HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 251 - 275 of 422) sorted by null

<<11121314151617

  /external/emma/core/java12/com/vladium/emma/rt/
InstrClassLoader.java 19 import java.security.cert.Certificate;
347 final CodeSource csrc = new CodeSource (srcURL, (Certificate[])null);
  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
SslUtil.java 46 import java.security.cert.Certificate;
89 * Generates a new, self-signed X509 V1 certificate for a KeyPair.
93 * @return the new certificate
94 * @throws GeneralSecurityException on error generating the certificate
126 * Generates a new, self-signed X509 V3 certificate for a KeyPair.
133 * @return the new certificate
134 * @throws GeneralSecurityException on error generating the certificate
153 // about certificate and extension content. Quoting the `man verify`:
156 // the issuer name of the current certificate are subject to further
158 // certificate (if present) must match the subject key identifier (i
    [all...]
  /frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
NetworkSecurityConfigTests.java 29 import java.security.cert.Certificate;
90 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES));
291 preNCerts.add(anchor.certificate);
295 nCerts.add(anchor.certificate);
299 privCerts.add(anchor.certificate);
  /libcore/luni/src/test/java/libcore/java/net/
OldURLClassLoaderTest.java 29 import java.security.cert.Certificate;
156 CodeSource codeSource = new CodeSource(url, new Certificate[0]);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStoreTest.java 36 import java.security.cert.Certificate;
142 * Test for <code>setKeyEntry(String alias, byte[] key, Certificate[] chain)</code>
155 Certificate certs[] = {
  /libcore/luni/src/test/java/tests/java/security/
SecureClassLoaderTest.java 37 import java.security.cert.Certificate;
183 CodeSource cs = new CodeSource(url, (Certificate[]) null);
  /libcore/ojluni/src/main/java/java/util/jar/
JarFile.java 36 import java.security.cert.Certificate;
58 * certificate. A caller should inspect the return value of
288 public Certificate[] getCertificates() {
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
AlgorithmChecker.java 39 import java.security.cert.Certificate;
63 * specified certificate contains the required algorithm constraints.
65 * Certificate fields such as the subject public key, the signature
107 * certificate
118 * path where the trust anchor is unknown, or a certificate list which may
134 * certificate
149 // Check for anchor certificate restrictions
203 public void check(Certificate cert,
208 // ignore the check for non-x.509 certificate or null constraints
360 * certificate
    [all...]
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLUtils.java 40 import java.security.cert.Certificate;
62 * A trust manager specific to a particular HostAuth. The first time a server certificate is
63 * encountered for the HostAuth, its certificate is saved; subsequent checks determine whether
64 * the PublicKey of the certificate presented matches that of the saved certificate
109 Certificate storedCert =
154 * Optionally bypass all SSL certificate checks.
156 * @param insecure if true, bypass all SSL certificate checks
283 * a client certificate.
317 * for a client certificate (in millis since epoch)
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyAttestationTest.java 78 import java.security.cert.Certificate;
209 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
326 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
428 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
482 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
    [all...]
TestUtils.java 45 import java.security.cert.Certificate;
162 Certificate cert;
174 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(),
184 "Public key used to sign certificate should have the same algorithm as in KeyPair",
187 Certificate[] chain = privEntry.getCertificateChain();
189 fail("Empty certificate chain");
424 Certificate certificate,
429 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate})
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 17 import java.security.cert.Certificate;
79 private org.bouncycastle.asn1.x509.Certificate c;
88 org.bouncycastle.asn1.x509.Certificate c)
147 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
152 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
602 if (!(o instanceof Certificate))
607 Certificate other = (Certificate)o;
849 throw new SignatureException("certificate does not verify with supplied key");
X509CRLObject.java 14 import java.security.cert.Certificate;
551 * Checks whether the given certificate is on this CRL.
553 * @param cert the certificate to check for.
554 * @return true if the given certificate is on this CRL,
557 public boolean isRevoked(Certificate cert)
598 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
602 throw new RuntimeException("Cannot process certificate");
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_darwin.go 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
47 // 2. Run "security find-certificate" to dump the list of system root
65 args := []string{"find-certificate", "-a", "-p",
143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
name_constraints_test.go 61 // #0: dummy test for the certificate generation process itself.
71 // #1: dummy test for the certificate generation process itself: single
87 // #2: dummy test for the certificate generation process itself: two
634 // #30: without SANs, a certificate is rejected in a constrained chain.
1188 // #61: omitting extended key usage in a CA certificate implies that
1265 // certificate doesn't use them.
1449 func makeConstraintsCACert(constraints constraintsSpec, name string, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) {
1453 template := &Certificate{
1485 func makeConstraintsLeafCert(leaf leafSpec, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error)
    [all...]
x509.go 8 // can be used to override the system default locations for the SSL certificate
9 // file and SSL certificate files directory, respectively.
127 type certificate struct { type
632 // A Certificate represents an X.509 certificate.
633 type Certificate struct {
634 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
635 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
686 // When parsing a certificate, a positive non-zero MaxPathLen
692 // When generating a certificate, an unset pathLenConstrain
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
root_darwin.go 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
47 // 2. Run "security find-certificate" to dump the list of system root
65 args := []string{"find-certificate", "-a", "-p",
143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
name_constraints_test.go 61 // #0: dummy test for the certificate generation process itself.
71 // #1: dummy test for the certificate generation process itself: single
87 // #2: dummy test for the certificate generation process itself: two
634 // #30: without SANs, a certificate is rejected in a constrained chain.
1188 // #61: omitting extended key usage in a CA certificate implies that
1265 // certificate doesn't use them.
1449 func makeConstraintsCACert(constraints constraintsSpec, name string, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) {
1453 template := &Certificate{
1485 func makeConstraintsLeafCert(leaf leafSpec, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error)
    [all...]
x509.go 8 // can be used to override the system default locations for the SSL certificate
9 // file and SSL certificate files directory, respectively.
127 type certificate struct { type
632 // A Certificate represents an X.509 certificate.
633 type Certificate struct {
634 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
635 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
686 // When parsing a certificate, a positive non-zero MaxPathLen
692 // When generating a certificate, an unset pathLenConstrain
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/
JarFileTest.java 36 import java.security.cert.Certificate;
445 Certificate[] certs = entry.getCertificates();
672 Certificate[] certs = entry.getCertificates();
683 public Certificate[] certificates;
701 Certificate[] certs = entry.getCertificates();
    [all...]
  /tools/apksig/src/apksigner/java/com/android/apksigner/
ApkSignerTool.java 47 import java.security.cert.Certificate;
196 signerParams.certFile = optionsParser.getRequiredValue("Certificate file");
465 "Signer #" + signerNumber + " certificate DN"
469 "Signer #" + signerNumber + " certificate SHA-256 digest: "
472 "Signer #" + signerNumber + " certificate SHA-1 digest: "
475 "Signer #" + signerNumber + " certificate MD5 digest: "
489 // DSA parameters may be inherited from the certificate. We
    [all...]
  /cts/tests/admin/src/android/admin/cts/
DevicePolicyManagerTest.java 44 import java.security.cert.Certificate;
70 "-----BEGIN CERTIFICATE-----\n" +
84 "-----END CERTIFICATE-----";
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLObject.java 14 import java.security.cert.Certificate;
554 * Checks whether the given certificate is on this CRL.
556 * @param cert the certificate to check for.
557 * @return true if the given certificate is on this CRL,
560 public boolean isRevoked(Certificate cert)
601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
  /prebuilts/go/darwin-x86/src/crypto/tls/
tls_test.go 24 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
74 -----END CERTIFICATE-----
127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
148 t.Error("Load of RSA certificate succeeded with ECDSA private key")
151 t.Error("Load of ECDSA certificate succeeded with RSA private key")
630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) {
634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) {
642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
tls_test.go 24 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
74 -----END CERTIFICATE-----
127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
148 t.Error("Load of RSA certificate succeeded with ECDSA private key")
151 t.Error("Load of ECDSA certificate succeeded with RSA private key")
630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) {
634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) {
642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
    [all...]

Completed in 779 milliseconds

<<11121314151617