/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
CertificateChainCleanerTest.java | 20 import java.security.cert.Certificate; 36 new RealTrustRootIndex(root.certificate)); 67 new RealTrustRootIndex(root.certificate)); 85 new RealTrustRootIndex(root.certificate)); 107 new RealTrustRootIndex(root.certificate)); 129 new RealTrustRootIndex(root.certificate)); 150 new RealTrustRootIndex(root.certificate)); 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); 194 HeldCertificate certificate = new HeldCertificate.Builder( local [all...] |
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 33 import java.security.cert.Certificate; 183 Certificate intermediate1 = pke1.getCertificateChain()[1]; 184 Certificate root1 = TestKeyStore.getClientCertificate().getRootCertificate("RSA"); 194 Certificate intermediate2 = pke2.getCertificateChain()[1]; 195 Certificate root2 = TestKeyStore.getServer().getRootCertificate("RSA"); 232 byte[] certificate = mService.getCertificate(alias1); 233 assertNotNull(certificate); 235 Arrays.toString(certificate));
|
/external/okhttp/okhttp-android-support/src/main/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverter.java | 41 import java.security.cert.Certificate; 118 Certificate[] peerCertificates; 125 Certificate[] localCertificates = httpsUrlConnection.getLocalCertificates(); 242 List<Certificate> peerCertificates; 248 List<Certificate> localCertificates = javaSecureCacheResponse.getLocalCertificateChain(); 301 public List<Certificate> getLocalCertificateChain() { 304 List<Certificate> certificates = handshake.localCertificates(); 309 public List<Certificate> getServerCertificateChain() throws SSLPeerUnverifiedException { 312 List<Certificate> certificates = handshake.peerCertificates();
|
/libcore/ojluni/src/main/java/java/util/jar/ |
JarVerifier.java | 337 * Return an array of java.security.cert.Certificate objects for 342 public java.security.cert.Certificate[] getCerts(String name) 347 public java.security.cert.Certificate[] getCerts(JarFile jar, JarEntry entry) 385 * Convert an array of signers into an array of concatenated certificate 388 private static java.security.cert.Certificate[] mapSignersToCertArray( 392 ArrayList<java.security.cert.Certificate> certChains = new ArrayList<>(); 398 // Convert into a Certificate[] 400 new java.security.cert.Certificate[certChains.size()]); 613 java.security.cert.Certificate[] vcerts; 623 VerifierCodeSource(Object csdomain, URL location, java.security.cert.Certificate[] certs) [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 23 // NotAuthorizedToSign results when a certificate is signed by another 24 // which isn't marked as a CA certificate. 26 // Expired results when a certificate has expired, based on the time 30 // certificate has a name constraint which doesn't permit a DNS or 31 // other name (including IP address) in the leaf certificate. 36 // IncompatibleUsage results when the certificate's key usage indicates 39 // NameMismatch results when the subject name of a parent certificate 42 // NameConstraintsWithoutSANs results when a leaf certificate doesn't 43 // contain a Subject Alternative Name extension, but a CA certificate 46 // UnconstrainedName results when a CA certificate contains permitte [all...] |
x509_test_import.go | 28 template := x509.Certificate{ 40 panic("failed to create certificate with basic imports: " + err.Error())
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 23 // NotAuthorizedToSign results when a certificate is signed by another 24 // which isn't marked as a CA certificate. 26 // Expired results when a certificate has expired, based on the time 30 // certificate has a name constraint which doesn't permit a DNS or 31 // other name (including IP address) in the leaf certificate. 36 // IncompatibleUsage results when the certificate's key usage indicates 39 // NameMismatch results when the subject name of a parent certificate 42 // NameConstraintsWithoutSANs results when a leaf certificate doesn't 43 // contain a Subject Alternative Name extension, but a CA certificate 46 // UnconstrainedName results when a CA certificate contains permitte [all...] |
x509_test_import.go | 28 template := x509.Certificate{ 40 panic("failed to create certificate with basic imports: " + err.Error())
|
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverterTest.java | 39 import java.security.cert.Certificate; 70 private static final X509Certificate LOCAL_CERT = certificate("" 71 + "-----BEGIN CERTIFICATE-----\n" 80 + "-----END CERTIFICATE-----"); 83 private static final X509Certificate SERVER_CERT = certificate("" 84 + "-----BEGIN CERTIFICATE-----\n" 94 + "-----END CERTIFICATE-----"); 161 final List<Certificate> localCertificates = Arrays.<Certificate>asList(LOCAL_CERT); 163 final List<Certificate> serverCertificates = Arrays.<Certificate>asList(SERVER_CERT) 622 private static X509Certificate certificate(String certificate) { method in class:JavaApiConverterTest [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 50 import java.security.cert.Certificate; 77 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 82 * with a single certificate. 106 public Certificate[] engineGetCertificateChain(String alias) { 116 final Certificate[] caList; 122 caList = new Certificate[caChain.size() + 1]; 130 caList = new Certificate[1]; 139 public Certificate engineGetCertificate(String alias) { 154 // This entry/alias does not contain a certificate. 158 private Certificate getCertificateForTrustedCertificateEntry(byte[] encodedCert) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 76 // creating a certificate 77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 91 + "-----END CERTIFICATE-----\n"; 93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 95 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 109 + "-----END CERTIFICATE-----\n"; 113 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 132 + "-----END CERTIFICATE-----\n" [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
AdminActionBookkeepingTest.java | 26 import java.security.cert.Certificate; 37 "-----BEGIN CERTIFICATE-----\n" + 57 "-----END CERTIFICATE-----"; 190 final Certificate cert = CertificateFactory.getInstance("X.509")
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-resourcesrc/src/android/security/net/config/cts/ |
ResourceSourceTest.java | 25 import java.security.cert.Certificate; 77 for (Certificate cert : factory.generateCertificates(is)) {
|
/cts/tests/tests/networksecurityconfig/src/android/security/net/config/cts/ |
TestUtils.java | 27 import java.security.cert.Certificate; 85 for (Certificate c : factory.generateCertificates(is)) {
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509v3CertificateBuilder.java | 11 import org.bouncycastle.asn1.x509.Certificate; 21 * class to produce an X.509 Version 3 certificate. 29 * Create a builder for a version 3 certificate. 31 * @param issuer the certificate issuer 32 * @param serial the certificate serial number 33 * @param notBefore the date before which the certificate is not valid 34 * @param notAfter the date after which the certificate is not valid 35 * @param subject the certificate subject 36 * @param publicKeyInfo the info structure for the public key to be associated with this certificate. 44 * Create a builder for a version 3 certificate. You may need to use this constructor if the default local [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
BasicOCSPResp.java | 16 import org.bouncycastle.asn1.x509.Certificate; 30 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 158 certs[i] = new X509CertificateHolder(Certificate.getInstance(s.getObjectAt(i)));
|
OCSPReq.java | 17 import org.bouncycastle.asn1.x509.Certificate; 41 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL} 195 certs[i] = new X509CertificateHolder(Certificate.getInstance(s.getObjectAt(i)));
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
ExternalSession.java | 20 import java.security.cert.Certificate; 115 public Certificate[] getLocalCertificates() {
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 63 Certificate[] certificates = session.getPeerCertificates(); 70 public boolean verify(String host, X509Certificate certificate) { 72 ? verifyIpAddress(host, certificate) 73 : verifyHostName(host, certificate); 81 * Returns true if {@code certificate} matches {@code ipAddress}. 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 84 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); 94 * Returns true if {@code certificate} matches {@code hostName}. 96 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 45 import java.security.cert.Certificate; 86 "-----BEGIN CERTIFICATE-----\n" 104 + "-----END CERTIFICATE-----\n"; 107 "-----BEGIN CERTIFICATE-----\r\n" 125 + "-----END CERTIFICATE-----\r\n"; 127 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n" 149 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n" 153 "-----BEGIN CERTIFICATE-----\n" 188 + "-----END CERTIFICATE-----"; 209 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid)) 309 Certificate certificate = cf.generateCertificate(certStream); local 540 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder [all...] |
X509CertSelectorTest.java | 22 import java.security.cert.Certificate; 155 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { 156 byte[] encoded = certificate.getEncoded();
|
/libcore/luni/src/test/java/libcore/java/util/zip/ |
OldAndroidZipStressTest.java | 22 import java.security.cert.Certificate; 50 Certificate[] certs = je != null ? je.getCertificates() : null;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory1Test.java | 41 import java.security.cert.Certificate; 376 assertTrue("Not empty certificate collection", colCer.isEmpty()); 435 Certificate cer; 446 assertNull("Not null certificate was created", cer); 453 assertTrue("Not empty certificate Collection was created", colCer.isEmpty()); 577 List<Certificate> list = null; 598 List<Certificate> list = new Vector<Certificate>(); 601 List<? extends Certificate> list1 = cp.getCertificates(); 609 * incorrect Certificate [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
ConstraintsChecker.java | 29 import java.security.cert.Certificate; 47 * constraints information on a PKIX certificate, namely basic constraints 105 * checks on the certificate using its internal state. 107 * @param cert the <code>Certificate</code> to be checked 110 * @throws CertPathValidatorException if the specified certificate 114 public void check(Certificate cert, Collection<String> unresCritExts) 202 // be sharing it with a Certificate object! 234 // RFC5280: If certificate i is a version 3 certificate, verify 236 // set to TRUE. (If certificate i is a version 1 or version [all...] |
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 18 Verify a given OTA package with the specifed certificate. 53 """Verify the given package with the certificate. 68 print('Certificate: %s' % (cert,)) 156 # Dump pubkey from the certificate. 181 parser.add_argument('certificate', help='The certificate to be used.') 185 VerifyPackage(args.certificate, args.package) 186 VerifyAbOtaPayload(args.certificate, args.package)
|