HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1426 - 1450 of 2776) sorted by null

<<51525354555657585960>>

  /external/boringssl/src/ssl/
ssl_file.cc 496 /* Read a file that contains our certificate in "PEM" format, possibly followed
498 * Certificate message. */
527 ret = 0; /* Key/certificate mismatch doesn't imply ret==0 ... */
531 /* If we could set up our certificate, now proceed to the CA
549 * (while we must free the main certificate, since its reference count is
  /external/boringssl/src/ssl/test/runner/
cipher_suites.go 30 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
31 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
37 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
38 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
55 // certificate is ECDSA. If this is not set then the cipher suite is
  /external/boringssl/src/tool/
client.cc 77 "-signed-certificate-timestamps", kBooleanArgument,
78 "Advertise support for signed certificate timestamps",
101 "PEM-encoded file containing the leaf certificate and optional "
102 "certificate chain. This is taken from the -key argument if this "
404 if (args_map.count("-signed-certificate-timestamps") != 0) {
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLX509Certificate.java 31 import java.security.cert.Certificate;
170 public static OpenSSLX509Certificate fromCertificate(Certificate cert)
239 throw new CertificateNotYetValidException("Certificate not valid until "
244 throw new CertificateExpiredException("Certificate expired at "
550 * A modified copy of the certificate is returned. The original object
  /external/curl/lib/
urldata.h 350 bool verifystatus; /* set TRUE if certificate status must be checked */
351 char *CApath; /* certificate dir (doesn't work on windows) */
352 char *CAfile; /* certificate to verify peer against */
363 bool no_revoke; /* disable SSL certificate revocation checks */
364 long certverifyresult; /* result from the certificate verification */
365 char *CRLfile; /* CRL to check certificate revocation */
366 char *issuercert;/* optional issuer certificate filename */
369 bool certinfo; /* gather lots of certificate info */
372 char *cert; /* client certificate file name */
373 char *cert_type; /* format for certificate (default: PEM)*
    [all...]
  /external/libbrillo/brillo/streams/
tls_stream.cc 58 // Default trusted certificate store location.
309 // OpenSSL already performs a comprehensive check of the certificate chain
318 LOG(ERROR) << "Server certificate validation failed: "
361 "Failed to specify trusted certificate location");
367 // Ask OpenSSL to validate the server host from the certificate to match
  /external/openssh/
authfile.c 420 /* Load the certificate associated with the named private key */
451 /* Load private key and certificate */
480 /* Make sure the private key matches the certificate */
505 * If "check_ca" is set and "key" is a certificate, then its CA key is
566 * This will check both the key and, if it is a certificate, its CA key too.
  /external/wpa_supplicant_8/hs20/server/ca/
setup.sh 106 echo " * Sign Root CA certificate"
107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate"
127 echo " * Sign Intermediate CA certificate"
128 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate"
188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PASS -days 730 -extensions ext_server -policy policy_osu_server || fail "Failed to sign server certificate"
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/provider/
HostAuth.java 71 // NOTE: The server certificate is NEVER automatically retrieved from EmailProvider
187 "Can't specify a certificate alias for a non-secure connection");
364 * @param clientCertAlias an optional alias to use if a client user certificate is to be
501 // We don't care about the server certificate for equals
525 * Note that the use of client certificate is specified in the URI, a secure connection type
  /packages/apps/Settings/tests/app/src/com/android/settings/vpn2/
VpnTests.java 124 Log.d(TAG, "certificate file for this vpn is " + vpnInfo.getCertificateFile());
127 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword());
333 * @param fileName certificate file name
334 * @param password password to extract certificate file
339 throw new Exception ("vpn profile, certificate file name and password can not be null");
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_ssl.py 104 # provided solely for this test, to exercise the certificate
359 self.fail("No server certificate on svn.python.org:443!")
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
371 self.fail("No server certificate on svn.python.org:443!")
373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
377 # certificate.
394 sys.stdout.write("Certificate is:\n%s\n" %
439 certfile=self.server.certificate,
446 # a mismatching protocol version, an invalid certificate,
527 def __init__(self, certificate, ssl_version=None
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_ssl.py 104 # provided solely for this test, to exercise the certificate
359 self.fail("No server certificate on svn.python.org:443!")
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
371 self.fail("No server certificate on svn.python.org:443!")
373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
377 # certificate.
394 sys.stdout.write("Certificate is:\n%s\n" %
439 certfile=self.server.certificate,
446 # a mismatching protocol version, an invalid certificate,
527 def __init__(self, certificate, ssl_version=None
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
48 // certificate is ECDSA. If this is not set then the cipher suite is
  /prebuilts/go/linux-x86/src/crypto/tls/
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
48 // certificate is ECDSA. If this is not set then the cipher suite is
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_ssl.py 104 # provided solely for this test, to exercise the certificate
359 self.fail("No server certificate on svn.python.org:443!")
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
371 self.fail("No server certificate on svn.python.org:443!")
373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
377 # certificate.
394 sys.stdout.write("Certificate is:\n%s\n" %
439 certfile=self.server.certificate,
446 # a mismatching protocol version, an invalid certificate,
527 def __init__(self, certificate, ssl_version=None
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_ssl.py 104 # provided solely for this test, to exercise the certificate
359 self.fail("No server certificate on svn.python.org:443!")
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
371 self.fail("No server certificate on svn.python.org:443!")
373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
377 # certificate.
394 sys.stdout.write("Certificate is:\n%s\n" %
439 certfile=self.server.certificate,
446 # a mismatching protocol version, an invalid certificate,
527 def __init__(self, certificate, ssl_version=None
    [all...]
  /external/libmtp/logs/
mtp-detect-toshiba-gigabeat-met401.txt 94 0xd102: Device Certificate
480 Device Certificate:
481 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
490 a9jMtNk1PMJdUSDZwY6uWdMqCnTUh7qXPgkhpR2koNPHV4k1O</CERTIFICATE></FALLBACK><
491 CERTIFICATE type="GROUP"><DATA><NAME>Gigabeat</NAME>
510 x8jnWqX19omsDZCNw0XXYg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
514 6KT2UIARVlpkeR3u1+m1wbg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
518 SIGNATURE_VALUE></CERTIFICATE></DEVCERT
    [all...]
  /libcore/ojluni/src/main/java/javax/crypto/
Cipher.java 40 import java.security.cert.Certificate;
298 // The OID for the KeyUsage extension in an X.509 v3 certificate
    [all...]
  /libcore/ojluni/src/main/java/java/security/
Signature.java 33 import java.security.cert.Certificate;
612 * the given certificate.
613 * <p>If the certificate is of type X.509 and has a <i>key usage</i>
616 * the certificate and its corresponding private key are not
620 * @param certificate the certificate of the identity whose signature is
623 * @exception InvalidKeyException if the public key in the certificate
628 public final void initVerify(Certificate certificate)
630 // If the certificate is of type X509Certificate
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyAttestationTest.java 74 import java.security.cert.Certificate;
205 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
322 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
424 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
478 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias);
    [all...]
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
SmartCardEdge.h 55 // value of tag field for certificate
59 // value of tag field for key index associated with certificate
79 // size of L field for certificate (big endian)
502 - The certificate item (0x01, certificate size, certificate)
507 - The L field value for certificate (2 bytes)
  /docs/source.android.com/en/security/overview/
app-security.html 291 <h2 id="certificate-authorities">Certificate authorities</h2>
293 Android includes a set of installed system Certificate Authorities, which are
330 its Application Sandbox. The signed application certificate defines which user
335 Manager verifies that the APK has been properly signed with the certificate
336 included in that APK. If the certificate (or, more accurately, the public key
337 in the certificate) matches the key used to sign any other APK on the device,
  /external/curl/src/
tool_help.c 52 " --cacert FILE CA certificate to verify peer against (SSL)",
54 " -E, --cert CERT[:PASSWD] Client certificate file and password (SSL)",
55 " --cert-status Verify the status of the server certificate (SSL)",
56 " --cert-type TYPE Certificate file type (DER/PEM/ENG) (SSL)",
180 "CA certificate to verify peer against for proxy (SSL)",
184 "Client certificate file and password for proxy (SSL)",
186 "Certificate file type (DER/PEM/ENG) for proxy (SSL)",
  /external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PairingSession.java 39 import java.security.cert.Certificate;
209 Certificate clientCert = mPairingContext.getClientCertificate();
210 Certificate serverCert = mPairingContext.getServerCertificate();
379 Certificate clientCert = mPairingContext.getClientCertificate();
381 logDebug("Client certificate:");
385 Certificate serverCert = mPairingContext.getServerCertificate();
388 logDebug("Server certificate:");
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 196 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
208 tlsv1_server_log(conn, "Send Certificate");
221 /* body - Certificate */
229 "for Certificate (cert_len=%lu left=%lu)",
249 * to form a full certificate chain. The client may fail to
253 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
289 * Client did not request certificate status or there is no

Completed in 669 milliseconds

<<51525354555657585960>>