OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:certificate
(Results
201 - 225
of
697
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/packages/apps/Settings/src/com/android/settings/
TrustedCredentialsDialogBuilder.java
282
for (X509Certificate
certificate
: certificates) {
283
SslCertificate sslCert = new SslCertificate(
certificate
);
/prebuilts/go/darwin-x86/src/net/smtp/
auth.go
37
TLS bool // using TLS, with valid
certificate
for Name
/prebuilts/go/linux-x86/src/net/smtp/
auth.go
37
TLS bool // using TLS, with valid
certificate
for Name
/external/nanohttpd/
README.md
237
### generating an self signed ssl
certificate
239
Just a hint how to generate a
certificate
for localhost.
243
This will generate a keystore file named 'keystore.jks' with a self signed
certificate
for a host named localhost with the ip adress 127.0.0.1 . Now
/external/nanohttpd/src/site/markdown/
index.md
233
### generating an self signed ssl
certificate
235
Just a hint how to generate a
certificate
for localhost.
239
This will generate a keystore file named 'keystore.jks' with a self signed
certificate
for a host named localhost with the ip adress 127.0.0.1 . Now
/external/webrtc/webrtc/p2p/base/
dtlstransportchannel.h
94
const rtc::scoped_refptr<rtc::RTCCertificate>&
certificate
) override;
101
// Returns false if no local
certificate
was set, or if the peer doesn't
140
// Once DTLS has been established, this method retrieves the
certificate
in
p2ptransportchannel.h
153
const rtc::scoped_refptr<rtc::RTCCertificate>&
certificate
) override {
transportcontroller_unittest.cc
285
EXPECT_EQ(certificate1->identity()->
certificate
().ToPEMString(),
286
returned_certificate->identity()->
certificate
().ToPEMString());
297
EXPECT_EQ(certificate1->identity()->
certificate
().ToPEMString(),
298
returned_certificate->identity()->
certificate
().ToPEMString());
/frameworks/av/drm/mediadrm/plugins/mock/
MockDrmCryptoPlugin.h
87
Vector<uint8_t> &
certificate
,
/frameworks/av/media/libmedia/include/media/
Drm.h
77
Vector<uint8_t> &
certificate
,
DrmHal.h
87
Vector<uint8_t> &
certificate
,
/frameworks/base/core/java/android/security/net/config/
NetworkSecurityConfig.java
58
// non-override pin entries. This allows us to handle the case where a
certificate
is in
59
// multiple entry refs by returning the
certificate
from the first entry ref.
78
// If we see the same
certificate
in two TrustAnchors, one with overridesPins and one
81
// this can be simplified to just using the first occurrence of a
certificate
.
86
X509Certificate cert = anchor.
certificate
;
170
* <li>No
certificate
pinning is used.</li>
171
* <li>The system
certificate
store is trusted for connections.</li>
172
* <li>If the application targets API level 23 (Android M) or lower then the user
certificate
181
// System
certificate
store, does not bypass static pins.
186
// Applications targeting N and above must opt in into trusting the user added
certificate
[
all
...]
NetworkSecurityTrustManager.java
174
issuers[i++] = anchor.
certificate
;
/frameworks/native/include/media/drm/
DrmAPI.h
207
// provisioning server to retrieve a device
certificate
. getProvisionRequest
220
Vector<uint8_t> &
certificate
,
/prebuilts/go/darwin-x86/src/crypto/x509/
root_cgo_darwin.go
143
// "this
certificate
must be verified to a known trusted
certificate
"; aka not a root.
root_darwin.go
26
func (c *
Certificate
) systemVerify(opts *VerifyOptions) (chains [][]*
Certificate
, err error) {
46
// 2. Run "security find-
certificate
" to dump the list of system root
64
cmd := exec.Command("/usr/bin/security", "find-
certificate
", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
123
if block.Type != "
CERTIFICATE
" || len(block.Headers) != 0 {
140
func verifyCertWithSystem(block *pem.Block, cert *
Certificate
) bool {
/prebuilts/go/linux-x86/src/crypto/x509/
root_cgo_darwin.go
143
// "this
certificate
must be verified to a known trusted
certificate
"; aka not a root.
root_darwin.go
26
func (c *
Certificate
) systemVerify(opts *VerifyOptions) (chains [][]*
Certificate
, err error) {
46
// 2. Run "security find-
certificate
" to dump the list of system root
64
cmd := exec.Command("/usr/bin/security", "find-
certificate
", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
123
if block.Type != "
CERTIFICATE
" || len(block.Headers) != 0 {
140
func verifyCertWithSystem(block *pem.Block, cert *
Certificate
) bool {
/system/tpm/attestation/server/
attestation_service.h
116
kGetCertificate, // Issues a
certificate
for a TPM-backed key.
199
// Finishes a
certificate
request by decoding the |certificate_response| to
247
// Creates a PEM
certificate
chain from the credential fields of a |key|.
250
// Creates a
certificate
in PEM format from a DER encoded X.509
certificate
.
251
std::string CreatePEMCertificate(const std::string&
certificate
);
254
//
certificate
. This decision factors in the currently signed-in |user| and
255
// the |origin| of the
certificate
request. The strategy is to find an index
/external/boringssl/src/ssl/test/runner/
runner.go
59
resourceDir = flag.String("resource-dir", ".", "The directory in which to find
certificate
and key files.")
131
rsaCertificate
Certificate
132
rsa1024Certificate
Certificate
133
rsaChainCertificate
Certificate
134
ecdsaP224Certificate
Certificate
135
ecdsaP256Certificate
Certificate
136
ecdsaP384Certificate
Certificate
137
ecdsaP521Certificate
Certificate
143
cert *
Certificate
230
func getRunnerCertificate(t testCert)
Certificate
{
[
all
...]
/external/curl/tests/
stunnel.pem
2
# This file contains a private key and a
certificate
used for stunnel.
3
# The
certificate
contains a number of extensions essentially being
4
# used in the 509 test. The
certificate
has been generated using
13
nsComment = "CURL stunnel server test
certificate
"
59
Certificate
:
92
CURL stunnel server test
certificate
117
-----BEGIN
CERTIFICATE
-----
138
-----END
CERTIFICATE
-----
/frameworks/av/drm/libmediadrm/
Drm.cpp
511
Vector<uint8_t> &
certificate
,
523
return mPlugin->provideProvisionResponse(response,
certificate
, wrappedKey);
/frameworks/base/packages/Osu/src/com/android/hotspot2/est/
ESTHandler.java
139
for (X509Certificate
certificate
: mCACerts) {
140
Log.d(TAG, "CA-Cert: " +
certificate
.getSubjectX500Principal());
195
Certificate
cert = certFactory.generateCertificate(new ByteArrayInputStream(certBytes));
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
XmlConfigTests.java
328
if (anchor.
certificate
.getSubjectDN().toString().equals(DEBUG_CA_SUBJ)) {
346
if (anchor.
certificate
.getSubjectDN().toString().equals(DEBUG_CA_SUBJ)) {
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
ExportWizard.java
65
* Export wizard to export an apk signed with a release key/
certificate
.
268
// keystore is created, now load the private key and
certificate
.
283
"
Certificate
fingerprints:",
295
// check the private key/
certificate
again since it may have been created just above.
344
// a private key/
certificate
or the creation mode. In creation mode, unless
507
void setSigningInfo(PrivateKey privateKey, X509Certificate
certificate
) {
509
mCertificate =
certificate
;
Completed in 623 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>