/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
RevocationChecker.java | 280 Collection<? extends Certificate> certs = 294 "Cannot find the responder's certificate " + 334 public void check(Certificate cert, Collection<String> unresolvedCritExts) 542 // the certificate in question and all reasons are covered 678 // The algorithm constraints of the OCSP trusted responder certificate 680 // checked when the responder's certificate is validated. 718 "Certificate does not specify OCSP responder", null, 747 "Certificate's revocation status is unknown", null, 791 * @param cert the certificate whose revocation status is being checked [all...] |
PolicyChecker.java | 30 import java.security.cert.Certificate; 52 * information on a PKIX certificate, namely certificate policies, policy 168 * Performs the policy processing checks on the certificate using its 171 * @param cert the Certificate to be processed 173 * @throws CertPathValidatorException if the certificate does not verify 176 public void check(Certificate cert, Collection<String> unresCritExts) 193 * @param currCert the certificate to be processed 195 * the certificate does not verify 200 String msg = "certificate policies" [all...] |
/prebuilts/go/darwin-x86/src/cmd/vendor/github.com/google/pprof/internal/driver/ |
fetch_test.go | 382 tlsConfig := &tls.Config{Certificates: []tls.Certificate{selfSignedCert(t)}} 479 func selfSignedCert(t *testing.T) tls.Certificate { 490 tmpl := x509.Certificate{ 500 bc := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: b})
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test.go | 344 c := &Certificate{ 357 c = &Certificate{ 368 c = &Certificate{ 520 template := Certificate{ 592 t.Errorf("%s: failed to create certificate: %s", test.name, err) 598 t.Errorf("%s: failed to parse certificate: %s", test.name, err) 686 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL) 726 // Self-signed certificate using ECDSA with SHA1 & secp256r1 728 -----BEGIN CERTIFICATE----- 741 -----END CERTIFICATE---- [all...] |
verify_test.go | 232 // Putting a certificate as a root directly should work as a 245 // Putting a certificate as a root directly should not skip 267 // An X.509 v1 certificate should not be accepted as an 414 func certificateFromPEM(pemBytes string) (*Certificate, error) { 532 func chainToDebugString(chain []*Certificate) string { 547 const geoTrustRoot = `-----BEGIN CERTIFICATE----- 566 -----END CERTIFICATE----- 569 const giag2Intermediate = `-----BEGIN CERTIFICATE----- 592 -----END CERTIFICATE----- 595 const googleLeaf = `-----BEGIN CERTIFICATE---- [all...] |
/prebuilts/go/linux-x86/src/cmd/vendor/github.com/google/pprof/internal/driver/ |
fetch_test.go | 382 tlsConfig := &tls.Config{Certificates: []tls.Certificate{selfSignedCert(t)}} 479 func selfSignedCert(t *testing.T) tls.Certificate { 490 tmpl := x509.Certificate{ 500 bc := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: b})
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test.go | 344 c := &Certificate{ 357 c = &Certificate{ 368 c = &Certificate{ 520 template := Certificate{ 592 t.Errorf("%s: failed to create certificate: %s", test.name, err) 598 t.Errorf("%s: failed to parse certificate: %s", test.name, err) 686 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL) 726 // Self-signed certificate using ECDSA with SHA1 & secp256r1 728 -----BEGIN CERTIFICATE----- 741 -----END CERTIFICATE---- [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/ |
Pkcs7VerifyDxe.c | 197 Check whether the hash of an given certificate is revoked by the revocation database.
199 @param[in] Certificate Pointer to the certificate that is searched for.
200 @param[in] CertSize Size of certificate in bytes.
202 structures which contains list of X.509 certificate
204 @param[out] RevocationTime Return the time that the certificate was revoked.
206 @return TRUE The certificate hash is found in the revocation database.
207 @return FALSE The certificate hash is not found in the revocation database.
212 IN UINT8 *Certificate,
233 // Retrieve the TBSCertificate from the X.509 Certificate for hash calculation [all...] |
/external/curl/tests/ |
stunnel.pem | 2 # This file contains a private key and a certificate used for stunnel. 3 # The certificate contains a number of extensions essentially being 4 # used in the 509 test. The certificate has been generated using 13 nsComment = "CURL stunnel server test certificate" 59 Certificate: 92 CURL stunnel server test certificate 117 -----BEGIN CERTIFICATE----- 138 -----END CERTIFICATE-----
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
SIPTransaction.java | [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
X509CRLSelector2Test.java | 19 import java.security.cert.Certificate; 547 public boolean isRevoked(Certificate cert) {
|
/libcore/ojluni/src/main/java/java/security/ |
Signature.java | 33 import java.security.cert.Certificate; 616 * the given certificate. 617 * <p>If the certificate is of type X.509 and has a <i>key usage</i> 620 * the certificate and its corresponding private key are not 624 * @param certificate the certificate of the identity whose signature is 627 * @exception InvalidKeyException if the public key in the certificate 632 public final void initVerify(Certificate certificate) 634 // If the certificate is of type X509Certificate [all...] |
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 57 import java.security.cert.Certificate; 219 Log.e(TAG, "Failed to import user certificate " + userCertificate); 226 Log.e(TAG, "Failed to import certificate chain" + userCertificateChain); 228 Log.e(TAG, "Failed to clean up key chain after certificate chain" 235 Log.e(TAG, "Failed to remove CA certificate chain for alias " + alias); 300 * @param privateKey The private key associated with the client certificate 301 * @param userCertificate The client certificate to be installed 302 * @param userCertificateChain The rest of the chain for the client certificate 324 Log.e(TAG, "Failed to import user certificate " + userCertificate); 326 Log.e(TAG, "Failed to delete private key after certificate importing failed") [all...] |
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/ |
Utility.h | 481 @param[in] InCert Pointer to the Certificate which distinguished name
483 @param[in] CertSize Size of the Certificate.
630 Generate a Authentication Payload for Certificate Auth method.
716 Generate the Certificate payload or Certificate Request Payload.
718 Since the Certificate Payload structure is same with Certificate Request Payload,
719 the only difference is that one contains the Certificate Data, other contains
720 the acceptable certificateion CA. This function generate Certificate payload
721 or Certificate Request Payload defined in RFC 4306, but all the fields [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/ |
CertUtils.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate; 43 import java.security.cert.Certificate; 89 * Decodes a byte array containing an encoded X509 certificate. 91 * @param certBytes the byte array containing the encoded X509 certificate 92 * @return the decoded X509 certificate 100 * Decodes an X509 certificate from an {@code InputStream}. 102 * @param inStream the input stream containing the encoded X509 certificate 103 * @return the decoded X509 certificate 259 * Validates a leaf certificate, and returns the certificate path if the certificate is valid [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
CertPinInstallReceiverTest.java | 36 import java.security.cert.Certificate;
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 27 import java.security.cert.Certificate; 434 System.out.println("CERTIFICATE PUBLIC KEY HASH: " + getHash(createPublicKey(cert))); 438 System.out.println("CERTIFICATE SERIAL NUMBER: " + createSerialNumber(cert).toString(16));
|
/libcore/luni/src/test/java/tests/java/security/ |
IdentityTest.java | 118 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 119 * If the identity has a public key, the public key in the certificate must be the same 130 // try Certificate with different key 138 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 139 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate. 152 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul [all...] |
/libcore/ojluni/src/main/java/java/lang/ |
ClassLoader.java | 43 import java.security.cert.Certificate; [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/ |
BuildPreferencePage.java | 41 import java.security.cert.Certificate; 301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local 303 if (key == null || certificate == null) { 310 FingerprintUtils.getFingerprint(certificate, "MD5")); 315 FingerprintUtils.getFingerprint(certificate, "SHA1")); 319 if (certificate.getNotAfter().compareTo(today) < 0) { 320 showErrorMessage("Certificate is expired!"); 324 if (certificate.getNotBefore().compareTo(today) > 0) { 325 showErrorMessage("Certificate validity is in the future!");
|
/system/extras/verity/ |
BootSignature.java | 27 import java.security.cert.Certificate; 51 * certificate ::= Certificate 67 private ASN1Encodable certificate; field in class:BootSignature 106 certificate = sequence.getObjectAt(1); 107 byte[] encoded = ((ASN1Object) certificate).getEncoded(); 156 certificate = s.readObject(); 187 v.add(certificate); 323 if (args.length >= 4 && "-certificate".equals(args[2])) { 324 /* args[3] is the path to a public key certificate */ [all...] |
Utils.java | 35 import java.security.cert.Certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 14 import java.security.cert.Certificate; 123 * issuer of the given X509 certificate. Uses the default provider 126 * @param cert the X509 certificate 131 * on the given certificate has thrown an exception. 143 * issuer of the given X509 certificate. Uses the specified 147 * @param cert the X509 certificate 153 * on the given certificate has thrown an exception. 234 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx); 543 throw new AnnotatedException("Certificate policies cannot be decoded.", e); 686 "Problem while picking certificates from certificate store." [all...] |
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 42 import java.security.cert.Certificate; 698 Certificate[] serverCertificates = connection.getServerCertificates(); 699 Certificate[] localCertificates = request.getSslLocalCertificates(); [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
Cipher.java | 40 import java.security.cert.Certificate; 348 // The OID for the KeyUsage extension in an X.509 v3 certificate [all...] |