/external/boringssl/src/ssl/ |
tls13_both.cc | 129 CBS certificate, extensions; local 130 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate) || 132 CBS_len(&certificate) == 0) { 139 pkey = ssl_cert_parse_pubkey(&certificate); 145 // TLS 1.3 always uses certificate keys for signing thus the correct 147 if (!ssl_cert_check_digital_signature_key_usage(&certificate)) { 153 // Retain the hash of the leaf certificate if requested. 154 SHA256(CBS_data(&certificate), CBS_len(&certificate), 160 CRYPTO_BUFFER_new_from_CBS(&certificate, ssl->ctx->pool)) [all...] |
/external/curl/docs/cmdline-opts/ |
connect-to.d | 12 used for TLS/SSL (e.g. SNI, certificate verification) or for the application
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 28 import java.security.cert.Certificate; 62 * Returns an input stream containing one or more certificate PEM files. This implementation just 72 + "-----BEGIN CERTIFICATE-----\n" 105 + "-----END CERTIFICATE-----\n"; 107 + "-----BEGIN CERTIFICATE-----\n" 133 + "-----END CERTIFICATE-----\n"; 146 * set. This is useful in development where certificate authority-trusted certificates aren't 147 * available. Or in production, to avoid reliance on third-party certificate authorities. 155 * operational complexity and limit your ability to migrate between certificate authorities. Do 162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in) [all...] |
/external/webrtc/talk/app/webrtc/ |
webrtcsessiondescriptionfactory.h | 98 // generate a certificate. 107 // |certificate|. 111 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate, 173 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate);
|
/external/webrtc/webrtc/p2p/base/ |
transport.h | 187 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {} 189 // Get a copy of the local certificate provided by SetLocalCertificate. 191 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) { 195 // Get a copy of the remote certificate in use by the specified channel.
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertSelectorTest.java | 22 import java.security.cert.Certificate; 155 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { 156 byte[] encoded = certificate.getEncoded();
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 7 import java.security.cert.Certificate; 24 // creating a certificate 25 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerImpl 39 + "-----END CERTIFICATE-----\n"; 41 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 44 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 58 + "-----END CERTIFICATE-----\n"; 63 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 82 + "-----END CERTIFICATE-----\n" [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to 31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for") 33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for") 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 113 template := x509.Certificate{ 142 log.Fatalf("Failed to create certificate: %s", err) 149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|
conn_test.go | 79 Certificates: []Certificate{ 81 Certificate: [][]byte{fromHex(certExampleCom)}, 84 Certificate: [][]byte{fromHex(certWildcardExampleCom)}, 87 Certificate: [][]byte{fromHex(certFooExampleCom)}, 90 Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)}, 97 pointerToIndex := func(c *Certificate) int { 106 certificateForName := func(name string) *Certificate { 111 t.Errorf("unable to get certificate for name '%s': %s", name, err) 119 t.Errorf("example.com returned certificate %d, not 0", n) 122 t.Errorf("bar.example.com returned certificate %d, not 1", n [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test_import.go | 28 template := x509.Certificate{ 40 panic("failed to create certificate with basic imports: " + err.Error())
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 7 // Generate a self-signed X.509 certificate for a TLS server. Outputs to 31 host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for") 33 validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for") 34 isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority") 113 template := x509.Certificate{ 142 log.Fatalf("Failed to create certificate: %s", err) 149 pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|
conn_test.go | 79 Certificates: []Certificate{ 81 Certificate: [][]byte{fromHex(certExampleCom)}, 84 Certificate: [][]byte{fromHex(certWildcardExampleCom)}, 87 Certificate: [][]byte{fromHex(certFooExampleCom)}, 90 Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)}, 97 pointerToIndex := func(c *Certificate) int { 106 certificateForName := func(name string) *Certificate { 111 t.Errorf("unable to get certificate for name '%s': %s", name, err) 119 t.Errorf("example.com returned certificate %d, not 0", n) 122 t.Errorf("bar.example.com returned certificate %d, not 1", n [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test_import.go | 28 template := x509.Certificate{ 40 panic("failed to create certificate with basic imports: " + err.Error())
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/scripts/ |
ca.conf | 17 # The root key and root certificate. 19 certificate = $dir/certs/ca.cert.pem 21 # For certificate revocation lists. 46 # The root key and root certificate. 48 certificate = $dir/certs/intermediate.cert.pem 50 # For certificate revocation lists. 130 nsComment = "OpenSSL Generated Client Certificate" 140 nsComment = "OpenSSL Generated Server Certificate"
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509CRL.java | 31 import java.security.cert.Certificate; 299 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { 300 if (certificate instanceof OpenSSLX509Certificate) { 301 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate; 316 return getRevokedCertificate(certificate.getSerialNumber()); 369 public boolean isRevoked(Certificate cert) { 382 throw new RuntimeException("cannot convert certificate", e);
|
/external/webrtc/webrtc/base/ |
sslfingerprint.cc | 28 return Create(algorithm, &(identity->certificate()));
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/ |
TestData.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
ConfigParser.java | 33 import java.security.cert.Certificate; 125 * [base64 encoded X509 CA certificate data] 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 135 * (required), CA (Certificate Authority) certificate (optional), and client 136 * certificate chain (optional). 185 // Parse CA (Certificate Authority) certificate. 191 throw new IOException("Failed to parse CA Certificate"); 195 // Parse PKCS12 data for client private key and certificate chain [all...] |
/prebuilts/go/darwin-x86/src/net/http/httptest/ |
server.go | 39 // certificate is a parsed version of the TLS config certificate, if present. 40 certificate *x509.Certificate 139 s.TLS.Certificates = []tls.Certificate{cert} 141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0]) 146 certpool.AddCert(s.certificate) 263 // Certificate returns the certificate used by the server, or nil i [all...] |
/prebuilts/go/linux-x86/src/net/http/httptest/ |
server.go | 39 // certificate is a parsed version of the TLS config certificate, if present. 40 certificate *x509.Certificate 139 s.TLS.Certificates = []tls.Certificate{cert} 141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0]) 146 certpool.AddCert(s.certificate) 263 // Certificate returns the certificate used by the server, or nil i [all...] |
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/ |
TestKeyStore.java | 40 import java.security.cert.Certificate; 211 .subject("CN=Test Root Certificate Authority") 218 .subject("CN=Test Intermediate Certificate Authority ECDSA") 226 .subject("CN=Test Intermediate Certificate Authority") 262 .subject("CN=Test Root Certificate Authority 2") 267 .subject("CN=Test Intermediate Certificate Authority") 300 * Return a server keystore with a matched RSA certificate and 301 * private key as well as a CA certificate. 309 * Return a keystore with a CA certificate 317 * Return a client keystore with a matched RSA certificate an 826 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 878 Certificate certificate = certificateEntry.getTrustedCertificate(); local 970 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/external/libcups/cups/ |
http-private.h | 118 extern bool SecCertificateIsValid(SecCertificateRef certificate, CFAbsoluteTime verifyTime); 119 extern CFAbsoluteTime SecCertificateNotValidAfter(SecCertificateRef certificate); 121 extern SecIdentityRef SecIdentityCreate(CFAllocatorRef allocator, SecCertificateRef certificate, SecKeyRef privateKey); 246 PCCERT_CONTEXT localCert, /* Local certificate */ 247 remoteCert; /* Remote (peer's) certificate */
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 67 import java.security.cert.Certificate; 208 .subject("CN=Test Root Certificate Authority") 215 .subject("CN=Test Intermediate Certificate Authority ECDSA") 223 .subject("CN=Test Intermediate Certificate Authority") 259 .subject("CN=Test Root Certificate Authority 2") 264 .subject("CN=Test Intermediate Certificate Authority") 297 * Return a server keystore with a matched RSA certificate and 298 * private key as well as a CA certificate. 306 * Return a keystore with a CA certificate 314 * Return a client keystore with a matched RSA certificate an 841 X509Certificate certificate = (X509Certificate) privateKey.getCertificate(); local 894 Certificate certificate = certificateEntry.getTrustedCertificate(); local 986 Certificate certificate = certificateEntry.getTrustedCertificate(); local [all...] |
/frameworks/base/core/java/android/util/apk/ |
ApkSignatureSchemeV2Verifier.java | 338 X509Certificate certificate; local 340 certificate = (X509Certificate) 343 throw new SecurityException("Failed to decode certificate #" + certificateCount, e); 345 certificate = new VerbatimX509Certificate( 346 certificate, encodedCert); 347 certs.add(certificate); 357 "Public key mismatch between certificate and signature record");
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
V2SchemeVerifier.java | 345 X509Certificate certificate; local 347 certificate = 363 certificate = new GuaranteedEncodedFormX509Certificate(certificate, encodedCert); 364 result.certs.add(certificate);
|