HomeSort by relevance Sort by last modified time
    Searched defs:certificate (Results 1 - 25 of 581) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/security/net/config/
TrustAnchor.java 23 public final X509Certificate certificate; field in class:TrustAnchor
26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) {
27 if (certificate == null) {
28 throw new NullPointerException("certificate");
30 this.certificate = certificate;
  /frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/
CertParsingException.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
CertValidationException.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 29 import java.security.cert.Certificate;
61 * <p>If you have a CA certificate which needs to be trusted by a particular app/service,
66 * <p>If you have a CA certificate that you believe should be present on all Android devices,
89 * This test exists because adding new ca certificate or removing the ca certificates trusted by
143 Certificate cert = certFactory.generateCertificate(fis);
161 X509Certificate certificate = (X509Certificate) wfaKeyStore.getCertificate(alias); local
162 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID());
163 assertNotNull(certificate.getSubjectDN());
164 assertNotNull(certificate.getIssuerDN())
182 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local
    [all...]
  /build/soong/java/
app.go 35 // path to a certificate, or the name of a certificate in the default
36 // certificate directory, or blank to use the default product certificate
37 Certificate *string
61 certificate certificate
76 type certificate struct { type
143 c := String(a.appProperties.Certificate)
147 a.certificate = certificate{pem, key
    [all...]
  /external/apache-http/android/src/android/net/http/
LoggingEventHandler.java 69 public void certificate(SslCertificate certificate) { method in class:LoggingEventHandler
71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
EventHandler.java 24 * there is an SSL certificate error. error() can occur anywhere
107 * SSL certificate callback called before resource request is
110 public void certificate(SslCertificate certificate); method in interface:EventHandler
120 * SSL certificate error callback. Handles SSL error(s) on the way
  /external/webrtc/webrtc/base/
rtccertificate_unittests.cc 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate";
76 // Certificate type does not matter for our purposes, using ECDSA because it
86 // Generate a real certificate without specifying the expiration time.
87 // Certificate type doesn't matter, using ECDSA because it's fast to generate.
90 scoped_refptr<RTCCertificate> certificate = local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now));
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60));
102 scoped_refptr<RTCCertificate> certificate = local
104 EXPECT_EQ(now, ExpiresSeconds(certificate));
108 // Generate a certificate that expires in 1s
110 scoped_refptr<RTCCertificate> certificate = local
    [all...]
fakesslidentity.h 100 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory.h 37 // The certificate to use when setting up DTLS.
38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory
44 // Specifies the certificate to use (only used when secure != SEC_DISABLED).
46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
47 certificate_ = certificate;
  /libcore/luni/src/test/java/tests/security/
CertificateFactoryTest.java 20 import java.security.cert.Certificate;
43 Certificate certificate = certificateFactory.generateCertificate( local
45 assertNotNull(certificate);
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
JcaContentVerifierProviderBuilder.java 56 public ContentVerifierProvider build(final X509Certificate certificate)
63 certHolder = new JcaX509CertificateHolder(certificate);
67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
91 sig.initVerify(certificate.getPublicKey());
100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 32 import java.security.cert.Certificate;
45 * SSL certificate info (certificate details) class
55 * Name of the entity this certificate is issued to
60 * Name of the entity this certificate is issued by
75 * The original source certificate, if available.
90 private static final String X509_CERTIFICATE = "x509-certificate";
93 * Saves the certificate state to a bundle
94 * @param certificate The SSL certificate to stor
184 certificate); local
    [all...]
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
CertificateEntry.java 57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */
58 private final byte[] certificate; field in class:CertificateEntry
60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) {
73 this.certificate = certificate;
87 throw new CertificateException("Certificate does not contain embedded signed timestamps");
118 return certificate;
132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
HostnameVerifierTest.java 49 + "-----BEGIN CERTIFICATE-----\n"
73 + "-----END CERTIFICATE-----\n");
84 + "-----BEGIN CERTIFICATE-----\n"
108 + "-----END CERTIFICATE-----\n");
118 + "-----BEGIN CERTIFICATE-----\n"
143 + "-----END CERTIFICATE-----\n");
159 + "-----BEGIN CERTIFICATE-----\n"
184 + "-----END CERTIFICATE-----\n");
200 + "-----BEGIN CERTIFICATE-----\n"
224 + "-----END CERTIFICATE-----\n")
409 X509Certificate certificate = certificate("" local
561 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/
SigXmlTest.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 26 import java.security.cert.Certificate;
36 String certificateData = "-----BEGIN CERTIFICATE-----\n"
50 + "-----END CERTIFICATE-----\n";
62 Certificate certificate = cf.generateCertificate(certArray); local
63 assertTrue(certificate instanceof X509Certificate);
65 String algorithm = certificate.getPublicKey().getAlgorithm();
71 // If all the certificate in the chain is X509Certificate,
74 privateKey, new Certificate[] { certificate });
    [all...]
  /libcore/luni/src/test/java/tests/targets/security/
KeyStoreTest.java 33 import java.security.cert.Certificate;
103 Certificate certificate = null; local
105 certificate = certificateFactory
114 generator = KeyPairGenerator.getInstance(certificate.getPublicKey()
123 .getPrivate(), new Certificate[] {certificate});
167 private String encodedCertificate = "-----BEGIN CERTIFICATE-----\n"
189 + "-----END CERTIFICATE-----\n";
  /prebuilts/go/darwin-x86/src/encoding/pem/
pem_test.go 42 if !reflect.DeepEqual(result, certificate) {
43 t.Errorf("#0 got:%#v want:%#v", result, certificate)
283 -----BEGIN CERTIFICATE-----
285 -----BEGIN CERTIFICATE-----
287 Certificate chain
290 -----BEGIN CERTIFICATE-----
292 -----BEGIN CERTIFICATE-----
293 -----BEGIN CERTIFICATE-----
315 -----END CERTIFICATE-----
362 var certificate = &Block{Type: "CERTIFICATE" var
    [all...]
  /prebuilts/go/linux-x86/src/encoding/pem/
pem_test.go 42 if !reflect.DeepEqual(result, certificate) {
43 t.Errorf("#0 got:%#v want:%#v", result, certificate)
283 -----BEGIN CERTIFICATE-----
285 -----BEGIN CERTIFICATE-----
287 Certificate chain
290 -----BEGIN CERTIFICATE-----
292 -----BEGIN CERTIFICATE-----
293 -----BEGIN CERTIFICATE-----
315 -----END CERTIFICATE-----
362 var certificate = &Block{Type: "CERTIFICATE" var
    [all...]
  /system/update_engine/
certificate_checker.cc 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); local
43 TEST_AND_RETURN_FALSE(certificate);
50 bool success = X509_digest(certificate, digest_function, out_digest, &len);
87 // which will be called after each server certificate is validated. However,
89 // callback, the certificate check will have to be done statically. Since we
91 // certificate, we hardcode Chrome OS's two known update servers here, and
140 // certificate. We store a report to UMA and just propagate the fail result.
154 LOG(WARNING) << "Failed to generate digest of X509 certificate "
168 // If there's no stored certificate, we just store the current one and return.
171 LOG(WARNING) << "Failed to store server certificate on storage key
    [all...]
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertificateTest.java 27 import java.security.cert.Certificate;
60 * Following certificate chain was taken from https://www.verisign.com and
61 * uses MD2withRSA for the root certificate. This chain stops validating
66 * A selfsigned certificate using MD2withRSA
69 * Certificate:
106 "-----BEGIN CERTIFICATE-----\n"
119 + "-----END CERTIFICATE-----\n";
122 * A certificate signed by selfSignedCertMD2
125 * Certificate:
165 * Certificate Sign, CRL Sig
616 Certificate certificate = certificateFactory local
629 Certificate certificate = certificateFactory local
    [all...]
  /cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/
CertInstallerReceiver.java 32 import java.security.cert.Certificate;
36 * Delegated certificate installer app that responds to specific intents and executes various DPM
37 * certificate manipulation APIs. The following APIs are exercised:
128 Certificate certificate = CertificateFactory.getInstance("X.509") local
138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias),
160 Certificate certificateToMatch = readCertificate(toMatch);
162 Certificate cert = readCertificate(certBuffer);
170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
  /cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/
CertInstallDelegateTest.java 37 import java.security.cert.Certificate;
54 "-----BEGIN CERTIFICATE-----\n" +
74 "-----END CERTIFICATE-----";
143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert));
146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert));
149 assertTrue("Certificate is not among installed certs",
154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert));
164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local
168 mDpm.installKeyPair(null, privatekey, certificate, alias))
    [all...]
  /development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/
PackageValidator.java 45 * Map allowed callers' certificate keys to the expected caller information.
66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local
68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
70 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
73 validCertificates.put(certificate, infos);
77 " certificate=", certificate);
107 LogHelper.w(TAG, "Caller has more than one signature certificate!");
126 // Check if the package name is valid for the certificate:
137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any "
    [all...]

Completed in 757 milliseconds

1 2 3 4 5 6 7 8 91011>>