/external/emma/core/java12/com/vladium/emma/rt/ |
InstrClassLoader.java | 19 import java.security.cert.Certificate; 347 final CodeSource csrc = new CodeSource (srcURL, (Certificate[])null);
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
SslUtil.java | 46 import java.security.cert.Certificate; 89 * Generates a new, self-signed X509 V1 certificate for a KeyPair. 93 * @return the new certificate 94 * @throws GeneralSecurityException on error generating the certificate 126 * Generates a new, self-signed X509 V3 certificate for a KeyPair. 133 * @return the new certificate 134 * @throws GeneralSecurityException on error generating the certificate 153 // about certificate and extension content. Quoting the `man verify`: 156 // the issuer name of the current certificate are subject to further 158 // certificate (if present) must match the subject key identifier (i [all...] |
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
NetworkSecurityConfigTests.java | 29 import java.security.cert.Certificate; 90 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); 291 preNCerts.add(anchor.certificate); 295 nCerts.add(anchor.certificate); 299 privCerts.add(anchor.certificate);
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldURLClassLoaderTest.java | 29 import java.security.cert.Certificate; 156 CodeSource codeSource = new CodeSource(url, new Certificate[0]);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 36 import java.security.cert.Certificate; 142 * Test for <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code> 155 Certificate certs[] = {
|
/libcore/luni/src/test/java/tests/java/security/ |
SecureClassLoaderTest.java | 37 import java.security.cert.Certificate; 183 CodeSource cs = new CodeSource(url, (Certificate[]) null);
|
/libcore/ojluni/src/main/java/java/util/jar/ |
JarFile.java | 36 import java.security.cert.Certificate; 58 * certificate. A caller should inspect the return value of 288 public Certificate[] getCertificates() {
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 39 import java.security.cert.Certificate; 63 * specified certificate contains the required algorithm constraints. 65 * Certificate fields such as the subject public key, the signature 107 * certificate 118 * path where the trust anchor is unknown, or a certificate list which may 134 * certificate 149 // Check for anchor certificate restrictions 203 public void check(Certificate cert, 208 // ignore the check for non-x.509 certificate or null constraints 360 * certificate [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 40 import java.security.cert.Certificate; 62 * A trust manager specific to a particular HostAuth. The first time a server certificate is 63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether 64 * the PublicKey of the certificate presented matches that of the saved certificate 109 Certificate storedCert = 154 * Optionally bypass all SSL certificate checks. 156 * @param insecure if true, bypass all SSL certificate checks 283 * a client certificate. 317 * for a client certificate (in millis since epoch) [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 78 import java.security.cert.Certificate; 209 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 326 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 428 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 482 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); [all...] |
TestUtils.java | 45 import java.security.cert.Certificate; 162 Certificate cert; 174 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 184 "Public key used to sign certificate should have the same algorithm as in KeyPair", 187 Certificate[] chain = privEntry.getCertificateChain(); 189 fail("Empty certificate chain"); 424 Certificate certificate, 429 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate}) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 17 import java.security.cert.Certificate; 79 private org.bouncycastle.asn1.x509.Certificate c; 88 org.bouncycastle.asn1.x509.Certificate c) 147 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 152 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 602 if (!(o instanceof Certificate)) 607 Certificate other = (Certificate)o; 849 throw new SignatureException("certificate does not verify with supplied key");
|
X509CRLObject.java | 14 import java.security.cert.Certificate; 551 * Checks whether the given certificate is on this CRL. 553 * @param cert the certificate to check for. 554 * @return true if the given certificate is on this CRL, 557 public boolean isRevoked(Certificate cert) 598 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 602 throw new RuntimeException("Cannot process certificate");
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_darwin.go | 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) { 47 // 2. Run "security find-certificate" to dump the list of system root 65 args := []string{"find-certificate", "-a", "-p", 143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 { 160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
|
name_constraints_test.go | 61 // #0: dummy test for the certificate generation process itself. 71 // #1: dummy test for the certificate generation process itself: single 87 // #2: dummy test for the certificate generation process itself: two 634 // #30: without SANs, a certificate is rejected in a constrained chain. 1188 // #61: omitting extended key usage in a CA certificate implies that 1265 // certificate doesn't use them. 1449 func makeConstraintsCACert(constraints constraintsSpec, name string, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) { 1453 template := &Certificate{ 1485 func makeConstraintsLeafCert(leaf leafSpec, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) [all...] |
x509.go | 8 // can be used to override the system default locations for the SSL certificate 9 // file and SSL certificate files directory, respectively. 127 type certificate struct { type 632 // A Certificate represents an X.509 certificate. 633 type Certificate struct { 634 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 635 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 686 // When parsing a certificate, a positive non-zero MaxPathLen 692 // When generating a certificate, an unset pathLenConstrain [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_darwin.go | 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) { 47 // 2. Run "security find-certificate" to dump the list of system root 65 args := []string{"find-certificate", "-a", "-p", 143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 { 160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
|
name_constraints_test.go | 61 // #0: dummy test for the certificate generation process itself. 71 // #1: dummy test for the certificate generation process itself: single 87 // #2: dummy test for the certificate generation process itself: two 634 // #30: without SANs, a certificate is rejected in a constrained chain. 1188 // #61: omitting extended key usage in a CA certificate implies that 1265 // certificate doesn't use them. 1449 func makeConstraintsCACert(constraints constraintsSpec, name string, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) { 1453 template := &Certificate{ 1485 func makeConstraintsLeafCert(leaf leafSpec, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) [all...] |
x509.go | 8 // can be used to override the system default locations for the SSL certificate 9 // file and SSL certificate files directory, respectively. 127 type certificate struct { type 632 // A Certificate represents an X.509 certificate. 633 type Certificate struct { 634 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 635 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 686 // When parsing a certificate, a positive non-zero MaxPathLen 692 // When generating a certificate, an unset pathLenConstrain [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/ |
JarFileTest.java | 36 import java.security.cert.Certificate; 445 Certificate[] certs = entry.getCertificates(); 672 Certificate[] certs = entry.getCertificates(); 683 public Certificate[] certificates; 701 Certificate[] certs = entry.getCertificates(); [all...] |
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
ApkSignerTool.java | 47 import java.security.cert.Certificate; 196 signerParams.certFile = optionsParser.getRequiredValue("Certificate file"); 465 "Signer #" + signerNumber + " certificate DN" 469 "Signer #" + signerNumber + " certificate SHA-256 digest: " 472 "Signer #" + signerNumber + " certificate SHA-1 digest: " 475 "Signer #" + signerNumber + " certificate MD5 digest: " 489 // DSA parameters may be inherited from the certificate. We [all...] |
/cts/tests/admin/src/android/admin/cts/ |
DevicePolicyManagerTest.java | 44 import java.security.cert.Certificate; 70 "-----BEGIN CERTIFICATE-----\n" + 84 "-----END CERTIFICATE-----"; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 14 import java.security.cert.Certificate; 554 * Checks whether the given certificate is on this CRL. 556 * @param cert the certificate to check for. 557 * @return true if the given certificate is on this CRL, 560 public boolean isRevoked(Certificate cert) 601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
tls_test.go | 24 var rsaCertPEM = `-----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE----- 74 -----END CERTIFICATE----- 127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) { 148 t.Error("Load of RSA certificate succeeded with ECDSA private key") 151 t.Error("Load of ECDSA certificate succeeded with RSA private key") 630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) { 634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) { 642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
tls_test.go | 24 var rsaCertPEM = `-----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE----- 74 -----END CERTIFICATE----- 127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) { 148 t.Error("Load of RSA certificate succeeded with ECDSA private key") 151 t.Error("Load of ECDSA certificate succeeded with RSA private key") 630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) { 634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) { 642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error [all...] |