/packages/apps/CertInstaller/res/values-en-rXC/ |
strings.xml | 19 <string name="app_name" msgid="9095072584761066851">"????????????????????????????????????????????????????????????????????????????????????????????????Certificate Installer??????"</string> 20 <string name="pick_file_title" msgid="4481949485108233297">"???????????????????????????????????????????????????????????????????????????????????????????????Choose a certificate??????"</string> 21 <string name="pkcs12_password_dialog_title" msgid="5997624645207427161">"????????????????????????????????????????????????????????????????????????????????????????????????Extract certificate??????"</string> 24 <string name="name_credential_dialog_title" msgid="277729846491554437">"???????????????????????????????????????????????????????????????????????????????????????????Name the certificate??????"</string> 25 <string name="credential_name" msgid="1974979771369744378">"??????????????????????????????????????????????????????????????????????????????????????????????Certificate name:??????"</string> 30 <string name="one_usercrt" msgid="7690798336332403106">"????????????????????????????????????????????????????????????????????????????????????????????????one user certificate??????"</string> 31 <string name="one_cacrt" msgid="2667950425420663146">"???????????????????????????????????????????????????????????????????????????????????????????????one CA certificate??????"</string> 37 <string name="unable_to_save_cert" msgid="9178604087335389686">"????????????????????????????????????????????????????????????????????????????????????????????????Couldn\'t save the certificate. The credential storage isn\'t enabled or properly initialized.??????"</string> 38 <string name="cert_not_saved" msgid="4037698479662830270">"???????????????????????????????????????????????????????????????????????????????????????????????The certificate is not installed.??????"</string> 39 <string name="no_cert_to_saved" msgid="5708884372817309068">"????????????????????????????????????????????????????????????????????????????????????????????????No certificate to install.??????"</string [all...] |
/system/update_engine/ |
certificate_checker.h | 38 // Takes an openssl X509_STORE_CTX, extracts the corresponding certificate 42 // |x509_ctx| is the pointer to the openssl object that holds the certificate. 43 // |out_depth| is the depth of the current certificate, in the certificate 60 // The certificate is valid and the same as seen before or the first time we 61 // see a certificate. 63 // The certificate is valid, but is different than a previously seen 64 // certificate for the selected server. 66 // The certificate validation failed. 96 // Called whenever a certificate is checked for the server |server_to_check [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
CertificatePinnerTest.java | 49 certA1Pin = CertificatePinner.pin(certA1.certificate); 55 certB1Pin = CertificatePinner.pin(certB1.certificate); 61 certC1Pin = CertificatePinner.pin(certC1.certificate); 95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); 101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); 113 certificatePinner.check("example.com", certA1.certificate); 121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); 130 certificatePinner.check("example.com", certB1.certificate); 141 certificatePinner.check("example.com", certA1.certificate); [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_windows.go | 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory 14 // certificate store containing itself and all of the intermediate certificates specified 20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) { 58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. 59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) { 83 // checkChainTrustStatus checks the trust status of the certificate chain, translating 85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error { 98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for 99 // use as a certificate chain for a SSL/TLS server. 100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_windows.go | 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory 14 // certificate store containing itself and all of the intermediate certificates specified 20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) { 58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. 59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) { 83 // checkChainTrustStatus checks the trust status of the certificate chain, translating 85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error { 98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for 99 // use as a certificate chain for a SSL/TLS server. 100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
CertificateFactorySpi.java | 41 * of a certificate factory for a particular certificate type, e.g., X.509. 43 * <p>Certificate factories are used to generate certificate, certification path 44 * ({@code CertPath}) and certificate revocation list (CRL) objects from 47 * <p>A certificate factory for X.509 must return certificates that are an 57 * @see Certificate 69 * Generates a certificate object and initializes it with 72 * <p>In order to take advantage of the specialized certificate format 73 * supported by this certificate factory [all...] |
/external/curl/docs/libcurl/opts/ |
CURLOPT_PROXY_SSL_VERIFYPEER.3 | 25 CURLOPT_PROXY_SSL_VERIFYPEER \- verify the proxy peer's SSL certificate 35 certificate. A value of 1 means curl verifies; 0 (zero) means it doesn't. 37 When negotiating a TLS or SSL connection, the server sends a certificate 38 indicating its identity. Curl verifies whether the certificate is authentic, 39 i.e. that you can trust that the server is who the certificate says it is. 47 prove that the certificate is authentic, the connection fails. When the 48 option is zero, the peer certificate verification succeeds regardless. 50 Authenticating the certificate is not enough to be sure about the server. You 53 host name in the certificate is valid for the host name you're connecting to 56 WARNING: disabling verification of the certificate allows bad guys t [all...] |
CURLOPT_SSL_VERIFYPEER.3 | 25 CURLOPT_SSL_VERIFYPEER \- verify the peer's SSL certificate 34 certificate. A value of 1 means curl verifies; 0 (zero) means it doesn't. 36 When negotiating a TLS or SSL connection, the server sends a certificate 37 indicating its identity. Curl verifies whether the certificate is authentic, 38 i.e. that you can trust that the server is who the certificate says it is. 46 prove that the certificate is authentic, the connection fails. When the 47 option is zero, the peer certificate verification succeeds regardless. 49 Authenticating the certificate is not enough to be sure about the server. You 52 host name in the certificate is valid for the host name you're connecting to 55 WARNING: disabling verification of the certificate allows bad guys t [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 27 import java.security.cert.Certificate; 46 private Certificate [] testChain; 50 testChain = new Certificate[5]; 61 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 66 Certificate[] certs = new MyCertificate[1];//new Certificate[1]; 76 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 82 Certificate[] chain = null; 90 chain = new Certificate[0]; 97 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateTest.java | 37 import java.security.cert.Certificate; 49 * Tests for <code>Certificate</code> fields and methods 60 * Test for <code>Certificate(String type)</code> method<br> 63 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding); 74 * Assertion: returns hash of the <code>Certificate</code> instance 78 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding); 79 Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding); 93 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding); 94 Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding); 105 Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding) [all...] |
/libcore/ojluni/src/main/java/javax/net/ssl/ |
X509ExtendedTrustManager.java | 39 * to verify that the hostname in an end-entity certificate matches the 42 * certificate chain checks were done at the SSL/TLS layer, and the hostname 57 * Given the partial or complete certificate chain provided by the 58 * peer, build and validate the certificate path based on the 61 * The authentication type is determined by the actual certificate 70 * in the end-entity X509 certificate, as specified in the endpoint 75 * <code>SSLParameters</code> is non-null, for every certificate in the 80 * @param chain the peer certificate chain 88 * @throws CertificateException if the certificate chain is not trusted 100 * Given the partial or complete certificate chain provided by th [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
X509CertificatePair.java | 44 * This class represents an X.509 Certificate Pair object, which is primarily 46 * Authorities. The ASN.1 structure is listed below. The forward certificate 47 * of the CertificatePair contains a certificate issued to this CA by another 48 * CA. The reverse certificate of the CertificatePair contains a certificate 51 * certificate shall match the subject name in the other and vice versa, and 52 * the subject public key in one certificate shall be capable of verifying the 53 * digital signature on the other certificate and vice versa. If a subject 54 * public key in one certificate does not contain required key algorithm 60 * forward [0] Certificate OPTIONAL [all...] |
AdaptableX509CertSelector.java | 30 import java.security.cert.Certificate; 43 * An adaptable X509 certificate selector for forward certification path 46 * additional rules for certificate validity. 69 * Normally, we may not have to check that a certificate validity period 70 * must fall within its issuer's certificate validity period. However, 73 * to determine the right issuer's certificate. 81 * within the certificate validity period for the X509Certificate 83 * within the certificate validity period for the X509Certificate 143 * Decides whether a <code>Certificate</code> should be selected. 146 * and serialNumber criteria and adds additional rules for certificate [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiKeyStore.java | 31 import java.security.cert.Certificate; 40 * This class provides the methods to access keystore for certificate management. 62 // Certificate and private key management for EnterpriseConfig 71 private static boolean hasHardwareBackedKey(Certificate certificate) { 72 return isHardwareBackedKey(certificate.getPublicKey()); 88 Certificate[] clientCertificateChain = config.getClientCertificateChain(); 163 * Install a certificate into the keystore. 165 * @param name The alias name of the certificate to be installed 166 * @param cert The certificate to be installe [all...] |
/packages/apps/CertInstaller/res/values/ |
strings.xml | 18 <string name="app_name">Certificate Installer</string> 21 <string name="pick_file_title">Choose a certificate</string> 24 <string name="pkcs12_password_dialog_title">Extract certificate</string> 30 <string name="name_credential_dialog_title">Name the certificate</string> 32 <string name="credential_name">Certificate name:</string> 42 <string name="one_usercrt">one user certificate</string> 44 <string name="one_cacrt">one CA certificate</string> 52 <string name="unable_to_save_cert">Couldn\'t save the certificate. The credential storage isn\'t enabled or properly initialized.</string> 53 <string name="cert_not_saved">The certificate is not installed.</string> 54 <string name="no_cert_to_saved">No certificate to install.</string [all...] |
/libcore/ojluni/src/main/java/com/sun/security/cert/internal/x509/ |
X509V1CertImpl.java | 67 * Unmarshals a certificate from its encoded form, parsing the 69 * need to examine and use certificate contents. That is, this is 71 * must include only a certificate, and no "garbage" may be left at 72 * the end. If you need to ignore data at the end of a certificate, 92 * unmarshals an X.509 certificate from an input stream. 94 * @param in an input stream holding at least one certificate 108 * Returns the encoded form of this certificate. It is 109 * assumed that each certificate type would have only a single 122 * Throws an exception if the certificate was not signed using the 123 * verification key provided. Successfully verifying a certificate [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
tls.go | 30 // at least one certificate or else set GetCertificate. 62 // at least one certificate or else set GetCertificate. 73 // at least one certificate or else set GetCertificate. 174 // of files. The files must contain PEM encoded data. The certificate file 175 // may contain intermediate certificates following the leaf certificate to 176 // form a certificate chain. On successful return, Certificate.Leaf will 177 // be nil because the parsed form of the certificate is not retained. 178 func LoadX509KeyPair(certFile, keyFile string) (Certificate, error) { 181 return Certificate{}, er [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
tls.go | 30 // at least one certificate or else set GetCertificate. 62 // at least one certificate or else set GetCertificate. 73 // at least one certificate or else set GetCertificate. 174 // of files. The files must contain PEM encoded data. The certificate file 175 // may contain intermediate certificates following the leaf certificate to 176 // form a certificate chain. On successful return, Certificate.Leaf will 177 // be nil because the parsed form of the certificate is not retained. 178 func LoadX509KeyPair(certFile, keyFile string) (Certificate, error) { 181 return Certificate{}, er [all...] |
/external/webrtc/webrtc/base/ |
sslidentity.h | 32 // A somewhat opaque type used to encapsulate a certificate. 33 // Wraps the SSL library's notion of a certificate, with reference counting. 39 // Parses and build a certificate from a PEM encoded string. 41 // The length of the string representation of the certificate is 49 // underlying certificate, including its chain if present. 54 // The chain includes a copy of each certificate, excluding the leaf. 57 // Returns a PEM encoded string representation of the certificate. 60 // Provides a DER encoded binary representation of the certificate. 64 // certificate's signature. 67 // Compute the digest of the certificate given algorith [all...] |
/packages/apps/CertInstaller/res/values-tl/ |
strings.xml | 19 <string name="app_name" msgid="9095072584761066851">"Installer ng Certificate"</string> 20 <string name="pick_file_title" msgid="4481949485108233297">"Pumili ng certificate"</string> 21 <string name="pkcs12_password_dialog_title" msgid="5997624645207427161">"I-extract ang certificate"</string> 24 <string name="name_credential_dialog_title" msgid="277729846491554437">"Pangalanan ang certificate"</string> 25 <string name="credential_name" msgid="1974979771369744378">"Pangalan ng certificate:"</string> 26 <string name="credential_password" msgid="3520176519550993326">"I-type ang password upang i-extract ang mga certificate."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Mga certificate sa PKCS12 keystore."</string> 30 <string name="one_usercrt" msgid="7690798336332403106">"isang certificate ng user"</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d Mga certificate ng CA"</string> 37 <string name="unable_to_save_cert" msgid="9178604087335389686">"Hindi mai-save ang certificate. Hindi pinagana o maayos na nasimulan ang storage ng kredensyal."</string [all...] |
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
trusted-board-boot.md | 10 5. [Certificate Generation Tool](#5--certificate-generation-tool) 45 Certificate Authority (CA) because the CoT is not established by verifying the 46 validity of a certificate's issuer but by the content of the certificate 56 with the hash extracted from the content certificate. The SHA-256 function is 64 The private part of this key is used to sign the BL2 content certificate and 65 the trusted key certificate. The public part is the ROTPK. 71 one of the extension fields in the trusted world certificate. 75 The private part is used to sign the key certificate corresponding to th [all...] |
/cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/res/raw/ |
invalid_chain.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE----- 18 -----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE-----
|
/cts/tests/tests/security/res/raw/ |
intermediate_test_invalid.pem | 1 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE----- 19 -----BEGIN CERTIFICATE----- 36 -----END CERTIFICATE-----
|
intermediate_test_valid.pem | 1 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE----- 19 -----BEGIN CERTIFICATE----- 36 -----END CERTIFICATE-----
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
badcert.pem | 16 -----BEGIN CERTIFICATE-----
18 -----END CERTIFICATE-----
34 -----BEGIN CERTIFICATE-----
36 -----END CERTIFICATE-----
|