HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 301 - 325 of 402) sorted by null

<<11121314151617

  /libcore/ojluni/src/main/java/java/lang/
ClassLoader.java 43 import java.security.cert.Certificate;
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/
BuildPreferencePage.java 41 import java.security.cert.Certificate;
301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local
303 if (key == null || certificate == null) {
310 FingerprintUtils.getFingerprint(certificate, "MD5"));
315 FingerprintUtils.getFingerprint(certificate, "SHA1"));
319 if (certificate.getNotAfter().compareTo(today) < 0) {
320 showErrorMessage("Certificate is expired!");
324 if (certificate.getNotBefore().compareTo(today) > 0) {
325 showErrorMessage("Certificate validity is in the future!");
  /system/extras/verity/
BootSignature.java 27 import java.security.cert.Certificate;
51 * certificate ::= Certificate
67 private ASN1Encodable certificate; field in class:BootSignature
101 certificate = sequence.getObjectAt(1);
102 byte[] encoded = ((ASN1Object) certificate).getEncoded();
151 certificate = s.readObject();
182 v.add(certificate);
302 if (args.length >= 4 && "-certificate".equals(args[2])) {
303 /* args[3] is the path to a public key certificate */
    [all...]
Utils.java 35 import java.security.cert.Certificate;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 14 import java.security.cert.Certificate;
125 * issuer of the given X509 certificate. Uses the default provider
128 * @param cert the X509 certificate
133 * on the given certificate has thrown an exception.
145 * issuer of the given X509 certificate. Uses the specified
149 * @param cert the X509 certificate
155 * on the given certificate has thrown an exception.
236 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx);
545 throw new AnnotatedException("Certificate policies cannot be decoded.", e);
686 "Problem while picking certificates from certificate store."
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/pm/
PackageParserTest.java 37 import java.security.cert.Certificate;
497 pkg.mCertificates = new Certificate[][] { new Certificate[] { null }};
  /libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 42 import java.security.cert.Certificate;
698 Certificate[] serverCertificates = connection.getServerCertificates();
699 Certificate[] localCertificates = request.getSslLocalCertificates();
    [all...]
  /libcore/ojluni/src/main/java/javax/crypto/
Cipher.java 40 import java.security.cert.Certificate;
298 // The OID for the KeyUsage extension in an X.509 v3 certificate
    [all...]
  /external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/
SSLSocketTest.java 63 import java.security.cert.Certificate;
432 Certificate[] localCertificates = server.getSession().getLocalCertificates();
443 Certificate[] peerCertificates = client.getSession().getPeerCertificates();
595 Certificate[] localCertificates = event.getLocalCertificates();
596 Certificate[] peerCertificates = event.getPeerCertificates();
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
333 func certificateFromPEM(pemBytes string) (*Certificate, error) {
451 func chainToDebugString(chain []*Certificate) string {
466 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
485 -----END CERTIFICATE-----
488 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
511 -----END CERTIFICATE-----
514 const googleLeaf = `-----BEGIN CERTIFICATE-----
539 -----END CERTIFICATE----
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
333 func certificateFromPEM(pemBytes string) (*Certificate, error) {
451 func chainToDebugString(chain []*Certificate) string {
466 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
485 -----END CERTIFICATE-----
488 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
511 -----END CERTIFICATE-----
514 const googleLeaf = `-----BEGIN CERTIFICATE-----
539 -----END CERTIFICATE----
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyStoreTest.java 42 import java.security.cert.Certificate;
75 private static final String ALIAS_CERTIFICATE = "certificate";
80 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe";
192 // RI can't handle certificate in PKCS12, but BC can
374 public static void setCertificate(KeyStore ks, String alias, Certificate certificate)
376 ks.setCertificateEntry(alias, certificate);
417 public static void assertCertificate(Certificate actual)
421 public static void assertCertificate2(Certificate actual)
432 public static void assertCertificateChain(Certificate[] actual
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
387 certMsg.certificates = hs.cert.Certificate
417 // Request a client certificate
429 // the client that it may send any certificate in response
432 // an appropriate certificate to give to us.
460 // If we requested a client certificate, then the client must send a
461 // certificate message, even if it's empty.
470 // The client didn't actually send a certificate
474 return errors.New("tls: client didn't provide a certificate")
508 // If we received a client cert in response to our certificate request message
    [all...]
tls_test.go 26 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
37 -----END CERTIFICATE-----
64 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
76 -----END CERTIFICATE-----
129 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
150 t.Error("Load of RSA certificate succeeded with ECDSA private key")
153 t.Error("Load of ECDSA certificate succeeded with RSA private key")
594 f.Set(reflect.ValueOf([]Certificate{
595 {Certificate: [][]byte{{'b'}}},
599 f.Set(reflect.ValueOf(map[string]*Certificate{"a": nil})
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
387 certMsg.certificates = hs.cert.Certificate
417 // Request a client certificate
429 // the client that it may send any certificate in response
432 // an appropriate certificate to give to us.
460 // If we requested a client certificate, then the client must send a
461 // certificate message, even if it's empty.
470 // The client didn't actually send a certificate
474 return errors.New("tls: client didn't provide a certificate")
508 // If we received a client cert in response to our certificate request message
    [all...]
tls_test.go 26 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
37 -----END CERTIFICATE-----
64 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
76 -----END CERTIFICATE-----
129 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
150 t.Error("Load of RSA certificate succeeded with ECDSA private key")
153 t.Error("Load of ECDSA certificate succeeded with RSA private key")
594 f.Set(reflect.ValueOf([]Certificate{
595 {Certificate: [][]byte{{'b'}}},
599 f.Set(reflect.ValueOf(map[string]*Certificate{"a": nil})
    [all...]
  /external/pdfium/xfa/fxfa/parser/
xfa_basic_data_element_properties.cpp 401 {XFA_Element::Certificate, 1, 0},
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
SunCertPathBuilder.java 303 * Certificate is good.
502 Certificate finalCert;
569 * Returns true if trust anchor certificate matches specified
570 * certificate constraints.
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
cryptxml.h 267 CRYPT_XML_DATA_BLOB Certificate;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 76 private org.bouncycastle.asn1.x509.Certificate c;
86 org.bouncycastle.asn1.x509.Certificate c)
146 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
151 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
246 * the certificate.
824 throw new SignatureException("certificate does not verify with supplied key");
  /external/conscrypt/platform/src/main/java/org/conscrypt/
TrustManagerImpl.java 46 import java.security.cert.Certificate;
93 * Comparator used for ordering trust anchors during certificate path building.
326 * Returns the full trusted certificate chain found from {@code certs}.
343 * Returns the full trusted certificate chain found from {@code certs}.
414 throw new CertificateException("No subjectAltNames on the certificate match");
483 // Initialize the chain to contain the leaf certificate. This potentially could be a trust
485 // complete trusted chain for additional validation such as certificate pinning.
500 * Recursively build certificate chains until a valid chain is found or all possible paths are
505 * certificate and ends in the final trusted root certificate
    [all...]
  /external/conscrypt/platform/src/test/java/org/conscrypt/
TrustedCertificateStoreTest.java 32 import java.security.cert.Certificate;
274 * The construction below is to build a certificate chain that has a loop
288 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1
332 * The construction below creates a certificate with multiple possible issuer certs.
799 assertEquals("System certificate stored in the wrong file",
802 // The two statements below indirectly assert that the certificate can be looked up
806 assertNotNull("Issuer certificate not found for system certificate " + actualFile,
808 assertNotNull("Trust anchor not found for system certificate " + actualFile,
820 // Checking that the certificate is stored in a file is extraneous given the curren
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreKeyPairGeneratorSpi.java 39 import com.android.org.bouncycastle.asn1.x509.Certificate;
494 // Very short certificate chain in the non-attestation case.
557 Credentials.USER_CERTIFICATE, iter.next(), flags, "Failed to store certificate");
570 flags, "Failed to store attestation CA certificate");
591 throw new ProviderException("Failed to generate self-signed certificate", e);
594 "Failed to obtain encoded form of self-signed certificate", e);
604 throw new ProviderException("Failed to generate attestation certificate chain",
609 throw new ProviderException("Attestation certificate chain contained "
633 // Key cannot be used to sign a certificate
636 // Key can be used to sign a certificate
    [all...]
  /libcore/ojluni/src/main/java/sun/misc/
URLClassPath.java 54 import java.security.cert.Certificate;
    [all...]
  /libcore/ojluni/src/main/java/sun/security/x509/
X509CRLImpl.java 41 import java.security.cert.Certificate;
56 * An implementation for X509 CRL (Certificate Revocation List).
67 * Public Key Infrastructure Certificate and CRL Profile</a>.
602 * Checks whether the given certificate is on this CRL.
604 * @param cert the certificate to check for.
605 * @return true if the given certificate is on this CRL,
608 public boolean isRevoked(Certificate cert) {
714 * Gets the CRL entry for the given certificate.
794 * Identifiers for the Internet X.509 Public Key Infrastructure Certificate
    [all...]

Completed in 2825 milliseconds

<<11121314151617