HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 651 - 675 of 2776) sorted by null

<<21222324252627282930>>

  /build/make/tools/releasetools/
check_ota_package_signature.py 18 Verify a given OTA package with the specifed certificate.
50 """Verify the given package with the certificate.
65 print('Certificate: %s' % (cert,))
149 parser.add_argument('certificate', help='The certificate to be used.')
153 verify_package(args.certificate, args.package)
  /device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/
main.c 92 /* Certificate file names (outputs) */
149 /* Certificate files */
180 printf("The certificate generation tool loads the binary images and\n"
228 /* TODO: Certificate filenames */
414 * BL2 certificate (Trusted Boot Firmware certificate):
437 /* Create certificate. Signed with ROT key */
445 * Trusted Key certificate:
471 * BL30 Key certificate (Trusted SCP Firmware Key certificate)
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
CertUtils.java 26 import org.bouncycastle.asn1.x509.Certificate;
59 throw new IllegalStateException("cannot produce certificate signature");
71 throw new IllegalStateException("cannot produce attribute certificate signature");
83 throw new IllegalStateException("cannot produce certificate signature");
100 private static Certificate generateStructure(TBSCertificate tbsCert, AlgorithmIdentifier sigAlgId, byte[] signature)
108 return Certificate.getInstance(new DERSequence(v));
  /external/conscrypt/common/src/main/java/org/conscrypt/
KeyManagerImpl.java 27 import java.security.cert.Certificate;
104 Certificate[] certs = hash.get(alias).getCertificateChain();
159 final Certificate[] chain = entry.getCertificateChain();
160 final Certificate cert = chain[0];
198 // check that a certificate in the chain was issued by one of the specified issuers
199 for (Certificate certFromChain : chain) {
  /external/conscrypt/openjdk/src/test/resources/
ca-cert.pem 0 Certificate:
6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen
10 Subject: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen
30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen
44 -----BEGIN CERTIFICATE-----
61 -----END CERTIFICATE-----
cert-ct-embedded.pem 0 Certificate:
6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen
10 Subject: C=GB, O=Certificate Transparency, ST=Wales, L=Erw Wen
30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen
46 -----BEGIN CERTIFICATE-----
65 -----END CERTIFICATE-----
cert-ct-poisoned.pem 0 Certificate:
6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen
10 Subject: C=GB, O=Certificate Transparency, ST=Wales, L=Erw Wen
30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen
46 -----BEGIN CERTIFICATE-----
63 -----END CERTIFICATE-----
cert.pem 0 Certificate:
6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen
10 Subject: C=GB, O=Certificate Transparency, ST=Wales, L=Erw Wen
30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen
44 -----BEGIN CERTIFICATE-----
60 -----END CERTIFICATE-----
  /external/curl/docs/libcurl/opts/
CURLINFO_TLS_SSL_PTR.3 44 This option may be useful for example to extract certificate information in a
114 certificate is allowed to change is allowed by your SSL library this may occur
115 and the certificate may change, and \fBdata may continue to be sent or received
117 pointer,\fP with the (possibly) changed certificate information.
120 be used to set a certificate verification callback in the CTX. That is safer
121 than using this option to poll for certificate changes and doesn't suffer from
  /external/libmicrohttpd/src/testcurl/https/
test_https_sni.c 41 * A hostname, server key and certificate.
57 /* Load the certificate and the private key.
80 "*** Error loading certificate file %s.\n",
90 "*** Error loading certificate file: %s\n",
161 "Need certificate for %.*s\n",
168 "Returning certificate for %.*s\n",
  /external/mockwebserver/src/main/java/com/google/mockwebserver/
RecordedRequest.java 22 import java.security.cert.Certificate;
46 private final Certificate[] sslLocalCertificates;
47 private final Certificate[] sslPeerCertificates;
66 Certificate[] peerCertificates = null;
216 public Certificate[] getSslLocalCertificates() {
234 public Certificate[] getSslPeerCertificates() {
  /external/webrtc/talk/app/webrtc/test/
fakedtlsidentitystore.h 58 "-----BEGIN CERTIFICATE-----\n"
68 "-----END CERTIFICATE-----\n"},
84 "-----BEGIN CERTIFICATE-----\n"
98 "-----END CERTIFICATE-----\n"}};
130 rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert);
168 rtc::SSLIdentity::PemToDer("CERTIFICATE", get_cert(), &cert);
  /libcore/luni/src/test/java/tests/security/cert/
X509CRL2Test.java 26 import java.security.cert.Certificate;
41 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRL2Test
63 + "-----END CERTIFICATE-----\n";
68 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
194 public boolean isRevoked(Certificate cert) {
PKIXBuilderParametersTest.java 48 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:PKIXBuilderParametersTest
62 + "-----END CERTIFICATE-----\n";
64 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
78 + "-----END CERTIFICATE-----\n";
213 * <code>keystore</code> does not contain at least one trusted certificate
239 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
270 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
298 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
341 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
X509CRLEntry.java 35 * <p>Abstract class for a revoked certificate in a CRL (Certificate
123 * @return the encoded form of this certificate
138 * the certificate issuer is also the CRL issuer, this method returns
177 * Returns the reason the certificate has been revoked, as specified
180 * @return the reason the certificate has been revoked, or
CertPathValidatorException.java 43 * the index of the certificate in the certification path that caused the
67 * @serial the index of the certificate in the certification path
140 * @param index the index of the certificate in the certification path
162 * @param index the index of the certificate in the certification path
205 * Returns the index of the certificate in the certification path
218 * associated with the index of the certificate returned by
267 * The certificate is expired.
272 * The certificate is not yet valid.
277 * The certificate is revoked.
282 * The revocation status of the certificate could not be determined
    [all...]
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
PKIXMasterCertPathValidator.java 43 * feeding each certificate to each <code>PKIXCertPathChecker</code>.
86 * current certificate, we verify the current certificate using
87 * information from the previous certificate and from the state,
89 * current certificate of this loop to be the previous certificate
Vertex.java 41 * in the directory. The Vertex contains a certificate
68 * return the certificate for this vertex
79 * certificate.
90 * certificate.
130 * certificate information.
132 * @returns String representation of certificate info
  /libcore/ojluni/src/main/java/sun/security/x509/
CertificateSerialNumber.java 36 * This class defines the SerialNumber attribute for the Certificate.
45 * get, set, delete methods of Certificate, x509 type.
58 * Default constructor for the certificate attribute.
60 * @param serial the serial number for the certificate.
67 * Default constructor for the certificate attribute.
69 * @param serial the serial number for the certificate.
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
EmailClientConnectionManager.java 50 * A {@link KeyManager} to track client certificate requests from servers.
86 * Ensures that a client SSL certificate is known to be used for the specified connection
103 LogUtils.i(Logging.LOG_TAG, "Registering socket factory for certificate alias ["
116 * Unregisters a custom connection type that uses a client certificate on the connection
144 * Builds a unique scheme name for an SSL connection that uses a client user certificate.
155 * a client SSL certificate by any servers
  /system/tpm/attestation/server/
pkcs11_key_store.cc 222 const std::string& certificate) {
322 if (!certificate.empty()) {
326 if (!GetCertificateFields(certificate, &subject, &issuer, &serial_number)) {
327 LOG(WARNING) << "Pkcs11KeyStore: Failed to find certificate fields.";
329 // Construct a PKCS #11 template for a certificate object.
330 std::string mutable_certificate = certificate;
350 LOG(ERROR) << "Pkcs11KeyStore: Failed to create certificate object.";
363 const std::string& certificate) {
375 if (DoesCertificateExist(session.handle(), certificate)) {
376 LOG(INFO) << "Pkcs11KeyStore: Certificate already exists."
    [all...]
pkcs11_key_store.h 67 const std::string& certificate) override;
69 const std::string& certificate) override;
105 // X.509 |certificate|. Returns false if the value cannot be determined.
106 bool GetCertificateFields(const std::string& certificate,
111 // Returns true iff the given certificate already exists in the token.
113 const std::string& certificate);
  /device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/
Pkcs7VerifyDxe.c 197 Check whether the hash of an given certificate is revoked by the revocation database.
199 @param[in] Certificate Pointer to the certificate that is searched for.
200 @param[in] CertSize Size of certificate in bytes.
202 structures which contains list of X.509 certificate
204 @param[out] RevocationTime Return the time that the certificate was revoked.
206 @return TRUE The certificate hash is found in the revocation database.
207 @return FALSE The certificate hash is not found in the revocation database.
212 IN UINT8 *Certificate,
233 // Retrieve the TBSCertificate from the X.509 Certificate for hash calculation
    [all...]
  /external/autotest/client/site_tests/network_DestinationVerification/
network_DestinationVerification.py 38 "certificate":"-----BEGIN CERTIFICATE-----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\\nMYLrTwMQfGuUaaaKko6ldKIrovjrcPloQr1Hxb2bipFcjLmG7nxQLoS6vQ==\\n-----END CERTIFICATE-----\\n",
64 "certificate": "-----BEGIN CERTIFICATE-----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\\nNg7k4Sfif5iktYT4VRKpThe0EGJNfqKJKYtvHEVC\\n-----END CERTIFICATE-----\\n",
91 "certificate": "-----BEGIN CERTIFICATE-----\\nMIIDpjCCAo4CBFFfTz8wDQYJKoZIhvcNAQEFBQAwfTELMAkGA1UEBhMCVVMxEzAR\\nBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDU1vdW50YWluIFZpZXcxEzARBgNV\\nBAoMCkdvb2dsZSBJbmMxEjAQBgNVBAsMCUdvb2dsZSBUVjEYMBYGA1UEAwwPRXVy\\nZWthIEdlbjEgSUNBMB4XDTEzMDQwNTIyMjUwM1oXDTMzMDMzMTIyMjUwM1owgYAx\\nCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRMwEQYDVQQKEwpHb29n\\nbGUgSW5jMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MRIwEAYDVQQLEwlHb29nbGUg\\nVFYxGzAZBgNVBAMTElpaQUlNIEZBOEZDQTMwMDgyNjCCASIwDQYJKoZIhvcNAQEB\\nBQADggEPADCCAQoCggEBALmAGRcIQt/k7WfoUHDCWQhzQ/FrHDnNiHcVj09Tyu7/\\n2pIB+pVnLac8pfFwdVAcDG4xmjnROIHeajz627uq8bHEVDfPCHe8WiM+CsPrMC85\\nlQOq8rBwNw3WO82suvWL8wjdqFy0uQHajp9e9ix3FXzfZDAuf7ABHmVZnPMWQz0a\\nR3zDCCF2NhEVhBwq+IGKNNvuIPhVF/5tkdWPmihFukJabmV2kjFUuPbEf4T1OMu+\\nhyqZ+lsTc/XVIqICRIq9ZE36MquAw0g9Hoah8OFFpkq2xJqlCY+HKvdhiA1HybfY\\nXSxOsI2rTQk3YHFMrAGMu16UYuOA+CRHD+UC8SI0fqkCAwEAAaMvMC0wCQYDVR0T\\nBAIwADALBgNVHQ8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcN\\nAQEFBQADggEBAJGyWBoDvwZBlDcyX31l5kwGVf6nVZR4KedcQMGpm76C6fgzeLHt\\nAq7OQhZgifFVLvzG7kqYgRRsW7WQKTF/QmHn8rnCdY16YtZv3vFzLbdBWkmSqAxD\\nqmBum9oD74AYeJaR0v68KCGvAVG0juRSs3H93s8k/fhY+LespUMlHwB4DwRYxDNP\\nIu3HX8NEmOBwjodKDDa8yu1weYUf8GFXH3b+tu7IHRzQpPzbSSibs+AXc8WbJWk3\\nrtQSugqegiiM/OAdRuSvkXtc1DJP9F7OLsVpF9i/VZ2k/QDPCu06vXB2w3wlRyR3\\nf6nQGB1Ej8Klsxlo8B+rmQ6N8C7f48GMI8s=\\n-----END CERTIFICATE-----\\n",
233 message.certificate = sign_bundle['certificate'
    [all...]
  /external/libcups/cups/
tls-darwin.c 76 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair.
99 SecCertificateRef cert = NULL; /* Self-signed certificate */
153 * Create a self-signed certificate using the public/private key pair...
184 DEBUG_puts("1cupsMakeServerCredentials: Unable to create self-signed certificate.");
271 * Run the "certtool" command to generate a self-signed certificate...
278 * Create a file with the certificate information fields...
288 "CUPS Self-Signed Certificate\n"
289 /* Enter key and certificate label */
437 SecCertificateRef secCert; /* Certificate reference */
438 CFDataRef data; /* Certificate data *
    [all...]

Completed in 477 milliseconds

<<21222324252627282930>>