OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:certificate
(Results
626 - 650
of
2776
) sorted by null
<<
21
22
23
24
25
26
27
28
29
30
>>
/cts/tests/tests/net/src/android/net/http/cts/
X509TrustManagerExtensionsTest.java
22
import java.security.cert.
Certificate
;
51
for (
Certificate
cert : tm.getAcceptedIssuers()) {
/cts/tests/tests/security/src/android/security/cts/
X509CertChainBuildingTest.java
40
* Test that all {@link X509TrustManager} build the correct
certificate
chain during
42
* multiple possible
certificate
paths exist.
50
* First
certificate
graph:
55
* leaf1:
Certificate
issued by rootA
63
* Second
certificate
graph:
108
// First try a path that doesn't have the cross signed A to B
certificate
.
137
// certificates over bridge versions of the same
certificate
.
189
* Asserts that all PKIX TrustManagerFactory providers build the expected
certificate
path or
/development/testrunner/
create_test.py
75
LOCAL_PACKAGE_NAME := ${MODULE_NAME}Tests${
CERTIFICATE
}
152
# include
certificate
definition if existent in makefile
153
certificate
= mk.GetVariable(mk.
CERTIFICATE
)
154
if
certificate
:
155
cert_definition = ("\n%s := %s" % (mk.
CERTIFICATE
,
certificate
))
160
mapping = {"MODULE_NAME":module_name, "
CERTIFICATE
":cert_definition}
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/
PeiCryptLib.uni
11
// Diffie-Hellman functions, X.509
certificate
handler functions, authenticode
30
#string STR_MODULE_DESCRIPTION #language en-US "Caution: This module requires additional review when modified. This library will have external input - signature. This external input must be validated carefully to avoid security issues such as buffer overflow or integer overflow. Note: MD4 Digest functions, HMAC-MD5 functions, HMAC-SHA1 functions, AES/ TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign functions, Diffie-Hellman functions, X.509
certificate
handler functions, authenticode signature verification functions, PEM handler functions, and pseudorandom number generator functions are not supported in this instance."
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/
BaseCryptLibRuntimeCryptProtocol.uni
8
// functions, Diffie-Hellman functions, X.509
certificate
handler functions,
28
#string STR_MODULE_DESCRIPTION #language en-US "This instance will be only used by the Authenticated Variable driver for IPF. Note: MD4/MD5/SHA1 Digest functions, HMAC-MD5 functions, HMAC-SHA1 functions, AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify functions, Diffie-Hellman functions, X.509
certificate
handler functions, authenticode signature verification functions, PEM handler functions, pseudorandom number generator functions, and Sha256Duplicate() are not supported in this instance."
/external/boringssl/src/crypto/pkcs7/
internal.h
25
/* pkcs7_parse_header reads the non-
certificate
/non-CRL prefix of a PKCS#7
36
* |cb| with a CBB to which
certificate
or CRL data can be written, and the
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
JcaSignerInfoGeneratorBuilder.java
81
public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate
certificate
)
84
return this.build(contentSigner, new JcaX509CertificateHolder(
certificate
));
/external/conscrypt/platform/src/main/java/org/conscrypt/
TrustManagerImpl.java
46
import java.security.cert.
Certificate
;
93
* Comparator used for ordering trust anchors during
certificate
path building.
326
* Returns the full trusted
certificate
chain found from {@code certs}.
343
* Returns the full trusted
certificate
chain found from {@code certs}.
414
throw new CertificateException("No subjectAltNames on the
certificate
match");
483
// Initialize the chain to contain the leaf
certificate
. This potentially could be a trust
485
// complete trusted chain for additional validation such as
certificate
pinning.
500
* Recursively build
certificate
chains until a valid chain is found or all possible paths are
505
*
certificate
and ends in the final trusted root
certificate
[
all
...]
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/
CTVerifier.java
51
* Verify a
certificate
chain for transparency.
52
* Signed timestamps are extracted from the leaf
certificate
, TLS extension, and stapled ocsp
77
* Verify a list of SCTs which were embedded from an X509
certificate
.
112
* Verify a list of SCTs which were not embedded in an X509
certificate
, that is received
139
* Verify a single SCT for the given
Certificate
Entry
211
* @param chain
certificate
chain for which to get SCTs. Must contain at least the leaf and it's
238
* Extract a list of SignedCertificateTimestamp embedded in an X509
certificate
.
240
* If the
certificate
does not contain any SCT extension, or the encompassing encoded list fails
/external/curl/docs/libcurl/opts/
CURLOPT_PROXY_SSLCERTTYPE.3
25
CURLOPT_PROXY_SSLCERTTYPE \- specify type of the proxy client SSL
certificate
33
the format of your
certificate
. Supported formats are "PEM" and "DER", except
CURLOPT_SSLCERTTYPE.3
25
CURLOPT_SSLCERTTYPE \- specify type of the client SSL
certificate
32
the format of your
certificate
. Supported formats are "PEM" and "DER", except
CURLOPT_SSL_VERIFYSTATUS.3
25
CURLOPT_SSL_VERIFYSTATUS \- verify the
certificate
's status
34
using the "
Certificate
Status Request" TLS extension (aka. OCSP stapling).
/external/webrtc/webrtc/base/
rtccertificate.h
32
// Checks if the
certificate
has expired, where |now| is expressed in ms
39
// raw SSLIdentity* for the sake of accessing SSLIdentity::
certificate
().
/frameworks/base/keystore/java/android/security/keystore/
AttestationUtils.java
76
* Performs attestation of the device's identifiers. This method returns a
certificate
chain
80
* trustworthy CA key. Otherwise, the chain will be rooted at an untrusted
certificate
. See
82
* Key Attestation</a> for the format of the
certificate
extension.
95
* @param attestationChallenge a blob to include in the
certificate
alongside the device
98
* @return a
certificate
chain containing the requested device identifiers in the first element
176
// Extract
certificate
chain.
179
throw new DeviceIdAttestationException("Attestation
certificate
chain contained "
191
throw new DeviceIdAttestationException("Unable to construct
certificate
chain", e);
/libcore/ojluni/src/main/java/java/security/cert/
CertificateExpiredException.java
29
*
Certificate
Expired Exception. This is thrown whenever the current
32
* of the
certificate
.
CertificateNotYetValidException.java
29
*
Certificate
is not yet valid exception. This is thrown whenever
31
* is before the {@code notBefore} date/time in the
Certificate
/libcore/ojluni/src/main/java/sun/security/util/
CertConstraintParameters.java
35
// A
certificate
being passed to check against constraints.
38
// This is true if the trust anchor in the
certificate
chain matches a cert
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertStoreSpi.java
32
import java.security.cert.
Certificate
;
51
public Collection<
Certificate
> engineGetCertificates(CertSelector selector)
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
CertificateRequestor.java
29
* a
certificate
to use for establishing secure connections in the Email app.
58
* Callback for the
certificate
request. Does not happen on the UI thread.
/packages/apps/KeyChain/res/values-ro/
strings.xml
20
<string name="title_no_certs" msgid="8350009443064722873">"Nu au fost g?site
certificate
"</string>
24
<string name="install_new_cert_message" msgid="4451971501142085495">"Pute?i instala
certificate
dintr-un fi?ier PKCS#12 cu o extensie %1$s sau %2$s care se afl? pe stocarea extern?."</string>
/prebuilts/go/darwin-x86/src/net/http/internal/
testcert.go
11
var LocalhostCert = []byte(`-----BEGIN
CERTIFICATE
-----
24
-----END
CERTIFICATE
-----`)
/prebuilts/go/linux-x86/src/net/http/internal/
testcert.go
11
var LocalhostCert = []byte(`-----BEGIN
CERTIFICATE
-----
24
-----END
CERTIFICATE
-----`)
/system/tpm/attestation/server/
mock_key_store.h
54
const std::string&
certificate
));
57
const std::string&
certificate
));
/tools/apksig/src/test/resources/com/android/apksig/
rsa-8192.x509.pem
1
-----BEGIN
CERTIFICATE
-----
50
-----END
CERTIFICATE
-----
/external/wpa_supplicant_8/src/tls/
x509v3.c
2
* X.509v3
certificate
parsing and processing (RFC 3280 profile)
42
* x509_certificate_free - Free an X.509
certificate
43
* @cert:
Certificate
to be freed
64
* x509_certificate_free - Free an X.509
certificate
chain
65
* @cert: Pointer to the first
certificate
in the chain
142
* x509_name_compare - Compare X.509
certificate
names
143
* @a:
Certificate
name
144
* @b:
Certificate
name
452
wpa_printf(MSG_INFO, "X509: Reject
certificate
with "
494
* x509_name_string - Convert an X.509
certificate
name into a strin
[
all
...]
Completed in 455 milliseconds
<<
21
22
23
24
25
26
27
28
29
30
>>