HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1126 - 1150 of 2776) sorted by null

<<41424344454647484950>>

  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_client_test.go 118 // cert, if not empty, contains a DER-encoded certificate for the
604 config.Certificates = []Certificate{cert}
640 config.Certificates = []Certificate{cert}
1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
    [all...]
  /system/ca-certificates/files/
1dac3003.0 1 -----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----
25 Certificate:
63 Digital Signature, Non Repudiation, Certificate Sign, CRL Sign
66 X509v3 Certificate Policies:
a0bc6fbb.0 1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
29 Certificate:
73 Certificate Sign, CRL Sign
80 X509v3 Certificate Policies:
aeb67534.0 1 -----BEGIN CERTIFICATE-----
31 -----END CERTIFICATE-----
32 Certificate:
72 Certificate Sign, CRL Sign
75 X509v3 Certificate Policies:
b872f2b4.0 1 -----BEGIN CERTIFICATE-----
21 -----END CERTIFICATE-----
22 Certificate:
63 X509v3 Certificate Policies:
67 Digital Signature, Certificate Sign, CRL Sign
ee7cd6fb.0 1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
29 Certificate:
73 Certificate Sign, CRL Sign
80 X509v3 Certificate Policies:
  /tools/apksig/src/main/java/com/android/apksig/
ApkVerifier.java 557 * Returns this signer's signing certificate or {@code null} if not available. The
558 * certificate is guaranteed to be available if no errors were encountered during
561 * <p>This certificate contains the signer's public key.
568 * Returns the certificate chain for the signer's public key. The certificate containing
569 * the public key is first, followed by the certificate (if any) which issued the
570 * signing certificate, and so forth. An empty list may be returned if an error was
632 * Returns this signer's signing certificate or {@code null} if not available. The
633 * certificate is guaranteed to be available if no errors were encountered during
636 * <p>This certificate contains the signer's public key
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/tools/fip_create/
fip_create.c 69 { "Root Of Trust key certificate", UUID_ROT_KEY_CERT,
71 { "Trusted key certificate", UUID_TRUSTED_KEY_CERT,
73 { "SCP Firmware BL3-0 key certificate", UUID_SCP_FIRMWARE_BL30_KEY_CERT,
75 { "EL3 Runtime Firmware BL3-1 key certificate", UUID_EL3_RUNTIME_FIRMWARE_BL31_KEY_CERT,
77 { "Secure Payload BL3-2 (Trusted OS) key certificate", UUID_SECURE_PAYLOAD_BL32_KEY_CERT,
79 { "Non-Trusted Firmware BL3-3 key certificate", UUID_NON_TRUSTED_FIRMWARE_BL33_KEY_CERT,
82 { "Trusted Boot Firmware BL2 certificate", UUID_TRUSTED_BOOT_FIRMWARE_BL2_CERT,
84 { "SCP Firmware BL3-0 certificate", UUID_SCP_FIRMWARE_BL30_CERT,
86 { "EL3 Runtime Firmware BL3-1 certificate", UUID_EL3_RUNTIME_FIRMWARE_BL31_CERT,
88 { "Secure Payload BL3-2 (Trusted OS) certificate", UUID_SECURE_PAYLOAD_BL32_CERT
    [all...]
  /docs/source.android.com/en/devices/tech/config/
uicc.html 42 the per-device platform certificate or pre-install as a system app.</p>
63 signature of the certificate.
71 <p>If PKG-REF-DO is not present, any app signed by the certificate is granted
72 access; otherwise both certificate and package name need to match.</p>
76 SHA-1 certificate in hex string is:</p>
112 the certificate hash
114 signed by this certificate are granted carrier privileges.</p>
197 caller certificate with its own rules one by one. If the UICC is removed, rules
209 tests also print out the expected certificate hash if certificates on UICC
344 Since this is the SHA-1 (20 bytes) hash value of the Publisher certificate use
    [all...]
  /external/boringssl/src/include/openssl/
x509_vfy.h 95 A X509_STORE_CTX is used while validating a single certificate.
98 certificate chain.
163 /* This is used to hold everything. It is used for all certificate
164 * validation. Once we have a certificate chain, the 'verify'
180 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */
187 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */
227 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */
234 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */
359 /* Certificate verify flags */
373 /* Enable proxy certificate validation *
    [all...]
  /external/libmtp/logs/
mtp-detect-samsung-juke.txt 78 0xd102: Device Certificate
338 Device Certificate:
339 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
341 private="1">TAgc/2jPXxLq/gHJRijomE0mwTnQhOd/PEUo1DLuQzEAty76lYBTYg==</PUBLICKEY><KEYDATA>XuBkAeQgg2A8GdHVO/lUyVbQLww=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>owp1zrBHh7eMEs/uJQ9C/ppEdCExtOK9B0vOjwe0sEcKkxRgELMpbA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>8OHgXjFSSbjrS/lMIosgZfZU5j4=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.108.219</SECURITYVERSION><CERTIFICATE
342 private="1">TAgc/2jPXxLq/gHJRijomE0mwTnQhOd/PEUo1DLuQzEAty76lYBTYgIEbNskkonvYMMgJmc0XbA/vcj2O1bjC0QrZdxTNhedz9B5Pu2XhVmVd3Yi</CERTIFICATE></FALLBACK><CERTIFICATE
346 IFICATE><CERTIFICATE
347 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>2111</AUTH_ID><PUBLICKEY>uk8RAuRderOsSQOiiL+cwyuTvi3jyu7fauvsiLVbwkSI3B1XWbzsMQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>7Uz/2vA+NynmkNrdMbHu770r0GS8/3/we4G5D5x7gDJ4ckMu/onpRA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
    [all...]
mtp-detect-sony-walkman-nwz-s516.txt 81 0xd102: Device Certificate
330 Device Certificate:
331 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
340 KKhjuWgaXGL/uP0zM9rQKBrX9WQNiHPtuvE+Y7fEiKey+T5tK</CERTIFICATE></FALLBACK><
341 CERTIFICATE
353 /CERTIFICATE><CERTIFICATE
357 Nv9VFv12f7PGZK+Qj5fByeQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
361 SIGNATURE_VALUE></CERTIFICATE></DEVCERT
    [all...]
  /external/libvncserver/webclients/java-applet/ssl/
tightvnc-1.3dev7_javasrc-vncviewer-ssl.patch 215 +import java.security.cert.Certificate;
270 + java.security.cert.Certificate[] trustallCerts = null;
271 + java.security.cert.Certificate[] trustsrvCerts = null;
272 + java.security.cert.Certificate[] trusturlCerts = null;
577 + Certificate[] certs = new Certificate[c.toArray().length];
579 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert));
585 + certs = (Certificate[]) c.toArray();
605 + trustsrvCerts = new Certificate[c.toArray().length];
607 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert))
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_ocsp.c 347 "OCSP: Did not find a response matching the server certificate");
381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */
460 "OCSP: Expected SEQUENCE (Certificate) - found class %d tag 0x%x",
601 "OCSP: Server certificate not known - cannot check OCSP response");
619 "OCSP: Server certificate issuer not known - cannot check OCSP response");
625 "OCSP: Server certificate issuer certificate matches ResponderID");
638 "OCSP: An extra certificate from the response matches ResponderID and is trusted as an OCSP signer");
643 "OCSP: Could not find OCSP signer certificate");
    [all...]
  /external/boringssl/src/ssl/test/runner/
handshake_client.go 766 var chainToSend *Certificate
783 return errors.New("tls: non-empty certificate request context sent in handshake")
814 return errors.New("tls: unexpected OCSP response in the server certificate")
818 return errors.New("tls: unexpected SCT list in the server certificate")
822 return errors.New("tls: unexpected extensions in the server certificate")
880 // from the client certificate are read over these keys.
935 for _, certData := range chainToSend.Certificate {
1020 var leaf *x509.Certificate
1084 var chainToSend *Certificate
1113 // If the server requested a certificate then we have to send
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLObject.java 14 import java.security.cert.Certificate;
554 * Checks whether the given certificate is on this CRL.
556 * @param cert the certificate to check for.
557 * @return true if the given certificate is on this CRL,
560 public boolean isRevoked(Certificate cert)
601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CRLObject.java 14 import java.security.cert.Certificate;
551 * Checks whether the given certificate is on this CRL.
553 * @param cert the certificate to check for.
554 * @return true if the given certificate is on this CRL,
557 public boolean isRevoked(Certificate cert)
598 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
602 throw new RuntimeException("Cannot process certificate");
  /external/libcups/cups/
tls-sspi.c 76 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair.
187 /* Certificate */
188 char cert_name[1024]; /* Name from certificate */
251 PCCERT_CONTEXT cert = NULL; /* Certificate to validate */
296 /* Certificate */
334 /* First certificate */
335 PCCERT_CONTEXT cert; /* Certificate */
423 HCERTSTORE store = NULL; /* Certificate store */
547 HCERTSTORE store = NULL; /* Certificate store */
    [all...]
  /external/webrtc/webrtc/p2p/base/
dtlstransportchannel.cc 133 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
135 if (certificate == local_certificate_) {
145 if (certificate) {
146 local_certificate_ = certificate;
204 // Once we have the local certificate, the same remote fingerprint can be set
221 // Otherwise, we must have a local certificate before setting remote
276 LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest.";
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
OSUSocketFactory.java 24 import java.security.cert.Certificate;
173 for (X509Certificate certificate : mTrustManager.getTrustChain()) {
174 for (List<?> name : certificate.getSubjectAlternativeNames()) {
178 return certificate;
293 Certificate cert = keyStore.getCertificate(alias);
304 Certificate cert = keyStore.getCertificate(
333 public void check(Certificate cert, Collection<String> unresolvedCritExts)
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.cert.Certificate;
51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest
65 + "-----END CERTIFICATE-----\n";
121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes());
156 Certificate[] res = event.getPeerCertificates();
554 * Implements basically a dummy TrustManager. It stores the certificate
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
ExportWizard.java 65 * Export wizard to export an apk signed with a release key/certificate.
268 // keystore is created, now load the private key and certificate.
283 "Certificate fingerprints:",
295 // check the private key/certificate again since it may have been created just above.
344 // a private key/certificate or the creation mode. In creation mode, unless
507 void setSigningInfo(PrivateKey privateKey, X509Certificate certificate) {
509 mCertificate = certificate;
  /libcore/ojluni/src/main/java/sun/security/pkcs/
PKCS7.java 333 // We only parse the normal certificate. Other types of
540 // Add the certificate set (tagged with [0] IMPLICIT)
709 * Returns the X.509 certificate listed in this PKCS7 block
713 * @param serial the serial number of the certificate to retrieve.
807 * For legacy reasons we need to return exactly the original encoded certificate bytes, instead
    [all...]
  /external/curl/lib/vtls/
nss.c 334 /* Check if the given string is filename or nickname of a certificate. If the
351 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
356 /* we'll use the PEM reader to read the certificate from file */
421 /* store reference to a client certificate */
458 /* we have successfully loaded a client certificate */
619 failf(conn->data, "Unable to load certificate %s", filename);
711 infof(conn->data, "skipping SSL peer certificate verification\n");
879 infof(conn->data, "Server certificate:\n");
947 infof(data, "Server certificate:\n");
957 * Check that the Peer certificate's issuer certificate matches the one foun
    [all...]
cyassl.c 240 failf(data, "error setting certificate verify locations:\n"
249 /* Just continue with a warning if no strict certificate
251 infof(data, "error setting certificate verify locations,"
257 infof(data, "successfully set certificate verify locations:\n");
268 /* Load the client certificate, and private key */
274 failf(data, "unable to use client certificate (no key or wrong pass"
486 /* Just continue with a warning if no strict certificate
511 failf(data, "SSL: failed retrieving server certificate");
517 failf(data, "SSL: failed retrieving ASN.1 server certificate");
527 failf(data, "SSL: failed retrieving public key from server certificate");
    [all...]

Completed in 555 milliseconds

<<41424344454647484950>>