/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 21 // NotAuthorizedToSign results when a certificate is signed by another 22 // which isn't marked as a CA certificate. 24 // Expired results when a certificate has expired, based on the time 28 // certificate has a name constraint which doesn't include the name 34 // IncompatibleUsage results when the certificate's key usage indicates 37 // NameMismatch results when the subject name of a parent certificate 45 Cert *Certificate 52 return "x509: certificate is not authorized to sign other certificates" 54 return "x509: certificate has expired or is not yet valid" 56 return "x509: a root or intermediate certificate is not authorized to sign in this domain [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PoloUtil.java | 22 import java.security.cert.Certificate; 33 * Returns the peer {@link Certificate} for an {@link SSLSession}. 35 * @throws PoloException if the peer certificate could not be obtained 37 * @return the {@link Certificate} of the peer 39 public static Certificate getPeerCert(SSLSession session) 42 // Peer certificate 43 Certificate[] certs = session.getPeerCertificates(); 45 throw new PoloException("No peer certificate."); 54 * Return the local {@link Certificate} for an {@link SSLSession}. 56 * @throws PoloException if the local certificate could not be obtaine [all...] |
/libcore/ojluni/src/main/java/java/net/ |
SecureCacheResponse.java | 28 import java.security.cert.Certificate; 49 * Returns the certificate chain that were sent to the server during 52 * when using certificate-based cipher suites. 54 * @return an immutable List of Certificate representing the 55 * certificate chain that was sent to the server. If no 56 * certificate chain was sent, null will be returned. 59 public abstract List<Certificate> getLocalCertificateChain(); 62 * Returns the server's certificate chain, which was established as 65 * can be used only when using certificate-based cipher suites; 66 * using it with non-certificate-based cipher suites, such a [all...] |
/libcore/ojluni/src/main/java/javax/net/ssl/ |
X509TrustManager.java | 33 * socket. Decisions may be based on trusted certificate 34 * authorities, certificate revocation lists, online 41 * Given the partial or complete certificate chain provided by the 42 * peer, build a certificate path to a trusted root and return if 46 * The authentication type is determined by the actual certificate 50 * @param chain the peer certificate chain 51 * @param authType the authentication type based on the client certificate 55 * @throws CertificateException if the certificate chain is not trusted 62 * Given the partial or complete certificate chain provided by the 63 * peer, build a certificate path to a trusted root and return i [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerId.java | 34 * certificate. 36 * @param issuer the issuer of the signer's associated certificate. 37 * @param serialNumber the serial number of the signer's associated certificate. 46 * certificate. 48 * @param issuer the issuer of the signer's associated certificate. 49 * @param serialNumber the serial number of the signer's associated certificate. 50 * @param subjectKeyId the subject key identifier to use to match the signers associated certificate.
|
/packages/apps/KeyChain/res/values-tl/ |
strings.xml | 20 <string name="title_no_certs" msgid="8350009443064722873">"Walang nahanap na mga certificate"</string> 21 <string name="title_select_cert" msgid="3588447616418041699">"Pumili ng certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"Humiling ng certificate ang app na %s. Bibigyang-daan ng pagpili ng certificate ang app na magamit ang pagkakakilanlang ito sa mga server ngayon at sa hinaharap."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"Natukoy ng app ang humihiling na server bilang %s, ngunit dapat mo lang bigyan ng access sa certificate ang app kung pinagkakatiwalaan mo ang app."</string> 24 <string name="install_new_cert_message" msgid="4451971501142085495">"Maaari kang mag-install ng mga certificate mula sa isang PKCS#12 file na may %1$s o %2$s na extension na matatagpuan sa external storage."</string> 25 <string name="install_new_cert_button_label" msgid="903474285774077171">"Mag-install ng certificate"</string>
|
/external/avb/libavb_atx/ |
avb_atx_validate.c | 77 /* Verifies the format, key version, usage, and signature of a certificate. */ 78 static bool verify_certificate(AvbAtxCertificate* certificate, 85 if (certificate->signed_data.version != 1) { 86 avb_error("Unsupported certificate format.\n"); 90 sha512((const uint8_t*)&certificate->signed_data, 95 certificate->signature, 101 avb_error("Invalid certificate signature.\n"); 104 if (certificate->signed_data.key_version < minimum_key_version) { 108 if (0 != avb_safe_memcmp(certificate->signed_data.usage, 111 avb_error("Invalid certificate usage.\n") [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
HeldCertificate.java | 34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on 35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other 36 * held certificates, as done in practice by certificate authorities. 39 public final X509Certificate certificate; field in class:HeldCertificate 42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) { 43 this.certificate = certificate; 65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is 66 * the CN (common name) in the certificate. Will be a random string if no value is provided. 79 * Set the certificate that signs this certificate. If unset, a self-signed certificate will b 132 X509Certificate certificate = generator.generateX509Certificate( local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 37 import java.security.cert.Certificate; 49 private Certificate certificate; field in class:KeyStore3Test 78 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[]{certificate}); 93 new Certificate[0]); 99 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[]{certificate}); 108 new Certificate[0]); 109 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[]{certificate}) [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory3Test.java | 35 import java.security.cert.Certificate; 84 * Assertion: returns Certificate 89 Certificate[] certs = new Certificate[3]; 100 * Assertion: returns Collection which consists of 1 Certificate 105 Certificate cert = certFs[0] 109 Collection<? extends Certificate> col = null; 112 Iterator<? extends Certificate> it = col.iterator(); 114 assertEquals("Incorrect Certificate in Collection", cert, it.next()); 120 * Assertion: returns CertPath with 1 Certificate [all...] |
/libcore/ojluni/src/main/java/javax/security/cert/ |
Certificate.java | 37 * An identity certificate is a guarantee by a principal that 43 * certificates, such as X.509 and PGP, share general certificate 48 * subclassing the Certificate class, even though they contain different 55 * use the standard Java SE certificate classes located in 63 public abstract class Certificate { 66 * Compares this certificate for equality with the specified 68 * {@code instanceof} {@code Certificate}, then 70 * encoded form of this certificate. 72 * @param other the object to test for equality with this certificate. 79 if (!(other instanceof Certificate)) [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
CertificatePinnerChainValidationTest.java | 42 /** The pinner should pull the root certificate from the trust manager. */ 55 HeldCertificate certificate = new HeldCertificate.Builder() local 61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate)) 64 .addTrustedCertificate(rootCa.certificate) 72 .certificateChain(certificate, intermediateCa) 110 HeldCertificate certificate = new HeldCertificate.Builder() local 116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate)) 119 .addTrustedCertificate(rootCa.certificate) 127 .certificateChain(certificate, intermediateCa) 153 // Start with a trusted root CA certificate [all...] |
CertificateChainCleanerTest.java | 20 import java.security.cert.Certificate; 36 new RealTrustRootIndex(root.certificate)); 67 new RealTrustRootIndex(root.certificate)); 85 new RealTrustRootIndex(root.certificate)); 107 new RealTrustRootIndex(root.certificate)); 129 new RealTrustRootIndex(root.certificate)); 150 new RealTrustRootIndex(root.certificate)); 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); 194 HeldCertificate certificate = new HeldCertificate.Builder( local [all...] |
/external/boringssl/src/crypto/x509/ |
x509_txt.c | 74 return ("unable to get issuer certificate"); 76 return ("unable to get certificate CRL"); 78 return ("unable to decrypt certificate's signature"); 84 return ("certificate signature failure"); 88 return ("certificate is not yet valid"); 92 return ("certificate has expired"); 96 return ("format error in certificate's notBefore field"); 98 return ("format error in certificate's notAfter field"); 106 return ("self signed certificate"); 108 return ("self signed certificate in certificate chain") [all...] |
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate"; 76 // Certificate type does not matter for our purposes, using ECDSA because it 86 // Generate a real certificate without specifying the expiration time. 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 90 scoped_refptr<RTCCertificate> certificate = local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); 102 scoped_refptr<RTCCertificate> certificate = local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); 108 // Generate a certificate that expires in 1s 110 scoped_refptr<RTCCertificate> certificate = local [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 24 import java.security.cert.Certificate; 34 * certificate in the benchmark loop, being careful to convert from the 35 * byte[] to the certificate each time. Otherwise the certificate class 37 * each certificate instance is verified once and then released. 73 final Certificate[] certificates = bytesToCertificates(encodedCertificates); 75 @Override public Certificate[] getPeerCertificates() { 83 private byte[][] certificatesToBytes(Certificate[] certificates) throws Exception { 91 private Certificate[] bytesToCertificates(byte[][] encodedCertificates) throws Exception { 93 Certificate[] result = new Certificate[encodedCertificates.length] [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
IssuerAndSerialNumber.java | 12 import org.bouncycastle.asn1.x509.Certificate; 73 Certificate certificate) 75 this.name = certificate.getIssuer(); 76 this.serialNumber = certificate.getSerialNumber(); 80 * @deprecated use constructor taking Certificate 83 X509CertificateStructure certificate) 85 this.name = certificate.getIssuer(); 86 this.serialNumber = certificate.getSerialNumber();
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXCertStoreSelector.java | 7 import java.security.cert.Certificate; 18 public class PKIXCertStoreSelector<T extends Certificate> 43 public PKIXCertStoreSelector<? extends Certificate> build() 56 public boolean match(Certificate cert) 66 public static Collection<? extends Certificate> getCertificates(final PKIXCertStoreSelector selector, CertStore certStore) 114 public boolean match(Certificate certificate) 116 return (selector == null) ? (certificate != null) : selector.match(certificate);
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.h | 30 // Reads an X509 certificate from a PEM encoded string. 32 // @return a pointer to a new X509 certificate or NULL if there was an error 33 // loading the certificate 36 // Converts an X509 certificate to a PEM encoded string. 37 // @param x509 the X509 certificate 38 // @return a PEM encoded string of the given certificate 60 // Generates a self-signed X509 certificate. 63 // @param days the number of days before the certificate expires 64 // @return a new self-signed X509 certificate
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathBuilderTestPKIX.java | 24 import java.security.cert.Certificate; 54 List<Certificate> certList = new ArrayList<Certificate>(); 55 for (Certificate certificate : pke.getCertificateChain()) { 56 certList.add(certificate); 70 List<? extends Certificate> certificates = path.getCertificates(); 76 Certificate endEntityCert = certificates.get(0); 77 assertEquals("Certificate must be of X.509 type", "X.509", endEntityCert.getType());
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
CertificateChainCleaner.java | 20 import java.security.cert.Certificate; 30 * Computes the effective certificate chain from the raw array returned by Java's built in TLS APIs. 32 * certificate is signed by the certificate that follows, and the last certificate is a trusted CA 33 * certificate. 36 * the TLS handshake and to extract the trusted CA certificate for the benefit of certificate 55 * <p>This method throws if the complete chain to a trusted CA certificate cannot be constructed. 59 public List<Certificate> clean(List<Certificate> chain) throws SSLPeerUnverifiedException [all...] |
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/cts/tools/utils/ |
certificates.py | 21 class Certificate(object): 49 return Certificate(cert, key) 77 return Certificate(cert, key) 81 a = Certificate.create("Root A") 82 a_sha1 = Certificate.create("Root A", key=a.key, digest="sha1") 83 b = Certificate.create("Root B") 84 a_to_b = Certificate.create("Root A", b, a.key) 85 b_to_a = Certificate.create("Root B", a, b.key) 86 leaf1 = Certificate.create("Leaf", a) 87 intermediate_a = Certificate.create("intermediate", a [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
CRLReason.java | 29 * The CRLReason enumeration specifies the reason that a certificate 31 * RFC 3280: Internet X.509 Public Key Infrastructure Certificate and CRL 42 * certificate has been revoked. 48 * certificate subject's private key has been compromised. It applies 55 * certificate subject's private key has been compromised. It applies 56 * to certificate authority (CA) certificates only. 67 * This reason indicates that the certificate has been superseded. 72 * This reason indicates that the certificate is no longer needed. 77 * This reason indicates that the certificate has been put on hold. 87 * This reason indicates that the certificate was previously on hol [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_plan9.go | 14 // Possible certificate files; stop after finding one. 19 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
|