/prebuilts/go/linux-x86/src/crypto/x509/ |
verify_test.go | 232 // Putting a certificate as a root directly should work as a 245 // Putting a certificate as a root directly should not skip 267 // An X.509 v1 certificate should not be accepted as an 414 func certificateFromPEM(pemBytes string) (*Certificate, error) { 532 func chainToDebugString(chain []*Certificate) string { 547 const geoTrustRoot = `-----BEGIN CERTIFICATE----- 566 -----END CERTIFICATE----- 569 const giag2Intermediate = `-----BEGIN CERTIFICATE----- 592 -----END CERTIFICATE----- 595 const googleLeaf = `-----BEGIN CERTIFICATE---- [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 42 import java.security.cert.Certificate; 77 private static final String ALIAS_CERTIFICATE = "certificate"; 82 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe"; 194 // RI can't handle certificate in PKCS12, but BC can 377 public static void setCertificate(KeyStore ks, String alias, Certificate certificate) 379 ks.setCertificateEntry(alias, certificate); 420 public static void assertCertificate(Certificate actual) 424 public static void assertCertificate2(Certificate actual) 435 public static void assertCertificateChain(Certificate[] actual [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server.go | 34 cert *Certificate 383 certMsg.certificates = hs.cert.Certificate 413 // Request a client certificate 425 // the client that it may send any certificate in response 428 // an appropriate certificate to give to us. 456 // If we requested a client certificate, then the client must send a 457 // certificate message, even if it's empty. 466 // The client didn't actually send a certificate 470 return errors.New("tls: client didn't provide a certificate") 504 // If we received a client cert in response to our certificate request message [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server.go | 34 cert *Certificate 383 certMsg.certificates = hs.cert.Certificate 413 // Request a client certificate 425 // the client that it may send any certificate in response 428 // an appropriate certificate to give to us. 456 // If we requested a client certificate, then the client must send a 457 // certificate message, even if it's empty. 466 // The client didn't actually send a certificate 470 return errors.New("tls: client didn't provide a certificate") 504 // If we received a client cert in response to our certificate request message [all...] |
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 809 var chainToSend *Certificate 826 return errors.New("tls: non-empty certificate request context sent in handshake") 861 return errors.New("tls: unexpected OCSP response in the server certificate") 865 return errors.New("tls: unexpected SCT list in the server certificate") 869 return errors.New("tls: unexpected extensions in the server certificate") 929 // from the client certificate are read over these keys. 992 for _, certData := range chainToSend.Certificate { [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeyGenParameterSpec.java | 32 import java.security.cert.Certificate; 63 * {@link Certificate#getPublicKey()}. 71 * <p>For asymmetric key pairs, a self-signed X.509 certificate will be also generated and stored in 73 * support storing key pairs without a certificate. The subject, serial number, and validity dates 74 * of the certificate can be customized in this spec. The self-signed certificate may be replaced at 75 * a later time by a certificate signed by a Certificate Authority (CA). 77 * <p>NOTE: If a private key is not authorized to sign the self-signed certificate, then the 78 * certificate will be created with an invalid signature which will not verify. Such a certificat [all...] |
AndroidKeyStoreKeyPairGeneratorSpi.java | 40 import com.android.org.bouncycastle.asn1.x509.Certificate; 500 // Very short certificate chain in the non-attestation case. 562 Credentials.USER_CERTIFICATE, iter.next(), flags, "Failed to store certificate"); 575 flags, "Failed to store attestation CA certificate"); 596 throw new ProviderException("Failed to generate self-signed certificate", e); 599 "Failed to obtain encoded form of self-signed certificate", e); 609 throw new ProviderException("Failed to generate attestation certificate chain", 614 throw new ProviderException("Attestation certificate chain contained " 638 // Key cannot be used to sign a certificate 641 // Key can be used to sign a certificate [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
SunCertPathBuilder.java | 303 * Certificate is good. 502 Certificate finalCert; 569 * Returns true if trust anchor certificate matches specified 570 * certificate constraints.
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
cryptxml.h | 267 CRYPT_XML_DATA_BLOB Certificate;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 76 private org.bouncycastle.asn1.x509.Certificate c; 86 org.bouncycastle.asn1.x509.Certificate c) 146 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 151 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 246 * the certificate. 545 // Android-added: Cache the encoded certificate 552 // BEGIN Android-changed: Cache the encoded certificate 557 // END Android-changed: Cache the encoded certificate 823 throw new SignatureException("certificate does not verify with supplied key");
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustManagerImpl.java | 46 import java.security.cert.Certificate; 93 * Comparator used for ordering trust anchors during certificate path building. 326 * Returns the full trusted certificate chain found from {@code certs}. 343 * Returns the full trusted certificate chain found from {@code certs}. 414 throw new CertificateException("No subjectAltNames on the certificate match"); 483 // Initialize the chain to contain the leaf certificate. This potentially could be a trust 485 // complete trusted chain for additional validation such as certificate pinning. 500 * Recursively build certificate chains until a valid chain is found or all possible paths are 505 * certificate and ends in the final trusted root certificate [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
TrustedCertificateStoreTest.java | 32 import java.security.cert.Certificate; 274 * The construction below is to build a certificate chain that has a loop 288 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1 332 * The construction below creates a certificate with multiple possible issuer certs. 799 assertEquals("System certificate stored in the wrong file", 802 // The two statements below indirectly assert that the certificate can be looked up 806 assertNotNull("Issuer certificate not found for system certificate " + actualFile, 808 assertNotNull("Trust anchor not found for system certificate " + actualFile, 820 // Checking that the certificate is stored in a file is extraneous given the curren [all...] |
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 96 import java.security.cert.Certificate; [all...] |
/libcore/ojluni/src/main/java/sun/misc/ |
URLClassPath.java | 54 import java.security.cert.Certificate; [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CRLImpl.java | 41 import java.security.cert.Certificate; 56 * An implementation for X509 CRL (Certificate Revocation List). 67 * Public Key Infrastructure Certificate and CRL Profile</a>. 602 * Checks whether the given certificate is on this CRL. 604 * @param cert the certificate to check for. 605 * @return true if the given certificate is on this CRL, 608 public boolean isRevoked(Certificate cert) { 714 * Gets the CRL entry for the given certificate. 794 * Identifiers for the Internet X.509 Public Key Infrastructure Certificate [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/pkix/ |
pkix.go | 242 // 5280, section 5.1. Use Certificate.CheckCRLSignature to verify the
|
/prebuilts/go/linux-x86/src/crypto/x509/pkix/ |
pkix.go | 242 // 5280, section 5.1. Use Certificate.CheckCRLSignature to verify the
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/net/ssl/ |
SSLSocketTest.java | 65 import java.security.cert.Certificate; 511 Certificate[] localCertificates = server.getSession().getLocalCertificates(); 524 Certificate[] peerCertificates = client.getSession().getPeerCertificates(); 690 Certificate[] localCertificates = event.getLocalCertificates(); 691 Certificate[] peerCertificates = event.getPeerCertificates(); [all...] |
/external/pdfium/xfa/fxfa/ |
fxfa_basic.h | 872 Certificate,
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 25 import java.security.cert.Certificate;
|
/prebuilts/android-emulator/darwin-x86_64/lib/ |
ca-bundle.pem | 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015 6 ## This is a bundle of X.509 certificates of public Certificate Authorities 23 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 43 -----BEGIN CERTIFICATE----- 60 -----END CERTIFICATE----- 64 -----BEGIN CERTIFICATE----- 82 -----END CERTIFICATE----- 86 -----BEGIN CERTIFICATE----- 106 -----END CERTIFICATE---- [all...] |
/prebuilts/android-emulator/linux-x86_64/lib/ |
ca-bundle.pem | 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015 6 ## This is a bundle of X.509 certificates of public Certificate Authorities 23 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 43 -----BEGIN CERTIFICATE----- 60 -----END CERTIFICATE----- 64 -----BEGIN CERTIFICATE----- 82 -----END CERTIFICATE----- 86 -----BEGIN CERTIFICATE----- 106 -----END CERTIFICATE---- [all...] |
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp_test.go | 382 config := tls.Config{Certificates: []tls.Certificate{cert}} 785 config := &tls.Config{Certificates: []tls.Certificate{keypair}} 849 var localhostCert = []byte(`-----BEGIN CERTIFICATE----- 859 -----END CERTIFICATE-----`)
|
/prebuilts/go/linux-x86/src/net/smtp/ |
smtp_test.go | 382 config := tls.Config{Certificates: []tls.Certificate{cert}} 785 config := &tls.Config{Certificates: []tls.Certificate{keypair}} 849 var localhostCert = []byte(`-----BEGIN CERTIFICATE----- 859 -----END CERTIFICATE-----`)
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/ |
DxeImageVerificationLib.c | 368 // But CheckSum field and SECURITY data directory (certificate) are excluded
838 Check whether the hash of an given X.509 certificate is in forbidden database (DBX).
840 @param[in] Certificate Pointer to X.509 Certificate that is searched for.
841 @param[in] CertSize Size of X.509 Certificate.
844 @param[out] RevocationTime Return the time that the certificate was revoked.
846 @return TRUE The certificate hash is found in the forbidden database.
847 @return FALSE The certificate hash is not found in the forbidden database.
852 IN UINT8 *Certificate,
885 // Retrieve the TBSCertificate from the X.509 Certificate. [all...] |