HomeSort by relevance Sort by last modified time
    Searched refs:certificate (Results 1 - 25 of 832) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/security/net/config/
TrustAnchor.java 23 public final X509Certificate certificate; field in class:TrustAnchor
26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) {
27 if (certificate == null) {
28 throw new NullPointerException("certificate");
30 this.certificate = certificate;
  /external/syslinux/gpxe/src/crypto/
x509.c 41 * Identify X.509 certificate public key
43 * @v certificate Certificate
48 static int x509_public_key ( const struct asn1_cursor *certificate,
55 memcpy ( &cursor, certificate, sizeof ( cursor ) );
56 rc = ( asn1_enter ( &cursor, ASN1_SEQUENCE ), /* Certificate */
67 DBG_HDA ( 0, certificate->data, certificate->len );
76 DBG_HDA ( 0, certificate->data, certificate->len )
    [all...]
  /external/curl/docs/cmdline-opts/
cert.d 3 Arg: <certificate[:password]>
4 Help: Client certificate file and password
8 Tells curl to use the specified client certificate file when getting a file
9 with HTTPS, FTPS or another SSL-based protocol. The certificate must be in
12 the terminal. Note that this option assumes a \&"certificate" file that is the
13 private key and the client certificate concatenated! See --cert and --key to
17 curl the nickname of the certificate to use within the NSS database defined
27 certificate string can either be the name of a certificate/private key in the
28 system or user keychain, or the path to a PKCS#12-encoded certificate an
    [all...]
cert-status.d 4 Help: Verify the status of the server certificate
6 Tells curl to verify the status of the server certificate by using the
7 Certificate Status Request (aka. OCSP stapling) TLS extension.
10 response, if the response suggests that the server certificate has been revoked,
proxy-cert-type.d 4 Help: Client certificate type for HTTS proxy
proxy-cert.d 3 Help: Set client certificate for proxy
cert-type.d 4 Help: Certificate file type (DER/PEM/ENG)
7 Tells curl what certificate type the provided certificate is in. PEM, DER and
  /frameworks/base/core/java/android/net/http/
SslError.java 23 * certificate.
32 * The certificate is not yet valid
36 * The certificate has expired
44 * The certificate authority is not trusted
48 * The date of the certificate is invalid
73 * The SSL certificate associated with the error set
83 * Creates a new SslError object using the supplied error and certificate.
86 * @param certificate The associated SSL certificate
90 public SslError(int error, SslCertificate certificate) {
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
AuthorityKeyIdentifierStructure.java 63 X509Certificate certificate)
68 if (certificate.getVersion() != 3)
70 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
71 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded());
74 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive();
78 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
80 byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId());
87 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive();
91 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded());
94 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive()
    [all...]
  /external/webrtc/webrtc/base/
rtccertificate_unittests.cc 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate";
76 // Certificate type does not matter for our purposes, using ECDSA because it
86 // Generate a real certificate without specifying the expiration time.
87 // Certificate type doesn't matter, using ECDSA because it's fast to generate.
90 scoped_refptr<RTCCertificate> certificate = local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now));
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60));
102 scoped_refptr<RTCCertificate> certificate = local
104 EXPECT_EQ(now, ExpiresSeconds(certificate));
108 // Generate a certificate that expires in 1s
110 scoped_refptr<RTCCertificate> certificate = local
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
CertificatePinnerTest.java 49 certA1Pin = CertificatePinner.pin(certA1.certificate);
55 certB1Pin = CertificatePinner.pin(certB1.certificate);
61 certC1Pin = CertificatePinner.pin(certC1.certificate);
95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate);
101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate);
113 certificatePinner.check("example.com", certA1.certificate);
121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate);
130 certificatePinner.check("example.com", certB1.certificate);
141 certificatePinner.check("example.com", certA1.certificate);
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
OkHostnameVerifier.java 20 import java.security.cert.Certificate;
63 Certificate[] certificates = session.getPeerCertificates();
70 public boolean verify(String host, X509Certificate certificate) {
72 ? verifyIpAddress(host, certificate)
73 : verifyHostName(host, certificate);
81 * Returns true if {@code certificate} matches {@code ipAddress}.
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) {
84 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME);
94 * Returns true if {@code certificate} matches {@code hostName}.
96 private boolean verifyHostName(String hostName, X509Certificate certificate) {
    [all...]
  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory.h 37 // The certificate to use when setting up DTLS.
38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory
44 // Specifies the certificate to use (only used when secure != SEC_DISABLED).
46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
47 certificate_ = certificate;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
IssuerAndSerialNumber.java 12 import org.bouncycastle.asn1.x509.Certificate;
73 Certificate certificate)
75 this.name = certificate.getIssuer();
76 this.serialNumber = certificate.getSerialNumber();
80 * @deprecated use constructor taking Certificate
83 X509CertificateStructure certificate)
85 this.name = certificate.getIssuer();
86 this.serialNumber = certificate.getSerialNumber();
  /tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/zfile/
ApkCreatorFactory.java 61 * Certificate used to sign the APK. Is {@code null} if and only if {@link #key} is
65 private final X509Certificate certificate; field in class:ApkCreatorFactory.CreationData
111 * @param certificate certificate used to sign the APK. Is {@code null} if and only if
129 @Nullable X509Certificate certificate,
137 Preconditions.checkArgument((key == null) == (certificate == null),
138 "(key == null) != (certificate == null)");
143 this.certificate = certificate;
175 * Obtains the certificate used to sign the APK
    [all...]
  /external/apache-http/android/src/android/net/http/
EventHandler.java 24 * there is an SSL certificate error. error() can occur anywhere
107 * SSL certificate callback called before resource request is
110 public void certificate(SslCertificate certificate); method in interface:EventHandler
120 * SSL certificate error callback. Handles SSL error(s) on the way
  /libcore/luni/src/test/java/tests/security/
CertificateFactoryTest.java 20 import java.security.cert.Certificate;
43 Certificate certificate = certificateFactory.generateCertificate( local
45 assertNotNull(certificate);
  /external/boringssl/src/ssl/test/runner/
alert.go 59 alertNoCertificate: "no certificate",
60 alertBadCertificate: "bad certificate",
61 alertUnsupportedCertificate: "unsupported certificate",
62 alertCertificateRevoked: "revoked certificate",
63 alertCertificateExpired: "expired certificate",
64 alertCertificateUnknown: "unknown certificate",
66 alertUnknownCA: "unknown certificate authority",
80 alertCertificateRequired: "certificate required",
  /external/syslinux/gpxe/src/include/gpxe/
x509.h 38 extern int x509_rsa_public_key ( const struct asn1_cursor *certificate,
  /frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/
CertParsingException.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
CertValidationException.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 26 import java.security.cert.Certificate;
36 String certificateData = "-----BEGIN CERTIFICATE-----\n"
50 + "-----END CERTIFICATE-----\n";
62 Certificate certificate = cf.generateCertificate(certArray); local
63 assertTrue(certificate instanceof X509Certificate);
65 String algorithm = certificate.getPublicKey().getAlgorithm();
71 // If all the certificate in the chain is X509Certificate,
74 privateKey, new Certificate[] { certificate });
    [all...]
  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
HeldCertificate.java 34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on
35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other
36 * held certificates, as done in practice by certificate authorities.
39 public final X509Certificate certificate; field in class:HeldCertificate
42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) {
43 this.certificate = certificate;
65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is
66 * the CN (common name) in the certificate. Will be a random string if no value is provided.
79 * Set the certificate that signs this certificate. If unset, a self-signed certificate will b
133 X509Certificate certificate = generator.generateX509Certificate( local
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
CertificateChainCleanerTest.java 20 import java.security.cert.Certificate;
36 new RealTrustRootIndex(root.certificate));
67 new RealTrustRootIndex(root.certificate));
85 new RealTrustRootIndex(root.certificate));
107 new RealTrustRootIndex(root.certificate));
129 new RealTrustRootIndex(root.certificate));
150 new RealTrustRootIndex(root.certificate));
173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate));
194 HeldCertificate certificate = new HeldCertificate.Builder( local
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 29 import java.security.cert.Certificate;
61 * <p>If you have a CA certificate which needs to be trusted by a particular app/service,
66 * <p>If you have a CA certificate that you believe should be present on all Android devices,
89 * This test exists because adding new ca certificate or removing the ca certificates trusted by
143 Certificate cert = certFactory.generateCertificate(fis);
161 X509Certificate certificate = (X509Certificate) wfaKeyStore.getCertificate(alias); local
162 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID());
163 assertNotNull(certificate.getSubjectDN());
164 assertNotNull(certificate.getIssuerDN())
182 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local
    [all...]

Completed in 583 milliseconds

1 2 3 4 5 6 7 8 91011>>