
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 74 import java.security.cert.Certificate; 205 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 322 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 424 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 478 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); [all...] |
TestUtils.java | 42 import java.security.cert.Certificate; 143 Certificate cert; 155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 165 "Public key used to sign certificate should have the same algorithm as in KeyPair", 168 Certificate[] chain = privEntry.getCertificateChain(); 170 fail("Empty certificate chain"); 405 Certificate certificate, 410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate}) [all...] |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 17 import java.security.cert.Certificate; 79 private org.bouncycastle.asn1.x509.Certificate c; 88 org.bouncycastle.asn1.x509.Certificate c) 147 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 152 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 602 if (!(o instanceof Certificate)) 607 Certificate other = (Certificate)o; 849 throw new SignatureException("certificate does not verify with supplied key");
|
X509CRLObject.java | 14 import java.security.cert.Certificate; 551 * Checks whether the given certificate is on this CRL. 553 * @param cert the certificate to check for. 554 * @return true if the given certificate is on this CRL, 557 public boolean isRevoked(Certificate cert) 598 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 602 throw new RuntimeException("Cannot process certificate");
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_darwin.go | 26 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) { 46 // 2. Run "security find-certificate" to dump the list of system root 64 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain") 123 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 { 140 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
|
x509.go | 119 type certificate struct { type 625 // A Certificate represents an X.509 certificate. 626 type Certificate struct { 627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 714 // a certificate. For example: checking a signature when the public key isn't a 715 // certificate signing key. 719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate" [all...] |
x509_test.go | 224 c := &Certificate{ 237 c = &Certificate{ 248 c = &Certificate{ 363 template := Certificate{ 427 t.Errorf("%s: failed to create certificate: %s", test.name, err) 433 t.Errorf("%s: failed to parse certificate: %s", test.name, err) 485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL) 535 template := Certificate{ 560 t.Fatalf("failed to create certificate: %s", err) 565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_darwin.go | 26 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) { 46 // 2. Run "security find-certificate" to dump the list of system root 64 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain") 123 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 { 140 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
|
x509.go | 119 type certificate struct { type 625 // A Certificate represents an X.509 certificate. 626 type Certificate struct { 627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 714 // a certificate. For example: checking a signature when the public key isn't a 715 // certificate signing key. 719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate" [all...] |
x509_test.go | 224 c := &Certificate{ 237 c = &Certificate{ 248 c = &Certificate{ 363 template := Certificate{ 427 t.Errorf("%s: failed to create certificate: %s", test.name, err) 433 t.Errorf("%s: failed to parse certificate: %s", test.name, err) 485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL) 535 template := Certificate{ 560 t.Fatalf("failed to create certificate: %s", err) 565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/ |
JarFileTest.java | 36 import java.security.cert.Certificate; 445 Certificate[] certs = entry.getCertificates(); 672 Certificate[] certs = entry.getCertificates(); 683 public Certificate[] certificates; 701 Certificate[] certs = entry.getCertificates(); [all...] |
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
ApkSignerTool.java | 47 import java.security.cert.Certificate; 193 signerParams.certFile = optionsParser.getRequiredValue("Certificate file"); 461 "Signer #" + signerNumber + " certificate DN" 465 "Signer #" + signerNumber + " certificate SHA-256 digest: " 468 "Signer #" + signerNumber + " certificate SHA-1 digest: " 471 "Signer #" + signerNumber + " certificate MD5 digest: " 485 // DSA parameters may be inherited from the certificate. We [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 14 import java.security.cert.Certificate; 554 * Checks whether the given certificate is on this CRL. 556 * @param cert the certificate to check for. 557 * @return true if the given certificate is on this CRL, 560 public boolean isRevoked(Certificate cert) 601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
|
/external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/ |
SerializationTest.java | 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts(); 365 java.security.cert.Certificate[] certs = initPerm
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 31 import java.security.cert.Certificate; 170 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 239 throw new CertificateNotYetValidException("Certificate not valid until " 244 throw new CertificateExpiredException("Certificate expired at " 550 * A modified copy of the certificate is returned. The original object
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/ |
RealConnection.java | 48 import java.security.cert.Certificate; 199 + "\n certificate: " + CertificatePinner.pin(cert) 204 // Check that the certificate pinner is satisfied by the certificates presented. 207 List<Certificate> certificates = new CertificateChainCleaner(trustRootIndex)
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 65 + "-----END CERTIFICATE-----\n"; 121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 156 Certificate[] res = event.getPeerCertificates(); 554 * Implements basically a dummy TrustManager. It stores the certificate
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldJarURLConnectionTest.java | 29 import java.security.cert.Certificate; 85 Certificate [] certs = juc.getCertificates();
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Signature2Test.java | 36 import java.security.cert.Certificate; 271 * java.security.Signature#initVerify(java.security.cert.Certificate) 287 Signature.getInstance("DSA").initVerify((Certificate) null);
|
SignatureTest.java | 40 import java.security.cert.Certificate; 133 * Class under test for void initVerify(Certificate) 553 private class MyCertificate extends java.security.cert.Certificate {
|