/libcore/ojluni/src/main/java/javax/crypto/ |
JarVerifier.java | 139 static void verifyPolicySigned(java.security.cert.Certificate[] certs)
|
/libcore/ojluni/src/main/java/javax/security/cert/ |
Certificate.java | 27 package javax.security.cert; 52 * <p><em>Note: The classes in the package {@code javax.security.cert} 56 * {@code java.security.cert}.</em></p>
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
PKIX.java | 29 import java.security.cert.*; 128 // cert is the last certificate 242 X509Certificate cert = sel.getCertificate(); local 243 if (cert != null) { 244 subject = cert.getSubjectX500Principal();
|
PolicyChecker.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.CertificateException; 32 import java.security.cert.CertPathValidatorException; 33 import java.security.cert.PKIXCertPathChecker; 34 import java.security.cert.PKIXReason; 35 import java.security.cert.PolicyNode; 36 import java.security.cert.PolicyQualifierInfo; 37 import java.security.cert.X509Certificate; 171 * @param cert the Certificate to be processed 176 public void check(Certificate cert, Collection<String> unresCritExts [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
PrivateKeyUsageExtension.java | 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateParsingException; 32 import java.security.cert.CertificateExpiredException; 33 import java.security.cert.CertificateNotYetValidException;
|
X509CRLEntryImpl.java | 29 import java.security.cert.CRLException; 30 import java.security.cert.CRLReason; 31 import java.security.cert.X509CRLEntry; 506 public Map<String, java.security.cert.Extension> getExtensions() { 511 Map<String, java.security.cert.Extension> map = new TreeMap<>();
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
ForwardingX509ExtendedKeyManager.java | 22 import java.security.cert.X509Certificate;
|
TestKeyManager.java | 23 import java.security.cert.CertificateException; 24 import java.security.cert.X509Certificate; 131 for (X509Certificate cert : certs) { 132 out.print(cert.getSubjectDN());
|
/packages/services/Telecomm/testapps/src/com/android/server/telecom/testapps/ |
TestCertActivity.java | 181 JSONObject cert = certificates.getJSONObject(i); local 182 String key = cert.getString("key"); 183 int type = cert.getInt("type"); 184 String identifier = cert.getString("identifier");
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.CertificateEncodingException; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateFactory; 36 import java.security.cert.X509Certificate; 132 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); local 133 x509Certificate = (X509Certificate) cert;
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 41 import javax.security.cert.X509Certificate; 573 public java.security.cert.X509Certificate[] getAcceptedIssuers() { 574 return new java.security.cert.X509Certificate[0]; 586 java.security.cert.X509Certificate[] chain, String authType) 592 java.security.cert.X509Certificate[] chain, String authType)
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateEncodingException; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.X509Certificate; 137 final X509Certificate cert = parseCertificate(caCertificate); 139 mTrustedCertificateStore.installCertificate(cert); 140 alias = mTrustedCertificateStore.getCertificateAlias(cert); 355 Log.w(TAG, "Error retrieving cert chain for root " + rootAlias);
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8_x509.c | 338 CBS cert_bag, cert_type, wrapped_cert, cert; local 343 !CBS_get_asn1(&wrapped_cert, &cert, CBS_ASN1_OCTETSTRING)) { 354 if (CBS_len(&cert) > LONG_MAX) { 359 const uint8_t *inp = CBS_data(&cert); 360 X509 *x509 = d2i_X509(NULL, &inp, (long)CBS_len(&cert)); 366 if (inp != CBS_data(&cert) + CBS_len(&cert)) { 772 X509 *cert = NULL; local 773 if (!PKCS12_parse(p12, password, &pkey, &cert, NULL)) { 779 X509_free(cert); [all...] |
/external/wpa_supplicant_8/hs20/client/ |
est.c | 65 certs = p7->d.sign->cert; 68 certs = p7->d.signed_and_enveloped->cert; 97 X509 *cert = sk_X509_value(certs, i); local 98 X509_print(out, cert); 99 PEM_write_bio_X509(out, cert); 138 res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt", 153 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 155 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); 183 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem", 191 unlink("Cert/est-cacerts.txt") 431 X509 *cert; local [all...] |
/libcore/ojluni/src/main/java/java/util/jar/ |
JarVerifier.java | 33 import java.security.cert.CertificateException; 337 * Return an array of java.security.cert.Certificate objects for 342 public java.security.cert.Certificate[] getCerts(String name) 347 public java.security.cert.Certificate[] getCerts(JarFile jar, JarEntry entry) 388 private static java.security.cert.Certificate[] mapSignersToCertArray( 392 ArrayList<java.security.cert.Certificate> certChains = new ArrayList<>(); 400 new java.security.cert.Certificate[certChains.size()]); 613 java.security.cert.Certificate[] vcerts; 623 VerifierCodeSource(Object csdomain, URL location, java.security.cert.Certificate[] certs) { 673 private java.security.cert.Certificate[] getPrivateCertificates() [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 8 // 'cert.pem' and 'key.pem' and will overwrite existing files. 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 145 certOut, err := os.Create("cert.pem") 147 log.Fatalf("failed to open cert.pem for writing: %s", err) 151 log.Print("written cert.pem\n")
|
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 47 priv, ok := cert.PrivateKey.(crypto.Decrypter) 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 78 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret) 192 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 257 priv, ok := cert.PrivateKey.(crypto.Signer) 301 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 337 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 8 // 'cert.pem' and 'key.pem' and will overwrite existing files. 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 145 certOut, err := os.Create("cert.pem") 147 log.Fatalf("failed to open cert.pem for writing: %s", err) 151 log.Print("written cert.pem\n")
|
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 47 priv, ok := cert.PrivateKey.(crypto.Decrypter) 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 78 encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSecret) 192 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 257 priv, ok := cert.PrivateKey.(crypto.Signer) 301 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 337 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error [all...] |
/external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 31 import java.security.cert.CertificateException; 32 import java.security.cert.PKIXBuilderParameters; 33 import java.security.cert.PKIXParameters; 34 import java.security.cert.X509CertSelector; 35 import java.security.cert.X509Certificate; 266 // unlike PKIXParameters(KeyStore), the cert chain of the key should be trusted.
|
/external/libvncserver/webclients/java-applet/ssl/ |
SignedVncViewer.jar | |
VncViewer.jar | |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
CertificateMonitor.java | 48 import java.security.cert.CertificateException; 49 import java.security.cert.CertificateFactory; 50 import java.security.cert.X509Certificate; 83 X509Certificate cert = parseCert(certBuffer); local 84 pemCert = Credentials.convertToPem(cert); 86 Log.e(LOG_TAG, "Problem converting cert", ce);
|
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
NetworkSecurityConfigTests.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); external variable declarations 90 TEST_CA_CERT = (X509Certificate) cert;
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 25 import java.security.cert.CertificateException; 26 import java.security.cert.PKIXBuilderParameters; 27 import java.security.cert.PKIXParameters; 28 import java.security.cert.X509CertSelector; 29 import java.security.cert.X509Certificate; 249 // unlike PKIXParameters(KeyStore), the cert chain of the key should be trusted.
|