/libcore/ojluni/src/main/java/java/lang/ |
ClassLoader.java | 43 import java.security.cert.Certificate; [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/ |
BuildPreferencePage.java | 41 import java.security.cert.Certificate; 301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local 303 if (key == null || certificate == null) { 310 FingerprintUtils.getFingerprint(certificate, "MD5")); 315 FingerprintUtils.getFingerprint(certificate, "SHA1")); 319 if (certificate.getNotAfter().compareTo(today) < 0) { 320 showErrorMessage("Certificate is expired!"); 324 if (certificate.getNotBefore().compareTo(today) > 0) { 325 showErrorMessage("Certificate validity is in the future!");
|
/system/extras/verity/ |
BootSignature.java | 27 import java.security.cert.Certificate; 51 * certificate ::= Certificate 67 private ASN1Encodable certificate; field in class:BootSignature 101 certificate = sequence.getObjectAt(1); 102 byte[] encoded = ((ASN1Object) certificate).getEncoded(); 151 certificate = s.readObject(); 182 v.add(certificate); 302 if (args.length >= 4 && "-certificate".equals(args[2])) { 303 /* args[3] is the path to a public key certificate */ [all...] |
Utils.java | 35 import java.security.cert.Certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 14 import java.security.cert.Certificate; 125 * issuer of the given X509 certificate. Uses the default provider 128 * @param cert the X509 certificate 133 * on the given certificate has thrown an exception. 145 * issuer of the given X509 certificate. Uses the specified 149 * @param cert the X509 certificate 155 * on the given certificate has thrown an exception. 236 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx); 545 throw new AnnotatedException("Certificate policies cannot be decoded.", e); 686 "Problem while picking certificates from certificate store." [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/pm/ |
PackageParserTest.java | 37 import java.security.cert.Certificate; 497 pkg.mCertificates = new Certificate[][] { new Certificate[] { null }};
|
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 42 import java.security.cert.Certificate; 698 Certificate[] serverCertificates = connection.getServerCertificates(); 699 Certificate[] localCertificates = request.getSslLocalCertificates(); [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
Cipher.java | 40 import java.security.cert.Certificate; 298 // The OID for the KeyUsage extension in an X.509 v3 certificate [all...] |
/external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/ |
SSLSocketTest.java | 63 import java.security.cert.Certificate; 432 Certificate[] localCertificates = server.getSession().getLocalCertificates(); 443 Certificate[] peerCertificates = client.getSession().getPeerCertificates(); 595 Certificate[] localCertificates = event.getLocalCertificates(); 596 Certificate[] peerCertificates = event.getPeerCertificates(); [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify_test.go | 232 // Putting a certificate as a root directly should work as a 245 // Putting a certificate as a root directly should not skip 333 func certificateFromPEM(pemBytes string) (*Certificate, error) { 451 func chainToDebugString(chain []*Certificate) string { 466 const geoTrustRoot = `-----BEGIN CERTIFICATE----- 485 -----END CERTIFICATE----- 488 const giag2Intermediate = `-----BEGIN CERTIFICATE----- 511 -----END CERTIFICATE----- 514 const googleLeaf = `-----BEGIN CERTIFICATE----- 539 -----END CERTIFICATE---- [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify_test.go | 232 // Putting a certificate as a root directly should work as a 245 // Putting a certificate as a root directly should not skip 333 func certificateFromPEM(pemBytes string) (*Certificate, error) { 451 func chainToDebugString(chain []*Certificate) string { 466 const geoTrustRoot = `-----BEGIN CERTIFICATE----- 485 -----END CERTIFICATE----- 488 const giag2Intermediate = `-----BEGIN CERTIFICATE----- 511 -----END CERTIFICATE----- 514 const googleLeaf = `-----BEGIN CERTIFICATE----- 539 -----END CERTIFICATE---- [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 42 import java.security.cert.Certificate; 75 private static final String ALIAS_CERTIFICATE = "certificate"; 80 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe"; 192 // RI can't handle certificate in PKCS12, but BC can 374 public static void setCertificate(KeyStore ks, String alias, Certificate certificate) 376 ks.setCertificateEntry(alias, certificate); 417 public static void assertCertificate(Certificate actual) 421 public static void assertCertificate2(Certificate actual) 432 public static void assertCertificateChain(Certificate[] actual [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server.go | 34 cert *Certificate 387 certMsg.certificates = hs.cert.Certificate 417 // Request a client certificate 429 // the client that it may send any certificate in response 432 // an appropriate certificate to give to us. 460 // If we requested a client certificate, then the client must send a 461 // certificate message, even if it's empty. 470 // The client didn't actually send a certificate 474 return errors.New("tls: client didn't provide a certificate") 508 // If we received a client cert in response to our certificate request message [all...] |
tls_test.go | 26 var rsaCertPEM = `-----BEGIN CERTIFICATE----- 37 -----END CERTIFICATE----- 64 var ecdsaCertPEM = `-----BEGIN CERTIFICATE----- 76 -----END CERTIFICATE----- 129 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) { 150 t.Error("Load of RSA certificate succeeded with ECDSA private key") 153 t.Error("Load of ECDSA certificate succeeded with RSA private key") 594 f.Set(reflect.ValueOf([]Certificate{ 595 {Certificate: [][]byte{{'b'}}}, 599 f.Set(reflect.ValueOf(map[string]*Certificate{"a": nil}) [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server.go | 34 cert *Certificate 387 certMsg.certificates = hs.cert.Certificate 417 // Request a client certificate 429 // the client that it may send any certificate in response 432 // an appropriate certificate to give to us. 460 // If we requested a client certificate, then the client must send a 461 // certificate message, even if it's empty. 470 // The client didn't actually send a certificate 474 return errors.New("tls: client didn't provide a certificate") 508 // If we received a client cert in response to our certificate request message [all...] |
tls_test.go | 26 var rsaCertPEM = `-----BEGIN CERTIFICATE----- 37 -----END CERTIFICATE----- 64 var ecdsaCertPEM = `-----BEGIN CERTIFICATE----- 76 -----END CERTIFICATE----- 129 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) { 150 t.Error("Load of RSA certificate succeeded with ECDSA private key") 153 t.Error("Load of ECDSA certificate succeeded with RSA private key") 594 f.Set(reflect.ValueOf([]Certificate{ 595 {Certificate: [][]byte{{'b'}}}, 599 f.Set(reflect.ValueOf(map[string]*Certificate{"a": nil}) [all...] |
/external/pdfium/xfa/fxfa/parser/ |
xfa_basic_data_element_properties.cpp | 401 {XFA_Element::Certificate, 1, 0},
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
SunCertPathBuilder.java | 303 * Certificate is good. 502 Certificate finalCert; 569 * Returns true if trust anchor certificate matches specified 570 * certificate constraints.
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
cryptxml.h | 267 CRYPT_XML_DATA_BLOB Certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 76 private org.bouncycastle.asn1.x509.Certificate c; 86 org.bouncycastle.asn1.x509.Certificate c) 146 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 151 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 246 * the certificate. 824 throw new SignatureException("certificate does not verify with supplied key");
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustManagerImpl.java | 46 import java.security.cert.Certificate; 93 * Comparator used for ordering trust anchors during certificate path building. 326 * Returns the full trusted certificate chain found from {@code certs}. 343 * Returns the full trusted certificate chain found from {@code certs}. 414 throw new CertificateException("No subjectAltNames on the certificate match"); 483 // Initialize the chain to contain the leaf certificate. This potentially could be a trust 485 // complete trusted chain for additional validation such as certificate pinning. 500 * Recursively build certificate chains until a valid chain is found or all possible paths are 505 * certificate and ends in the final trusted root certificate [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
TrustedCertificateStoreTest.java | 32 import java.security.cert.Certificate; 274 * The construction below is to build a certificate chain that has a loop 288 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1 332 * The construction below creates a certificate with multiple possible issuer certs. 799 assertEquals("System certificate stored in the wrong file", 802 // The two statements below indirectly assert that the certificate can be looked up 806 assertNotNull("Issuer certificate not found for system certificate " + actualFile, 808 assertNotNull("Trust anchor not found for system certificate " + actualFile, 820 // Checking that the certificate is stored in a file is extraneous given the curren [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyPairGeneratorSpi.java | 39 import com.android.org.bouncycastle.asn1.x509.Certificate; 494 // Very short certificate chain in the non-attestation case. 557 Credentials.USER_CERTIFICATE, iter.next(), flags, "Failed to store certificate"); 570 flags, "Failed to store attestation CA certificate"); 591 throw new ProviderException("Failed to generate self-signed certificate", e); 594 "Failed to obtain encoded form of self-signed certificate", e); 604 throw new ProviderException("Failed to generate attestation certificate chain", 609 throw new ProviderException("Attestation certificate chain contained " 633 // Key cannot be used to sign a certificate 636 // Key can be used to sign a certificate [all...] |
/libcore/ojluni/src/main/java/sun/misc/ |
URLClassPath.java | 54 import java.security.cert.Certificate; [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CRLImpl.java | 41 import java.security.cert.Certificate; 56 * An implementation for X509 CRL (Certificate Revocation List). 67 * Public Key Infrastructure Certificate and CRL Profile</a>. 602 * Checks whether the given certificate is on this CRL. 604 * @param cert the certificate to check for. 605 * @return true if the given certificate is on this CRL, 608 public boolean isRevoked(Certificate cert) { 714 * Gets the CRL entry for the given certificate. 794 * Identifiers for the Internet X.509 Public Key Infrastructure Certificate [all...] |