HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 251 - 275 of 402) sorted by null

<<11121314151617

  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLUtils.java 40 import java.security.cert.Certificate;
62 * A trust manager specific to a particular HostAuth. The first time a server certificate is
63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether
64 * the PublicKey of the certificate presented matches that of the saved certificate
109 Certificate storedCert =
154 * Optionally bypass all SSL certificate checks.
156 * @param insecure if true, bypass all SSL certificate checks
283 * a client certificate.
317 * for a client certificate (in millis since epoch)
    [all...]
  /external/boringssl/src/ssl/test/runner/
runner.go 59 resourceDir = flag.String("resource-dir", ".", "The directory in which to find certificate and key files.")
133 rsaCertificate Certificate
134 rsa1024Certificate Certificate
135 rsaChainCertificate Certificate
136 ecdsaP224Certificate Certificate
137 ecdsaP256Certificate Certificate
138 ecdsaP384Certificate Certificate
139 ecdsaP521Certificate Certificate
140 ed25519Certificate Certificate
146 cert *Certificate
    [all...]
cipher_suites.go 30 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
31 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
37 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
38 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
55 // certificate is ECDSA. If this is not set then the cipher suite is
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyAttestationTest.java 74 import java.security.cert.Certificate;
205 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
322 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
424 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
478 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
    [all...]
TestUtils.java 42 import java.security.cert.Certificate;
143 Certificate cert;
155 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(),
165 "Public key used to sign certificate should have the same algorithm as in KeyPair",
168 Certificate[] chain = privEntry.getCertificateChain();
170 fail("Empty certificate chain");
405 Certificate certificate,
410 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate})
    [all...]
KeyPairGeneratorTest.java 41 import java.security.cert.Certificate;
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 17 import java.security.cert.Certificate;
79 private org.bouncycastle.asn1.x509.Certificate c;
88 org.bouncycastle.asn1.x509.Certificate c)
147 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
152 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
602 if (!(o instanceof Certificate))
607 Certificate other = (Certificate)o;
849 throw new SignatureException("certificate does not verify with supplied key");
X509CRLObject.java 14 import java.security.cert.Certificate;
551 * Checks whether the given certificate is on this CRL.
553 * @param cert the certificate to check for.
554 * @return true if the given certificate is on this CRL,
557 public boolean isRevoked(Certificate cert)
598 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
602 throw new RuntimeException("Cannot process certificate");
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_darwin.go 26 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
46 // 2. Run "security find-certificate" to dump the list of system root
64 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
123 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
140 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
x509.go 119 type certificate struct { type
625 // A Certificate represents an X.509 certificate.
626 type Certificate struct {
627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
714 // a certificate. For example: checking a signature when the public key isn't a
715 // certificate signing key.
719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate"
    [all...]
x509_test.go 224 c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
root_darwin.go 26 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
46 // 2. Run "security find-certificate" to dump the list of system root
64 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
123 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
140 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
x509.go 119 type certificate struct { type
625 // A Certificate represents an X.509 certificate.
626 type Certificate struct {
627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
714 // a certificate. For example: checking a signature when the public key isn't a
715 // certificate signing key.
719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate"
    [all...]
x509_test.go 224 c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/
JarFileTest.java 36 import java.security.cert.Certificate;
445 Certificate[] certs = entry.getCertificates();
672 Certificate[] certs = entry.getCertificates();
683 public Certificate[] certificates;
701 Certificate[] certs = entry.getCertificates();
    [all...]
  /tools/apksig/src/apksigner/java/com/android/apksigner/
ApkSignerTool.java 47 import java.security.cert.Certificate;
193 signerParams.certFile = optionsParser.getRequiredValue("Certificate file");
461 "Signer #" + signerNumber + " certificate DN"
465 "Signer #" + signerNumber + " certificate SHA-256 digest: "
468 "Signer #" + signerNumber + " certificate SHA-1 digest: "
471 "Signer #" + signerNumber + " certificate MD5 digest: "
485 // DSA parameters may be inherited from the certificate. We
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLObject.java 14 import java.security.cert.Certificate;
554 * Checks whether the given certificate is on this CRL.
556 * @param cert the certificate to check for.
557 * @return true if the given certificate is on this CRL,
560 public boolean isRevoked(Certificate cert)
601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
  /external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/
SerializationTest.java 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts();
365 java.security.cert.Certificate[] certs = initPerm
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLX509Certificate.java 31 import java.security.cert.Certificate;
170 public static OpenSSLX509Certificate fromCertificate(Certificate cert)
239 throw new CertificateNotYetValidException("Certificate not valid until "
244 throw new CertificateExpiredException("Certificate expired at "
550 * A modified copy of the certificate is returned. The original object
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/
RealConnection.java 48 import java.security.cert.Certificate;
199 + "\n certificate: " + CertificatePinner.pin(cert)
204 // Check that the certificate pinner is satisfied by the certificates presented.
207 List<Certificate> certificates = new CertificateChainCleaner(trustRootIndex)
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 32 import java.security.cert.Certificate;
45 * SSL certificate info (certificate details) class
55 * Name of the entity this certificate is issued to
60 * Name of the entity this certificate is issued by
75 * The original source certificate, if available.
90 private static final String X509_CERTIFICATE = "x509-certificate";
93 * Saves the certificate state to a bundle
94 * @param certificate The SSL certificate to stor
184 certificate); local
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.cert.Certificate;
51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest
65 + "-----END CERTIFICATE-----\n";
121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes());
156 Certificate[] res = event.getPeerCertificates();
554 * Implements basically a dummy TrustManager. It stores the certificate
  /libcore/luni/src/test/java/libcore/java/net/
OldJarURLConnectionTest.java 29 import java.security.cert.Certificate;
85 Certificate [] certs = juc.getCertificates();
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Signature2Test.java 36 import java.security.cert.Certificate;
271 * java.security.Signature#initVerify(java.security.cert.Certificate)
287 Signature.getInstance("DSA").initVerify((Certificate) null);
SignatureTest.java 40 import java.security.cert.Certificate;
133 * Class under test for void initVerify(Certificate)
553 private class MyCertificate extends java.security.cert.Certificate {

Completed in 1478 milliseconds

<<11121314151617