HomeSort by relevance Sort by last modified time
    Searched refs:Certificate (Results 326 - 350 of 422) sorted by null

<<11121314151617

  /prebuilts/go/linux-x86/src/crypto/x509/
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
267 // An X.509 v1 certificate should not be accepted as an
414 func certificateFromPEM(pemBytes string) (*Certificate, error) {
532 func chainToDebugString(chain []*Certificate) string {
547 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
566 -----END CERTIFICATE-----
569 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
592 -----END CERTIFICATE-----
595 const googleLeaf = `-----BEGIN CERTIFICATE----
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyStoreTest.java 42 import java.security.cert.Certificate;
77 private static final String ALIAS_CERTIFICATE = "certificate";
82 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe";
194 // RI can't handle certificate in PKCS12, but BC can
377 public static void setCertificate(KeyStore ks, String alias, Certificate certificate)
379 ks.setCertificateEntry(alias, certificate);
420 public static void assertCertificate(Certificate actual)
424 public static void assertCertificate2(Certificate actual)
435 public static void assertCertificateChain(Certificate[] actual
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
383 certMsg.certificates = hs.cert.Certificate
413 // Request a client certificate
425 // the client that it may send any certificate in response
428 // an appropriate certificate to give to us.
456 // If we requested a client certificate, then the client must send a
457 // certificate message, even if it's empty.
466 // The client didn't actually send a certificate
470 return errors.New("tls: client didn't provide a certificate")
504 // If we received a client cert in response to our certificate request message
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server.go 34 cert *Certificate
383 certMsg.certificates = hs.cert.Certificate
413 // Request a client certificate
425 // the client that it may send any certificate in response
428 // an appropriate certificate to give to us.
456 // If we requested a client certificate, then the client must send a
457 // certificate message, even if it's empty.
466 // The client didn't actually send a certificate
470 return errors.New("tls: client didn't provide a certificate")
504 // If we received a client cert in response to our certificate request message
    [all...]
  /external/boringssl/src/ssl/test/runner/
handshake_client.go 809 var chainToSend *Certificate
826 return errors.New("tls: non-empty certificate request context sent in handshake")
861 return errors.New("tls: unexpected OCSP response in the server certificate")
865 return errors.New("tls: unexpected SCT list in the server certificate")
869 return errors.New("tls: unexpected extensions in the server certificate")
929 // from the client certificate are read over these keys.
992 for _, certData := range chainToSend.Certificate {
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
KeyGenParameterSpec.java 32 import java.security.cert.Certificate;
63 * {@link Certificate#getPublicKey()}.
71 * <p>For asymmetric key pairs, a self-signed X.509 certificate will be also generated and stored in
73 * support storing key pairs without a certificate. The subject, serial number, and validity dates
74 * of the certificate can be customized in this spec. The self-signed certificate may be replaced at
75 * a later time by a certificate signed by a Certificate Authority (CA).
77 * <p>NOTE: If a private key is not authorized to sign the self-signed certificate, then the
78 * certificate will be created with an invalid signature which will not verify. Such a certificat
    [all...]
AndroidKeyStoreKeyPairGeneratorSpi.java 40 import com.android.org.bouncycastle.asn1.x509.Certificate;
500 // Very short certificate chain in the non-attestation case.
562 Credentials.USER_CERTIFICATE, iter.next(), flags, "Failed to store certificate");
575 flags, "Failed to store attestation CA certificate");
596 throw new ProviderException("Failed to generate self-signed certificate", e);
599 "Failed to obtain encoded form of self-signed certificate", e);
609 throw new ProviderException("Failed to generate attestation certificate chain",
614 throw new ProviderException("Attestation certificate chain contained "
638 // Key cannot be used to sign a certificate
641 // Key can be used to sign a certificate
    [all...]
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
SunCertPathBuilder.java 303 * Certificate is good.
502 Certificate finalCert;
569 * Returns true if trust anchor certificate matches specified
570 * certificate constraints.
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
cryptxml.h 267 CRYPT_XML_DATA_BLOB Certificate;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 76 private org.bouncycastle.asn1.x509.Certificate c;
86 org.bouncycastle.asn1.x509.Certificate c)
146 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
151 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
246 * the certificate.
545 // Android-added: Cache the encoded certificate
552 // BEGIN Android-changed: Cache the encoded certificate
557 // END Android-changed: Cache the encoded certificate
823 throw new SignatureException("certificate does not verify with supplied key");
  /external/conscrypt/platform/src/main/java/org/conscrypt/
TrustManagerImpl.java 46 import java.security.cert.Certificate;
93 * Comparator used for ordering trust anchors during certificate path building.
326 * Returns the full trusted certificate chain found from {@code certs}.
343 * Returns the full trusted certificate chain found from {@code certs}.
414 throw new CertificateException("No subjectAltNames on the certificate match");
483 // Initialize the chain to contain the leaf certificate. This potentially could be a trust
485 // complete trusted chain for additional validation such as certificate pinning.
500 * Recursively build certificate chains until a valid chain is found or all possible paths are
505 * certificate and ends in the final trusted root certificate
    [all...]
  /external/conscrypt/platform/src/test/java/org/conscrypt/
TrustedCertificateStoreTest.java 32 import java.security.cert.Certificate;
274 * The construction below is to build a certificate chain that has a loop
288 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1
332 * The construction below creates a certificate with multiple possible issuer certs.
799 assertEquals("System certificate stored in the wrong file",
802 // The two statements below indirectly assert that the certificate can be looked up
806 assertNotNull("Issuer certificate not found for system certificate " + actualFile,
808 assertNotNull("Trust anchor not found for system certificate " + actualFile,
820 // Checking that the certificate is stored in a file is extraneous given the curren
    [all...]
  /frameworks/base/core/java/android/app/admin/
DevicePolicyManager.java 96 import java.security.cert.Certificate;
    [all...]
  /libcore/ojluni/src/main/java/sun/misc/
URLClassPath.java 54 import java.security.cert.Certificate;
    [all...]
  /libcore/ojluni/src/main/java/sun/security/x509/
X509CRLImpl.java 41 import java.security.cert.Certificate;
56 * An implementation for X509 CRL (Certificate Revocation List).
67 * Public Key Infrastructure Certificate and CRL Profile</a>.
602 * Checks whether the given certificate is on this CRL.
604 * @param cert the certificate to check for.
605 * @return true if the given certificate is on this CRL,
608 public boolean isRevoked(Certificate cert) {
714 * Gets the CRL entry for the given certificate.
794 * Identifiers for the Internet X.509 Public Key Infrastructure Certificate
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/pkix/
pkix.go 242 // 5280, section 5.1. Use Certificate.CheckCRLSignature to verify the
  /prebuilts/go/linux-x86/src/crypto/x509/pkix/
pkix.go 242 // 5280, section 5.1. Use Certificate.CheckCRLSignature to verify the
  /external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/net/ssl/
SSLSocketTest.java 65 import java.security.cert.Certificate;
511 Certificate[] localCertificates = server.getSession().getLocalCertificates();
524 Certificate[] peerCertificates = client.getSession().getPeerCertificates();
690 Certificate[] localCertificates = event.getLocalCertificates();
691 Certificate[] peerCertificates = event.getPeerCertificates();
    [all...]
  /external/pdfium/xfa/fxfa/
fxfa_basic.h 872 Certificate,
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore4Test.java 25 import java.security.cert.Certificate;
  /prebuilts/android-emulator/darwin-x86_64/lib/
ca-bundle.pem 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015
6 ## This is a bundle of X.509 certificates of public Certificate Authorities
23 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
43 -----BEGIN CERTIFICATE-----
60 -----END CERTIFICATE-----
64 -----BEGIN CERTIFICATE-----
82 -----END CERTIFICATE-----
86 -----BEGIN CERTIFICATE-----
106 -----END CERTIFICATE----
    [all...]
  /prebuilts/android-emulator/linux-x86_64/lib/
ca-bundle.pem 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015
6 ## This is a bundle of X.509 certificates of public Certificate Authorities
23 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
43 -----BEGIN CERTIFICATE-----
60 -----END CERTIFICATE-----
64 -----BEGIN CERTIFICATE-----
82 -----END CERTIFICATE-----
86 -----BEGIN CERTIFICATE-----
106 -----END CERTIFICATE----
    [all...]
  /prebuilts/go/darwin-x86/src/net/smtp/
smtp_test.go 382 config := tls.Config{Certificates: []tls.Certificate{cert}}
785 config := &tls.Config{Certificates: []tls.Certificate{keypair}}
849 var localhostCert = []byte(`-----BEGIN CERTIFICATE-----
859 -----END CERTIFICATE-----`)
  /prebuilts/go/linux-x86/src/net/smtp/
smtp_test.go 382 config := tls.Config{Certificates: []tls.Certificate{cert}}
785 config := &tls.Config{Certificates: []tls.Certificate{keypair}}
849 var localhostCert = []byte(`-----BEGIN CERTIFICATE-----
859 -----END CERTIFICATE-----`)
  /device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/
DxeImageVerificationLib.c 368 // But CheckSum field and SECURITY data directory (certificate) are excluded
838 Check whether the hash of an given X.509 certificate is in forbidden database (DBX).
840 @param[in] Certificate Pointer to X.509 Certificate that is searched for.
841 @param[in] CertSize Size of X.509 Certificate.
844 @param[out] RevocationTime Return the time that the certificate was revoked.
846 @return TRUE The certificate hash is found in the forbidden database.
847 @return FALSE The certificate hash is not found in the forbidden database.
852 IN UINT8 *Certificate,
885 // Retrieve the TBSCertificate from the X.509 Certificate.
    [all...]

Completed in 1252 milliseconds

<<11121314151617