/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_plan9.go | 14 // Possible certificate files; stop after finding one. 19 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_plan9.go | 14 // Possible certificate files; stop after finding one. 19 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
|
/external/curl/docs/cmdline-opts/ |
cert-type.d | 4 Help: Certificate file type (DER/PEM/ENG) 7 Tells curl what certificate type the provided certificate is in. PEM, DER and
|
crlfile.d | 7 Provide a file using PEM format with a Certificate Revocation List that may
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 24 import java.security.cert.Certificate; 34 for (Certificate certificate : chain.connection().getHandshake().peerCertificates()) { 35 String pin = CertificatePinner.pin(certificate); 37 throw new IOException("Blacklisted peer certificate: " + pin);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
WfaCertBuilder.java | 24 import java.security.cert.Certificate; 32 * Provides static method to build certificate set from cert files 54 Certificate cert = certFactory.generateCertificate(fis);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CRLTest.java | 28 import java.security.cert.Certificate; 88 // that are abstract in <code>Certificate</code> 115 public boolean isRevoked(Certificate cert) {
|
CertStoreSpiTest.java | 36 import java.security.cert.Certificate; 89 public boolean match (Certificate crl) {
|
PKIXCertPathCheckerTest.java | 28 import java.security.cert.Certificate; 89 public void check(Certificate cert,
|
/libcore/ojluni/src/main/java/java/security/ |
Timestamp.java | 29 import java.security.cert.Certificate; 57 * The TSA's certificate path. 72 * @param signerCertPath is the TSA's certificate path. It must not be null. 93 * Returns the certificate path for the Timestamping Authority. 95 * @return The TSA's certificate path. 104 * and the TSA's certificate path. 118 * their timestamp's and their signer's certificate paths are equal. 141 * its signer's certificate. 147 List<? extends Certificate> certs = signerCertPath.getCertificates();
|
KeyStore.java | 30 import java.security.cert.Certificate; 52 * unauthorized access. It is also accompanied by a certificate chain 55 * <p> Private keys and certificate chains are used by a given entity for 66 * <p> This type of entry contains a single public key {@code Certificate} 67 * belonging to another party. It is called a <i>trusted certificate</i> 68 * because the keystore owner trusts that the public key in the certificate 70 * of the certificate. 76 * case of private keys and their associated certificate chains, these strings 79 * certificate authorities, or using different public key algorithms. 206 * @see java.security.cert.Certificate [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 22 import java.security.cert.Certificate; 28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>. 30 * @param certificate 33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
|
/cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/ |
CertInstallerReceiver.java | 32 import java.security.cert.Certificate; 36 * Delegated certificate installer app that responds to specific intents and executes various DPM 37 * certificate manipulation APIs. The following APIs are exercised: 128 Certificate certificate = CertificateFactory.getInstance("X.509") local 138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias), 160 Certificate certificateToMatch = readCertificate(toMatch); 162 Certificate cert = readCertificate(certBuffer); 170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
|
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
CertInstallDelegateTest.java | 37 import java.security.cert.Certificate; 54 "-----BEGIN CERTIFICATE-----\n" + 74 "-----END CERTIFICATE-----"; 143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert)); 146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert)); 149 assertTrue("Certificate is not among installed certs", 154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert)); 164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local 168 mDpm.installKeyPair(null, privatekey, certificate, alias)) [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
CaCertManagementTest.java | 24 import java.security.cert.Certificate; 69 * Test: removing one certificate must not remove any others. 85 * supplementary installed certificate. 99 Certificate caCert = readCertificate(caBytes); 105 Certificate caCert = readCertificate(caBytes); 122 * <p>A CA certificate is "installed" if it matches all of the following conditions: 125 * <li>{@link DevicePolicyManager#getInstalledCaCerts} lists a matching certificate (not 127 * <li>Any new instances of {@link TrustManager} should report the certificate among their 134 private boolean isCaCertInstalledAndTrusted(Certificate caCert) 155 // All three responses should match - if an installed certificate isn't trusted or (worse [all...] |
KeyManagementTest.java | 55 import java.security.cert.Certificate; 115 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); 139 final Certificate cert = getCertificate(FAKE_RSA_1.caCertificate); 142 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 144 assertTrue(mDevicePolicyManager.installKeyPair(getWho(), privKey, new Certificate[] {cert}, 163 private List<Certificate> loadCertificateChain(String assetName) throws Exception { 164 final Collection<Certificate> certs = loadCertificatesFromAsset(assetName); 165 final ArrayList<Certificate> certChain = new ArrayList(certs); 177 final Certificate[] certChain = loadCertificateChain("user-cert-chain.crt") 178 .toArray(new Certificate[0]) [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PoloChallengeResponse.java | 24 import java.security.cert.Certificate; 44 * Certificate of the local peer in the protocol. 46 private Certificate mClientCertificate; 49 * Certificate of the remote peer in the protocol. 51 private Certificate mServerCertificate; 56 * @param clientCert the certificate of the client node 57 * @param serverCert the certificate of the server node 60 public PoloChallengeResponse(Certificate clientCert, Certificate serverCert,
|
/bootable/recovery/ |
verifier.cpp | 123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys, 273 if (key.key_type == Certificate::KEY_TYPE_RSA) { 282 } else if (key.key_type == Certificate::KEY_TYPE_EC && key.hash_len == SHA256_DIGEST_LENGTH) { 463 // A Certificate is a pair of an RSAPublicKey and a particular hash 476 bool load_keys(const char* filename, std::vector<Certificate>& certs) { 484 certs.emplace_back(0, Certificate::KEY_TYPE_RSA, nullptr, nullptr); 485 Certificate& cert = certs.back(); 492 cert.key_type = Certificate::KEY_TYPE_RSA; 500 cert.key_type = Certificate::KEY_TYPE_RSA; 505 cert.key_type = Certificate::KEY_TYPE_RSA [all...] |
/frameworks/base/core/java/android/util/apk/ |
ApkSignatureVerifier.java | 42 import java.security.cert.Certificate; 81 Certificate[][] signerCerts = new Certificate[][] { vSigner.certs }; 123 Certificate[][] signerCerts = ApkSignatureSchemeV2Verifier.verify(apkPath); 168 final Certificate[][] lastCerts; 212 final Certificate[][] entryCerts = loadCertificates(jarFile, entry); 242 private static Certificate[][] loadCertificates(StrictJarFile jarFile, ZipEntry entry) 276 * Converts an array of certificate chains into the {@code Signature} equivalent used by the 281 public static Signature[] convertToSignatures(Certificate[][] certs) 323 Certificate[][] signerCerts = new Certificate[][] { vSigner.certs } [all...] |
/external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/ |
DelegatingHttpsURLConnection.java | 28 import java.security.cert.Certificate; 63 @Override public Certificate[] getLocalCertificates() { 66 List<Certificate> result = handshake.localCertificates(); 67 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null; 70 @Override public Certificate[] getServerCertificates() throws SSLPeerUnverifiedException { 73 List<Certificate> result = handshake.peerCertificates(); 74 return !result.isEmpty() ? result.toArray(new Certificate[result.size()]) : null;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 28 import org.bouncycastle.asn1.x509.Certificate; 37 * At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----" 46 private static final PEMUtil PEM_CERT_PARSER = new PEMUtil("CERTIFICATE"); 58 private java.security.cert.Certificate readDERCertificate( 65 private java.security.cert.Certificate readPEMCertificate( 72 private java.security.cert.Certificate getCertificate(ASN1Sequence seq) 93 Certificate.getInstance(seq)); 96 private java.security.cert.Certificate getCertificate() 108 Certificate.getInstance(obj)) [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertBlacklistTest.java | 24 import java.security.cert.Certificate; 92 Collection<? extends Certificate> collection = factory.generateCertificates(is); 95 for (Certificate cert : collection) {
|
ConscryptIntermediateVerificationTest.java | 24 import java.security.cert.Certificate; 42 Collection<? extends Certificate> certs; 54 for (Certificate cert : certs) { 89 // L is a certificate issued by I for example.com 90 // L' is a certificate issued by I for android.com
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
CertBlacklistTest.java | 21 import java.security.cert.Certificate; 89 Collection<? extends Certificate> collection = factory.generateCertificates(is); 93 for (Certificate cert : collection) {
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 26 import java.security.cert.Certificate; 36 * self-signed certificate for a single hostname such as "localhost". 57 .addTrustedCertificate(heldCertificate.certificate) 72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate 73 * in this chain is the server's certificate, further certificates are included in the handshake 74 * so the client can build a trusted path to a CA certificate. 82 * Add a certificate authority that this client trusts. Servers that provide certificate chains 85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) { [all...] |