HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 626 - 650 of 2776) sorted by null

<<21222324252627282930>>

  /cts/tests/tests/net/src/android/net/http/cts/
X509TrustManagerExtensionsTest.java 22 import java.security.cert.Certificate;
51 for (Certificate cert : tm.getAcceptedIssuers()) {
  /cts/tests/tests/security/src/android/security/cts/
X509CertChainBuildingTest.java 40 * Test that all {@link X509TrustManager} build the correct certificate chain during
42 * multiple possible certificate paths exist.
50 * First certificate graph:
55 * leaf1: Certificate issued by rootA
63 * Second certificate graph:
108 // First try a path that doesn't have the cross signed A to B certificate.
137 // certificates over bridge versions of the same certificate.
189 * Asserts that all PKIX TrustManagerFactory providers build the expected certificate path or
  /development/testrunner/
create_test.py 75 LOCAL_PACKAGE_NAME := ${MODULE_NAME}Tests${CERTIFICATE}
152 # include certificate definition if existent in makefile
153 certificate = mk.GetVariable(mk.CERTIFICATE)
154 if certificate:
155 cert_definition = ("\n%s := %s" % (mk.CERTIFICATE, certificate))
160 mapping = {"MODULE_NAME":module_name, "CERTIFICATE":cert_definition}
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/
PeiCryptLib.uni 11 // Diffie-Hellman functions, X.509 certificate handler functions, authenticode
30 #string STR_MODULE_DESCRIPTION #language en-US "Caution: This module requires additional review when modified. This library will have external input - signature. This external input must be validated carefully to avoid security issues such as buffer overflow or integer overflow. Note: MD4 Digest functions, HMAC-MD5 functions, HMAC-SHA1 functions, AES/ TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign functions, Diffie-Hellman functions, X.509 certificate handler functions, authenticode signature verification functions, PEM handler functions, and pseudorandom number generator functions are not supported in this instance."
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/
BaseCryptLibRuntimeCryptProtocol.uni 8 // functions, Diffie-Hellman functions, X.509 certificate handler functions,
28 #string STR_MODULE_DESCRIPTION #language en-US "This instance will be only used by the Authenticated Variable driver for IPF. Note: MD4/MD5/SHA1 Digest functions, HMAC-MD5 functions, HMAC-SHA1 functions, AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify functions, Diffie-Hellman functions, X.509 certificate handler functions, authenticode signature verification functions, PEM handler functions, pseudorandom number generator functions, and Sha256Duplicate() are not supported in this instance."
  /external/boringssl/src/crypto/pkcs7/
internal.h 25 /* pkcs7_parse_header reads the non-certificate/non-CRL prefix of a PKCS#7
36 * |cb| with a CBB to which certificate or CRL data can be written, and the
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
JcaSignerInfoGeneratorBuilder.java 81 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate)
84 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
  /external/conscrypt/platform/src/main/java/org/conscrypt/
TrustManagerImpl.java 46 import java.security.cert.Certificate;
93 * Comparator used for ordering trust anchors during certificate path building.
326 * Returns the full trusted certificate chain found from {@code certs}.
343 * Returns the full trusted certificate chain found from {@code certs}.
414 throw new CertificateException("No subjectAltNames on the certificate match");
483 // Initialize the chain to contain the leaf certificate. This potentially could be a trust
485 // complete trusted chain for additional validation such as certificate pinning.
500 * Recursively build certificate chains until a valid chain is found or all possible paths are
505 * certificate and ends in the final trusted root certificate
    [all...]
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
CTVerifier.java 51 * Verify a certificate chain for transparency.
52 * Signed timestamps are extracted from the leaf certificate, TLS extension, and stapled ocsp
77 * Verify a list of SCTs which were embedded from an X509 certificate.
112 * Verify a list of SCTs which were not embedded in an X509 certificate, that is received
139 * Verify a single SCT for the given Certificate Entry
211 * @param chain certificate chain for which to get SCTs. Must contain at least the leaf and it's
238 * Extract a list of SignedCertificateTimestamp embedded in an X509 certificate.
240 * If the certificate does not contain any SCT extension, or the encompassing encoded list fails
  /external/curl/docs/libcurl/opts/
CURLOPT_PROXY_SSLCERTTYPE.3 25 CURLOPT_PROXY_SSLCERTTYPE \- specify type of the proxy client SSL certificate
33 the format of your certificate. Supported formats are "PEM" and "DER", except
CURLOPT_SSLCERTTYPE.3 25 CURLOPT_SSLCERTTYPE \- specify type of the client SSL certificate
32 the format of your certificate. Supported formats are "PEM" and "DER", except
CURLOPT_SSL_VERIFYSTATUS.3 25 CURLOPT_SSL_VERIFYSTATUS \- verify the certificate's status
34 using the "Certificate Status Request" TLS extension (aka. OCSP stapling).
  /external/webrtc/webrtc/base/
rtccertificate.h 32 // Checks if the certificate has expired, where |now| is expressed in ms
39 // raw SSLIdentity* for the sake of accessing SSLIdentity::certificate().
  /frameworks/base/keystore/java/android/security/keystore/
AttestationUtils.java 76 * Performs attestation of the device's identifiers. This method returns a certificate chain
80 * trustworthy CA key. Otherwise, the chain will be rooted at an untrusted certificate. See
82 * Key Attestation</a> for the format of the certificate extension.
95 * @param attestationChallenge a blob to include in the certificate alongside the device
98 * @return a certificate chain containing the requested device identifiers in the first element
176 // Extract certificate chain.
179 throw new DeviceIdAttestationException("Attestation certificate chain contained "
191 throw new DeviceIdAttestationException("Unable to construct certificate chain", e);
  /libcore/ojluni/src/main/java/java/security/cert/
CertificateExpiredException.java 29 * Certificate Expired Exception. This is thrown whenever the current
32 * of the certificate.
CertificateNotYetValidException.java 29 * Certificate is not yet valid exception. This is thrown whenever
31 * is before the {@code notBefore} date/time in the Certificate
  /libcore/ojluni/src/main/java/sun/security/util/
CertConstraintParameters.java 35 // A certificate being passed to check against constraints.
38 // This is true if the trust anchor in the certificate chain matches a cert
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertStoreSpi.java 32 import java.security.cert.Certificate;
51 public Collection<Certificate> engineGetCertificates(CertSelector selector)
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
CertificateRequestor.java 29 * a certificate to use for establishing secure connections in the Email app.
58 * Callback for the certificate request. Does not happen on the UI thread.
  /packages/apps/KeyChain/res/values-ro/
strings.xml 20 <string name="title_no_certs" msgid="8350009443064722873">"Nu au fost g?site certificate"</string>
24 <string name="install_new_cert_message" msgid="4451971501142085495">"Pute?i instala certificate dintr-un fi?ier PKCS#12 cu o extensie %1$s sau %2$s care se afl? pe stocarea extern?."</string>
  /prebuilts/go/darwin-x86/src/net/http/internal/
testcert.go 11 var LocalhostCert = []byte(`-----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----`)
  /prebuilts/go/linux-x86/src/net/http/internal/
testcert.go 11 var LocalhostCert = []byte(`-----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----`)
  /system/tpm/attestation/server/
mock_key_store.h 54 const std::string& certificate));
57 const std::string& certificate));
  /tools/apksig/src/test/resources/com/android/apksig/
rsa-8192.x509.pem 1 -----BEGIN CERTIFICATE-----
50 -----END CERTIFICATE-----
  /external/wpa_supplicant_8/src/tls/
x509v3.c 2 * X.509v3 certificate parsing and processing (RFC 3280 profile)
42 * x509_certificate_free - Free an X.509 certificate
43 * @cert: Certificate to be freed
64 * x509_certificate_free - Free an X.509 certificate chain
65 * @cert: Pointer to the first certificate in the chain
142 * x509_name_compare - Compare X.509 certificate names
143 * @a: Certificate name
144 * @b: Certificate name
452 wpa_printf(MSG_INFO, "X509: Reject certificate with "
494 * x509_name_string - Convert an X.509 certificate name into a strin
    [all...]

Completed in 455 milliseconds

<<21222324252627282930>>