HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 126 - 150 of 2776) sorted by null

1 2 3 4 56 7 8 91011>>

  /prebuilts/go/linux-x86/src/crypto/x509/
verify.go 21 // NotAuthorizedToSign results when a certificate is signed by another
22 // which isn't marked as a CA certificate.
24 // Expired results when a certificate has expired, based on the time
28 // certificate has a name constraint which doesn't include the name
34 // IncompatibleUsage results when the certificate's key usage indicates
37 // NameMismatch results when the subject name of a parent certificate
45 Cert *Certificate
52 return "x509: certificate is not authorized to sign other certificates"
54 return "x509: certificate has expired or is not yet valid"
56 return "x509: a root or intermediate certificate is not authorized to sign in this domain
    [all...]
  /external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PoloUtil.java 22 import java.security.cert.Certificate;
33 * Returns the peer {@link Certificate} for an {@link SSLSession}.
35 * @throws PoloException if the peer certificate could not be obtained
37 * @return the {@link Certificate} of the peer
39 public static Certificate getPeerCert(SSLSession session)
42 // Peer certificate
43 Certificate[] certs = session.getPeerCertificates();
45 throw new PoloException("No peer certificate.");
54 * Return the local {@link Certificate} for an {@link SSLSession}.
56 * @throws PoloException if the local certificate could not be obtaine
    [all...]
  /libcore/ojluni/src/main/java/java/net/
SecureCacheResponse.java 28 import java.security.cert.Certificate;
49 * Returns the certificate chain that were sent to the server during
52 * when using certificate-based cipher suites.
54 * @return an immutable List of Certificate representing the
55 * certificate chain that was sent to the server. If no
56 * certificate chain was sent, null will be returned.
59 public abstract List<Certificate> getLocalCertificateChain();
62 * Returns the server's certificate chain, which was established as
65 * can be used only when using certificate-based cipher suites;
66 * using it with non-certificate-based cipher suites, such a
    [all...]
  /libcore/ojluni/src/main/java/javax/net/ssl/
X509TrustManager.java 33 * socket. Decisions may be based on trusted certificate
34 * authorities, certificate revocation lists, online
41 * Given the partial or complete certificate chain provided by the
42 * peer, build a certificate path to a trusted root and return if
46 * The authentication type is determined by the actual certificate
50 * @param chain the peer certificate chain
51 * @param authType the authentication type based on the client certificate
55 * @throws CertificateException if the certificate chain is not trusted
62 * Given the partial or complete certificate chain provided by the
63 * peer, build a certificate path to a trusted root and return i
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
SignerId.java 34 * certificate.
36 * @param issuer the issuer of the signer's associated certificate.
37 * @param serialNumber the serial number of the signer's associated certificate.
46 * certificate.
48 * @param issuer the issuer of the signer's associated certificate.
49 * @param serialNumber the serial number of the signer's associated certificate.
50 * @param subjectKeyId the subject key identifier to use to match the signers associated certificate.
  /packages/apps/KeyChain/res/values-tl/
strings.xml 20 <string name="title_no_certs" msgid="8350009443064722873">"Walang nahanap na mga certificate"</string>
21 <string name="title_select_cert" msgid="3588447616418041699">"Pumili ng certificate"</string>
22 <string name="requesting_application" msgid="1589142627467598421">"Humiling ng certificate ang app na %s. Bibigyang-daan ng pagpili ng certificate ang app na magamit ang pagkakakilanlang ito sa mga server ngayon at sa hinaharap."</string>
23 <string name="requesting_server" msgid="5832565605998634370">"Natukoy ng app ang humihiling na server bilang %s, ngunit dapat mo lang bigyan ng access sa certificate ang app kung pinagkakatiwalaan mo ang app."</string>
24 <string name="install_new_cert_message" msgid="4451971501142085495">"Maaari kang mag-install ng mga certificate mula sa isang PKCS#12 file na may %1$s o %2$s na extension na matatagpuan sa external storage."</string>
25 <string name="install_new_cert_button_label" msgid="903474285774077171">"Mag-install ng certificate"</string>
  /external/avb/libavb_atx/
avb_atx_validate.c 77 /* Verifies the format, key version, usage, and signature of a certificate. */
78 static bool verify_certificate(AvbAtxCertificate* certificate,
85 if (certificate->signed_data.version != 1) {
86 avb_error("Unsupported certificate format.\n");
90 sha512((const uint8_t*)&certificate->signed_data,
95 certificate->signature,
101 avb_error("Invalid certificate signature.\n");
104 if (certificate->signed_data.key_version < minimum_key_version) {
108 if (0 != avb_safe_memcmp(certificate->signed_data.usage,
111 avb_error("Invalid certificate usage.\n")
    [all...]
  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
HeldCertificate.java 34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on
35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other
36 * held certificates, as done in practice by certificate authorities.
39 public final X509Certificate certificate; field in class:HeldCertificate
42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) {
43 this.certificate = certificate;
65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is
66 * the CN (common name) in the certificate. Will be a random string if no value is provided.
79 * Set the certificate that signs this certificate. If unset, a self-signed certificate will b
132 X509Certificate certificate = generator.generateX509Certificate( local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore3Test.java 37 import java.security.cert.Certificate;
49 private Certificate certificate; field in class:KeyStore3Test
78 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[]{certificate});
93 new Certificate[0]);
99 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[]{certificate});
108 new Certificate[0]);
109 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[]{certificate})
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory3Test.java 35 import java.security.cert.Certificate;
84 * Assertion: returns Certificate
89 Certificate[] certs = new Certificate[3];
100 * Assertion: returns Collection which consists of 1 Certificate
105 Certificate cert = certFs[0]
109 Collection<? extends Certificate> col = null;
112 Iterator<? extends Certificate> it = col.iterator();
114 assertEquals("Incorrect Certificate in Collection", cert, it.next());
120 * Assertion: returns CertPath with 1 Certificate
    [all...]
  /libcore/ojluni/src/main/java/javax/security/cert/
Certificate.java 37 * An identity certificate is a guarantee by a principal that
43 * certificates, such as X.509 and PGP, share general certificate
48 * subclassing the Certificate class, even though they contain different
55 * use the standard Java SE certificate classes located in
63 public abstract class Certificate {
66 * Compares this certificate for equality with the specified
68 * {@code instanceof} {@code Certificate}, then
70 * encoded form of this certificate.
72 * @param other the object to test for equality with this certificate.
79 if (!(other instanceof Certificate))
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
CertificatePinnerChainValidationTest.java 42 /** The pinner should pull the root certificate from the trust manager. */
55 HeldCertificate certificate = new HeldCertificate.Builder() local
61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate))
64 .addTrustedCertificate(rootCa.certificate)
72 .certificateChain(certificate, intermediateCa)
110 HeldCertificate certificate = new HeldCertificate.Builder() local
116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate))
119 .addTrustedCertificate(rootCa.certificate)
127 .certificateChain(certificate, intermediateCa)
153 // Start with a trusted root CA certificate
    [all...]
CertificateChainCleanerTest.java 20 import java.security.cert.Certificate;
36 new RealTrustRootIndex(root.certificate));
67 new RealTrustRootIndex(root.certificate));
85 new RealTrustRootIndex(root.certificate));
107 new RealTrustRootIndex(root.certificate));
129 new RealTrustRootIndex(root.certificate));
150 new RealTrustRootIndex(root.certificate));
173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate));
194 HeldCertificate certificate = new HeldCertificate.Builder( local
    [all...]
  /external/boringssl/src/crypto/x509/
x509_txt.c 74 return ("unable to get issuer certificate");
76 return ("unable to get certificate CRL");
78 return ("unable to decrypt certificate's signature");
84 return ("certificate signature failure");
88 return ("certificate is not yet valid");
92 return ("certificate has expired");
96 return ("format error in certificate's notBefore field");
98 return ("format error in certificate's notAfter field");
106 return ("self signed certificate");
108 return ("self signed certificate in certificate chain")
    [all...]
  /external/webrtc/webrtc/base/
rtccertificate_unittests.cc 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate";
76 // Certificate type does not matter for our purposes, using ECDSA because it
86 // Generate a real certificate without specifying the expiration time.
87 // Certificate type doesn't matter, using ECDSA because it's fast to generate.
90 scoped_refptr<RTCCertificate> certificate = local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now));
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60));
102 scoped_refptr<RTCCertificate> certificate = local
104 EXPECT_EQ(now, ExpiresSeconds(certificate));
108 // Generate a certificate that expires in 1s
110 scoped_refptr<RTCCertificate> certificate = local
    [all...]
  /libcore/benchmarks/src/benchmarks/regression/
HostnameVerifierBenchmark.java 24 import java.security.cert.Certificate;
34 * certificate in the benchmark loop, being careful to convert from the
35 * byte[] to the certificate each time. Otherwise the certificate class
37 * each certificate instance is verified once and then released.
73 final Certificate[] certificates = bytesToCertificates(encodedCertificates);
75 @Override public Certificate[] getPeerCertificates() {
83 private byte[][] certificatesToBytes(Certificate[] certificates) throws Exception {
91 private Certificate[] bytesToCertificates(byte[][] encodedCertificates) throws Exception {
93 Certificate[] result = new Certificate[encodedCertificates.length]
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
IssuerAndSerialNumber.java 12 import org.bouncycastle.asn1.x509.Certificate;
73 Certificate certificate)
75 this.name = certificate.getIssuer();
76 this.serialNumber = certificate.getSerialNumber();
80 * @deprecated use constructor taking Certificate
83 X509CertificateStructure certificate)
85 this.name = certificate.getIssuer();
86 this.serialNumber = certificate.getSerialNumber();
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKIXCertStoreSelector.java 7 import java.security.cert.Certificate;
18 public class PKIXCertStoreSelector<T extends Certificate>
43 public PKIXCertStoreSelector<? extends Certificate> build()
56 public boolean match(Certificate cert)
66 public static Collection<? extends Certificate> getCertificates(final PKIXCertStoreSelector selector, CertStore certStore)
114 public boolean match(Certificate certificate)
116 return (selector == null) ? (certificate != null) : selector.match(certificate);
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.h 30 // Reads an X509 certificate from a PEM encoded string.
32 // @return a pointer to a new X509 certificate or NULL if there was an error
33 // loading the certificate
36 // Converts an X509 certificate to a PEM encoded string.
37 // @param x509 the X509 certificate
38 // @return a PEM encoded string of the given certificate
60 // Generates a self-signed X509 certificate.
63 // @param days the number of days before the certificate expires
64 // @return a new self-signed X509 certificate
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertPathBuilderTestPKIX.java 24 import java.security.cert.Certificate;
54 List<Certificate> certList = new ArrayList<Certificate>();
55 for (Certificate certificate : pke.getCertificateChain()) {
56 certList.add(certificate);
70 List<? extends Certificate> certificates = path.getCertificates();
76 Certificate endEntityCert = certificates.get(0);
77 assertEquals("Certificate must be of X.509 type", "X.509", endEntityCert.getType());
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
CertificateChainCleaner.java 20 import java.security.cert.Certificate;
30 * Computes the effective certificate chain from the raw array returned by Java's built in TLS APIs.
32 * certificate is signed by the certificate that follows, and the last certificate is a trusted CA
33 * certificate.
36 * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate
55 * <p>This method throws if the complete chain to a trusted CA certificate cannot be constructed.
59 public List<Certificate> clean(List<Certificate> chain) throws SSLPeerUnverifiedException
    [all...]
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 32 import java.security.cert.Certificate;
45 * SSL certificate info (certificate details) class
55 * Name of the entity this certificate is issued to
60 * Name of the entity this certificate is issued by
75 * The original source certificate, if available.
90 private static final String X509_CERTIFICATE = "x509-certificate";
93 * Saves the certificate state to a bundle
94 * @param certificate The SSL certificate to stor
184 certificate); local
    [all...]
  /cts/tools/utils/
certificates.py 21 class Certificate(object):
49 return Certificate(cert, key)
77 return Certificate(cert, key)
81 a = Certificate.create("Root A")
82 a_sha1 = Certificate.create("Root A", key=a.key, digest="sha1")
83 b = Certificate.create("Root B")
84 a_to_b = Certificate.create("Root A", b, a.key)
85 b_to_a = Certificate.create("Root B", a, b.key)
86 leaf1 = Certificate.create("Leaf", a)
87 intermediate_a = Certificate.create("intermediate", a
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
CRLReason.java 29 * The CRLReason enumeration specifies the reason that a certificate
31 * RFC 3280: Internet X.509 Public Key Infrastructure Certificate and CRL
42 * certificate has been revoked.
48 * certificate subject's private key has been compromised. It applies
55 * certificate subject's private key has been compromised. It applies
56 * to certificate authority (CA) certificates only.
67 * This reason indicates that the certificate has been superseded.
72 * This reason indicates that the certificate is no longer needed.
77 * This reason indicates that the certificate has been put on hold.
87 * This reason indicates that the certificate was previously on hol
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_plan9.go 14 // Possible certificate files; stop after finding one.
19 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {

Completed in 795 milliseconds

1 2 3 4 56 7 8 91011>>