/external/curl/lib/ |
mk-ca-bundle.pl | 183 print wrap("\t","\t\t", "-s\tcomma separated list of certificate signatures/hashes to output in plain text mode. (default: $default_signature_algorithms)\n"); 397 ## Certificate data from Mozilla ${datesrc}: ${currentdate} GMT 399 ## This is a bundle of X.509 certificates of public Certificate Authorities 443 # this is a match for the start of a certificate 486 my $pem = "-----BEGIN CERTIFICATE-----\n" 488 . "-----END CERTIFICATE-----\n";
|
/external/libese/third_party/NXPNFC_P61_JCOP_Kit/src/ |
Ala.cpp | 277 ** Description: Performs get JSBL Certificate Identifier sequence 859 /*Check if the certificate/ is verified or not*/ 939 /*Enable certificate and signature verification*/ 962 ALOGD("TAGID: Encountered again certificate tag 7F21"); 975 ALOGD("2nd Script store data success next certificate verification"); 982 /*If the certificate and signature is verified*/ 985 /*If the certificate is verified for 6320 then new 989 /*If the certificate or signature verification failed*/ 994 /*Already certificate&Sginature verified previously skip 7f21& tag 60*/ [all...] |
/external/webrtc/webrtc/base/ |
opensslstreamadapter.cc | 749 // then a peer certificate must have been specified by now. 1000 // Require a certificate from the client. 1047 LOG(LS_INFO) << "Ignored chained certificate at depth " << depth; 1064 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest."; 1070 LOG(LS_INFO) << "Accepted peer certificate."; 1072 // Record the peer's certificate. [all...] |
sslstreamadapter_unittest.cc | 55 "-----BEGIN CERTIFICATE-----\n" 65 "-----END CERTIFICATE-----\n"; 335 rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, 348 rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, 1028 // Test getting the remote certificate. [all...] |
/frameworks/base/wifi/tests/src/android/net/wifi/ |
FakeKeys.java | 34 private static final String CA_CERT0_STRING = "-----BEGIN CERTIFICATE-----\n" + 52 "-----END CERTIFICATE-----\n"; 55 private static final String CA_CERT1_STRING = "-----BEGIN CERTIFICATE-----\n" + 73 "-----END CERTIFICATE-----\n"; 76 private static final String CLIENT_CERT_STR = "-----BEGIN CERTIFICATE-----\n" + 104 "-----END CERTIFICATE-----\n";
|
/hardware/interfaces/wifi/supplicant/1.0/ |
ISupplicantStaNetwork.hal | 414 * Set EAP CA certificate file path for this network. 427 * Set EAP CA certificate directory path for this network. 440 * Set EAP Client certificate file path for this network. 810 * Get EAP CA certificate file path set for this network. 822 * Get EAP CA certificate directory path set for this network. 834 * Get EAP Client certificate file path set for this network. [all...] |
/hardware/libhardware/include/hardware/ |
keymaster2.h | 221 * Generates a signed X.509 certificate chain attesting to the presence of \p key_to_attest in 222 * keymaster (TODO(swillden): Describe certificate contents in more detail). The certificate 228 * \param[in] key_to_attest The keymaster key for which the attestation certificate will be 233 * This selects which of the provisioned attestation keys will be used to sign the certificate. 236 * certificate for \p key_to_attest. The remaining entries will chain back to the root. The
|
/platform_testing/docs/development/ |
instr-self-e2e.md | 126 certificate as the core platform. This is needed if your test uses a signature 131 special platform certificate. 141 with the same certificate. 144 will simply sign it with a default built-in certificate, based on the build 235 dependent on the apk being signed with same certificate as the core platform 239 signing certificate
|
/system/tpm/attestation/server/ |
pkcs11_key_store_test.cc | 465 .Times(2) // Public, private (no certificate). 474 .Times(3) // Public, private, and certificate. 484 .Times(3) // Public, private, and certificate. 493 .Times(3) // Public, private, and certificate. 524 // Try with a valid certificate (hit multiple times to check dup logic). 528 // Try with an invalid certificate.
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
V2SchemeSigner.java | 96 * Certificates, with the first certificate containing the public key corresponding to 444 // * length-prefixed bytes: X.509 certificate (ASN.1 DER encoded). 489 + " public key from certificate", e); 493 + " public key from certificate", e); 557 for (X509Certificate certificate : certificates) { 558 result.add(certificate.getEncoded());
|
/external/python/cpython2/Lib/test/ |
test_ssl.py | 36 # The custom key and certificate files used in test_ssl are generated 185 # provided solely for this test, to exercise the certificate 377 """Check that trying to use the given client certificate fails""" 392 """Wrapping with a badly formatted certificate (syntax error)""" [all...] |
/external/webrtc/talk/app/webrtc/ |
statscollector_unittest.cc | 100 rtc::scoped_refptr<rtc::RTCCertificate>* certificate)); 696 // Fake certificate to report 721 // Check local certificate chain. 734 // Check remote certificate chain. [all...] |
webrtcsession.cc | 608 // Obtain a certificate from RTCConfiguration if any were provided (optional). 609 rtc::scoped_refptr<rtc::RTCCertificate> certificate; local 611 // TODO(hbos,torbjorng): Decide on certificate-selection strategy instead of 614 certificate = rtc_configuration.certificates[0]; 627 // Enable DTLS by default if we have an identity store or a certificate. 628 dtls_enabled_ = (dtls_identity_store || certificate); 723 if (!certificate) { 724 // Use the |dtls_identity_store| to generate a certificate. 730 // Use the already generated certificate. 732 signaling_thread(), channel_manager_, certificate, this, id())) [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
NativeCrypto.java | [all...] |
/external/syslinux/gpxe/src/net/ |
tls.c | 846 * Receive new Certificate handshake record 858 } __attribute__ (( packed )) *certificate = data; local 861 uint8_t certificate[0]; member in struct:__anon35027 863 ( ( void * ) certificate->certificates ); 864 size_t elements_len = tls_uint24 ( certificate->length ); 865 void *end = ( certificate->certificates + elements_len ); 871 DBGC ( tls, "TLS %p received overlength Server Certificate\n", 877 /* Traverse certificate chain */ 879 cursor.data = element->certificate; 883 "Certificate\n", tls ) [all...] |
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 115 // cert_verified is true if certificate verification has been driven to 167 // Keep reading the certificate chain. 570 // Install the certificate in the early callback. 575 // Install the certificate asynchronously. 596 fprintf(stderr, "certificate types mismatch\n"); 653 // Return zero for no certificate. 676 // The certificate will be installed via other means. 703 fprintf(stderr, "Certificate verified twice.\n"); [all...] |
/external/curl/lib/vtls/ |
schannel.c | 168 /* certificate validation on CE doesn't seem to work right; we'll 183 infof(data, "schannel: disabled server certificate revocation " 186 infof(data, "schannel: checking server certificate revocation\n"); 192 infof(data, "schannel: disabled server certificate revocation checks\n"); 253 failf(data, "schannel: SNI or certificate check failed: %s", 365 failf(data, "schannel: SNI or certificate check failed: %s", 542 /* If the server has requested a client certificate, attempt to continue 544 request a client certificate but do not require it. */ 549 infof(data, "schannel: a client certificate has been requested\n"); 581 failf(data, "schannel: SNI or certificate check failed: %s" [all...] |
/external/openssh/ |
sshd_config.0 | 158 certificate principals as per AuthorizedPrincipalsFile. The 182 certificate authentication. When using certificates signed by a 184 which must appear in the certificate for it to be accepted for 194 appear in a certificate's principals list for it to be accepted. 414 Specifies a file containing a public host certificate. The 415 certificate's public key must match a private host key already [all...] |
sshd_config.5 | 289 certificate principals as per 328 certificate authentication. 331 this file lists names, one of which must appear in the certificate for it 352 of the user must appear in a certificate's principals list for it to be 697 Specifies a file containing a public host certificate. 698 The certificate's public key must match a private host key already specified [all...] |
auth2-pubkey.c | 828 * their username in the certificate principals list. 833 reason = "Certificate does not contain an " 847 verbose("Accepted certificate ID \"%s\" (serial %llu) " 877 /* Authenticate a certificate key against TrustedUserCAKeys */ 900 * If AuthorizedPrincipals is in use, then compare the certificate 915 reason = "Certificate does not contain an authorized principal"; 927 verbose("Accepted certificate ID \"%s\" (serial %llu) signed by "
|
/packages/apps/Email/res/values/ |
strings.xml | 228 the desire for an encrypted session on the selected port, including SSL certificate 238 port, including SSL certificate checks --> 266 <!-- On "Exchange" setup screen, a heading title for the current client certificate, should be uppercase where applicable [CHAR LIMIT=50] --> 267 <string name="account_setup_exchange_certificate_title">CLIENT CERTIFICATE</string> 268 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] --> 270 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] --> 271 <string name="account_setup_exchange_use_certificate">Use client certificate</string> 272 <!-- On "Exchange" setup screen, a button label to remove the currently used client certificate [CHAR LIMIT=35] --> 275 certificate is used [CHAR LIMIT=50] --> 352 client certificate to connect [CHAR LIMIT=NONE] -- [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Application/Cryptest/ |
RsaVerify2.c | 64 // Test CA X509 Certificate for X509 Verification Routine (Generated by OpenSSL utility).
230 // Retrieve RSA public key from X509 Certificate.
275 // X509 Certificate Subject Retrieving.
277 Print (L"\n- X509 Certificate Subject Bytes Retrieving ... ");
290 // X509 Certificate Verification.
292 Print (L"\n- X509 Certificate Verification with Trusted CA ...");
337 // Construct Signer Certificate from RAW data.
|
/docs/source.android.com/en/devices/tech/ota/ |
ab_updates.html | 438 To add the .X509 certificate containing the public key to the system keyring: 443 Copy the .X509 certificate formatted in the <code>.der</code> 446 <code>.der</code> format (if the .X509 certificate is formatted in 449 openssl x509 -in <x509-pem-certificate> -outform der -out <x509-der-certificate> 454 include the certificate as part of the system keyring. This can be verified 469 Successful inclusion of the .X509 certificate indicates the presence of the
|
/external/libmicrohttpd/src/microspdy/ |
structures.h | 114 * hostnames matches and the SSL server certificate presented in the 116 * the SSL connection can contain at most one client certificate, 276 * not have valid credentials in the client certificate vector. 568 * the client certificate to be used for this request The value 0 569 * means no client certificate should be associated with this stream. 889 * Certificate file of the server. File path is kept here. 894 * Key file for the certificate of the server. File path is
|
/external/libmicrohttpd/src/spdy2http/ |
proxy.c | 1263 "Usage: microspdy2http -p <PORT> [-c <CERTIFICATE>] [-k <CERT-KEY>]\n" 1268 " -c, --certificate Path to a certificate file. Requiered if\n" 1270 " -k, --certificate-key Path to a key file for the certificate.\n" [all...] |