/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 55 Certificates: make([]Certificate, 2), 61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 158 serverConfig.Certificates = make([]Certificate, 1) 159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 188 serverConfig.Certificates = make([]Certificate, 1) 189 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 383 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 385 Certificates: []Certificate{{ 386 Certificate: [][]byte{testRSACertificate} [all...] |
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter") 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer") 309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Cache.java | 30 import java.security.cert.Certificate; 520 * is the length of the peer certificate chain. These certificates are 522 * contains the length of the local certificate chain. These 555 List<Certificate> peerCertificates = readCertificateList(source); 556 List<Certificate> localCertificates = readCertificateList(source); 618 private List<Certificate> readCertificateList(BufferedSource source) throws IOException { 624 List<Certificate> result = new ArrayList<>(length); 637 private void writeCertList(BufferedSink sink, List<Certificate> certificates)
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
ConfigParser.java | 33 import java.security.cert.Certificate; 125 * [base64 encoded X509 CA certificate data] 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 135 * (required), CA (Certificate Authority) certificate (optional), and client 136 * certificate chain (optional). 185 // Parse CA (Certificate Authority) certificate. 191 throw new IOException("Failed to parse CA Certificate"); 195 // Parse PKCS12 data for client private key and certificate chain [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 23 import java.security.Certificate; 45 public static class CertificateImpl implements java.security.Certificate { 84 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 98 + "-----END CERTIFICATE-----\n"; 100 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 102 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 116 + "-----END CERTIFICATE-----\n"; 253 java.security.Certificate[] certs = sub.certificates(); 254 assertEquals("Certificate not contained in the identity" [all...] |
/prebuilts/go/darwin-x86/src/net/http/httptest/ |
server.go | 39 // certificate is a parsed version of the TLS config certificate, if present. 40 certificate *x509.Certificate 139 s.TLS.Certificates = []tls.Certificate{cert} 141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0]) 146 certpool.AddCert(s.certificate) 263 // Certificate returns the certificate used by the server, or nil i [all...] |
/prebuilts/go/linux-x86/src/net/http/httptest/ |
server.go | 39 // certificate is a parsed version of the TLS config certificate, if present. 40 certificate *x509.Certificate 139 s.TLS.Certificates = []tls.Certificate{cert} 141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0]) 146 certpool.AddCert(s.certificate) 263 // Certificate returns the certificate used by the server, or nil i [all...] |
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Efi/Protocol/Bis/ |
Bis.h | 66 // authorization certificate.
84 // platform Boot Object Authorization Certificate to create the certificateID.
156 OUT EFI_BIS_DATA **Certificate // Pointer to certificate.
197 IN EFI_BIS_DATA * AuthorityCertificate, // Certificate for credentials.
|
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Bis.h | 3 against a digital certificate for the purpose of an integrity and authorization check.
98 /// platform Boot Object Authorization Certificate to create the certificateID.
220 Retrieves the certificate that has been configured as the identity of the organization designated as
225 @param Certificate The function writes an allocated EFI_BIS_DATA* containing the Boot
226 Object Authorization Certificate object. The caller must
232 @retval EFI_NOT_FOUND There is no Boot Object Authorization Certificate currently installed.
234 @retval EFI_INVALID_PARAMETER The Certificate parameter supplied by the caller is NULL or
242 OUT EFI_BIS_DATA **Certificate
347 certificate's key algorithm, or while attempting to retrieve
348 the public key algorithm of the manifest's signer's certificate,
[all...] |
/frameworks/base/core/java/android/security/net/config/ |
KeyStoreCertificateSource.java | 22 import java.security.cert.Certificate; 31 * {@link CertificateSource} which provides certificates from trusted certificate entries of a
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertStore.java | 41 * A class for retrieving {@code Certificate}s and {@code CRL}s 51 * retrieve {@code Certificate}s and {@code CRL}s by calling its 134 * Returns a {@code Collection} of {@code Certificate}s that 135 * match the specified selector. If no {@code Certificate}s 140 * {@code Certificate}s that match the selector. For instance, 143 * contain the {@code Certificate}s it is looking for. 152 * {@code Certificate}s should be returned. Specify {@code null} 153 * to return all {@code Certificate}s (if supported). 154 * @return A {@code Collection} of {@code Certificate}s that 158 public final Collection<? extends Certificate> getCertificate [all...] |
/libcore/ojluni/src/main/java/javax/security/cert/ |
X509Certificate.java | 48 * way to access all the version 1 attributes of an X.509 certificate. 56 * Certificate ::= SEQUENCE { 68 * These certificates are managed and vouched for by <em>Certificate 89 * Here is sample code to instantiate an X.509 certificate: 97 * byte[] certData = <certificate read from a file, say> 101 * In either case, the code that instantiates an X.509 certificate 122 * use the standard Java SE certificate classes located in 127 * @see Certificate 131 public abstract class X509Certificate extends Certificate { 165 * certificate is expected to be in the input stream [all...] |
/libcore/ojluni/src/main/java/sun/misc/ |
Resource.java | 177 public java.security.cert.Certificate[] getCertificates() {
|
/packages/apps/SecureElement/src/com/android/se/security/ |
AccessRuleCache.java | 48 import java.security.cert.Certificate; 251 public ChannelAccess findAccessRule(byte[] aid, Certificate[] appCerts) 254 // TODO: check difference between DeviceCertHash and Certificate Chain (EndEntityCertHash, 263 /* Search Rule A ( Certificate(s); AID ) */ 267 for (Certificate appCert : appCerts) { 289 throw new AccessControlException("Problem with Application Certificate."); 320 // Search Rule C ( Certificate(s); <AllSEApplications> ) 322 for (Certificate appCert : appCerts) { 344 throw new AccessControlException("Problem with Application Certificate.");
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter") 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer") 309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) [all...] |
/compatibility/cdd/9_security-model/ |
9_8_privacy.md | 45 Certificate Authority (CA) store as [provided]( 46 https://source.android.com/security/overview/app-security.html#certificate-authorities)
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
DelegatedCertInstallerTest.java | 37 import java.security.cert.Certificate; 47 * cert-related APIs. The expected certificate changes are validated both remotely and locally. 85 "-----BEGIN CERTIFICATE-----\n" + 105 "-----END CERTIFICATE-----"; 187 final Certificate caCert = CertificateFactory.getInstance("X.509") 201 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled( 216 assertFalse("Certificate is not removed properly", mDpm.hasCaCertInstalled(
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 29 import java.security.cert.Certificate; 61 * <p>If you have a CA certificate which needs to be trusted by a particular app/service, 66 * <p>If you have a CA certificate that you believe should be present on all Android devices, 89 * This test exists because adding new ca certificate or removing the ca certificates trusted by 143 Certificate cert = certFactory.generateCertificate(fis); 161 X509Certificate certificate = (X509Certificate) wfaKeyStore.getCertificate(alias); local 162 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID()); 163 assertNotNull(certificate.getSubjectDN()); 164 assertNotNull(certificate.getIssuerDN()) 182 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local [all...] |
/external/apache-http/android/src/android/net/http/ |
CertificateChainValidator.java | 32 import java.security.cert.Certificate; 47 * Class responsible for all server certificate validation functionality 54 * The singleton instance of the certificate chain validator. 75 * Creates a new certificate chain validator. This is a private constructor. 76 * If you need a Certificate chain validator, call getInstance(). 103 * And if the last traced certificate is self issued and it is expired, it 119 Certificate[] peerCertificates = 126 // update the SSL certificate associated with the connection 151 throw new IllegalArgumentException("bad certificate chain"); 163 throw new IOException("can't read certificate", e) [all...] |
/external/boringssl/src/crypto/x509/ |
make_many_constraints.go | 88 err = pem.Encode(file, &pem.Block{Type: "CERTIFICATE", Bytes: in}) 104 caTemplate := x509.Certificate{ 146 leafTemplate := x509.Certificate{
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedHelper.java | 26 import org.bouncycastle.asn1.x509.Certificate; 179 certList.add(new X509CertificateHolder(Certificate.getInstance(obj)));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 11 import java.security.cert.Certificate; 202 Certificate cert; 317 pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded())); 324 throw new CertificateEncodingException("can't encode certificate for PEM encoded path"); 349 * Return a DERObject containing the encoded certificate. 365 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
ActiveSession.java | 22 import java.security.cert.Certificate; 126 * Returns the signed certificate timestamp (SCT) received from the peer. Returns a 193 public Certificate[] getLocalCertificates() { 198 * Returns the certificate(s) of the peer in this SSL session 204 * certificate were used during the SSL connection. 205 * @throws SSLPeerUnverifiedException if either a non-X.509 certificate 299 * Updates the cached peer certificate after the handshake has completed
|
OpenSSLX509CertPath.java | 23 import java.security.cert.Certificate; 94 public List<? extends Certificate> getCertificates() {
|
/external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/ |
CoverageTransformerTest.java | 26 import java.security.cert.Certificate; 181 CodeSource cs = new CodeSource(null, new Certificate[0]);
|