/device/linaro/bootloader/edk2/MdePkg/Include/Guid/ |
WinCertificate.h | 32 /// The length of the entire certificate,
42 /// The certificate type. See WIN_CERT_TYPE_xxx for the UEFI
43 /// certificate types. The UEFI specification reserves the range of
44 /// certificate type values from 0x0EF0 to 0x0EFF.
48 /// The following is the actual certificate. The format of
49 /// the certificate depends on wCertificateType.
72 /// Certificate which encapsulates a GUID-specific digital signature
86 /// The following is the certificate data. The format of
96 /// Certificate which encapsulates the RSASSA_PKCS1-v1_5 digital signature.
119 /// from the total length of the certificate as found in [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
cert_pool.go | 17 certs []*Certificate 42 // given certificate. If any candidates were rejected then errCert will be set 45 func (s *CertPool) findVerifiedParents(cert *Certificate) (parents []int, errCert *Certificate, err error) { 69 func (s *CertPool) contains(cert *Certificate) bool { 84 // AddCert adds a certificate to a pool. 85 func (s *CertPool) AddCert(cert *Certificate) { 87 panic("adding nil Certificate to CertPool") 90 // Check that the certificate isn't being added twice. 119 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
cert_pool.go | 17 certs []*Certificate 42 // given certificate. If any candidates were rejected then errCert will be set 45 func (s *CertPool) findVerifiedParents(cert *Certificate) (parents []int, errCert *Certificate, err error) { 69 func (s *CertPool) contains(cert *Certificate) bool { 84 // AddCert adds a certificate to a pool. 85 func (s *CertPool) AddCert(cert *Certificate) { 87 panic("adding nil Certificate to CertPool") 90 // Check that the certificate isn't being added twice. 119 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 [all...] |
/external/conscrypt/android-stub/src/main/java/com/android/org/conscrypt/ |
NativeCrypto.java | 27 * Verify that we trust the certificate chain is trusted. 32 * @throws CertificateException if the certificate is untrusted 38 * requires a certificate). The client can respond by using 40 * certificate if has an appropriate one available, similar to 41 * how the server provides its certificate.
|
/external/conscrypt/android-stub/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
NativeCrypto.java | 26 * Verify that we trust the certificate chain is trusted. 31 * @throws CertificateException if the certificate is untrusted 37 * requires a certificate). The client can respond by using 39 * certificate if has an appropriate one available, similar to 40 * how the server provides its certificate.
|
/external/curl/docs/cmdline-opts/ |
cacert.d | 2 Arg: <CA certificate> 3 Help: CA certificate to verify peer against 6 Tells curl to use the specified certificate file to verify the peer. The file 7 may contain multiple CA certificates. The certificate(s) must be in PEM 26 preferred method of verifying the peer's certificate chain.
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 24 import java.security.cert.Certificate; 34 for (Certificate certificate : chain.connection().getHandshake().peerCertificates()) { 35 String pin = CertificatePinner.pin(certificate); 37 throw new IOException("Blacklisted peer certificate: " + pin);
|
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory.h | 37 // The certificate to use when setting up DTLS. 38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory 44 // Specifies the certificate to use (only used when secure != SEC_DISABLED). 46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 47 certificate_ = certificate;
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
HandshakeCompletedEvent.java | 29 import java.security.cert.Certificate; 94 * Returns the certificate(s) that were sent to the peer during 96 * Note: This method is useful only when using certificate-based 101 * "best" certificate chain available, and transmits that to 103 * which certificate chain was actually used. 106 * certificate first followed by any 107 * certificate authorities. If no certificates were sent, 111 public java.security.cert.Certificate [] getLocalCertificates() 120 * Note: This method can be used only when using certificate-based 121 * cipher suites; using it with non-certificate-based cipher suites [all...] |
/packages/apps/KeyChain/res/values-en-rAU/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The %s app has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string> 25 <string name="install_new_cert_button_label" msgid="903474285774077171">"Install certificate"</string>
|
/packages/apps/KeyChain/res/values-en-rCA/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The %s app has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string> 25 <string name="install_new_cert_button_label" msgid="903474285774077171">"Install certificate"</string>
|
/packages/apps/KeyChain/res/values-en-rGB/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The %s app has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string> 25 <string name="install_new_cert_button_label" msgid="903474285774077171">"Install certificate"</string>
|
/packages/apps/KeyChain/res/values-en-rIN/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"Choose certificate"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"The %s app has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future."</string> 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string> 25 <string name="install_new_cert_button_label" msgid="903474285774077171">"Install certificate"</string>
|
/packages/apps/KeyChain/res/values-en-rXC/ |
strings.xml | 21 <string name="title_select_cert" msgid="3588447616418041699">"???????????????????????????????????????????????????????????????????????????????????????????????Choose certificate??????"</string> 22 <string name="requesting_application" msgid="1589142627467598421">"??????????????????????????????????????????????????????????????????????????????????????????????The app %s has requested a certificate. Choosing a certificate will let the app use this identity with servers now and in the future.??????"</string> 23 <string name="requesting_server" msgid="5832565605998634370">"????????????????????????????????????????????????????????????????????????????????????????????????The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app.??????"</string> 25 <string name="install_new_cert_button_label" msgid="903474285774077171">"?????????????????????????????????????????????????????????????????????????????????????????????Install certificate??????"</string>
|
/prebuilts/android-emulator/darwin-x86_64/lib/ |
ca-bundle.pem | 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015 6 ## This is a bundle of X.509 certificates of public Certificate Authorities 23 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 43 -----BEGIN CERTIFICATE----- 60 -----END CERTIFICATE----- 64 -----BEGIN CERTIFICATE----- 82 -----END CERTIFICATE----- 86 -----BEGIN CERTIFICATE----- 106 -----END CERTIFICATE---- [all...] |
/prebuilts/android-emulator/linux-x86_64/lib/ |
ca-bundle.pem | 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015 6 ## This is a bundle of X.509 certificates of public Certificate Authorities 23 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 43 -----BEGIN CERTIFICATE----- 60 -----END CERTIFICATE----- 64 -----BEGIN CERTIFICATE----- 82 -----END CERTIFICATE----- 86 -----BEGIN CERTIFICATE----- 106 -----END CERTIFICATE---- [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
Builder.java | 47 * matching certificates and is able to verify a particular certificate. 95 * @param cert the certificate to be verified 104 * Verifies whether the input certificate completes the path. 108 * @param cert the certificate to test 114 * Adds the certificate to the certPathList 116 * @param cert the certificate to be added 123 * Removes final certificate from the certPathList 241 * Determine how close a given certificate gets you toward 246 * independently, realizing that this certificate 248 * @param cert Candidate certificate for chai [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
CertificatePinner.java | 19 import java.security.cert.Certificate; 34 * against attacks on certificate authorities. It also prevents connections 35 * through man-in-the-middle certificate authorities either known or unknown to 38 * <p>This class currently pins a certificate's Subject Public Key Info as 45 * <h3>Setting up Certificate Pinning</h3> 68 * As expected, this fails with a certificate pinning exception: <pre> {@code 70 * javax.net.ssl.SSLPeerUnverifiedException: Certificate pinning failure! 71 * Peer certificate chain: 85 * certificate pinner's configuration: <pre> {@code 118 * <h3>Warning: Certificate Pinning is Dangerous!</h3 [all...] |
/system/keymaster/ |
asymmetric_key.cpp | 45 X509* certificate) { 104 if (!X509_add_ext(certificate, key_usage_extension.get() /* Don't release; copied */, 175 static bool add_public_key(EVP_PKEY* key, X509* certificate, keymaster_error_t* error) { 176 if (!X509_set_pubkey(certificate, key)) { 186 const KeymasterContext& context, X509* certificate, 194 if (!X509_add_ext(certificate, attest_extension.get() /* Don't release; copied */, 203 static keymaster_error_t get_certificate_blob(X509* certificate, keymaster_blob_t* blob) { 204 int len = i2d_X509(certificate, nullptr); 213 i2d_X509(certificate, &p); 239 // certificate [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
BasicOCSPRespBuilder.java | 124 * Add a response for a particular Certificate ID. 126 * @param certID certificate ID details 127 * @param certStatus status of the certificate - null if okay 139 * Add a response for a particular Certificate ID. 141 * @param certID certificate ID details 142 * @param certStatus status of the certificate - null if okay 156 * Add a response for a particular Certificate ID. 158 * @param certID certificate ID details 160 * @param certStatus status of the certificate - null if okay 175 * Add a response for a particular Certificate ID [all...] |
/libcore/ojluni/src/main/java/javax/security/cert/ |
X509Certificate.java | 48 * way to access all the version 1 attributes of an X.509 certificate. 56 * Certificate ::= SEQUENCE { 68 * These certificates are managed and vouched for by <em>Certificate 89 * Here is sample code to instantiate an X.509 certificate: 97 * byte[] certData = <certificate read from a file, say> 101 * In either case, the code that instantiates an X.509 certificate 122 * use the standard Java SE certificate classes located in 127 * @see Certificate 131 public abstract class X509Certificate extends Certificate { 165 * certificate is expected to be in the input stream [all...] |
/device/linaro/bootloader/arm-trusted-firmware/common/auth/polarssl/ |
polarssl.c | 200 * Parse and verify the BL2 certificate 202 * This function verifies the integrity of the BL2 certificate, checks that it 204 * certificate so it can be matched later against the calculated hash. 216 /* Parse the BL2 certificate */ 219 ERROR("BL2 certificate parse error %d.\n", err); 235 ERROR("ROT and BL2 certificate key mismatch\n"); 239 /* Verify certificate */ 242 ERROR("BL2 certificate verification error %d. Flags: 0x%x.\n", 247 /* Extract BL2 image hash from certificate */ 250 ERROR("Cannot read BL2 hash from certificate\n") [all...] |
/external/curl/docs/examples/ |
cacertinmem.c | 43 "-----BEGIN CERTIFICATE-----\n"\ 83 "-----END CERTIFICATE-----\n"; 86 /* use it to read the PEM formatted certificate from memory into an X509 93 /* get a pointer to the X509 certificate store (which may be empty!) */ 96 /* add our certificate to this store */ 98 printf("error adding certificate\n"); 127 /* first try: retrieve page without cacerts' certificate -> will fail 135 /* second try: retrieve page using cacerts' certificate -> will succeed 136 * load the certificate by installing a function doing the nescessary
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSTrustedCertificateEntryTest.java | 26 import java.security.cert.Certificate; 43 * Test for <codfe>KeyStore.TrustedCertificateEntry(Certificate trustCert)</code> 48 Certificate cert = null; 71 Certificate cert = new MyCertificate("TEST", new byte[10]); 81 * Assertion: returns trusted Certificate from goven entry 84 Certificate cert = new MyCertificate("TEST", new byte[10]); 87 assertEquals("Incorrect certificate", cert, ksTCE.getTrustedCertificate()); 95 Certificate cert = new MyCertificate("TEST", new byte[10]); 130 Certificate cert = new MyCertificate("TEST", new byte[10]);
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
sha256.pem | 0 # Certificate chain for https://sha256.tbs-internet.com 4 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 42 -----BEGIN CERTIFICATE----- 72 -----END CERTIFICATE----- 75 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 103 -----BEGIN CERTIFICATE----- 128 -----END CERTIFICATE-----
|