/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
WiFiKeyManager.java | 12 import java.security.cert.Certificate; 13 import java.security.cert.X509Certificate; 45 Certificate cert = mKeyStore.getCertificate(alias); local 46 if ((cert instanceof X509Certificate) && mKeyStore.getKey(alias, null) != null) { 47 X509Certificate x509Certificate = (X509Certificate) cert; 50 mAliases.put(issuer, new String[]{alias, cert.getPublicKey().getAlgorithm()});
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory4Test.java | 18 package tests.security.cert; 33 import java.security.cert.CRL; 34 import java.security.cert.CRLException; 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 55 * java.security.cert.CertificateFactory#generateCertificate(java.io.InputStream) 59 // Test for method java.security.cert.Certificate 60 // java.security.cert.CertificateFactory.generateCertificate(java.io.InputStream) 86 * java.security.cert.CertificateFactory#generateCertificates(java.io.InputStream [all...] |
CertStore1Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertStoreParameters; 29 import org.apache.harmony.security.tests.support.cert.MyCertStoreSpi; 36 import java.security.cert.CertStore; 37 import java.security.cert.CertStoreException; 38 import java.security.cert.CertStoreParameters; 39 import java.security.cert.CertStoreSpi; 40 import java.security.cert.CollectionCertStoreParameters; 41 import java.security.cert.LDAPCertStoreParameters; 136 String def = "Proba.cert.store.type" [all...] |
TrustAnchorTest.java | 23 package tests.security.cert; 33 import org.apache.harmony.security.tests.support.cert.TestUtils; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.TrustAnchor; 42 import java.security.cert.X509Certificate; 471 X509Certificate cert = new TestCertUtils.TestX509Certificate(x500p, x500p); local 472 TrustAnchor ta2 = new TrustAnchor(cert, null); 473 assertSame(cert, ta2.getTrustedCert());
|
CertPathBuilder2Test.java | 23 package tests.security.cert; 27 import tests.security.cert.myCertPathBuilder.MyProvider; 34 import java.security.cert.CertPathBuilder; 35 import java.security.cert.CertPathBuilderException; 36 import java.security.cert.CertPathBuilderResult; 45 private static final String CertPathBuilderProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi";
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 415 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", 423 "Failed to read CA cert '%s' in PEM format: %s", 439 "Failed to parse CA cert in DER format: %s", 445 "Failed to parse CA cert in PEM format: %s", 486 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 500 "cert/key in PEM format: %s", 526 gnutls_datum_t cert, key; local 528 cert.data = (unsigned char *) params->client_cert_blob; 529 cert.size = params->client_cert_blob_len; 535 conn->xcred, &cert, &key, GNUTLS_X509_FMT_DER 999 gnutls_x509_crt_t cert; local [all...] |
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
PKCS7.java | 33 import java.security.cert.X509Certificate; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateEncodingException; 36 import java.security.cert.CertificateExpiredException; 37 import java.security.cert.CertificateNotYetValidException; 38 import java.security.cert.CertificateParsingException; 39 import java.security.cert.X509CRL; 40 import java.security.cert.CRLException; 41 import java.security.cert.CertificateFactory; 721 X509Certificate cert = certificates[i] local 743 X509Certificate cert = certificates[i]; local [all...] |
SignerInfo.java | 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertificateFactory; 47 import java.security.cert.CertPath; 48 import java.security.cert.X509Certificate; 292 // next cert in chain found 294 // if selected cert is self-signed, we're done 419 X509Certificate cert = getCertificate(block); local 420 PublicKey key = cert.getPublicKey(); 421 if (cert == null) { 433 if (cert.hasUnsupportedCriticalExtension()) [all...] |
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
ConscryptSocketTest.java | 35 import java.security.cert.CertificateException; 36 import java.security.cert.X509Certificate; 124 private X509Certificate cert; field in class:ConscryptSocketTest 136 ca = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("ca-cert.pem")); 137 cert = OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("cert.pem")); 139 OpenSSLX509Certificate.fromX509PemInputStream(openTestFile("cert-ct-embedded.pem")); 140 certKey = OpenSSLKey.fromPrivateKeyPemInputStream(openTestFile("cert-key.pem")) 307 TestConnection connection = new TestConnection(new X509Certificate[] {cert, ca}, certKey); 327 TestConnection connection = new TestConnection(new X509Certificate[] {cert, ca}, certKey) [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 36 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i); 37 if (cert == NULL) { 43 err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data); 116 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, j); 117 if (cert == NULL) { 124 // configures "Never Trust" on such a cert, it will also be found in the 134 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings); 161 CFDataRef subjectName = SecCertificateCopyNormalizedSubjectContent(cert, &errRef); 166 CFDataRef issuerName = SecCertificateCopyNormalizedIssuerContent(cert, &errRef) [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 36 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i); 37 if (cert == NULL) { 43 err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data); 116 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, j); 117 if (cert == NULL) { 124 // configures "Never Trust" on such a cert, it will also be found in the 134 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings); 161 CFDataRef subjectName = SecCertificateCopyNormalizedSubjectContent(cert, &errRef); 166 CFDataRef issuerName = SecCertificateCopyNormalizedIssuerContent(cert, &errRef) [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyStore.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.X509Certificate; 32 import java.security.cert.CertificateException; 206 * @see java.security.cert.Certificate 657 for (Certificate cert : chain) { 658 sb.append(cert); 757 private final Certificate cert; field in class:KeyStore.TrustedCertificateEntry 773 this.cert = trustedCert; 797 this.cert = trustedCert; 808 return cert; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 14 import java.security.cert.CertificateEncodingException; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.X509Certificate; 46 * @deprecated use org.bouncycastle.cert.X509v3CertificateBuilder. 283 X509Certificate cert) 286 byte[] extValue = cert.getExtensionValue(oid); 313 X509Certificate cert) 316 this.copyAndAddExtension(oid.getId(), critical, cert); local 444 throw new ExtCertificateEncodingException("exception encoding TBS cert", e); 489 throw new ExtCertificateEncodingException("exception encoding TBS cert", e) [all...] |
ExtendedPKIXParameters.java | 7 import java.security.cert.CertSelector; 8 import java.security.cert.CertStore; 9 import java.security.cert.PKIXParameters; 10 import java.security.cert.TrustAnchor; 11 import java.security.cert.X509CertSelector; 59 * is not of type <code>java.security.cert.TrustAnchor</code>
|
/frameworks/base/services/core/java/com/android/server/pm/ |
SELinuxMMAC.java | 158 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 177 // Check for a cert attached to the signer tag. We allow a signature 178 // to appear as an attribute as well as those attached to cert tags. 179 String cert = parser.getAttributeValue(null, "signature"); local 180 if (cert != null) { 181 pb.addSignature(cert); 196 } else if ("cert".equals(tagName)) { 245 parser.require(XmlPullParser.START_TAG, null, "cert"); 397 for (Signature cert : mCerts) { 398 sb.append("cert=" + cert.toCharsString().substring(0, 11) + "... ") [all...] |
/bootable/recovery/tools/dumpkey/ |
DumpPublicKey.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 241 X509Certificate cert = (X509Certificate) cf.generateCertificate(input); local 244 String sigAlg = cert.getSigAlgName(); 259 PublicKey key = cert.getPublicKey();
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/src/android/security/net/config/cts/ |
DownloadManagerTest.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 133 for (Certificate cert : certs) { 134 chain[i++] = (X509Certificate) cert;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 10 import java.security.cert.CertificateEncodingException; 11 import java.security.cert.CertificateException; 12 import java.security.cert.X509Certificate; 16 import org.bouncycastle.cert.X509CertificateHolder; 17 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXExtendedParameters.java | 3 import java.security.cert.CertPathParameters; 4 import java.security.cert.CertSelector; 5 import java.security.cert.CertStore; 6 import java.security.cert.PKIXParameters; 7 import java.security.cert.TrustAnchor;
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
ActiveSession.java | 22 import java.security.cert.Certificate; 23 import java.security.cert.X509Certificate; 48 private volatile javax.security.cert.X509Certificate[] peerCertificateChain; 237 public javax.security.cert.X509Certificate[] getPeerCertificateChain() 241 javax.security.cert.X509Certificate[] result = peerCertificateChain;
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CTVerifier.java | 19 import java.security.cert.CertificateEncodingException; 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate; 44 for(X509Certificate cert : chain) { 45 certs[i++] = OpenSSLX509Certificate.fromCertificate(cert); 83 // Avoid creating the cert entry if we don't need it 119 // Avoid creating the cert entry if we don't need it
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateEncodingException; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiKeyStore.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateException; 33 import java.security.cert.X509Certificate; 129 // Remove client key+cert 166 * @param cert The certificate to be installed 169 public boolean putCertInKeyStore(String name, Certificate cert) { 170 return putCertsInKeyStore(name, new Certificate[] {cert}); 226 if (mVerboseLoggingEnabled) Log.d(TAG, "removing client private key and user cert"); 236 if (mVerboseLoggingEnabled) Log.d(TAG, "removing CA cert: " + ca);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 23 package libcore.java.security.cert; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.PKIXParameters; 31 import java.security.cert.TrustAnchor; 36 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 49 private Hashtable<String, Object> Cert = new Hashtable<String, Object>(); 79 if (Cert.containsKey(alias)) { 80 return (Certificate) Cert.get(alias); 94 if (Cert.containsKey(alias)) { 95 Cert.remove(alias); 109 if (Cert.containsKey(alias)) { 110 Cert.remove(alias); 125 public void engineSetCertificateEntry(String alias, Certificate cert) [all...] |