/build/make/tools/releasetools/ |
check_ota_package_signature.py | 18 Verify a given OTA package with the specifed certificate. 50 """Verify the given package with the certificate. 65 print('Certificate: %s' % (cert,)) 149 parser.add_argument('certificate', help='The certificate to be used.') 153 verify_package(args.certificate, args.package)
|
/device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/ |
main.c | 92 /* Certificate file names (outputs) */ 149 /* Certificate files */ 180 printf("The certificate generation tool loads the binary images and\n" 228 /* TODO: Certificate filenames */ 414 * BL2 certificate (Trusted Boot Firmware certificate): 437 /* Create certificate. Signed with ROT key */ 445 * Trusted Key certificate: 471 * BL30 Key certificate (Trusted SCP Firmware Key certificate) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
CertUtils.java | 26 import org.bouncycastle.asn1.x509.Certificate; 59 throw new IllegalStateException("cannot produce certificate signature"); 71 throw new IllegalStateException("cannot produce attribute certificate signature"); 83 throw new IllegalStateException("cannot produce certificate signature"); 100 private static Certificate generateStructure(TBSCertificate tbsCert, AlgorithmIdentifier sigAlgId, byte[] signature) 108 return Certificate.getInstance(new DERSequence(v));
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
KeyManagerImpl.java | 27 import java.security.cert.Certificate; 104 Certificate[] certs = hash.get(alias).getCertificateChain(); 159 final Certificate[] chain = entry.getCertificateChain(); 160 final Certificate cert = chain[0]; 198 // check that a certificate in the chain was issued by one of the specified issuers 199 for (Certificate certFromChain : chain) {
|
/external/conscrypt/openjdk/src/test/resources/ |
ca-cert.pem | 0 Certificate: 6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 10 Subject: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen 44 -----BEGIN CERTIFICATE----- 61 -----END CERTIFICATE-----
|
cert-ct-embedded.pem | 0 Certificate: 6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 10 Subject: C=GB, O=Certificate Transparency, ST=Wales, L=Erw Wen 30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen 46 -----BEGIN CERTIFICATE----- 65 -----END CERTIFICATE-----
|
cert-ct-poisoned.pem | 0 Certificate: 6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 10 Subject: C=GB, O=Certificate Transparency, ST=Wales, L=Erw Wen 30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen 46 -----BEGIN CERTIFICATE----- 63 -----END CERTIFICATE-----
|
cert.pem | 0 Certificate: 6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 10 Subject: C=GB, O=Certificate Transparency, ST=Wales, L=Erw Wen 30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen 44 -----BEGIN CERTIFICATE----- 60 -----END CERTIFICATE-----
|
/external/curl/docs/libcurl/opts/ |
CURLINFO_TLS_SSL_PTR.3 | 44 This option may be useful for example to extract certificate information in a 114 certificate is allowed to change is allowed by your SSL library this may occur 115 and the certificate may change, and \fBdata may continue to be sent or received 117 pointer,\fP with the (possibly) changed certificate information. 120 be used to set a certificate verification callback in the CTX. That is safer 121 than using this option to poll for certificate changes and doesn't suffer from
|
/external/libmicrohttpd/src/testcurl/https/ |
test_https_sni.c | 41 * A hostname, server key and certificate. 57 /* Load the certificate and the private key. 80 "*** Error loading certificate file %s.\n", 90 "*** Error loading certificate file: %s\n", 161 "Need certificate for %.*s\n", 168 "Returning certificate for %.*s\n",
|
/external/mockwebserver/src/main/java/com/google/mockwebserver/ |
RecordedRequest.java | 22 import java.security.cert.Certificate; 46 private final Certificate[] sslLocalCertificates; 47 private final Certificate[] sslPeerCertificates; 66 Certificate[] peerCertificates = null; 216 public Certificate[] getSslLocalCertificates() { 234 public Certificate[] getSslPeerCertificates() {
|
/external/webrtc/talk/app/webrtc/test/ |
fakedtlsidentitystore.h | 58 "-----BEGIN CERTIFICATE-----\n" 68 "-----END CERTIFICATE-----\n"}, 84 "-----BEGIN CERTIFICATE-----\n" 98 "-----END CERTIFICATE-----\n"}}; 130 rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert); 168 rtc::SSLIdentity::PemToDer("CERTIFICATE", get_cert(), &cert);
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509CRL2Test.java | 26 import java.security.cert.Certificate; 41 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509CRL2Test 63 + "-----END CERTIFICATE-----\n"; 68 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 194 public boolean isRevoked(Certificate cert) {
|
PKIXBuilderParametersTest.java | 48 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:PKIXBuilderParametersTest 62 + "-----END CERTIFICATE-----\n"; 64 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 78 + "-----END CERTIFICATE-----\n"; 213 * <code>keystore</code> does not contain at least one trusted certificate 239 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 270 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 298 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 341 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
X509CRLEntry.java | 35 * <p>Abstract class for a revoked certificate in a CRL (Certificate 123 * @return the encoded form of this certificate 138 * the certificate issuer is also the CRL issuer, this method returns 177 * Returns the reason the certificate has been revoked, as specified 180 * @return the reason the certificate has been revoked, or
|
CertPathValidatorException.java | 43 * the index of the certificate in the certification path that caused the 67 * @serial the index of the certificate in the certification path 140 * @param index the index of the certificate in the certification path 162 * @param index the index of the certificate in the certification path 205 * Returns the index of the certificate in the certification path 218 * associated with the index of the certificate returned by 267 * The certificate is expired. 272 * The certificate is not yet valid. 277 * The certificate is revoked. 282 * The revocation status of the certificate could not be determined [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
PKIXMasterCertPathValidator.java | 43 * feeding each certificate to each <code>PKIXCertPathChecker</code>. 86 * current certificate, we verify the current certificate using 87 * information from the previous certificate and from the state, 89 * current certificate of this loop to be the previous certificate
|
Vertex.java | 41 * in the directory. The Vertex contains a certificate 68 * return the certificate for this vertex 79 * certificate. 90 * certificate. 130 * certificate information. 132 * @returns String representation of certificate info
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
CertificateSerialNumber.java | 36 * This class defines the SerialNumber attribute for the Certificate. 45 * get, set, delete methods of Certificate, x509 type. 58 * Default constructor for the certificate attribute. 60 * @param serial the serial number for the certificate. 67 * Default constructor for the certificate attribute. 69 * @param serial the serial number for the certificate.
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
EmailClientConnectionManager.java | 50 * A {@link KeyManager} to track client certificate requests from servers. 86 * Ensures that a client SSL certificate is known to be used for the specified connection 103 LogUtils.i(Logging.LOG_TAG, "Registering socket factory for certificate alias [" 116 * Unregisters a custom connection type that uses a client certificate on the connection 144 * Builds a unique scheme name for an SSL connection that uses a client user certificate. 155 * a client SSL certificate by any servers
|
/system/tpm/attestation/server/ |
pkcs11_key_store.cc | 222 const std::string& certificate) { 322 if (!certificate.empty()) { 326 if (!GetCertificateFields(certificate, &subject, &issuer, &serial_number)) { 327 LOG(WARNING) << "Pkcs11KeyStore: Failed to find certificate fields."; 329 // Construct a PKCS #11 template for a certificate object. 330 std::string mutable_certificate = certificate; 350 LOG(ERROR) << "Pkcs11KeyStore: Failed to create certificate object."; 363 const std::string& certificate) { 375 if (DoesCertificateExist(session.handle(), certificate)) { 376 LOG(INFO) << "Pkcs11KeyStore: Certificate already exists." [all...] |
pkcs11_key_store.h | 67 const std::string& certificate) override; 69 const std::string& certificate) override; 105 // X.509 |certificate|. Returns false if the value cannot be determined. 106 bool GetCertificateFields(const std::string& certificate, 111 // Returns true iff the given certificate already exists in the token. 113 const std::string& certificate);
|
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/ |
Pkcs7VerifyDxe.c | 197 Check whether the hash of an given certificate is revoked by the revocation database.
199 @param[in] Certificate Pointer to the certificate that is searched for.
200 @param[in] CertSize Size of certificate in bytes.
202 structures which contains list of X.509 certificate
204 @param[out] RevocationTime Return the time that the certificate was revoked.
206 @return TRUE The certificate hash is found in the revocation database.
207 @return FALSE The certificate hash is not found in the revocation database.
212 IN UINT8 *Certificate,
233 // Retrieve the TBSCertificate from the X.509 Certificate for hash calculation [all...] |
/external/autotest/client/site_tests/network_DestinationVerification/ |
network_DestinationVerification.py | 38 "certificate":"-----BEGIN CERTIFICATE-----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\\nMYLrTwMQfGuUaaaKko6ldKIrovjrcPloQr1Hxb2bipFcjLmG7nxQLoS6vQ==\\n-----END CERTIFICATE-----\\n", 64 "certificate": "-----BEGIN CERTIFICATE-----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\\nNg7k4Sfif5iktYT4VRKpThe0EGJNfqKJKYtvHEVC\\n-----END CERTIFICATE-----\\n", 91 "certificate": "-----BEGIN CERTIFICATE-----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\\nf6nQGB1Ej8Klsxlo8B+rmQ6N8C7f48GMI8s=\\n-----END CERTIFICATE-----\\n", 233 message.certificate = sign_bundle['certificate' [all...] |
/external/libcups/cups/ |
tls-darwin.c | 76 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair. 99 SecCertificateRef cert = NULL; /* Self-signed certificate */ 153 * Create a self-signed certificate using the public/private key pair... 184 DEBUG_puts("1cupsMakeServerCredentials: Unable to create self-signed certificate."); 271 * Run the "certtool" command to generate a self-signed certificate... 278 * Create a file with the certificate information fields... 288 "CUPS Self-Signed Certificate\n" 289 /* Enter key and certificate label */ 437 SecCertificateRef secCert; /* Certificate reference */ 438 CFDataRef data; /* Certificate data * [all...] |