HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 76 - 100 of 402) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/curl/docs/cmdline-opts/
crlfile.d 7 Provide a file using PEM format with a Certificate Revocation List that may
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CheckHandshake.java 24 import java.security.cert.Certificate;
34 for (Certificate certificate : chain.connection().getHandshake().peerCertificates()) {
35 String pin = CertificatePinner.pin(certificate);
37 throw new IOException("Blacklisted peer certificate: " + pin);
  /libcore/luni/src/test/java/tests/security/cert/
CRLTest.java 28 import java.security.cert.Certificate;
88 // that are abstract in <code>Certificate</code>
115 public boolean isRevoked(Certificate cert) {
CertStoreSpiTest.java 36 import java.security.cert.Certificate;
89 public boolean match (Certificate crl) {
PKIXCertPathCheckerTest.java 28 import java.security.cert.Certificate;
89 public void check(Certificate cert,
  /libcore/ojluni/src/main/java/java/security/
Timestamp.java 29 import java.security.cert.Certificate;
57 * The TSA's certificate path.
72 * @param signerCertPath is the TSA's certificate path. It must not be null.
93 * Returns the certificate path for the Timestamping Authority.
95 * @return The TSA's certificate path.
104 * and the TSA's certificate path.
118 * their timestamp's and their signer's certificate paths are equal.
141 * its signer's certificate.
147 List<? extends Certificate> certs = signerCertPath.getCertificates();
KeyStore.java 30 import java.security.cert.Certificate;
52 * unauthorized access. It is also accompanied by a certificate chain
55 * <p> Private keys and certificate chains are used by a given entity for
66 * <p> This type of entry contains a single public key {@code Certificate}
67 * belonging to another party. It is called a <i>trusted certificate</i>
68 * because the keystore owner trusts that the public key in the certificate
70 * of the certificate.
76 * case of private keys and their associated certificate chains, these strings
79 * certificate authorities, or using different public key algorithms.
206 * @see java.security.cert.Certificate
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/
FingerprintUtils.java 22 import java.security.cert.Certificate;
28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>.
30 * @param certificate
33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
  /cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/
CertInstallerReceiver.java 32 import java.security.cert.Certificate;
36 * Delegated certificate installer app that responds to specific intents and executes various DPM
37 * certificate manipulation APIs. The following APIs are exercised:
128 Certificate certificate = CertificateFactory.getInstance("X.509") local
138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias),
160 Certificate certificateToMatch = readCertificate(toMatch);
162 Certificate cert = readCertificate(certBuffer);
170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
  /cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/
CertInstallDelegateTest.java 37 import java.security.cert.Certificate;
54 "-----BEGIN CERTIFICATE-----\n" +
74 "-----END CERTIFICATE-----";
143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert));
146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert));
149 assertTrue("Certificate is not among installed certs",
154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert));
164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local
168 mDpm.installKeyPair(null, privatekey, certificate, alias))
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
CaCertManagementTest.java 24 import java.security.cert.Certificate;
69 * Test: removing one certificate must not remove any others.
85 * supplementary installed certificate.
99 Certificate caCert = readCertificate(caBytes);
105 Certificate caCert = readCertificate(caBytes);
122 * <p>A CA certificate is "installed" if it matches all of the following conditions:
125 * <li>{@link DevicePolicyManager#getInstalledCaCerts} lists a matching certificate (not
127 * <li>Any new instances of {@link TrustManager} should report the certificate among their
134 private boolean isCaCertInstalledAndTrusted(Certificate caCert)
155 // All three responses should match - if an installed certificate isn't trusted or (worse
    [all...]
  /external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PoloChallengeResponse.java 24 import java.security.cert.Certificate;
44 * Certificate of the local peer in the protocol.
46 private Certificate mClientCertificate;
49 * Certificate of the remote peer in the protocol.
51 private Certificate mServerCertificate;
56 * @param clientCert the certificate of the client node
57 * @param serverCert the certificate of the server node
60 public PoloChallengeResponse(Certificate clientCert, Certificate serverCert,
  /bootable/recovery/
verifier.cpp 123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys,
273 if (key.key_type == Certificate::KEY_TYPE_RSA) {
282 } else if (key.key_type == Certificate::KEY_TYPE_EC && key.hash_len == SHA256_DIGEST_LENGTH) {
463 // A Certificate is a pair of an RSAPublicKey and a particular hash
476 bool load_keys(const char* filename, std::vector<Certificate>& certs) {
484 certs.emplace_back(0, Certificate::KEY_TYPE_RSA, nullptr, nullptr);
485 Certificate& cert = certs.back();
492 cert.key_type = Certificate::KEY_TYPE_RSA;
500 cert.key_type = Certificate::KEY_TYPE_RSA;
505 cert.key_type = Certificate::KEY_TYPE_RSA
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
verify.go 21 // NotAuthorizedToSign results when a certificate is signed by another
22 // which isn't marked as a CA certificate.
24 // Expired results when a certificate has expired, based on the time
28 // certificate has a name constraint which doesn't include the name
34 // IncompatibleUsage results when the certificate's key usage indicates
37 // NameMismatch results when the subject name of a parent certificate
45 Cert *Certificate
52 return "x509: certificate is not authorized to sign other certificates"
54 return "x509: certificate has expired or is not yet valid"
56 return "x509: a root or intermediate certificate is not authorized to sign in this domain
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
verify.go 21 // NotAuthorizedToSign results when a certificate is signed by another
22 // which isn't marked as a CA certificate.
24 // Expired results when a certificate has expired, based on the time
28 // certificate has a name constraint which doesn't include the name
34 // IncompatibleUsage results when the certificate's key usage indicates
37 // NameMismatch results when the subject name of a parent certificate
45 Cert *Certificate
52 return "x509: certificate is not authorized to sign other certificates"
54 return "x509: certificate has expired or is not yet valid"
56 return "x509: a root or intermediate certificate is not authorized to sign in this domain
    [all...]
  /external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/
DelegatingHttpsURLConnection.java 28 import java.security.cert.Certificate;
63 @Override public Certificate[] getLocalCertificates() {
66 List<Certificate> result = handshake.localCertificates();
67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException {
73 List<Certificate> result = handshake.peerCertificates();
74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
CertificateFactory.java 29 import org.bouncycastle.asn1.x509.Certificate;
38 * At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----"
47 private static final PEMUtil PEM_CERT_PARSER = new PEMUtil("CERTIFICATE");
59 private java.security.cert.Certificate readDERCertificate(
66 private java.security.cert.Certificate readPEMCertificate(
73 private java.security.cert.Certificate getCertificate(ASN1Sequence seq)
94 Certificate.getInstance(seq));
97 private java.security.cert.Certificate getCertificate()
109 Certificate.getInstance(obj))
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
CertBlacklistTest.java 24 import java.security.cert.Certificate;
92 Collection<? extends Certificate> collection = factory.generateCertificates(is);
95 for (Certificate cert : collection) {
ConscryptIntermediateVerificationTest.java 24 import java.security.cert.Certificate;
42 Collection<? extends Certificate> certs;
54 for (Certificate cert : certs) {
89 // L is a certificate issued by I for example.com
90 // L' is a certificate issued by I for android.com
  /external/conscrypt/common/src/main/java/org/conscrypt/
DelegatingExtendedSSLSession.java 21 import java.security.cert.Certificate;
149 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
154 public Certificate[] getLocalCertificates() {
SSLNullSession.java 21 import java.security.cert.Certificate;
85 public Certificate[] getLocalCertificates() {
102 throw new SSLPeerUnverifiedException("No peer certificate");
106 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
107 throw new SSLPeerUnverifiedException("No peer certificate");
122 throw new SSLPeerUnverifiedException("No peer certificate");
  /external/conscrypt/platform/src/test/java/org/conscrypt/
CertBlacklistTest.java 21 import java.security.cert.Certificate;
89 Collection<? extends Certificate> collection = factory.generateCertificates(is);
93 for (Certificate cert : collection) {
  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
SslContextBuilder.java 26 import java.security.cert.Certificate;
36 * self-signed certificate for a single hostname such as "localhost".
57 .addTrustedCertificate(heldCertificate.certificate)
72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate
73 * in this chain is the server's certificate, further certificates are included in the handshake
74 * so the client can build a trusted path to a CA certificate.
82 * Add a certificate authority that this client trusts. Servers that provide certificate chains
85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) {
    [all...]
  /frameworks/base/core/java/android/security/net/config/
ResourceCertificateSource.java 23 import java.security.cert.Certificate;
56 Collection<? extends Certificate> certs;
69 for (Certificate cert : certs) {
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertPathValidatorTestPKIX.java 27 import java.security.cert.Certificate;
70 List<Certificate> certList = new ArrayList<Certificate>();
106 private String selfSignedCert = "-----BEGIN CERTIFICATE-----\n"
117 + "DC9BBx1sVKoji17RP4R8CTf1\n" + "-----END CERTIFICATE-----";

Completed in 201 milliseconds

1 2 34 5 6 7 8 91011>>