/external/curl/docs/cmdline-opts/ |
crlfile.d | 7 Provide a file using PEM format with a Certificate Revocation List that may
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 24 import java.security.cert.Certificate; 34 for (Certificate certificate : chain.connection().getHandshake().peerCertificates()) { 35 String pin = CertificatePinner.pin(certificate); 37 throw new IOException("Blacklisted peer certificate: " + pin);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CRLTest.java | 28 import java.security.cert.Certificate; 88 // that are abstract in <code>Certificate</code> 115 public boolean isRevoked(Certificate cert) {
|
CertStoreSpiTest.java | 36 import java.security.cert.Certificate; 89 public boolean match (Certificate crl) {
|
PKIXCertPathCheckerTest.java | 28 import java.security.cert.Certificate; 89 public void check(Certificate cert,
|
/libcore/ojluni/src/main/java/java/security/ |
Timestamp.java | 29 import java.security.cert.Certificate; 57 * The TSA's certificate path. 72 * @param signerCertPath is the TSA's certificate path. It must not be null. 93 * Returns the certificate path for the Timestamping Authority. 95 * @return The TSA's certificate path. 104 * and the TSA's certificate path. 118 * their timestamp's and their signer's certificate paths are equal. 141 * its signer's certificate. 147 List<? extends Certificate> certs = signerCertPath.getCertificates();
|
KeyStore.java | 30 import java.security.cert.Certificate; 52 * unauthorized access. It is also accompanied by a certificate chain 55 * <p> Private keys and certificate chains are used by a given entity for 66 * <p> This type of entry contains a single public key {@code Certificate} 67 * belonging to another party. It is called a <i>trusted certificate</i> 68 * because the keystore owner trusts that the public key in the certificate 70 * of the certificate. 76 * case of private keys and their associated certificate chains, these strings 79 * certificate authorities, or using different public key algorithms. 206 * @see java.security.cert.Certificate [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 22 import java.security.cert.Certificate; 28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>. 30 * @param certificate 33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
|
/cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/ |
CertInstallerReceiver.java | 32 import java.security.cert.Certificate; 36 * Delegated certificate installer app that responds to specific intents and executes various DPM 37 * certificate manipulation APIs. The following APIs are exercised: 128 Certificate certificate = CertificateFactory.getInstance("X.509") local 138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias), 160 Certificate certificateToMatch = readCertificate(toMatch); 162 Certificate cert = readCertificate(certBuffer); 170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
|
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
CertInstallDelegateTest.java | 37 import java.security.cert.Certificate; 54 "-----BEGIN CERTIFICATE-----\n" + 74 "-----END CERTIFICATE-----"; 143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert)); 146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert)); 149 assertTrue("Certificate is not among installed certs", 154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert)); 164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local 168 mDpm.installKeyPair(null, privatekey, certificate, alias)) [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
CaCertManagementTest.java | 24 import java.security.cert.Certificate; 69 * Test: removing one certificate must not remove any others. 85 * supplementary installed certificate. 99 Certificate caCert = readCertificate(caBytes); 105 Certificate caCert = readCertificate(caBytes); 122 * <p>A CA certificate is "installed" if it matches all of the following conditions: 125 * <li>{@link DevicePolicyManager#getInstalledCaCerts} lists a matching certificate (not 127 * <li>Any new instances of {@link TrustManager} should report the certificate among their 134 private boolean isCaCertInstalledAndTrusted(Certificate caCert) 155 // All three responses should match - if an installed certificate isn't trusted or (worse [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PoloChallengeResponse.java | 24 import java.security.cert.Certificate; 44 * Certificate of the local peer in the protocol. 46 private Certificate mClientCertificate; 49 * Certificate of the remote peer in the protocol. 51 private Certificate mServerCertificate; 56 * @param clientCert the certificate of the client node 57 * @param serverCert the certificate of the server node 60 public PoloChallengeResponse(Certificate clientCert, Certificate serverCert,
|
/bootable/recovery/ |
verifier.cpp | 123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys, 273 if (key.key_type == Certificate::KEY_TYPE_RSA) { 282 } else if (key.key_type == Certificate::KEY_TYPE_EC && key.hash_len == SHA256_DIGEST_LENGTH) { 463 // A Certificate is a pair of an RSAPublicKey and a particular hash 476 bool load_keys(const char* filename, std::vector<Certificate>& certs) { 484 certs.emplace_back(0, Certificate::KEY_TYPE_RSA, nullptr, nullptr); 485 Certificate& cert = certs.back(); 492 cert.key_type = Certificate::KEY_TYPE_RSA; 500 cert.key_type = Certificate::KEY_TYPE_RSA; 505 cert.key_type = Certificate::KEY_TYPE_RSA [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 21 // NotAuthorizedToSign results when a certificate is signed by another 22 // which isn't marked as a CA certificate. 24 // Expired results when a certificate has expired, based on the time 28 // certificate has a name constraint which doesn't include the name 34 // IncompatibleUsage results when the certificate's key usage indicates 37 // NameMismatch results when the subject name of a parent certificate 45 Cert *Certificate 52 return "x509: certificate is not authorized to sign other certificates" 54 return "x509: certificate has expired or is not yet valid" 56 return "x509: a root or intermediate certificate is not authorized to sign in this domain [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 21 // NotAuthorizedToSign results when a certificate is signed by another 22 // which isn't marked as a CA certificate. 24 // Expired results when a certificate has expired, based on the time 28 // certificate has a name constraint which doesn't include the name 34 // IncompatibleUsage results when the certificate's key usage indicates 37 // NameMismatch results when the subject name of a parent certificate 45 Cert *Certificate 52 return "x509: certificate is not authorized to sign other certificates" 54 return "x509: certificate has expired or is not yet valid" 56 return "x509: a root or intermediate certificate is not authorized to sign in this domain [all...] |
/external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/ |
DelegatingHttpsURLConnection.java | 28 import java.security.cert.Certificate; 63 @Override public Certificate[] getLocalCertificates() { 66 List<Certificate> result = handshake.localCertificates(); 67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null; 70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException { 73 List<Certificate> result = handshake.peerCertificates(); 74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 29 import org.bouncycastle.asn1.x509.Certificate; 38 * At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----" 47 private static final PEMUtil PEM_CERT_PARSER = new PEMUtil("CERTIFICATE"); 59 private java.security.cert.Certificate readDERCertificate( 66 private java.security.cert.Certificate readPEMCertificate( 73 private java.security.cert.Certificate getCertificate(ASN1Sequence seq) 94 Certificate.getInstance(seq)); 97 private java.security.cert.Certificate getCertificate() 109 Certificate.getInstance(obj)) [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertBlacklistTest.java | 24 import java.security.cert.Certificate; 92 Collection<? extends Certificate> collection = factory.generateCertificates(is); 95 for (Certificate cert : collection) {
|
ConscryptIntermediateVerificationTest.java | 24 import java.security.cert.Certificate; 42 Collection<? extends Certificate> certs; 54 for (Certificate cert : certs) { 89 // L is a certificate issued by I for example.com 90 // L' is a certificate issued by I for android.com
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
DelegatingExtendedSSLSession.java | 21 import java.security.cert.Certificate; 149 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 154 public Certificate[] getLocalCertificates() {
|
SSLNullSession.java | 21 import java.security.cert.Certificate; 85 public Certificate[] getLocalCertificates() { 102 throw new SSLPeerUnverifiedException("No peer certificate"); 106 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 107 throw new SSLPeerUnverifiedException("No peer certificate"); 122 throw new SSLPeerUnverifiedException("No peer certificate");
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
CertBlacklistTest.java | 21 import java.security.cert.Certificate; 89 Collection<? extends Certificate> collection = factory.generateCertificates(is); 93 for (Certificate cert : collection) {
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 26 import java.security.cert.Certificate; 36 * self-signed certificate for a single hostname such as "localhost". 57 .addTrustedCertificate(heldCertificate.certificate) 72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate 73 * in this chain is the server's certificate, further certificates are included in the handshake 74 * so the client can build a trusted path to a CA certificate. 82 * Add a certificate authority that this client trusts. Servers that provide certificate chains 85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) { [all...] |
/frameworks/base/core/java/android/security/net/config/ |
ResourceCertificateSource.java | 23 import java.security.cert.Certificate; 56 Collection<? extends Certificate> certs; 69 for (Certificate cert : certs) {
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathValidatorTestPKIX.java | 27 import java.security.cert.Certificate; 70 List<Certificate> certList = new ArrayList<Certificate>(); 106 private String selfSignedCert = "-----BEGIN CERTIFICATE-----\n" 117 + "DC9BBx1sVKoji17RP4R8CTf1\n" + "-----END CERTIFICATE-----";
|