HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1576 - 1600 of 2776) sorted by null

<<61626364656667686970>>

  /external/curl/lib/
mk-ca-bundle.pl 183 print wrap("\t","\t\t", "-s\tcomma separated list of certificate signatures/hashes to output in plain text mode. (default: $default_signature_algorithms)\n");
397 ## Certificate data from Mozilla ${datesrc}: ${currentdate} GMT
399 ## This is a bundle of X.509 certificates of public Certificate Authorities
443 # this is a match for the start of a certificate
486 my $pem = "-----BEGIN CERTIFICATE-----\n"
488 . "-----END CERTIFICATE-----\n";
  /external/libese/third_party/NXPNFC_P61_JCOP_Kit/src/
Ala.cpp 277 ** Description: Performs get JSBL Certificate Identifier sequence
859 /*Check if the certificate/ is verified or not*/
939 /*Enable certificate and signature verification*/
962 ALOGD("TAGID: Encountered again certificate tag 7F21");
975 ALOGD("2nd Script store data success next certificate verification");
982 /*If the certificate and signature is verified*/
985 /*If the certificate is verified for 6320 then new
989 /*If the certificate or signature verification failed*/
994 /*Already certificate&Sginature verified previously skip 7f21& tag 60*/
    [all...]
  /external/webrtc/webrtc/base/
opensslstreamadapter.cc 749 // then a peer certificate must have been specified by now.
1000 // Require a certificate from the client.
1047 LOG(LS_INFO) << "Ignored chained certificate at depth " << depth;
1064 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest.";
1070 LOG(LS_INFO) << "Accepted peer certificate.";
1072 // Record the peer's certificate.
    [all...]
sslstreamadapter_unittest.cc 55 "-----BEGIN CERTIFICATE-----\n"
65 "-----END CERTIFICATE-----\n";
335 rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1,
348 rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1,
1028 // Test getting the remote certificate.
    [all...]
  /frameworks/base/wifi/tests/src/android/net/wifi/
FakeKeys.java 34 private static final String CA_CERT0_STRING = "-----BEGIN CERTIFICATE-----\n" +
52 "-----END CERTIFICATE-----\n";
55 private static final String CA_CERT1_STRING = "-----BEGIN CERTIFICATE-----\n" +
73 "-----END CERTIFICATE-----\n";
76 private static final String CLIENT_CERT_STR = "-----BEGIN CERTIFICATE-----\n" +
104 "-----END CERTIFICATE-----\n";
  /hardware/interfaces/wifi/supplicant/1.0/
ISupplicantStaNetwork.hal 414 * Set EAP CA certificate file path for this network.
427 * Set EAP CA certificate directory path for this network.
440 * Set EAP Client certificate file path for this network.
810 * Get EAP CA certificate file path set for this network.
822 * Get EAP CA certificate directory path set for this network.
834 * Get EAP Client certificate file path set for this network.
    [all...]
  /hardware/libhardware/include/hardware/
keymaster2.h 221 * Generates a signed X.509 certificate chain attesting to the presence of \p key_to_attest in
222 * keymaster (TODO(swillden): Describe certificate contents in more detail). The certificate
228 * \param[in] key_to_attest The keymaster key for which the attestation certificate will be
233 * This selects which of the provisioned attestation keys will be used to sign the certificate.
236 * certificate for \p key_to_attest. The remaining entries will chain back to the root. The
  /platform_testing/docs/development/
instr-self-e2e.md 126 certificate as the core platform. This is needed if your test uses a signature
131 special platform certificate.
141 with the same certificate.
144 will simply sign it with a default built-in certificate, based on the build
235 dependent on the apk being signed with same certificate as the core platform
239 signing certificate
  /system/tpm/attestation/server/
pkcs11_key_store_test.cc 465 .Times(2) // Public, private (no certificate).
474 .Times(3) // Public, private, and certificate.
484 .Times(3) // Public, private, and certificate.
493 .Times(3) // Public, private, and certificate.
524 // Try with a valid certificate (hit multiple times to check dup logic).
528 // Try with an invalid certificate.
  /tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/
V2SchemeSigner.java 96 * Certificates, with the first certificate containing the public key corresponding to
444 // * length-prefixed bytes: X.509 certificate (ASN.1 DER encoded).
489 + " public key from certificate", e);
493 + " public key from certificate", e);
557 for (X509Certificate certificate : certificates) {
558 result.add(certificate.getEncoded());
  /external/python/cpython2/Lib/test/
test_ssl.py 36 # The custom key and certificate files used in test_ssl are generated
185 # provided solely for this test, to exercise the certificate
377 """Check that trying to use the given client certificate fails"""
392 """Wrapping with a badly formatted certificate (syntax error)"""
    [all...]
  /external/webrtc/talk/app/webrtc/
statscollector_unittest.cc 100 rtc::scoped_refptr<rtc::RTCCertificate>* certificate));
696 // Fake certificate to report
721 // Check local certificate chain.
734 // Check remote certificate chain.
    [all...]
webrtcsession.cc 608 // Obtain a certificate from RTCConfiguration if any were provided (optional).
609 rtc::scoped_refptr<rtc::RTCCertificate> certificate; local
611 // TODO(hbos,torbjorng): Decide on certificate-selection strategy instead of
614 certificate = rtc_configuration.certificates[0];
627 // Enable DTLS by default if we have an identity store or a certificate.
628 dtls_enabled_ = (dtls_identity_store || certificate);
723 if (!certificate) {
724 // Use the |dtls_identity_store| to generate a certificate.
730 // Use the already generated certificate.
732 signaling_thread(), channel_manager_, certificate, this, id()))
    [all...]
  /external/conscrypt/common/src/main/java/org/conscrypt/
NativeCrypto.java     [all...]
  /external/syslinux/gpxe/src/net/
tls.c 846 * Receive new Certificate handshake record
858 } __attribute__ (( packed )) *certificate = data; local
861 uint8_t certificate[0]; member in struct:__anon35027
863 ( ( void * ) certificate->certificates );
864 size_t elements_len = tls_uint24 ( certificate->length );
865 void *end = ( certificate->certificates + elements_len );
871 DBGC ( tls, "TLS %p received overlength Server Certificate\n",
877 /* Traverse certificate chain */
879 cursor.data = element->certificate;
883 "Certificate\n", tls )
    [all...]
  /external/boringssl/src/ssl/test/
bssl_shim.cc 115 // cert_verified is true if certificate verification has been driven to
167 // Keep reading the certificate chain.
570 // Install the certificate in the early callback.
575 // Install the certificate asynchronously.
596 fprintf(stderr, "certificate types mismatch\n");
653 // Return zero for no certificate.
676 // The certificate will be installed via other means.
703 fprintf(stderr, "Certificate verified twice.\n");
    [all...]
  /external/curl/lib/vtls/
schannel.c 168 /* certificate validation on CE doesn't seem to work right; we'll
183 infof(data, "schannel: disabled server certificate revocation "
186 infof(data, "schannel: checking server certificate revocation\n");
192 infof(data, "schannel: disabled server certificate revocation checks\n");
253 failf(data, "schannel: SNI or certificate check failed: %s",
365 failf(data, "schannel: SNI or certificate check failed: %s",
542 /* If the server has requested a client certificate, attempt to continue
544 request a client certificate but do not require it. */
549 infof(data, "schannel: a client certificate has been requested\n");
581 failf(data, "schannel: SNI or certificate check failed: %s"
    [all...]
  /external/openssh/
sshd_config.0 158 certificate principals as per AuthorizedPrincipalsFile. The
182 certificate authentication. When using certificates signed by a
184 which must appear in the certificate for it to be accepted for
194 appear in a certificate's principals list for it to be accepted.
414 Specifies a file containing a public host certificate. The
415 certificate's public key must match a private host key already
    [all...]
sshd_config.5 289 certificate principals as per
328 certificate authentication.
331 this file lists names, one of which must appear in the certificate for it
352 of the user must appear in a certificate's principals list for it to be
697 Specifies a file containing a public host certificate.
698 The certificate's public key must match a private host key already specified
    [all...]
auth2-pubkey.c 828 * their username in the certificate principals list.
833 reason = "Certificate does not contain an "
847 verbose("Accepted certificate ID \"%s\" (serial %llu) "
877 /* Authenticate a certificate key against TrustedUserCAKeys */
900 * If AuthorizedPrincipals is in use, then compare the certificate
915 reason = "Certificate does not contain an authorized principal";
927 verbose("Accepted certificate ID \"%s\" (serial %llu) signed by "
  /packages/apps/Email/res/values/
strings.xml 228 the desire for an encrypted session on the selected port, including SSL certificate
238 port, including SSL certificate checks -->
266 <!-- On "Exchange" setup screen, a heading title for the current client certificate, should be uppercase where applicable [CHAR LIMIT=50] -->
267 <string name="account_setup_exchange_certificate_title">CLIENT CERTIFICATE</string>
268 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] -->
270 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] -->
271 <string name="account_setup_exchange_use_certificate">Use client certificate</string>
272 <!-- On "Exchange" setup screen, a button label to remove the currently used client certificate [CHAR LIMIT=35] -->
275 certificate is used [CHAR LIMIT=50] -->
352 client certificate to connect [CHAR LIMIT=NONE] --
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Application/Cryptest/
RsaVerify2.c 64 // Test CA X509 Certificate for X509 Verification Routine (Generated by OpenSSL utility).
230 // Retrieve RSA public key from X509 Certificate.
275 // X509 Certificate Subject Retrieving.
277 Print (L"\n- X509 Certificate Subject Bytes Retrieving ... ");
290 // X509 Certificate Verification.
292 Print (L"\n- X509 Certificate Verification with Trusted CA ...");
337 // Construct Signer Certificate from RAW data.
  /docs/source.android.com/en/devices/tech/ota/
ab_updates.html 438 To add the .X509 certificate containing the public key to the system keyring:
443 Copy the .X509 certificate formatted in the <code>.der</code>
446 <code>.der</code> format (if the .X509 certificate is formatted in
449 openssl x509 -in &lt;x509-pem-certificate&gt; -outform der -out &lt;x509-der-certificate&gt;
454 include the certificate as part of the system keyring. This can be verified
469 Successful inclusion of the .X509 certificate indicates the presence of the
  /external/libmicrohttpd/src/microspdy/
structures.h 114 * hostnames matches and the SSL server certificate presented in the
116 * the SSL connection can contain at most one client certificate,
276 * not have valid credentials in the client certificate vector.
568 * the client certificate to be used for this request The value 0
569 * means no client certificate should be associated with this stream.
889 * Certificate file of the server. File path is kept here.
894 * Key file for the certificate of the server. File path is
  /external/libmicrohttpd/src/spdy2http/
proxy.c 1263 "Usage: microspdy2http -p <PORT> [-c <CERTIFICATE>] [-k <CERT-KEY>]\n"
1268 " -c, --certificate Path to a certificate file. Requiered if\n"
1270 " -k, --certificate-key Path to a key file for the certificate.\n"
    [all...]

Completed in 524 milliseconds

<<61626364656667686970>>