/system/tpm/attestation/common/ |
interface.proto | 39 // Describes the certificate to be requested of the CA. 56 // certificate issued by the CA and followed by certificates for any 58 // certificate is well-known and not included. 77 // The certificate data associated with the key (if any). 78 optional bytes certificate = 7; 89 // The endorsement certificate (X.509/DER). 103 // The attestation key certificate. 104 optional bytes certificate = 4; 119 // The decrypted attestation key certificate. 120 optional bytes certificate = 2 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V1CertificateGenerator.java | 39 * class to produce an X.509 Version 1 certificate. 66 * set the serial number for the certificate. 81 * certificate. 98 * certificate. 182 * generate an X509 certificate, based on the current issuer and subject 201 * generate an X509 certificate, based on the current issuer and subject 221 * generate an X509 certificate, based on the current issuer and subject, 235 * generate an X509 certificate, based on the current issuer and subject, 269 * generate an X509 certificate, based on the current issuer and subject 284 * generate an X509 certificate, based on the current issuer and subjec [all...] |
/external/libmtp/logs/ |
mtp-detect-iriver-t10.txt | 64 0xd102: Device Certificate 180 Trying to acquire device certificate 182 Device Certificate: 183 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">CgoKCgoKCgoKCgoKCgoKCgoKCgo=</UNIQUEID><PUBLICKEY private="1">7RqSopOusCYv5QMC3DVLKa4yyoOzIqGmCLyWjCzXiUw30sdRJ00aJg==</PUBLICKEY><KEYDATA>9mavUe/KTsOYKWu0vTg/wK1U2Rs=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>B5CPcB+XffZRMK/9eFOV1lshKjq2It2UldHXeDOwg1QMWXQoLn8RQg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>wlP+Zc1g451zJMVLnom5cbcmpf0=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.3</SECURITYVERSION><CERTIFICATE private="1">7RqSopOusCYv5QMC3DVLKa4yyoOzIqGmCLyWjCzXiUw30sdRJ00aJgIEZgPhNl4IaMaz8zFguv1JT6b8s81PSKRaaY/GmNhCUe8fl9+WOZtAfUVD</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>iRiver H10 Series</NAME><MANUFACTURER>iRiver</MANUFACTURER><MAKE>iRiver</MAKE><DISTRIBUTOR>ReignCom</DISTRIBUTOR><MODEL>H10</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>1</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>1</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>8jeq4PyJZUL8NpU2+/tgvUZC9ijn3RdlK3wd04Iws6oXHoA+D6vFfQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>HZ85tGf5VnDwKLGq2S0OlK/oJCKbCx3A2yudzMOv8ERwi6drHW5xOA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>359</AUTH_ID><PUBLICKEY>DpM (…) [all...] |
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
tpmtoken_import_openssl.cnf | 3 # This is mostly being used for generation of certificate requests. 43 certificate = $dir/cacert.pem # The CA certificate 54 cert_opt = ca_default # Certificate field options 118 # req_extensions = v3_req # The extensions to add to a certificate request 162 # requires this to avoid interpreting an end user certificate as a CA. 167 # the certificate can be used for anything *except* object signing. 172 # For an object signing certificate this would be used. 181 # This is typical in keyUsage for a client certificate. 185 nsComment = "OpenSSL Generated Certificate" [all...] |
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 28 import java.security.cert.Certificate; 62 * Returns an input stream containing one or more certificate PEM files. This implementation just 72 + "-----BEGIN CERTIFICATE-----\n" 105 + "-----END CERTIFICATE-----\n"; 107 + "-----BEGIN CERTIFICATE-----\n" 133 + "-----END CERTIFICATE-----\n"; 146 * set. This is useful in development where certificate authority-trusted certificates aren't 147 * available. Or in production, to avoid reliance on third-party certificate authorities. 155 * operational complexity and limit your ability to migrate between certificate authorities. Do 162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in) [all...] |
/external/webrtc/webrtc/base/ |
sslstreamadapter.h | 91 // Specify our SSL identity: key and certificate. Mostly this is 93 // provide a client certificate to a server). 132 // which the server's certificate needs to specify. 144 // Specify the digest of the certificate that our peer is expected to use in 145 // peer-to-peer mode. Only this certificate will be accepted during 146 // SSL verification. The certificate is assumed to have been 149 // terminal certificate, not just a CA. 155 // Retrieves the peer's X.509 certificate, if a connection has been 157 // chain. The returned certificate is owned by the caller. 204 // If true, the server certificate need not match the configure [all...] |
/frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/ |
Credential.java | 119 * and Accounting) server's certificate during EAP (Extensible Authentication 471 * Certificate based credential. This is used for EAP-TLS. 476 * Supported certificate types. 482 * Certificate SHA-256 fingerprint length. 487 * Certificate type. 491 * Set the certificate type associated with this certificate credential. 493 * @param certType The certificate type to set to 499 * Get the certificate type associated with this certificate credential [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
conn_test.go | 67 Certificates: []Certificate{ 69 Certificate: [][]byte{fromHex(certExampleCom)}, 72 Certificate: [][]byte{fromHex(certWildcardExampleCom)}, 75 Certificate: [][]byte{fromHex(certFooExampleCom)}, 78 Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)}, 85 pointerToIndex := func(c *Certificate) int { 94 certificateForName := func(name string) *Certificate { 99 t.Errorf("unable to get certificate for name '%s': %s", name, err) 107 t.Errorf("example.com returned certificate %d, not 0", n) 110 t.Errorf("bar.example.com returned certificate %d, not 1", n [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
conn_test.go | 67 Certificates: []Certificate{ 69 Certificate: [][]byte{fromHex(certExampleCom)}, 72 Certificate: [][]byte{fromHex(certWildcardExampleCom)}, 75 Certificate: [][]byte{fromHex(certFooExampleCom)}, 78 Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)}, 85 pointerToIndex := func(c *Certificate) int { 94 certificateForName := func(name string) *Certificate { 99 t.Errorf("unable to get certificate for name '%s': %s", name, err) 107 t.Errorf("example.com returned certificate %d, not 0", n) 110 t.Errorf("bar.example.com returned certificate %d, not 1", n [all...] |
/external/openssh/ |
PROTOCOL.certkeys | 1 This document describes a simple public-key certificate authentication 15 system already in SSH to allow certificate-based authentication. The 45 algorithm names to add support for certificate authentication without 56 The certificate key types take a similar high-level format (note: data 63 RSA certificate 81 DSA certificate 101 ECDSA certificate 121 ED25519 certificate 152 serial is an optional certificate serial number set by the CA to 157 type specifies whether this certificate is for identification of a use [all...] |
ssherr.c | 59 return "plain key provided where certificate required"; 61 return "key lacks certificate data"; 63 return "unknown/unsupported certificate type"; 65 return "invalid certificate signing key"; 77 return "invalid certificate"; 117 return "certificate does not match key";
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
CertificatesToPlayWith.java | 41 * find 花子.co.jp. So would the CN in the certificate contain 52 "-----BEGIN CERTIFICATE-----\n" + 76 "-----END CERTIFICATE-----\n").getBytes(); 82 "-----BEGIN CERTIFICATE-----\n" + 106 "-----END CERTIFICATE-----\n").getBytes(); 112 "-----BEGIN CERTIFICATE-----\n" + 137 "-----END CERTIFICATE-----\n").getBytes(); 144 "-----BEGIN CERTIFICATE-----\n" + 169 "-----END CERTIFICATE-----\n").getBytes(); 175 "-----BEGIN CERTIFICATE-----\n" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 73 * ca_cert - File path to CA certificate file (PEM/DER) 76 * and ca_path are not included, server certificate will not be 77 * verified. This is insecure and a trusted CA certificate should 86 * server certificate (SHA-256 hash of the DER encoded X.509 87 * certificate). In this case, the possible CA certificates in the 88 * server certificate chain are ignored and only the server certificate 95 * certificate store by setting this to cert_store://name, e.g., 98 * certificate store (My user account) is used, whereas computer store 104 * ca_path - Directory path for CA certificate files (PEM [all...] |
/external/boringssl/src/ssl/ |
ssl_stat.cc | 122 return "SSLv3 read server certificate A"; 128 return "SSLv3 read server certificate request A"; 137 return "SSLv3 write client certificate A"; 143 return "SSLv3 write certificate verify A"; 177 return "SSLv3 write certificate A"; 186 return "SSLv3 read client certificate A"; 195 return "SSLv3 read certificate verify A"; 340 return "no certificate"; 343 return "bad certificate"; 346 return "unsupported certificate"; [all...] |
/frameworks/base/wifi/tests/src/android/net/wifi/hotspot2/pps/ |
CredentialTest.java | 47 * @param caCert CA certificate 73 * Helper function for generating certificate credential for testing. 136 * Verify parcel read/write for a certificate credential. 176 * Verify that an user credential without CA Certificate is invalid. 249 * Verify a certificate credential. CA Certificate, client certificate chain, 251 * certificate must match the fingerprint specified in the certificate credential. 262 * Verify that an certificate credential without CA Certificate is invalid [all...] |
/libcore/luni/src/test/java/tests/java/security/ |
IdentityTest.java | 118 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 119 * If the identity has a public key, the public key in the certificate must be the same 130 // try Certificate with different key 138 * verify addCertificate(Certificate certificate) adds a certificate for this identity. 139 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate. 152 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
HostnameVerifierTest.java | 49 + "-----BEGIN CERTIFICATE-----\n" 73 + "-----END CERTIFICATE-----\n"); 82 + "-----BEGIN CERTIFICATE-----\n" 106 + "-----END CERTIFICATE-----\n"); 114 + "-----BEGIN CERTIFICATE-----\n" 139 + "-----END CERTIFICATE-----\n"); 155 + "-----BEGIN CERTIFICATE-----\n" 180 + "-----END CERTIFICATE-----\n"); 196 + "-----BEGIN CERTIFICATE-----\n" 220 + "-----END CERTIFICATE-----\n") 395 X509Certificate certificate = certificate("" local 545 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory4Test.java | 35 import java.security.cert.Certificate; 59 // Test for method java.security.cert.Certificate 95 Collection<? extends Certificate> certs = fact.generateCertificates(is); 100 // the certificate could not be found, skip it 121 // the certificate could not be found, skip it 143 // the certificate could not be found, skip it 251 * extends Certificate> certificates) 257 (List<Certificate>) null); 290 "-----BEGIN CERTIFICATE-----\n" 304 + "-----END CERTIFICATE-----\n" [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify_test.go | 232 // Putting a certificate as a root directly should work as a 245 // Putting a certificate as a root directly should not skip 333 func certificateFromPEM(pemBytes string) (*Certificate, error) { 451 func chainToDebugString(chain []*Certificate) string { 466 const geoTrustRoot = `-----BEGIN CERTIFICATE----- 485 -----END CERTIFICATE----- 488 const giag2Intermediate = `-----BEGIN CERTIFICATE----- 511 -----END CERTIFICATE----- 514 const googleLeaf = `-----BEGIN CERTIFICATE----- 539 -----END CERTIFICATE---- [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify_test.go | 232 // Putting a certificate as a root directly should work as a 245 // Putting a certificate as a root directly should not skip 333 func certificateFromPEM(pemBytes string) (*Certificate, error) { 451 func chainToDebugString(chain []*Certificate) string { 466 const geoTrustRoot = `-----BEGIN CERTIFICATE----- 485 -----END CERTIFICATE----- 488 const giag2Intermediate = `-----BEGIN CERTIFICATE----- 511 -----END CERTIFICATE----- 514 const googleLeaf = `-----BEGIN CERTIFICATE----- 539 -----END CERTIFICATE---- [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
CertificateID.java | 38 * create from an issuer certificate and the serial number of the 39 * certificate it signed. 41 * @param issuerCert issuing certificate 70 * return the serial number for the certificate associated 116 * calculated for the same CA certificate. 119 * @param newSerialNumber the serial number for the new certificate of interest.
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
SSLNullSession.java | 21 import java.security.cert.Certificate; 85 public Certificate[] getLocalCertificates() { 102 throw new SSLPeerUnverifiedException("No peer certificate"); 106 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 107 throw new SSLPeerUnverifiedException("No peer certificate"); 122 throw new SSLPeerUnverifiedException("No peer certificate");
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
SslCertificateTest.java | 30 * Problematic certificate from Issue 1597 34 "-----BEGIN CERTIFICATE-----\n"+ 44 "-----END CERTIFICATE-----\n"; 55 * Problematic certificate from Issue 41662 59 "-----BEGIN CERTIFICATE-----\n"+ 97 "-----END CERTIFICATE-----\n";
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
WiFiKeyManager.java | 12 import java.security.cert.Certificate; 45 Certificate cert = mKeyStore.getCertificate(alias); 151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) { 152 if (certificate instanceof X509Certificate) { 153 certs.add((X509Certificate) certificate);
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertPathChecker.java | 29 * <p>Performs one or more checks on each {@code Certificate} of a 34 * may check for and process a critical private extension of each certificate 68 * Performs the check(s) on the specified certificate using its internal 72 * @param cert the {@code Certificate} to be checked 73 * @throws CertPathValidatorException if the specified certificate does 76 void check(Certificate cert) throws CertPathValidatorException;
|