/external/webrtc/webrtc/p2p/base/ |
transportcontroller.cc | 76 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 78 &TransportController::SetLocalCertificate_w, this, certificate)); 83 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) { 86 transport_name, certificate)); 360 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 366 if (!certificate) { 369 certificate_ = certificate; 379 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) { 387 return t->GetLocalCertificate(certificate);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
SOAPParser.java | 122 <xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client certificate of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation> 131 <xsd:documentation>The issuer name of an acceptable provider-issued certificate. The text of this element is formatted in accordance with the Issuer Name field in RFC-3280. This element is present only when acceptProviderCerts is true.</xsd:documentation> 247 <xsd:documentation>Command to mobile to initiate certificate enrollment or re-enrollment and is a container for metadata to enable enrollment.</xsd:documentation> 253 <xsd:documentation>HTTPS URI of the server to be contacted to initiate certificate enrollment. The URI must contain an FQDN.</xsd:documentation> 258 <xsd:documentation>Temporary userid used by an EST client to authenticate to the EST server using HTTP Digest authentication. This element must be used for initial certificate enrollment; its use is optional for certificate re-enrollment.</xsd:documentation> 268 <xsd:documentation>Temporary password used by an EST client to authenticate to the EST server using HTTP Digest authentication. This element must be used for initial certificate enrollment; its use is optional for certificate re-enrollment.</xsd:documentation> 306 <xsd:enumeration value="Continue to use existing certificate"/>
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 136 * Specify no certificate type 143 * Specify X.509 certificate type 459 * This event type indicates that the app needs to request a certificate from [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server_test.go | 53 Certificates: make([]Certificate, 2), 59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 152 serverConfig.Certificates = make([]Certificate, 1) 153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 182 serverConfig.Certificates = make([]Certificate, 1) 183 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 377 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 379 Certificates: []Certificate{{ 380 Certificate: [][]byte{testRSACertificate} [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 53 Certificates: make([]Certificate, 2), 59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 152 serverConfig.Certificates = make([]Certificate, 1) 153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 182 serverConfig.Certificates = make([]Certificate, 1) 183 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 377 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 379 Certificates: []Certificate{{ 380 Certificate: [][]byte{testRSACertificate} [all...] |
/bootable/recovery/ |
verifier.cpp | 123 int verify_file(const unsigned char* addr, size_t length, const std::vector<Certificate>& keys, 273 if (key.key_type == Certificate::KEY_TYPE_RSA) { 282 } else if (key.key_type == Certificate::KEY_TYPE_EC && key.hash_len == SHA256_DIGEST_LENGTH) { 463 // A Certificate is a pair of an RSAPublicKey and a particular hash 476 bool load_keys(const char* filename, std::vector<Certificate>& certs) { 484 certs.emplace_back(0, Certificate::KEY_TYPE_RSA, nullptr, nullptr); 485 Certificate& cert = certs.back(); 492 cert.key_type = Certificate::KEY_TYPE_RSA; 500 cert.key_type = Certificate::KEY_TYPE_RSA; 505 cert.key_type = Certificate::KEY_TYPE_RSA [all...] |
/device/google/marlin/ |
wpa_supplicant_wcn.conf | 338 # TLS = EAP-TLS (client and server certificate) 358 # ca_cert: File path to CA certificate file (PEM/DER). This file can have one 360 # included, server certificate will not be verified. This is insecure and 361 # a trusted CA certificate should always be configured when using 365 # certificate store by setting this to cert_store://<name>, e.g., 368 # certificate store (My user account) is used, whereas computer store 370 # ca_path: Directory path for CA certificate files (PEM). This path may 376 # client_cert: File path to client certificate file (PEM/DER) 383 # commented out. Both the private key and certificate will be read from 386 # Windows certificate store can be used by leaving client_cert out an [all...] |
/device/google/wahoo/ |
wpa_supplicant_wcn.conf | 338 # TLS = EAP-TLS (client and server certificate) 358 # ca_cert: File path to CA certificate file (PEM/DER). This file can have one 360 # included, server certificate will not be verified. This is insecure and 361 # a trusted CA certificate should always be configured when using 365 # certificate store by setting this to cert_store://<name>, e.g., 368 # certificate store (My user account) is used, whereas computer store 370 # ca_path: Directory path for CA certificate files (PEM). This path may 376 # client_cert: File path to client certificate file (PEM/DER) 383 # commented out. Both the private key and certificate will be read from 386 # Windows certificate store can be used by leaving client_cert out an [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Pkcs7Verify.h | 39 verifies the signature of the content is valid and signing certificate was not
59 EFI_CERT_X509_GUID. Any hash certificate in AllowedDb
96 content, the signer's certificate was not found in
140 verifies the signature of the content is valid and signing certificate was not revoked
156 EFI_CERT_X509_GUID. Any hash certificate in AllowedDb
176 hash of content, the signer's certificate was not
|
/external/apache-http/android/src/android/net/http/ |
HttpsConnection.java | 145 * Sets the server SSL certificate associated with this 147 * @param certificate The SSL certificate 149 /* package */ void setCertificate(SslCertificate certificate) { 150 mCertificate = certificate; 313 // allow the certificate anyway.
|
/external/boringssl/src/crypto/x509/ |
x_x509.c | 212 * X509_AUX ASN1 routines. X509_AUX is the name given to a certificate with 213 * extra info tagged on the end. Since these functions set how a certificate 214 * is trusted they should only be used when the certificate comes from a 227 /* If certificate unreadable then forget it */ 247 * Serialize trusted certificate to *pp or just return the required buffer 281 * Serialize trusted certificate to *pp, or just return the required buffer
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 11 import java.security.cert.Certificate; 204 Certificate cert; 318 // pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.get(i)).getEncoded())); 325 // throw new CertificateEncodingException("can't encode certificate for PEM encoded path"); 349 * Return a DERObject containing the encoded certificate. 365 throw new CertificateEncodingException("Exception while encoding certificate: " + e.toString());
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
SslSessionWrapper.java | 29 import java.security.cert.Certificate; 107 throw new IOException("Can not read certificate " + i + "/" + count); 186 * Returns the signed certificate timestamp (SCT) received from the peer. The returned array 309 for (Certificate cert : peerCertificates) { 419 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 424 public Certificate[] getLocalCertificates() {
|
/external/webrtc/webrtc/base/ |
ssladapter_unittest.cc | 50 // Ignore any certificate errors for the purpose of testing. 51 // Note: We do this only because we don't have a real certificate. 136 // Generate a key pair and a certificate for this host. 157 // Since we don't have a real certificate anyway, the value here doesn't 242 // clients are not required to provide a certificate during handshake. 248 // Set a bogus peer certificate digest.
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.h | 227 * notify_cert - Notification of a peer certificate 229 * @depth: Depth in certificate chain (0 = server) 230 * @subject: Subject of the peer certificate 231 * @altsubject: Select fields from AltSubject of the peer certificate 233 * @cert_hash: SHA-256 hash of the certificate 234 * @cert: Peer certificate
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 247 * cert_cb - Notification of a peer certificate 249 * @depth: Depth in certificate chain (0 = server) 250 * @subject: Subject of the peer certificate 251 * @altsubject: Select fields from AltSubject of the peer certificate 253 * @cert_hash: SHA-256 hash of the certificate 254 * @cert: Peer certificate
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 156 # cert_in_cb - Whether to include a peer certificate dump in events 158 # its certificate chain are included in EAP peer certificate events. This is 501 # ca_cert: CA certificate for Interworking network selection 503 # client_cert: File path to client certificate file (PEM/DER) 505 # where client certificate/private key is used for authentication 518 # commented out. Both the private key and certificate will be read 526 # Windows certificate store can be used by leaving client_cert out and 536 # certificate store (My user account) is used, whereas computer store 626 # ocsp: Whether to use/require OCSP to check server certificate [all...] |
/frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/ |
UpdateParameter.java | 83 * Number of bytes for certificate SHA-256 fingerprint byte array. 158 * HTTPS URL for retrieving certificate for trust root. The trust root is used to validate 170 * SHA-256 fingerprint of the certificate located at {@link #trustRootCertUrl} 330 Log.d(TAG, "Missing trust root certificate URL"); 340 Log.d(TAG, "Missing trust root certificate SHA-256 fingerprint"); 344 Log.d(TAG, "Incorrect size of trust root certificate SHA-256 fingerprint: "
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
X509CertPath.java | 33 import java.security.cert.Certificate; 55 * That is, the issuer of one certificate is the subject of the following 104 public X509CertPath(List<? extends Certificate> certs) throws CertificateException { 109 // Note; The certs parameter is not necessarily to be of Certificate 113 // for (Certificate obj : certs) 299 ("Duplicate Certificate");
|
/system/ca-certificates/files/ |
10531352.0 | 1 -----BEGIN CERTIFICATE----- 24 -----END CERTIFICATE----- 25 Certificate: 30 Issuer: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Services Root Certificate Authority - G2 34 Subject: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Services Root Certificate Authority - G2 62 Certificate Sign, CRL Sign
|
2fa87019.0 | 1 -----BEGIN CERTIFICATE----- 23 -----END CERTIFICATE----- 24 Certificate: 30 Issuer: C=US, O=Network Solutions L.L.C., CN=Network Solutions Certificate Authority 34 Subject: C=US, O=Network Solutions L.L.C., CN=Network Solutions Certificate Authority 62 Certificate Sign, CRL Sign
|
75680d2e.0 | 1 -----BEGIN CERTIFICATE----- 25 -----END CERTIFICATE----- 26 Certificate: 31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services 35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services 63 Certificate Sign, CRL Sign
|
85cde254.0 | 1 -----BEGIN CERTIFICATE----- 23 -----END CERTIFICATE----- 24 Certificate: 29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2 33 Subject: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2 61 Certificate Sign, CRL Sign
|
bc3f2570.0 | 1 -----BEGIN CERTIFICATE----- 23 -----END CERTIFICATE----- 24 Certificate: 29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2 33 Subject: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2 61 Certificate Sign, CRL Sign
|
/system/ca-certificates/google/files/ |
02b73561.0 | 1 -----BEGIN CERTIFICATE----- 25 -----END CERTIFICATE----- 26 Certificate: 31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Secure Certificate Services 35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Secure Certificate Services 63 Certificate Sign, CRL Sign
|