HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 926 - 950 of 2776) sorted by null

<<31323334353637383940>>

  /external/webrtc/webrtc/p2p/base/
transportcontroller.cc 76 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
78 &TransportController::SetLocalCertificate_w, this, certificate));
83 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) {
86 transport_name, certificate));
360 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
366 if (!certificate) {
369 certificate_ = certificate;
379 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) {
387 return t->GetLocalCertificate(certificate);
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
SOAPParser.java 122 <xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client certificate of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation>
131 <xsd:documentation>The issuer name of an acceptable provider-issued certificate. The text of this element is formatted in accordance with the Issuer Name field in RFC-3280. This element is present only when acceptProviderCerts is true.</xsd:documentation>
247 <xsd:documentation>Command to mobile to initiate certificate enrollment or re-enrollment and is a container for metadata to enable enrollment.</xsd:documentation>
253 <xsd:documentation>HTTPS URI of the server to be contacted to initiate certificate enrollment. The URI must contain an FQDN.</xsd:documentation>
258 <xsd:documentation>Temporary userid used by an EST client to authenticate to the EST server using HTTP Digest authentication. This element must be used for initial certificate enrollment; its use is optional for certificate re-enrollment.</xsd:documentation>
268 <xsd:documentation>Temporary password used by an EST client to authenticate to the EST server using HTTP Digest authentication. This element must be used for initial certificate enrollment; its use is optional for certificate re-enrollment.</xsd:documentation>
306 <xsd:enumeration value="Continue to use existing certificate"/>
  /frameworks/base/media/java/android/media/
MediaDrm.java 136 * Specify no certificate type
143 * Specify X.509 certificate type
459 * This event type indicates that the app needs to request a certificate from
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server_test.go 53 Certificates: make([]Certificate, 2),
59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
152 serverConfig.Certificates = make([]Certificate, 1)
153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
182 serverConfig.Certificates = make([]Certificate, 1)
183 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
377 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
379 Certificates: []Certificate{{
380 Certificate: [][]byte{testRSACertificate}
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server_test.go 53 Certificates: make([]Certificate, 2),
59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
152 serverConfig.Certificates = make([]Certificate, 1)
153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
182 serverConfig.Certificates = make([]Certificate, 1)
183 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
377 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
379 Certificates: []Certificate{{
380 Certificate: [][]byte{testRSACertificate}
    [all...]
  /bootable/recovery/
verifier.cpp 123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys,
273 if (key.key_type == Certificate::KEY_TYPE_RSA) {
282 } else if (key.key_type == Certificate::KEY_TYPE_EC && key.hash_len == SHA256_DIGEST_LENGTH) {
463 // A Certificate is a pair of an RSAPublicKey and a particular hash
476 bool load_keys(const char* filename, std::vector<Certificate>& certs) {
484 certs.emplace_back(0, Certificate::KEY_TYPE_RSA, nullptr, nullptr);
485 Certificate& cert = certs.back();
492 cert.key_type = Certificate::KEY_TYPE_RSA;
500 cert.key_type = Certificate::KEY_TYPE_RSA;
505 cert.key_type = Certificate::KEY_TYPE_RSA
    [all...]
  /device/google/marlin/
wpa_supplicant_wcn.conf 338 # TLS = EAP-TLS (client and server certificate)
358 # ca_cert: File path to CA certificate file (PEM/DER). This file can have one
360 # included, server certificate will not be verified. This is insecure and
361 # a trusted CA certificate should always be configured when using
365 # certificate store by setting this to cert_store://<name>, e.g.,
368 # certificate store (My user account) is used, whereas computer store
370 # ca_path: Directory path for CA certificate files (PEM). This path may
376 # client_cert: File path to client certificate file (PEM/DER)
383 # commented out. Both the private key and certificate will be read from
386 # Windows certificate store can be used by leaving client_cert out an
    [all...]
  /device/google/wahoo/
wpa_supplicant_wcn.conf 338 # TLS = EAP-TLS (client and server certificate)
358 # ca_cert: File path to CA certificate file (PEM/DER). This file can have one
360 # included, server certificate will not be verified. This is insecure and
361 # a trusted CA certificate should always be configured when using
365 # certificate store by setting this to cert_store://<name>, e.g.,
368 # certificate store (My user account) is used, whereas computer store
370 # ca_path: Directory path for CA certificate files (PEM). This path may
376 # client_cert: File path to client certificate file (PEM/DER)
383 # commented out. Both the private key and certificate will be read from
386 # Windows certificate store can be used by leaving client_cert out an
    [all...]
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Pkcs7Verify.h 39 verifies the signature of the content is valid and signing certificate was not
59 EFI_CERT_X509_GUID. Any hash certificate in AllowedDb
96 content, the signer's certificate was not found in
140 verifies the signature of the content is valid and signing certificate was not revoked
156 EFI_CERT_X509_GUID. Any hash certificate in AllowedDb
176 hash of content, the signer's certificate was not
  /external/apache-http/android/src/android/net/http/
HttpsConnection.java 145 * Sets the server SSL certificate associated with this
147 * @param certificate The SSL certificate
149 /* package */ void setCertificate(SslCertificate certificate) {
150 mCertificate = certificate;
313 // allow the certificate anyway.
  /external/boringssl/src/crypto/x509/
x_x509.c 212 * X509_AUX ASN1 routines. X509_AUX is the name given to a certificate with
213 * extra info tagged on the end. Since these functions set how a certificate
214 * is trusted they should only be used when the certificate comes from a
227 /* If certificate unreadable then forget it */
247 * Serialize trusted certificate to *pp or just return the required buffer
281 * Serialize trusted certificate to *pp, or just return the required buffer
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 11 import java.security.cert.Certificate;
204 Certificate cert;
318 // pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded()));
325 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path");
349 * Return a DERObject containing the encoded certificate.
365 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
  /external/conscrypt/common/src/main/java/org/conscrypt/
SslSessionWrapper.java 29 import java.security.cert.Certificate;
107 throw new IOException("Can not read certificate " + i + "/" + count);
186 * Returns the signed certificate timestamp (SCT) received from the peer. The returned array
309 for (Certificate cert : peerCertificates) {
419 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
424 public Certificate[] getLocalCertificates() {
  /external/webrtc/webrtc/base/
ssladapter_unittest.cc 50 // Ignore any certificate errors for the purpose of testing.
51 // Note: We do this only because we don't have a real certificate.
136 // Generate a key pair and a certificate for this host.
157 // Since we don't have a real certificate anyway, the value here doesn't
242 // clients are not required to provide a certificate during handshake.
248 // Set a bogus peer certificate digest.
  /external/wpa_supplicant_8/src/eap_peer/
eap.h 227 * notify_cert - Notification of a peer certificate
229 * @depth: Depth in certificate chain (0 = server)
230 * @subject: Subject of the peer certificate
231 * @altsubject: Select fields from AltSubject of the peer certificate
233 * @cert_hash: SHA-256 hash of the certificate
234 * @cert: Peer certificate
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 247 * cert_cb - Notification of a peer certificate
249 * @depth: Depth in certificate chain (0 = server)
250 * @subject: Subject of the peer certificate
251 * @altsubject: Select fields from AltSubject of the peer certificate
253 * @cert_hash: SHA-256 hash of the certificate
254 * @cert: Peer certificate
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 156 # cert_in_cb - Whether to include a peer certificate dump in events
158 # its certificate chain are included in EAP peer certificate events. This is
501 # ca_cert: CA certificate for Interworking network selection
503 # client_cert: File path to client certificate file (PEM/DER)
505 # where client certificate/private key is used for authentication
518 # commented out. Both the private key and certificate will be read
526 # Windows certificate store can be used by leaving client_cert out and
536 # certificate store (My user account) is used, whereas computer store
626 # ocsp: Whether to use/require OCSP to check server certificate
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/
UpdateParameter.java 83 * Number of bytes for certificate SHA-256 fingerprint byte array.
158 * HTTPS URL for retrieving certificate for trust root. The trust root is used to validate
170 * SHA-256 fingerprint of the certificate located at {@link #trustRootCertUrl}
330 Log.d(TAG, "Missing trust root certificate URL");
340 Log.d(TAG, "Missing trust root certificate SHA-256 fingerprint");
344 Log.d(TAG, "Incorrect size of trust root certificate SHA-256 fingerprint: "
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
X509CertPath.java 33 import java.security.cert.Certificate;
55 * That is, the issuer of one certificate is the subject of the following
104 public X509CertPath(List<? extends Certificate> certs) throws CertificateException {
109 // Note; The certs parameter is not necessarily to be of Certificate
113 // for (Certificate obj : certs)
299 ("Duplicate Certificate");
  /system/ca-certificates/files/
10531352.0 1 -----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----
25 Certificate:
30 Issuer: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Services Root Certificate Authority - G2
34 Subject: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Services Root Certificate Authority - G2
62 Certificate Sign, CRL Sign
2fa87019.0 1 -----BEGIN CERTIFICATE-----
23 -----END CERTIFICATE-----
24 Certificate:
30 Issuer: C=US, O=Network Solutions L.L.C., CN=Network Solutions Certificate Authority
34 Subject: C=US, O=Network Solutions L.L.C., CN=Network Solutions Certificate Authority
62 Certificate Sign, CRL Sign
75680d2e.0 1 -----BEGIN CERTIFICATE-----
25 -----END CERTIFICATE-----
26 Certificate:
31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
63 Certificate Sign, CRL Sign
85cde254.0 1 -----BEGIN CERTIFICATE-----
23 -----END CERTIFICATE-----
24 Certificate:
29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
33 Subject: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
61 Certificate Sign, CRL Sign
bc3f2570.0 1 -----BEGIN CERTIFICATE-----
23 -----END CERTIFICATE-----
24 Certificate:
29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
33 Subject: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
61 Certificate Sign, CRL Sign
  /system/ca-certificates/google/files/
02b73561.0 1 -----BEGIN CERTIFICATE-----
25 -----END CERTIFICATE-----
26 Certificate:
31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Secure Certificate Services
35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Secure Certificate Services
63 Certificate Sign, CRL Sign

Completed in 417 milliseconds

<<31323334353637383940>>