HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 401 - 425 of 2776) sorted by null

<<11121314151617181920>>

  /system/tpm/attestation/common/
interface.proto 39 // Describes the certificate to be requested of the CA.
56 // certificate issued by the CA and followed by certificates for any
58 // certificate is well-known and not included.
77 // The certificate data associated with the key (if any).
78 optional bytes certificate = 7;
89 // The endorsement certificate (X.509/DER).
103 // The attestation key certificate.
104 optional bytes certificate = 4;
119 // The decrypted attestation key certificate.
120 optional bytes certificate = 2
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V1CertificateGenerator.java 39 * class to produce an X.509 Version 1 certificate.
66 * set the serial number for the certificate.
81 * certificate.
98 * certificate.
182 * generate an X509 certificate, based on the current issuer and subject
201 * generate an X509 certificate, based on the current issuer and subject
221 * generate an X509 certificate, based on the current issuer and subject,
235 * generate an X509 certificate, based on the current issuer and subject,
269 * generate an X509 certificate, based on the current issuer and subject
284 * generate an X509 certificate, based on the current issuer and subjec
    [all...]
  /external/libmtp/logs/
mtp-detect-iriver-t10.txt 64 0xd102: Device Certificate
180 Trying to acquire device certificate
182 Device Certificate:
183 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">CgoKCgoKCgoKCgoKCgoKCgoKCgo=</UNIQUEID><PUBLICKEY private="1">7RqSopOusCYv5QMC3DVLKa4yyoOzIqGmCLyWjCzXiUw30sdRJ00aJg==</PUBLICKEY><KEYDATA>9mavUe/KTsOYKWu0vTg/wK1U2Rs=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>B5CPcB+XffZRMK/9eFOV1lshKjq2It2UldHXeDOwg1QMWXQoLn8RQg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>wlP+Zc1g451zJMVLnom5cbcmpf0=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.3</SECURITYVERSION><CERTIFICATE private="1">7RqSopOusCYv5QMC3DVLKa4yyoOzIqGmCLyWjCzXiUw30sdRJ00aJgIEZgPhNl4IaMaz8zFguv1JT6b8s81PSKRaaY/GmNhCUe8fl9+WOZtAfUVD</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>iRiver H10 Series</NAME><MANUFACTURER>iRiver</MANUFACTURER><MAKE>iRiver</MAKE><DISTRIBUTOR>ReignCom</DISTRIBUTOR><MODEL>H10</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>1</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>1</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>8jeq4PyJZUL8NpU2+/tgvUZC9ijn3RdlK3wd04Iws6oXHoA+D6vFfQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>HZ85tGf5VnDwKLGq2S0OlK/oJCKbCx3A2yudzMOv8ERwi6drHW5xOA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>359</AUTH_ID><PUBLICKEY>DpM (…)
    [all...]
  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
tpmtoken_import_openssl.cnf 3 # This is mostly being used for generation of certificate requests.
43 certificate = $dir/cacert.pem # The CA certificate
54 cert_opt = ca_default # Certificate field options
118 # req_extensions = v3_req # The extensions to add to a certificate request
162 # requires this to avoid interpreting an end user certificate as a CA.
167 # the certificate can be used for anything *except* object signing.
172 # For an object signing certificate this would be used.
181 # This is typical in keyUsage for a client certificate.
185 nsComment = "OpenSSL Generated Certificate"
    [all...]
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CustomTrust.java 28 import java.security.cert.Certificate;
62 * Returns an input stream containing one or more certificate PEM files. This implementation just
72 + "-----BEGIN CERTIFICATE-----\n"
105 + "-----END CERTIFICATE-----\n";
107 + "-----BEGIN CERTIFICATE-----\n"
133 + "-----END CERTIFICATE-----\n";
146 * set. This is useful in development where certificate authority-trusted certificates aren't
147 * available. Or in production, to avoid reliance on third-party certificate authorities.
155 * operational complexity and limit your ability to migrate between certificate authorities. Do
162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in)
    [all...]
  /external/webrtc/webrtc/base/
sslstreamadapter.h 91 // Specify our SSL identity: key and certificate. Mostly this is
93 // provide a client certificate to a server).
132 // which the server's certificate needs to specify.
144 // Specify the digest of the certificate that our peer is expected to use in
145 // peer-to-peer mode. Only this certificate will be accepted during
146 // SSL verification. The certificate is assumed to have been
149 // terminal certificate, not just a CA.
155 // Retrieves the peer's X.509 certificate, if a connection has been
157 // chain. The returned certificate is owned by the caller.
204 // If true, the server certificate need not match the configure
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/
Credential.java 119 * and Accounting) server's certificate during EAP (Extensible Authentication
471 * Certificate based credential. This is used for EAP-TLS.
476 * Supported certificate types.
482 * Certificate SHA-256 fingerprint length.
487 * Certificate type.
491 * Set the certificate type associated with this certificate credential.
493 * @param certType The certificate type to set to
499 * Get the certificate type associated with this certificate credential
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
conn_test.go 67 Certificates: []Certificate{
69 Certificate: [][]byte{fromHex(certExampleCom)},
72 Certificate: [][]byte{fromHex(certWildcardExampleCom)},
75 Certificate: [][]byte{fromHex(certFooExampleCom)},
78 Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)},
85 pointerToIndex := func(c *Certificate) int {
94 certificateForName := func(name string) *Certificate {
99 t.Errorf("unable to get certificate for name '%s': %s", name, err)
107 t.Errorf("example.com returned certificate %d, not 0", n)
110 t.Errorf("bar.example.com returned certificate %d, not 1", n
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
conn_test.go 67 Certificates: []Certificate{
69 Certificate: [][]byte{fromHex(certExampleCom)},
72 Certificate: [][]byte{fromHex(certWildcardExampleCom)},
75 Certificate: [][]byte{fromHex(certFooExampleCom)},
78 Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)},
85 pointerToIndex := func(c *Certificate) int {
94 certificateForName := func(name string) *Certificate {
99 t.Errorf("unable to get certificate for name '%s': %s", name, err)
107 t.Errorf("example.com returned certificate %d, not 0", n)
110 t.Errorf("bar.example.com returned certificate %d, not 1", n
    [all...]
  /external/openssh/
PROTOCOL.certkeys 1 This document describes a simple public-key certificate authentication
15 system already in SSH to allow certificate-based authentication. The
45 algorithm names to add support for certificate authentication without
56 The certificate key types take a similar high-level format (note: data
63 RSA certificate
81 DSA certificate
101 ECDSA certificate
121 ED25519 certificate
152 serial is an optional certificate serial number set by the CA to
157 type specifies whether this certificate is for identification of a use
    [all...]
ssherr.c 59 return "plain key provided where certificate required";
61 return "key lacks certificate data";
63 return "unknown/unsupported certificate type";
65 return "invalid certificate signing key";
77 return "invalid certificate";
117 return "certificate does not match key";
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
CertificatesToPlayWith.java 41 * find &#x82b1;&#x5b50;.co.jp. So would the CN in the certificate contain
52 "-----BEGIN CERTIFICATE-----\n" +
76 "-----END CERTIFICATE-----\n").getBytes();
82 "-----BEGIN CERTIFICATE-----\n" +
106 "-----END CERTIFICATE-----\n").getBytes();
112 "-----BEGIN CERTIFICATE-----\n" +
137 "-----END CERTIFICATE-----\n").getBytes();
144 "-----BEGIN CERTIFICATE-----\n" +
169 "-----END CERTIFICATE-----\n").getBytes();
175 "-----BEGIN CERTIFICATE-----\n"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 73 * ca_cert - File path to CA certificate file (PEM/DER)
76 * and ca_path are not included, server certificate will not be
77 * verified. This is insecure and a trusted CA certificate should
86 * server certificate (SHA-256 hash of the DER encoded X.509
87 * certificate). In this case, the possible CA certificates in the
88 * server certificate chain are ignored and only the server certificate
95 * certificate store by setting this to cert_store://name, e.g.,
98 * certificate store (My user account) is used, whereas computer store
104 * ca_path - Directory path for CA certificate files (PEM
    [all...]
  /external/boringssl/src/ssl/
ssl_stat.cc 122 return "SSLv3 read server certificate A";
128 return "SSLv3 read server certificate request A";
137 return "SSLv3 write client certificate A";
143 return "SSLv3 write certificate verify A";
177 return "SSLv3 write certificate A";
186 return "SSLv3 read client certificate A";
195 return "SSLv3 read certificate verify A";
340 return "no certificate";
343 return "bad certificate";
346 return "unsupported certificate";
    [all...]
  /frameworks/base/wifi/tests/src/android/net/wifi/hotspot2/pps/
CredentialTest.java 47 * @param caCert CA certificate
73 * Helper function for generating certificate credential for testing.
136 * Verify parcel read/write for a certificate credential.
176 * Verify that an user credential without CA Certificate is invalid.
249 * Verify a certificate credential. CA Certificate, client certificate chain,
251 * certificate must match the fingerprint specified in the certificate credential.
262 * Verify that an certificate credential without CA Certificate is invalid
    [all...]
  /libcore/luni/src/test/java/tests/java/security/
IdentityTest.java 118 * verify addCertificate(Certificate certificate) adds a certificate for this identity.
119 * If the identity has a public key, the public key in the certificate must be the same
130 // try Certificate with different key
138 * verify addCertificate(Certificate certificate) adds a certificate for this identity.
139 * if the identity does not have a public key, the identity's public key is set to be that specified in the certificate.
152 * verify addCertificate(Certificate certificate) throws KeyManagementException if certificate is nul
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
HostnameVerifierTest.java 49 + "-----BEGIN CERTIFICATE-----\n"
73 + "-----END CERTIFICATE-----\n");
82 + "-----BEGIN CERTIFICATE-----\n"
106 + "-----END CERTIFICATE-----\n");
114 + "-----BEGIN CERTIFICATE-----\n"
139 + "-----END CERTIFICATE-----\n");
155 + "-----BEGIN CERTIFICATE-----\n"
180 + "-----END CERTIFICATE-----\n");
196 + "-----BEGIN CERTIFICATE-----\n"
220 + "-----END CERTIFICATE-----\n")
395 X509Certificate certificate = certificate("" local
545 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory4Test.java 35 import java.security.cert.Certificate;
59 // Test for method java.security.cert.Certificate
95 Collection<? extends Certificate> certs = fact.generateCertificates(is);
100 // the certificate could not be found, skip it
121 // the certificate could not be found, skip it
143 // the certificate could not be found, skip it
251 * extends Certificate> certificates)
257 (List<Certificate>) null);
290 "-----BEGIN CERTIFICATE-----\n"
304 + "-----END CERTIFICATE-----\n"
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
333 func certificateFromPEM(pemBytes string) (*Certificate, error) {
451 func chainToDebugString(chain []*Certificate) string {
466 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
485 -----END CERTIFICATE-----
488 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
511 -----END CERTIFICATE-----
514 const googleLeaf = `-----BEGIN CERTIFICATE-----
539 -----END CERTIFICATE----
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
333 func certificateFromPEM(pemBytes string) (*Certificate, error) {
451 func chainToDebugString(chain []*Certificate) string {
466 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
485 -----END CERTIFICATE-----
488 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
511 -----END CERTIFICATE-----
514 const googleLeaf = `-----BEGIN CERTIFICATE-----
539 -----END CERTIFICATE----
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/
CertificateID.java 38 * create from an issuer certificate and the serial number of the
39 * certificate it signed.
41 * @param issuerCert issuing certificate
70 * return the serial number for the certificate associated
116 * calculated for the same CA certificate.
119 * @param newSerialNumber the serial number for the new certificate of interest.
  /external/conscrypt/common/src/main/java/org/conscrypt/
SSLNullSession.java 21 import java.security.cert.Certificate;
85 public Certificate[] getLocalCertificates() {
102 throw new SSLPeerUnverifiedException("No peer certificate");
106 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
107 throw new SSLPeerUnverifiedException("No peer certificate");
122 throw new SSLPeerUnverifiedException("No peer certificate");
  /frameworks/base/core/tests/coretests/src/android/net/http/
SslCertificateTest.java 30 * Problematic certificate from Issue 1597
34 "-----BEGIN CERTIFICATE-----\n"+
44 "-----END CERTIFICATE-----\n";
55 * Problematic certificate from Issue 41662
59 "-----BEGIN CERTIFICATE-----\n"+
97 "-----END CERTIFICATE-----\n";
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
WiFiKeyManager.java 12 import java.security.cert.Certificate;
45 Certificate cert = mKeyStore.getCertificate(alias);
151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) {
152 if (certificate instanceof X509Certificate) {
153 certs.add((X509Certificate) certificate);
  /libcore/ojluni/src/main/java/java/security/cert/
CertPathChecker.java 29 * <p>Performs one or more checks on each {@code Certificate} of a
34 * may check for and process a critical private extension of each certificate
68 * Performs the check(s) on the specified certificate using its internal
72 * @param cert the {@code Certificate} to be checked
73 * @throws CertPathValidatorException if the specified certificate does
76 void check(Certificate cert) throws CertPathValidatorException;

Completed in 1750 milliseconds

<<11121314151617181920>>