/external/boringssl/src/ssl/ |
ssl_file.cc | 496 /* Read a file that contains our certificate in "PEM" format, possibly followed 498 * Certificate message. */ 527 ret = 0; /* Key/certificate mismatch doesn't imply ret==0 ... */ 531 /* If we could set up our certificate, now proceed to the CA 549 * (while we must free the main certificate, since its reference count is
|
/external/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 30 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 31 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 37 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 38 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 55 // certificate is ECDSA. If this is not set then the cipher suite is
|
/external/boringssl/src/tool/ |
client.cc | 77 "-signed-certificate-timestamps", kBooleanArgument, 78 "Advertise support for signed certificate timestamps", 101 "PEM-encoded file containing the leaf certificate and optional " 102 "certificate chain. This is taken from the -key argument if this " 404 if (args_map.count("-signed-certificate-timestamps") != 0) {
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 31 import java.security.cert.Certificate; 170 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 239 throw new CertificateNotYetValidException("Certificate not valid until " 244 throw new CertificateExpiredException("Certificate expired at " 550 * A modified copy of the certificate is returned. The original object
|
/external/curl/lib/ |
urldata.h | 350 bool verifystatus; /* set TRUE if certificate status must be checked */ 351 char *CApath; /* certificate dir (doesn't work on windows) */ 352 char *CAfile; /* certificate to verify peer against */ 363 bool no_revoke; /* disable SSL certificate revocation checks */ 364 long certverifyresult; /* result from the certificate verification */ 365 char *CRLfile; /* CRL to check certificate revocation */ 366 char *issuercert;/* optional issuer certificate filename */ 369 bool certinfo; /* gather lots of certificate info */ 372 char *cert; /* client certificate file name */ 373 char *cert_type; /* format for certificate (default: PEM)* [all...] |
/external/libbrillo/brillo/streams/ |
tls_stream.cc | 58 // Default trusted certificate store location. 309 // OpenSSL already performs a comprehensive check of the certificate chain 318 LOG(ERROR) << "Server certificate validation failed: " 361 "Failed to specify trusted certificate location"); 367 // Ask OpenSSL to validate the server host from the certificate to match
|
/external/openssh/ |
authfile.c | 420 /* Load the certificate associated with the named private key */ 451 /* Load private key and certificate */ 480 /* Make sure the private key matches the certificate */ 505 * If "check_ca" is set and "key" is a certificate, then its CA key is 566 * This will check both the key and, if it is a certificate, its CA key too.
|
/external/wpa_supplicant_8/hs20/server/ca/ |
setup.sh | 106 echo " * Sign Root CA certificate" 107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 127 echo " * Sign Intermediate CA certificate" 128 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate" 188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PASS -days 730 -extensions ext_server -policy policy_osu_server || fail "Failed to sign server certificate"
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/provider/ |
HostAuth.java | 71 // NOTE: The server certificate is NEVER automatically retrieved from EmailProvider 187 "Can't specify a certificate alias for a non-secure connection"); 364 * @param clientCertAlias an optional alias to use if a client user certificate is to be 501 // We don't care about the server certificate for equals 525 * Note that the use of client certificate is specified in the URI, a secure connection type
|
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
VpnTests.java | 124 Log.d(TAG, "certificate file for this vpn is " + vpnInfo.getCertificateFile()); 127 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword()); 333 * @param fileName certificate file name 334 * @param password password to extract certificate file 339 throw new Exception ("vpn profile, certificate file name and password can not be null");
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_ssl.py | 104 # provided solely for this test, to exercise the certificate 359 self.fail("No server certificate on svn.python.org:443!") 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 371 self.fail("No server certificate on svn.python.org:443!") 373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) 377 # certificate. 394 sys.stdout.write("Certificate is:\n%s\n" % 439 certfile=self.server.certificate, 446 # a mismatching protocol version, an invalid certificate, 527 def __init__(self, certificate, ssl_version=None [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_ssl.py | 104 # provided solely for this test, to exercise the certificate 359 self.fail("No server certificate on svn.python.org:443!") 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 371 self.fail("No server certificate on svn.python.org:443!") 373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) 377 # certificate. 394 sys.stdout.write("Certificate is:\n%s\n" % 439 certfile=self.server.certificate, 446 # a mismatching protocol version, an invalid certificate, 527 def __init__(self, certificate, ssl_version=None [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 48 // certificate is ECDSA. If this is not set then the cipher suite is
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 48 // certificate is ECDSA. If this is not set then the cipher suite is
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 104 # provided solely for this test, to exercise the certificate 359 self.fail("No server certificate on svn.python.org:443!") 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 371 self.fail("No server certificate on svn.python.org:443!") 373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) 377 # certificate. 394 sys.stdout.write("Certificate is:\n%s\n" % 439 certfile=self.server.certificate, 446 # a mismatching protocol version, an invalid certificate, 527 def __init__(self, certificate, ssl_version=None [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 104 # provided solely for this test, to exercise the certificate 359 self.fail("No server certificate on svn.python.org:443!") 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 371 self.fail("No server certificate on svn.python.org:443!") 373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) 377 # certificate. 394 sys.stdout.write("Certificate is:\n%s\n" % 439 certfile=self.server.certificate, 446 # a mismatching protocol version, an invalid certificate, 527 def __init__(self, certificate, ssl_version=None [all...] |
/external/libmtp/logs/ |
mtp-detect-toshiba-gigabeat-met401.txt | 94 0xd102: Device Certificate 480 Device Certificate: 481 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID 490 a9jMtNk1PMJdUSDZwY6uWdMqCnTUh7qXPgkhpR2koNPHV4k1O</CERTIFICATE></FALLBACK>< 491 CERTIFICATE type="GROUP"><DATA><NAME>Gigabeat</NAME> 510 x8jnWqX19omsDZCNw0XXYg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 514 6KT2UIARVlpkeR3u1+m1wbg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 518 SIGNATURE_VALUE></CERTIFICATE></DEVCERT [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
Cipher.java | 40 import java.security.cert.Certificate; 298 // The OID for the KeyUsage extension in an X.509 v3 certificate [all...] |
/libcore/ojluni/src/main/java/java/security/ |
Signature.java | 33 import java.security.cert.Certificate; 612 * the given certificate. 613 * <p>If the certificate is of type X.509 and has a <i>key usage</i> 616 * the certificate and its corresponding private key are not 620 * @param certificate the certificate of the identity whose signature is 623 * @exception InvalidKeyException if the public key in the certificate 628 public final void initVerify(Certificate certificate) 630 // If the certificate is of type X509Certificate [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyAttestationTest.java | 74 import java.security.cert.Certificate; 205 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 322 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 424 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); 478 Certificate certificates[] = keyStore.getCertificateChain(keystoreAlias); [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
SmartCardEdge.h | 55 // value of tag field for certificate
59 // value of tag field for key index associated with certificate
79 // size of L field for certificate (big endian)
502 - The certificate item (0x01, certificate size, certificate)
507 - The L field value for certificate (2 bytes)
|
/docs/source.android.com/en/security/overview/ |
app-security.html | 291 <h2 id="certificate-authorities">Certificate authorities</h2> 293 Android includes a set of installed system Certificate Authorities, which are 330 its Application Sandbox. The signed application certificate defines which user 335 Manager verifies that the APK has been properly signed with the certificate 336 included in that APK. If the certificate (or, more accurately, the public key 337 in the certificate) matches the key used to sign any other APK on the device,
|
/external/curl/src/ |
tool_help.c | 52 " --cacert FILE CA certificate to verify peer against (SSL)", 54 " -E, --cert CERT[:PASSWD] Client certificate file and password (SSL)", 55 " --cert-status Verify the status of the server certificate (SSL)", 56 " --cert-type TYPE Certificate file type (DER/PEM/ENG) (SSL)", 180 "CA certificate to verify peer against for proxy (SSL)", 184 "Client certificate file and password for proxy (SSL)", 186 "Certificate file type (DER/PEM/ENG) for proxy (SSL)",
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PairingSession.java | 39 import java.security.cert.Certificate; 209 Certificate clientCert = mPairingContext.getClientCertificate(); 210 Certificate serverCert = mPairingContext.getServerCertificate(); 379 Certificate clientCert = mPairingContext.getClientCertificate(); 381 logDebug("Client certificate:"); 385 Certificate serverCert = mPairingContext.getServerCertificate(); 388 logDebug("Server certificate:");
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 196 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 208 tlsv1_server_log(conn, "Send Certificate"); 221 /* body - Certificate */ 229 "for Certificate (cert_len=%lu left=%lu)", 249 * to form a full certificate chain. The client may fail to 253 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " 289 * Client did not request certificate status or there is no
|