/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client_test.go | 118 // cert, if not empty, contains a DER-encoded certificate for the 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { [all...] |
/system/ca-certificates/files/ |
1dac3003.0 | 1 -----BEGIN CERTIFICATE----- 24 -----END CERTIFICATE----- 25 Certificate: 63 Digital Signature, Non Repudiation, Certificate Sign, CRL Sign 66 X509v3 Certificate Policies:
|
a0bc6fbb.0 | 1 -----BEGIN CERTIFICATE----- 28 -----END CERTIFICATE----- 29 Certificate: 73 Certificate Sign, CRL Sign 80 X509v3 Certificate Policies:
|
aeb67534.0 | 1 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE----- 32 Certificate: 72 Certificate Sign, CRL Sign 75 X509v3 Certificate Policies:
|
b872f2b4.0 | 1 -----BEGIN CERTIFICATE----- 21 -----END CERTIFICATE----- 22 Certificate: 63 X509v3 Certificate Policies: 67 Digital Signature, Certificate Sign, CRL Sign
|
ee7cd6fb.0 | 1 -----BEGIN CERTIFICATE----- 28 -----END CERTIFICATE----- 29 Certificate: 73 Certificate Sign, CRL Sign 80 X509v3 Certificate Policies:
|
/tools/apksig/src/main/java/com/android/apksig/ |
ApkVerifier.java | 557 * Returns this signer's signing certificate or {@code null} if not available. The 558 * certificate is guaranteed to be available if no errors were encountered during 561 * <p>This certificate contains the signer's public key. 568 * Returns the certificate chain for the signer's public key. The certificate containing 569 * the public key is first, followed by the certificate (if any) which issued the 570 * signing certificate, and so forth. An empty list may be returned if an error was 632 * Returns this signer's signing certificate or {@code null} if not available. The 633 * certificate is guaranteed to be available if no errors were encountered during 636 * <p>This certificate contains the signer's public key [all...] |
/device/linaro/bootloader/arm-trusted-firmware/tools/fip_create/ |
fip_create.c | 69 { "Root Of Trust key certificate", UUID_ROT_KEY_CERT, 71 { "Trusted key certificate", UUID_TRUSTED_KEY_CERT, 73 { "SCP Firmware BL3-0 key certificate", UUID_SCP_FIRMWARE_BL30_KEY_CERT, 75 { "EL3 Runtime Firmware BL3-1 key certificate", UUID_EL3_RUNTIME_FIRMWARE_BL31_KEY_CERT, 77 { "Secure Payload BL3-2 (Trusted OS) key certificate", UUID_SECURE_PAYLOAD_BL32_KEY_CERT, 79 { "Non-Trusted Firmware BL3-3 key certificate", UUID_NON_TRUSTED_FIRMWARE_BL33_KEY_CERT, 82 { "Trusted Boot Firmware BL2 certificate", UUID_TRUSTED_BOOT_FIRMWARE_BL2_CERT, 84 { "SCP Firmware BL3-0 certificate", UUID_SCP_FIRMWARE_BL30_CERT, 86 { "EL3 Runtime Firmware BL3-1 certificate", UUID_EL3_RUNTIME_FIRMWARE_BL31_CERT, 88 { "Secure Payload BL3-2 (Trusted OS) certificate", UUID_SECURE_PAYLOAD_BL32_CERT [all...] |
/docs/source.android.com/en/devices/tech/config/ |
uicc.html | 42 the per-device platform certificate or pre-install as a system app.</p> 63 signature of the certificate. 71 <p>If PKG-REF-DO is not present, any app signed by the certificate is granted 72 access; otherwise both certificate and package name need to match.</p> 76 SHA-1 certificate in hex string is:</p> 112 the certificate hash 114 signed by this certificate are granted carrier privileges.</p> 197 caller certificate with its own rules one by one. If the UICC is removed, rules 209 tests also print out the expected certificate hash if certificates on UICC 344 Since this is the SHA-1 (20 bytes) hash value of the Publisher certificate use [all...] |
/external/boringssl/src/include/openssl/ |
x509_vfy.h | 95 A X509_STORE_CTX is used while validating a single certificate. 98 certificate chain. 163 /* This is used to hold everything. It is used for all certificate 164 * validation. Once we have a certificate chain, the 'verify' 180 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ 187 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ 227 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ 234 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ 359 /* Certificate verify flags */ 373 /* Enable proxy certificate validation * [all...] |
/external/libmtp/logs/ |
mtp-detect-samsung-juke.txt | 78 0xd102: Device Certificate 338 Device Certificate: 339 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID 341 private="1">TAgc/2jPXxLq/gHJRijomE0mwTnQhOd/PEUo1DLuQzEAty76lYBTYg==</PUBLICKEY><KEYDATA>XuBkAeQgg2A8GdHVO/lUyVbQLww=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>owp1zrBHh7eMEs/uJQ9C/ppEdCExtOK9B0vOjwe0sEcKkxRgELMpbA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>8OHgXjFSSbjrS/lMIosgZfZU5j4=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.108.219</SECURITYVERSION><CERTIFICATE 342 private="1">TAgc/2jPXxLq/gHJRijomE0mwTnQhOd/PEUo1DLuQzEAty76lYBTYgIEbNskkonvYMMgJmc0XbA/vcj2O1bjC0QrZdxTNhedz9B5Pu2XhVmVd3Yi</CERTIFICATE></FALLBACK><CERTIFICATE 346 IFICATE><CERTIFICATE 347 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>2111</AUTH_ID><PUBLICKEY>uk8RAuRderOsSQOiiL+cwyuTvi3jyu7fauvsiLVbwkSI3B1XWbzsMQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>7Uz/2vA+NynmkNrdMbHu770r0GS8/3/we4G5D5x7gDJ4ckMu/onpRA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE [all...] |
mtp-detect-sony-walkman-nwz-s516.txt | 81 0xd102: Device Certificate 330 Device Certificate: 331 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID 340 KKhjuWgaXGL/uP0zM9rQKBrX9WQNiHPtuvE+Y7fEiKey+T5tK</CERTIFICATE></FALLBACK>< 341 CERTIFICATE 353 /CERTIFICATE><CERTIFICATE 357 Nv9VFv12f7PGZK+Qj5fByeQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 361 SIGNATURE_VALUE></CERTIFICATE></DEVCERT [all...] |
/external/libvncserver/webclients/java-applet/ssl/ |
tightvnc-1.3dev7_javasrc-vncviewer-ssl.patch | 215 +import java.security.cert.Certificate; 270 + java.security.cert.Certificate[] trustallCerts = null; 271 + java.security.cert.Certificate[] trustsrvCerts = null; 272 + java.security.cert.Certificate[] trusturlCerts = null; 577 + Certificate[] certs = new Certificate[c.toArray().length]; 579 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert)); 585 + certs = (Certificate[]) c.toArray(); 605 + trustsrvCerts = new Certificate[c.toArray().length]; 607 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert)) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 347 "OCSP: Did not find a response matching the server certificate"); 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 460 "OCSP: Expected SEQUENCE (Certificate) - found class %d tag 0x%x", 601 "OCSP: Server certificate not known - cannot check OCSP response"); 619 "OCSP: Server certificate issuer not known - cannot check OCSP response"); 625 "OCSP: Server certificate issuer certificate matches ResponderID"); 638 "OCSP: An extra certificate from the response matches ResponderID and is trusted as an OCSP signer"); 643 "OCSP: Could not find OCSP signer certificate"); [all...] |
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 766 var chainToSend *Certificate 783 return errors.New("tls: non-empty certificate request context sent in handshake") 814 return errors.New("tls: unexpected OCSP response in the server certificate") 818 return errors.New("tls: unexpected SCT list in the server certificate") 822 return errors.New("tls: unexpected extensions in the server certificate") 880 // from the client certificate are read over these keys. 935 for _, certData := range chainToSend.Certificate { 1020 var leaf *x509.Certificate 1084 var chainToSend *Certificate 1113 // If the server requested a certificate then we have to send [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 14 import java.security.cert.Certificate; 554 * Checks whether the given certificate is on this CRL. 556 * @param cert the certificate to check for. 557 * @return true if the given certificate is on this CRL, 560 public boolean isRevoked(Certificate cert) 601 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 605 throw new IllegalArgumentException("Cannot process certificate: " + e.getMessage());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CRLObject.java | 14 import java.security.cert.Certificate; 551 * Checks whether the given certificate is on this CRL. 553 * @param cert the certificate to check for. 554 * @return true if the given certificate is on this CRL, 557 public boolean isRevoked(Certificate cert) 598 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 602 throw new RuntimeException("Cannot process certificate");
|
/external/libcups/cups/ |
tls-sspi.c | 76 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair. 187 /* Certificate */ 188 char cert_name[1024]; /* Name from certificate */ 251 PCCERT_CONTEXT cert = NULL; /* Certificate to validate */ 296 /* Certificate */ 334 /* First certificate */ 335 PCCERT_CONTEXT cert; /* Certificate */ 423 HCERTSTORE store = NULL; /* Certificate store */ 547 HCERTSTORE store = NULL; /* Certificate store */ [all...] |
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel.cc | 133 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 135 if (certificate == local_certificate_) { 145 if (certificate) { 146 local_certificate_ = certificate; 204 // Once we have the local certificate, the same remote fingerprint can be set 221 // Otherwise, we must have a local certificate before setting remote 276 LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest.";
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
OSUSocketFactory.java | 24 import java.security.cert.Certificate; 173 for (X509Certificate certificate : mTrustManager.getTrustChain()) { 174 for (List<?> name : certificate.getSubjectAlternativeNames()) { 178 return certificate; 293 Certificate cert = keyStore.getCertificate(alias); 304 Certificate cert = keyStore.getCertificate( 333 public void check(Certificate cert, Collection<String> unresolvedCritExts)
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 65 + "-----END CERTIFICATE-----\n"; 121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 156 Certificate[] res = event.getPeerCertificates(); 554 * Implements basically a dummy TrustManager. It stores the certificate
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
ExportWizard.java | 65 * Export wizard to export an apk signed with a release key/certificate. 268 // keystore is created, now load the private key and certificate. 283 "Certificate fingerprints:", 295 // check the private key/certificate again since it may have been created just above. 344 // a private key/certificate or the creation mode. In creation mode, unless 507 void setSigningInfo(PrivateKey privateKey, X509Certificate certificate) { 509 mCertificate = certificate;
|
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
PKCS7.java | 333 // We only parse the normal certificate. Other types of 540 // Add the certificate set (tagged with [0] IMPLICIT) 709 * Returns the X.509 certificate listed in this PKCS7 block 713 * @param serial the serial number of the certificate to retrieve. 807 * For legacy reasons we need to return exactly the original encoded certificate bytes, instead [all...] |
/external/curl/lib/vtls/ |
nss.c | 334 /* Check if the given string is filename or nickname of a certificate. If the 351 infof(data, "warning: certificate file name \"%s\" handled as nickname; " 356 /* we'll use the PEM reader to read the certificate from file */ 421 /* store reference to a client certificate */ 458 /* we have successfully loaded a client certificate */ 619 failf(conn->data, "Unable to load certificate %s", filename); 711 infof(conn->data, "skipping SSL peer certificate verification\n"); 879 infof(conn->data, "Server certificate:\n"); 947 infof(data, "Server certificate:\n"); 957 * Check that the Peer certificate's issuer certificate matches the one foun [all...] |
cyassl.c | 240 failf(data, "error setting certificate verify locations:\n" 249 /* Just continue with a warning if no strict certificate 251 infof(data, "error setting certificate verify locations," 257 infof(data, "successfully set certificate verify locations:\n"); 268 /* Load the client certificate, and private key */ 274 failf(data, "unable to use client certificate (no key or wrong pass" 486 /* Just continue with a warning if no strict certificate 511 failf(data, "SSL: failed retrieving server certificate"); 517 failf(data, "SSL: failed retrieving ASN.1 server certificate"); 527 failf(data, "SSL: failed retrieving public key from server certificate"); [all...] |