HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 201 - 225 of 422) sorted by null

1 2 3 4 5 6 7 891011>>

  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server_test.go 55 Certificates: make([]Certificate, 2),
61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
158 serverConfig.Certificates = make([]Certificate, 1)
159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
188 serverConfig.Certificates = make([]Certificate, 1)
189 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
383 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
385 Certificates: []Certificate{{
386 Certificate: [][]byte{testRSACertificate}
    [all...]
key_agreement.go 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
Cache.java 30 import java.security.cert.Certificate;
520 * is the length of the peer certificate chain. These certificates are
522 * contains the length of the local certificate chain. These
555 List<Certificate> peerCertificates = readCertificateList(source);
556 List<Certificate> localCertificates = readCertificateList(source);
618 private List<Certificate> readCertificateList(BufferedSource source) throws IOException {
624 List<Certificate> result = new ArrayList<>(length);
637 private void writeCertList(BufferedSink sink, List<Certificate> certificates)
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/
ConfigParser.java 33 import java.security.cert.Certificate;
125 * [base64 encoded X509 CA certificate data]
130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain]
135 * (required), CA (Certificate Authority) certificate (optional), and client
136 * certificate chain (optional).
185 // Parse CA (Certificate Authority) certificate.
191 throw new IOException("Failed to parse CA Certificate");
195 // Parse PKCS12 data for client private key and certificate chain
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Identity2Test.java 23 import java.security.Certificate;
45 public static class CertificateImpl implements java.security.Certificate {
84 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test
98 + "-----END CERTIFICATE-----\n";
100 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes());
102 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
116 + "-----END CERTIFICATE-----\n";
253 java.security.Certificate[] certs = sub.certificates();
254 assertEquals("Certificate not contained in the identity"
    [all...]
  /prebuilts/go/darwin-x86/src/net/http/httptest/
server.go 39 // certificate is a parsed version of the TLS config certificate, if present.
40 certificate *x509.Certificate
139 s.TLS.Certificates = []tls.Certificate{cert}
141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0])
146 certpool.AddCert(s.certificate)
263 // Certificate returns the certificate used by the server, or nil i
    [all...]
  /prebuilts/go/linux-x86/src/net/http/httptest/
server.go 39 // certificate is a parsed version of the TLS config certificate, if present.
40 certificate *x509.Certificate
139 s.TLS.Certificates = []tls.Certificate{cert}
141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0])
146 certpool.AddCert(s.certificate)
263 // Certificate returns the certificate used by the server, or nil i
    [all...]
  /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Efi/Protocol/Bis/
Bis.h 66 // authorization certificate.
84 // platform Boot Object Authorization Certificate to create the certificateID.
156 OUT EFI_BIS_DATA **Certificate // Pointer to certificate.
197 IN EFI_BIS_DATA * AuthorityCertificate, // Certificate for credentials.
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Bis.h 3 against a digital certificate for the purpose of an integrity and authorization check.
98 /// platform Boot Object Authorization Certificate to create the certificateID.
220 Retrieves the certificate that has been configured as the identity of the organization designated as
225 @param Certificate The function writes an allocated EFI_BIS_DATA* containing the Boot
226 Object Authorization Certificate object. The caller must
232 @retval EFI_NOT_FOUND There is no Boot Object Authorization Certificate currently installed.
234 @retval EFI_INVALID_PARAMETER The Certificate parameter supplied by the caller is NULL or
242 OUT EFI_BIS_DATA **Certificate
347 certificate's key algorithm, or while attempting to retrieve
348 the public key algorithm of the manifest's signer's certificate,
    [all...]
  /frameworks/base/core/java/android/security/net/config/
KeyStoreCertificateSource.java 22 import java.security.cert.Certificate;
31 * {@link CertificateSource} which provides certificates from trusted certificate entries of a
  /libcore/ojluni/src/main/java/java/security/cert/
CertStore.java 41 * A class for retrieving {@code Certificate}s and {@code CRL}s
51 * retrieve {@code Certificate}s and {@code CRL}s by calling its
134 * Returns a {@code Collection} of {@code Certificate}s that
135 * match the specified selector. If no {@code Certificate}s
140 * {@code Certificate}s that match the selector. For instance,
143 * contain the {@code Certificate}s it is looking for.
152 * {@code Certificate}s should be returned. Specify {@code null}
153 * to return all {@code Certificate}s (if supported).
154 * @return A {@code Collection} of {@code Certificate}s that
158 public final Collection<? extends Certificate> getCertificate
    [all...]
  /libcore/ojluni/src/main/java/javax/security/cert/
X509Certificate.java 48 * way to access all the version 1 attributes of an X.509 certificate.
56 * Certificate ::= SEQUENCE {
68 * These certificates are managed and vouched for by <em>Certificate
89 * Here is sample code to instantiate an X.509 certificate:
97 * byte[] certData = &lt;certificate read from a file, say&gt;
101 * In either case, the code that instantiates an X.509 certificate
122 * use the standard Java SE certificate classes located in
127 * @see Certificate
131 public abstract class X509Certificate extends Certificate {
165 * certificate is expected to be in the input stream
    [all...]
  /libcore/ojluni/src/main/java/sun/misc/
Resource.java 177 public java.security.cert.Certificate[] getCertificates() {
  /packages/apps/SecureElement/src/com/android/se/security/
AccessRuleCache.java 48 import java.security.cert.Certificate;
251 public ChannelAccess findAccessRule(byte[] aid, Certificate[] appCerts)
254 // TODO: check difference between DeviceCertHash and Certificate Chain (EndEntityCertHash,
263 /* Search Rule A ( Certificate(s); AID ) */
267 for (Certificate appCert : appCerts) {
289 throw new AccessControlException("Problem with Application Certificate.");
320 // Search Rule C ( Certificate(s); <AllSEApplications> )
322 for (Certificate appCert : appCerts) {
344 throw new AccessControlException("Problem with Application Certificate.");
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
    [all...]
  /compatibility/cdd/9_security-model/
9_8_privacy.md 45 Certificate Authority (CA) store as [provided](
46 https://source.android.com/security/overview/app-security.html#certificate-authorities)
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
DelegatedCertInstallerTest.java 37 import java.security.cert.Certificate;
47 * cert-related APIs. The expected certificate changes are validated both remotely and locally.
85 "-----BEGIN CERTIFICATE-----\n" +
105 "-----END CERTIFICATE-----";
187 final Certificate caCert = CertificateFactory.getInstance("X.509")
201 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(
216 assertFalse("Certificate is not removed properly", mDpm.hasCaCertInstalled(
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 29 import java.security.cert.Certificate;
61 * <p>If you have a CA certificate which needs to be trusted by a particular app/service,
66 * <p>If you have a CA certificate that you believe should be present on all Android devices,
89 * This test exists because adding new ca certificate or removing the ca certificates trusted by
143 Certificate cert = certFactory.generateCertificate(fis);
161 X509Certificate certificate = (X509Certificate) wfaKeyStore.getCertificate(alias); local
162 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID());
163 assertNotNull(certificate.getSubjectDN());
164 assertNotNull(certificate.getIssuerDN())
182 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local
    [all...]
  /external/apache-http/android/src/android/net/http/
CertificateChainValidator.java 32 import java.security.cert.Certificate;
47 * Class responsible for all server certificate validation functionality
54 * The singleton instance of the certificate chain validator.
75 * Creates a new certificate chain validator. This is a private constructor.
76 * If you need a Certificate chain validator, call getInstance().
103 * And if the last traced certificate is self issued and it is expired, it
119 Certificate[] peerCertificates =
126 // update the SSL certificate associated with the connection
151 throw new IllegalArgumentException("bad certificate chain");
163 throw new IOException("can't read certificate", e)
    [all...]
  /external/boringssl/src/crypto/x509/
make_many_constraints.go 88 err = pem.Encode(file, &pem.Block{Type: "CERTIFICATE", Bytes: in})
104 caTemplate := x509.Certificate{
146 leafTemplate := x509.Certificate{
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java 26 import org.bouncycastle.asn1.x509.Certificate;
179 certList.add(new X509CertificateHolder(Certificate.getInstance(obj)));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 11 import java.security.cert.Certificate;
202 Certificate cert;
317 pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded()));
324 throw new CertificateEncodingException("can't encode certificate for PEM encoded path");
349 * Return a DERObject containing the encoded certificate.
365 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
  /external/conscrypt/common/src/main/java/org/conscrypt/
ActiveSession.java 22 import java.security.cert.Certificate;
126 * Returns the signed certificate timestamp (SCT) received from the peer. Returns a
193 public Certificate[] getLocalCertificates() {
198 * Returns the certificate(s) of the peer in this SSL session
204 * certificate were used during the SSL connection.
205 * @throws SSLPeerUnverifiedException if either a non-X.509 certificate
299 * Updates the cached peer certificate after the handshake has completed
OpenSSLX509CertPath.java 23 import java.security.cert.Certificate;
94 public List<? extends Certificate> getCertificates() {
  /external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/
CoverageTransformerTest.java 26 import java.security.cert.Certificate;
181 CodeSource cs = new CodeSource(null, new Certificate[0]);

Completed in 936 milliseconds

1 2 3 4 5 6 7 891011>>