HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 301 - 325 of 422) sorted by null

<<11121314151617

  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
RevocationChecker.java 280 Collection<? extends Certificate> certs =
294 "Cannot find the responder's certificate " +
334 public void check(Certificate cert, Collection<String> unresolvedCritExts)
542 // the certificate in question and all reasons are covered
678 // The algorithm constraints of the OCSP trusted responder certificate
680 // checked when the responder's certificate is validated.
718 "Certificate does not specify OCSP responder", null,
747 "Certificate's revocation status is unknown", null,
791 * @param cert the certificate whose revocation status is being checked
    [all...]
PolicyChecker.java 30 import java.security.cert.Certificate;
52 * information on a PKIX certificate, namely certificate policies, policy
168 * Performs the policy processing checks on the certificate using its
171 * @param cert the Certificate to be processed
173 * @throws CertPathValidatorException if the certificate does not verify
176 public void check(Certificate cert, Collection<String> unresCritExts)
193 * @param currCert the certificate to be processed
195 * the certificate does not verify
200 String msg = "certificate policies"
    [all...]
  /prebuilts/go/darwin-x86/src/cmd/vendor/github.com/google/pprof/internal/driver/
fetch_test.go 382 tlsConfig := &tls.Config{Certificates: []tls.Certificate{selfSignedCert(t)}}
479 func selfSignedCert(t *testing.T) tls.Certificate {
490 tmpl := x509.Certificate{
500 bc := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: b})
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go 344 c := &Certificate{
357 c = &Certificate{
368 c = &Certificate{
520 template := Certificate{
592 t.Errorf("%s: failed to create certificate: %s", test.name, err)
598 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
686 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
726 // Self-signed certificate using ECDSA with SHA1 & secp256r1
728 -----BEGIN CERTIFICATE-----
741 -----END CERTIFICATE----
    [all...]
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
267 // An X.509 v1 certificate should not be accepted as an
414 func certificateFromPEM(pemBytes string) (*Certificate, error) {
532 func chainToDebugString(chain []*Certificate) string {
547 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
566 -----END CERTIFICATE-----
569 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
592 -----END CERTIFICATE-----
595 const googleLeaf = `-----BEGIN CERTIFICATE----
    [all...]
  /prebuilts/go/linux-x86/src/cmd/vendor/github.com/google/pprof/internal/driver/
fetch_test.go 382 tlsConfig := &tls.Config{Certificates: []tls.Certificate{selfSignedCert(t)}}
479 func selfSignedCert(t *testing.T) tls.Certificate {
490 tmpl := x509.Certificate{
500 bc := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: b})
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test.go 344 c := &Certificate{
357 c = &Certificate{
368 c = &Certificate{
520 template := Certificate{
592 t.Errorf("%s: failed to create certificate: %s", test.name, err)
598 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
686 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
726 // Self-signed certificate using ECDSA with SHA1 & secp256r1
728 -----BEGIN CERTIFICATE-----
741 -----END CERTIFICATE----
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/
Pkcs7VerifyDxe.c 197 Check whether the hash of an given certificate is revoked by the revocation database.
199 @param[in] Certificate Pointer to the certificate that is searched for.
200 @param[in] CertSize Size of certificate in bytes.
202 structures which contains list of X.509 certificate
204 @param[out] RevocationTime Return the time that the certificate was revoked.
206 @return TRUE The certificate hash is found in the revocation database.
207 @return FALSE The certificate hash is not found in the revocation database.
212 IN UINT8 *Certificate,
233 // Retrieve the TBSCertificate from the X.509 Certificate for hash calculation
    [all...]
  /external/curl/tests/
stunnel.pem 2 # This file contains a private key and a certificate used for stunnel.
3 # The certificate contains a number of extensions essentially being
4 # used in the 509 test. The certificate has been generated using
13 nsComment = "CURL stunnel server test certificate"
59 Certificate:
92 CURL stunnel server test certificate
117 -----BEGIN CERTIFICATE-----
138 -----END CERTIFICATE-----
  /external/nist-sip/java/gov/nist/javax/sip/stack/
SIPTransaction.java     [all...]
  /libcore/luni/src/test/java/tests/security/cert/
X509CRLSelector2Test.java 19 import java.security.cert.Certificate;
547 public boolean isRevoked(Certificate cert) {
  /libcore/ojluni/src/main/java/java/security/
Signature.java 33 import java.security.cert.Certificate;
616 * the given certificate.
617 * <p>If the certificate is of type X.509 and has a <i>key usage</i>
620 * the certificate and its corresponding private key are not
624 * @param certificate the certificate of the identity whose signature is
627 * @exception InvalidKeyException if the public key in the certificate
632 public final void initVerify(Certificate certificate)
634 // If the certificate is of type X509Certificate
    [all...]
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainService.java 57 import java.security.cert.Certificate;
219 Log.e(TAG, "Failed to import user certificate " + userCertificate);
226 Log.e(TAG, "Failed to import certificate chain" + userCertificateChain);
228 Log.e(TAG, "Failed to clean up key chain after certificate chain"
235 Log.e(TAG, "Failed to remove CA certificate chain for alias " + alias);
300 * @param privateKey The private key associated with the client certificate
301 * @param userCertificate The client certificate to be installed
302 * @param userCertificateChain The rest of the chain for the client certificate
324 Log.e(TAG, "Failed to import user certificate " + userCertificate);
326 Log.e(TAG, "Failed to delete private key after certificate importing failed")
    [all...]
  /device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/
Utility.h 481 @param[in] InCert Pointer to the Certificate which distinguished name
483 @param[in] CertSize Size of the Certificate.
630 Generate a Authentication Payload for Certificate Auth method.
716 Generate the Certificate payload or Certificate Request Payload.
718 Since the Certificate Payload structure is same with Certificate Request Payload,
719 the only difference is that one contains the Certificate Data, other contains
720 the acceptable certificateion CA. This function generate Certificate payload
721 or Certificate Request Payload defined in RFC 4306, but all the fields
    [all...]
  /frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/
CertUtils.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
43 import java.security.cert.Certificate;
89 * Decodes a byte array containing an encoded X509 certificate.
91 * @param certBytes the byte array containing the encoded X509 certificate
92 * @return the decoded X509 certificate
100 * Decodes an X509 certificate from an {@code InputStream}.
102 * @param inStream the input stream containing the encoded X509 certificate
103 * @return the decoded X509 certificate
259 * Validates a leaf certificate, and returns the certificate path if the certificate is valid
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/updates/
CertPinInstallReceiverTest.java 36 import java.security.cert.Certificate;
  /libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/
CertBlacklistTest.java 27 import java.security.cert.Certificate;
434 System.out.println("CERTIFICATE PUBLIC KEY HASH: " + getHash(createPublicKey(cert)));
438 System.out.println("CERTIFICATE SERIAL NUMBER: " + createSerialNumber(cert).toString(16));
  /libcore/luni/src/test/java/tests/java/security/
IdentityTest.java 118 * verify addCertificate(Certificate certificate) adds a certificate for this identity.
119 * If the identity has a public key, the public key in the certificate must be the same
130 // try Certificate with different key
138 * verify addCertificate(Certificate certificate) adds a certificate for this identity.
139 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate.
152 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul
    [all...]
  /libcore/ojluni/src/main/java/java/lang/
ClassLoader.java 43 import java.security.cert.Certificate;
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/preferences/
BuildPreferencePage.java 41 import java.security.cert.Certificate;
301 X509Certificate certificate = (X509Certificate)provider.getCertificate(); local
303 if (key == null || certificate == null) {
310 FingerprintUtils.getFingerprint(certificate, "MD5"));
315 FingerprintUtils.getFingerprint(certificate, "SHA1"));
319 if (certificate.getNotAfter().compareTo(today) < 0) {
320 showErrorMessage("Certificate is expired!");
324 if (certificate.getNotBefore().compareTo(today) > 0) {
325 showErrorMessage("Certificate validity is in the future!");
  /system/extras/verity/
BootSignature.java 27 import java.security.cert.Certificate;
51 * certificate ::= Certificate
67 private ASN1Encodable certificate; field in class:BootSignature
106 certificate = sequence.getObjectAt(1);
107 byte[] encoded = ((ASN1Object) certificate).getEncoded();
156 certificate = s.readObject();
187 v.add(certificate);
323 if (args.length >= 4 && "-certificate".equals(args[2])) {
324 /* args[3] is the path to a public key certificate */
    [all...]
Utils.java 35 import java.security.cert.Certificate;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 14 import java.security.cert.Certificate;
123 * issuer of the given X509 certificate. Uses the default provider
126 * @param cert the X509 certificate
131 * on the given certificate has thrown an exception.
143 * issuer of the given X509 certificate. Uses the specified
147 * @param cert the X509 certificate
153 * on the given certificate has thrown an exception.
234 throw new AnnotatedException("TrustAnchor found but certificate validation failed.", invalidKeyEx);
543 throw new AnnotatedException("Certificate policies cannot be decoded.", e);
686 "Problem while picking certificates from certificate store."
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 42 import java.security.cert.Certificate;
698 Certificate[] serverCertificates = connection.getServerCertificates();
699 Certificate[] localCertificates = request.getSslLocalCertificates();
    [all...]
  /libcore/ojluni/src/main/java/javax/crypto/
Cipher.java 40 import java.security.cert.Certificate;
348 // The OID for the KeyUsage extension in an X.509 v3 certificate
    [all...]

Completed in 768 milliseconds

<<11121314151617