/frameworks/base/core/java/android/security/net/config/ |
TrustAnchor.java | 23 public final X509Certificate certificate; field in class:TrustAnchor 26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { 27 if (certificate == null) { 28 throw new NullPointerException("certificate"); 30 this.certificate = certificate;
|
/external/syslinux/gpxe/src/crypto/ |
x509.c | 41 * Identify X.509 certificate public key 43 * @v certificate Certificate 48 static int x509_public_key ( const struct asn1_cursor *certificate, 55 memcpy ( &cursor, certificate, sizeof ( cursor ) ); 56 rc = ( asn1_enter ( &cursor, ASN1_SEQUENCE ), /* Certificate */ 67 DBG_HDA ( 0, certificate->data, certificate->len ); 76 DBG_HDA ( 0, certificate->data, certificate->len ) [all...] |
/external/curl/docs/cmdline-opts/ |
cert.d | 3 Arg: <certificate[:password]> 4 Help: Client certificate file and password 8 Tells curl to use the specified client certificate file when getting a file 9 with HTTPS, FTPS or another SSL-based protocol. The certificate must be in 12 the terminal. Note that this option assumes a \&"certificate" file that is the 13 private key and the client certificate concatenated! See --cert and --key to 17 curl the nickname of the certificate to use within the NSS database defined 27 certificate string can either be the name of a certificate/private key in the 28 system or user keychain, or the path to a PKCS#12-encoded certificate an [all...] |
cert-status.d | 4 Help: Verify the status of the server certificate 6 Tells curl to verify the status of the server certificate by using the 7 Certificate Status Request (aka. OCSP stapling) TLS extension. 10 response, if the response suggests that the server certificate has been revoked,
|
proxy-cert-type.d | 4 Help: Client certificate type for HTTS proxy
|
proxy-cert.d | 3 Help: Set client certificate for proxy
|
cert-type.d | 4 Help: Certificate file type (DER/PEM/ENG) 7 Tells curl what certificate type the provided certificate is in. PEM, DER and
|
/frameworks/base/core/java/android/net/http/ |
SslError.java | 23 * certificate. 32 * The certificate is not yet valid 36 * The certificate has expired 44 * The certificate authority is not trusted 48 * The date of the certificate is invalid 73 * The SSL certificate associated with the error set 83 * Creates a new SslError object using the supplied error and certificate. 86 * @param certificate The associated SSL certificate 90 public SslError(int error, SslCertificate certificate) { [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
AuthorityKeyIdentifierStructure.java | 63 X509Certificate certificate) 68 if (certificate.getVersion() != 3) 70 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 71 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded()); 74 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); 78 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 80 byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()); 87 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); 91 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded()); 94 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive() [all...] |
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate"; 76 // Certificate type does not matter for our purposes, using ECDSA because it 86 // Generate a real certificate without specifying the expiration time. 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 90 scoped_refptr<RTCCertificate> certificate = local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); 102 scoped_refptr<RTCCertificate> certificate = local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); 108 // Generate a certificate that expires in 1s 110 scoped_refptr<RTCCertificate> certificate = local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
CertificatePinnerTest.java | 49 certA1Pin = CertificatePinner.pin(certA1.certificate); 55 certB1Pin = CertificatePinner.pin(certB1.certificate); 61 certC1Pin = CertificatePinner.pin(certC1.certificate); 95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); 101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); 113 certificatePinner.check("example.com", certA1.certificate); 121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); 130 certificatePinner.check("example.com", certB1.certificate); 141 certificatePinner.check("example.com", certA1.certificate); [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 63 Certificate[] certificates = session.getPeerCertificates(); 70 public boolean verify(String host, X509Certificate certificate) { 72 ? verifyIpAddress(host, certificate) 73 : verifyHostName(host, certificate); 81 * Returns true if {@code certificate} matches {@code ipAddress}. 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 84 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); 94 * Returns true if {@code certificate} matches {@code hostName}. 96 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory.h | 37 // The certificate to use when setting up DTLS. 38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory 44 // Specifies the certificate to use (only used when secure != SEC_DISABLED). 46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 47 certificate_ = certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
IssuerAndSerialNumber.java | 12 import org.bouncycastle.asn1.x509.Certificate; 73 Certificate certificate) 75 this.name = certificate.getIssuer(); 76 this.serialNumber = certificate.getSerialNumber(); 80 * @deprecated use constructor taking Certificate 83 X509CertificateStructure certificate) 85 this.name = certificate.getIssuer(); 86 this.serialNumber = certificate.getSerialNumber();
|
/tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/zfile/ |
ApkCreatorFactory.java | 61 * Certificate used to sign the APK. Is {@code null} if and only if {@link #key} is 65 private final X509Certificate certificate; field in class:ApkCreatorFactory.CreationData 111 * @param certificate certificate used to sign the APK. Is {@code null} if and only if 129 @Nullable X509Certificate certificate, 137 Preconditions.checkArgument((key == null) == (certificate == null), 138 "(key == null) != (certificate == null)"); 143 this.certificate = certificate; 175 * Obtains the certificate used to sign the APK [all...] |
/external/apache-http/android/src/android/net/http/ |
EventHandler.java | 24 * there is an SSL certificate error. error() can occur anywhere 107 * SSL certificate callback called before resource request is 110 public void certificate(SslCertificate certificate); method in interface:EventHandler 120 * SSL certificate error callback. Handles SSL error(s) on the way
|
/libcore/luni/src/test/java/tests/security/ |
CertificateFactoryTest.java | 20 import java.security.cert.Certificate; 43 Certificate certificate = certificateFactory.generateCertificate( local 45 assertNotNull(certificate);
|
/external/boringssl/src/ssl/test/runner/ |
alert.go | 59 alertNoCertificate: "no certificate", 60 alertBadCertificate: "bad certificate", 61 alertUnsupportedCertificate: "unsupported certificate", 62 alertCertificateRevoked: "revoked certificate", 63 alertCertificateExpired: "expired certificate", 64 alertCertificateUnknown: "unknown certificate", 66 alertUnknownCA: "unknown certificate authority", 80 alertCertificateRequired: "certificate required",
|
/external/syslinux/gpxe/src/include/gpxe/ |
x509.h | 38 extern int x509_rsa_public_key ( const struct asn1_cursor *certificate,
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/ |
CertParsingException.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
CertValidationException.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
HeldCertificate.java | 34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on 35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other 36 * held certificates, as done in practice by certificate authorities. 39 public final X509Certificate certificate; field in class:HeldCertificate 42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) { 43 this.certificate = certificate; 65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is 66 * the CN (common name) in the certificate. Will be a random string if no value is provided. 79 * Set the certificate that signs this certificate. If unset, a self-signed certificate will b 133 X509Certificate certificate = generator.generateX509Certificate( local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
CertificateChainCleanerTest.java | 20 import java.security.cert.Certificate; 36 new RealTrustRootIndex(root.certificate)); 67 new RealTrustRootIndex(root.certificate)); 85 new RealTrustRootIndex(root.certificate)); 107 new RealTrustRootIndex(root.certificate)); 129 new RealTrustRootIndex(root.certificate)); 150 new RealTrustRootIndex(root.certificate)); 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); 194 HeldCertificate certificate = new HeldCertificate.Builder( local [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 29 import java.security.cert.Certificate; 61 * <p>If you have a CA certificate which needs to be trusted by a particular app/service, 66 * <p>If you have a CA certificate that you believe should be present on all Android devices, 89 * This test exists because adding new ca certificate or removing the ca certificates trusted by 143 Certificate cert = certFactory.generateCertificate(fis); 161 X509Certificate certificate = (X509Certificate) wfaKeyStore.getCertificate(alias); local 162 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID()); 163 assertNotNull(certificate.getSubjectDN()); 164 assertNotNull(certificate.getIssuerDN()) 182 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local [all...] |