HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 276 - 300 of 422) sorted by null

<<11121314151617

  /external/boringssl/src/ssl/test/runner/
runner.go 59 resourceDir = flag.String("resource-dir", ".", "The directory in which to find certificate and key files.")
133 rsaCertificate Certificate
134 rsa1024Certificate Certificate
135 rsaChainCertificate Certificate
136 ecdsaP224Certificate Certificate
137 ecdsaP256Certificate Certificate
138 ecdsaP384Certificate Certificate
139 ecdsaP521Certificate Certificate
140 ed25519Certificate Certificate
141 garbageCertificate Certificate
    [all...]
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
52 // certificate is ECDSA. If this is not set then the cipher suite is
common.go 172 // Certificate types (for certificateRequestMsg)
174 CertTypeRSASign = 1 // A certificate containing an RSA key
175 CertTypeDSSSign = 2 // A certificate containing a DSA key
176 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key
177 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key
180 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
181 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
182 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
256 PeerCertificates []*x509.Certificate // certificate chain presented by remote pee
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyPairGeneratorTest.java 41 import java.security.cert.Certificate;
    [all...]
  /external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/
SerializationTest.java 336 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts();
365 java.security.cert.Certificate[] certs = initPerm
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLX509Certificate.java 31 import java.security.cert.Certificate;
191 public static OpenSSLX509Certificate fromCertificate(Certificate cert)
260 throw new CertificateNotYetValidException("Certificate not valid until "
265 throw new CertificateExpiredException("Certificate expired at "
568 * A modified copy of the certificate is returned. The original object
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/io/
RealConnection.java 48 import java.security.cert.Certificate;
199 + "\n certificate: " + CertificatePinner.pin(cert)
204 // Check that the certificate pinner is satisfied by the certificates presented.
207 List<Certificate> certificates = new CertificateChainCleaner(trustRootIndex)
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 32 import java.security.cert.Certificate;
45 * SSL certificate info (certificate details) class
55 * Name of the entity this certificate is issued to
60 * Name of the entity this certificate is issued by
75 * The original source certificate, if available.
90 private static final String X509_CERTIFICATE = "x509-certificate";
93 * Saves the certificate state to a bundle
94 * @param certificate The SSL certificate to stor
184 certificate); local
    [all...]
  /frameworks/base/keystore/java/android/security/
KeyChain.java 47 import java.security.cert.Certificate;
62 * their corresponding certificate chains in credential storage.
75 * certificate chains. The chosen alias will be returned by the
94 * Certificate Authority (CA) certificates will be trusted by all
116 * Package name for the Certificate Installer.
157 * Optional extra to specify an X.509 certificate to install on
164 * name for the installed certificate.
166 // Compatible with old android.security.Credentials.CERTIFICATE
180 * private key and associated certificate chain will be installed.
216 * Broadcast Action: Indicates the contents of the trusted certificate store has changed. Sen
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.cert.Certificate;
51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest
65 + "-----END CERTIFICATE-----\n";
121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes());
156 Certificate[] res = event.getPeerCertificates();
554 * Implements basically a dummy TrustManager. It stores the certificate
  /libcore/luni/src/test/java/libcore/java/net/
OldJarURLConnectionTest.java 29 import java.security.cert.Certificate;
85 Certificate [] certs = juc.getCertificates();
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Signature2Test.java 36 import java.security.cert.Certificate;
271 * java.security.Signature#initVerify(java.security.cert.Certificate)
287 Signature.getInstance("DSA").initVerify((Certificate) null);
SignatureTest.java 40 import java.security.cert.Certificate;
133 * Class under test for void initVerify(Certificate)
553 private class MyCertificate extends java.security.cert.Certificate {
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 39 import java.security.cert.Certificate;
63 // Certificate type used during testing
87 * constructed using self signed test certificate
122 * containing single element (self signed test certificate).
206 public void check(Certificate arg0, Collection arg1)
297 // X.509 encoded certificate
298 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n"
313 + "JDSM\n" + "-----END CERTIFICATE-----\n";
320 * Returns X.509 certificate encoding corresponding to version v1.
322 * Certificate encoding was created by hands according to X.509 Certificat
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
48 // certificate is ECDSA. If this is not set then the cipher suite is
handshake_client.go 126 // certificate, which would be skipped if session resumption occurred.
315 certs := make([]*x509.Certificate, len(certMsg.certificates))
320 return errors.New("tls: failed to parse certificate from server: " + err.Error())
358 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
364 // server's identity (i.e. leaf certificate) is unchanged and
382 // RFC4366 on Certificate Status Request:
422 var chainToSend *Certificate
447 // If the server requested a certificate then we have to send a
448 // Certificate message, even if it's empty because we don't have a
449 // certificate to send
    [all...]
  /prebuilts/go/darwin-x86/src/net/http/
npn_test.go 65 certPool.AddCert(ts.Certificate())
  /prebuilts/go/linux-x86/src/crypto/tls/
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
48 // certificate is ECDSA. If this is not set then the cipher suite is
handshake_client.go 126 // certificate, which would be skipped if session resumption occurred.
315 certs := make([]*x509.Certificate, len(certMsg.certificates))
320 return errors.New("tls: failed to parse certificate from server: " + err.Error())
358 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
364 // server's identity (i.e. leaf certificate) is unchanged and
382 // RFC4366 on Certificate Status Request:
422 var chainToSend *Certificate
447 // If the server requested a certificate then we have to send a
448 // Certificate message, even if it's empty because we don't have a
449 // certificate to send
    [all...]
  /prebuilts/go/linux-x86/src/net/http/
npn_test.go 65 certPool.AddCert(ts.Certificate())
  /frameworks/base/core/java/android/security/net/config/
DirectoryCertificateSource.java 29 import java.security.cert.Certificate;
205 Log.e(LOG_TAG, "Failed to read certificate from " + file, e);
  /frameworks/base/keystore/java/android/security/keystore/
KeyProtection.java 30 import java.security.cert.Certificate;
54 * {@link Certificate#getPublicKey()}.
131 * Certificate[] certChain = ...; // Certificate chain with the first certificate
161 * Certificate[] certChain = ...; // Certificate chain with the first certificate
195 * Certificate[] certChain = ...; // Certificate chain with the first certificat
    [all...]
  /libcore/luni/src/test/java/libcore/java/security/
ProviderTest.java 32 import java.security.cert.Certificate;
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 36 import java.security.cert.Certificate;
739 /* Certificate creation notes: certificate should be valid 37273 starting
753 Certificate cert = cf.generateCertificate(is);
769 /* Certificate creation notes: certificate should be valid 37273 starting
783 Certificate cert = cf.generateCertificate(is);
925 Certificate cert = cf.generateCertificate(is);
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
PKIXParameters.java 56 * {@code KeyStore} instance containing trusted certificate entries, each
130 * certificate entries contained in the specified {@code KeyStore}.
132 * are considered; all other certificate types are ignored.
138 * not contain at least one trusted certificate entry
152 Certificate cert = keystore.getCertificate(alias);
216 * policies would be acceptable to the certificate user for the purposes of
234 * policies would be acceptable to the certificate user for the purposes of
360 * acceptable policy needs to be explicitly identified in every certificate.
372 * acceptable policy needs to be explicitly identified in every certificate.
407 * if it is included in a certificate. By default, the any policy OI
    [all...]

Completed in 675 milliseconds

<<11121314151617