/external/boringssl/src/ssl/test/runner/ |
runner.go | 59 resourceDir = flag.String("resource-dir", ".", "The directory in which to find certificate and key files.") 133 rsaCertificate Certificate 134 rsa1024Certificate Certificate 135 rsaChainCertificate Certificate 136 ecdsaP224Certificate Certificate 137 ecdsaP256Certificate Certificate 138 ecdsaP384Certificate Certificate 139 ecdsaP521Certificate Certificate 140 ed25519Certificate Certificate 141 garbageCertificate Certificate [all...] |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 52 // certificate is ECDSA. If this is not set then the cipher suite is
|
common.go | 172 // Certificate types (for certificateRequestMsg) 174 CertTypeRSASign = 1 // A certificate containing an RSA key 175 CertTypeDSSSign = 2 // A certificate containing a DSA key 176 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key 177 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key 180 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA. 181 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA. 182 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA. 256 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; [all...] |
/external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/ |
SerializationTest.java | 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts(); 365 java.security.cert.Certificate[] certs = initPerm
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 31 import java.security.cert.Certificate; 191 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 260 throw new CertificateNotYetValidException("Certificate not valid until " 265 throw new CertificateExpiredException("Certificate expired at " 568 * A modified copy of the certificate is returned. The original object
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/ |
RealConnection.java | 48 import java.security.cert.Certificate; 199 + "\n certificate: " + CertificatePinner.pin(cert) 204 // Check that the certificate pinner is satisfied by the certificates presented. 207 List<Certificate> certificates = new CertificateChainCleaner(trustRootIndex)
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/frameworks/base/keystore/java/android/security/ |
KeyChain.java | 47 import java.security.cert.Certificate; 62 * their corresponding certificate chains in credential storage. 75 * certificate chains. The chosen alias will be returned by the 94 * Certificate Authority (CA) certificates will be trusted by all 116 * Package name for the Certificate Installer. 157 * Optional extra to specify an X.509 certificate to install on 164 * name for the installed certificate. 166 // Compatible with old android.security.Credentials.CERTIFICATE 180 * private key and associated certificate chain will be installed. 216 * Broadcast Action: Indicates the contents of the trusted certificate store has changed. Sen [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 65 + "-----END CERTIFICATE-----\n"; 121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 156 Certificate[] res = event.getPeerCertificates(); 554 * Implements basically a dummy TrustManager. It stores the certificate
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldJarURLConnectionTest.java | 29 import java.security.cert.Certificate; 85 Certificate [] certs = juc.getCertificates();
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Signature2Test.java | 36 import java.security.cert.Certificate; 271 * java.security.Signature#initVerify(java.security.cert.Certificate) 287 Signature.getInstance("DSA").initVerify((Certificate) null);
|
SignatureTest.java | 40 import java.security.cert.Certificate; 133 * Class under test for void initVerify(Certificate) 553 private class MyCertificate extends java.security.cert.Certificate {
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 39 import java.security.cert.Certificate; 63 // Certificate type used during testing 87 * constructed using self signed test certificate 122 * containing single element (self signed test certificate). 206 public void check(Certificate arg0, Collection arg1) 297 // X.509 encoded certificate 298 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n" 313 + "JDSM\n" + "-----END CERTIFICATE-----\n"; 320 * Returns X.509 certificate encoding corresponding to version v1. 322 * Certificate encoding was created by hands according to X.509 Certificat [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 48 // certificate is ECDSA. If this is not set then the cipher suite is
|
handshake_client.go | 126 // certificate, which would be skipped if session resumption occurred. 315 certs := make([]*x509.Certificate, len(certMsg.certificates)) 320 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 358 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 364 // server's identity (i.e. leaf certificate) is unchanged and 382 // RFC4366 on Certificate Status Request: 422 var chainToSend *Certificate 447 // If the server requested a certificate then we have to send a 448 // Certificate message, even if it's empty because we don't have a 449 // certificate to send [all...] |
/prebuilts/go/darwin-x86/src/net/http/ |
npn_test.go | 65 certPool.AddCert(ts.Certificate())
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 48 // certificate is ECDSA. If this is not set then the cipher suite is
|
handshake_client.go | 126 // certificate, which would be skipped if session resumption occurred. 315 certs := make([]*x509.Certificate, len(certMsg.certificates)) 320 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 358 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 364 // server's identity (i.e. leaf certificate) is unchanged and 382 // RFC4366 on Certificate Status Request: 422 var chainToSend *Certificate 447 // If the server requested a certificate then we have to send a 448 // Certificate message, even if it's empty because we don't have a 449 // certificate to send [all...] |
/prebuilts/go/linux-x86/src/net/http/ |
npn_test.go | 65 certPool.AddCert(ts.Certificate())
|
/frameworks/base/core/java/android/security/net/config/ |
DirectoryCertificateSource.java | 29 import java.security.cert.Certificate; 205 Log.e(LOG_TAG, "Failed to read certificate from " + file, e);
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProtection.java | 30 import java.security.cert.Certificate; 54 * {@link Certificate#getPublicKey()}. 131 * Certificate[] certChain = ...; // Certificate chain with the first certificate 161 * Certificate[] certChain = ...; // Certificate chain with the first certificate 195 * Certificate[] certChain = ...; // Certificate chain with the first certificat [all...] |
/libcore/luni/src/test/java/libcore/java/security/ |
ProviderTest.java | 32 import java.security.cert.Certificate; [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 36 import java.security.cert.Certificate; 739 /* Certificate creation notes: certificate should be valid 37273 starting 753 Certificate cert = cf.generateCertificate(is); 769 /* Certificate creation notes: certificate should be valid 37273 starting 783 Certificate cert = cf.generateCertificate(is); 925 Certificate cert = cf.generateCertificate(is); [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
PKIXParameters.java | 56 * {@code KeyStore} instance containing trusted certificate entries, each 130 * certificate entries contained in the specified {@code KeyStore}. 132 * are considered; all other certificate types are ignored. 138 * not contain at least one trusted certificate entry 152 Certificate cert = keystore.getCertificate(alias); 216 * policies would be acceptable to the certificate user for the purposes of 234 * policies would be acceptable to the certificate user for the purposes of 360 * acceptable policy needs to be explicitly identified in every certificate. 372 * acceptable policy needs to be explicitly identified in every certificate. 407 * if it is included in a certificate. By default, the any policy OI [all...] |