HomeSort by relevance Sort by last modified time
    Searched refs:certificate (Results 226 - 250 of 832) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /compatibility/cdd/9_security-model/
9_4_alternate-execution-environments.md 22 the standard Android mechanisms of shared user ID and signing certificate.
  /external/boringssl/src/ssl/test/runner/
handshake_client.go 809 var chainToSend *Certificate
826 return errors.New("tls: non-empty certificate request context sent in handshake")
861 return errors.New("tls: unexpected OCSP response in the server certificate")
865 return errors.New("tls: unexpected SCT list in the server certificate")
869 return errors.New("tls: unexpected extensions in the server certificate")
929 // from the client certificate are read over these keys.
992 for _, certData := range chainToSend.Certificate {
    [all...]
  /external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/
TestSSLContext.java 33 import java.security.cert.Certificate;
347 * SSLContext with certificate and key as well as SSLServerSocket
362 * certificate chain from the given KeyStore and a TrustManager
391 public static void assertCertificateInKeyStore(Certificate certificate, KeyStore keyStore)
398 Certificate keyStoreCertificate = keyStore.getCertificate(alias);
399 if (certificate.equals(keyStoreCertificate)) {
407 X509TrustManager trustManager, Certificate[] serverChain) throws CertificateException {
412 X509TrustManager trustManager, Certificate[] clientChain) throws CertificateException {
  /external/webrtc/talk/app/webrtc/
webrtcsession.h 295 rtc::scoped_refptr<rtc::RTCCertificate>* certificate);
297 // Caller owns returned certificate
310 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate);
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.cert.Certificate;
51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest
65 + "-----END CERTIFICATE-----\n";
121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes());
156 Certificate[] res = event.getPeerCertificates();
554 * Implements basically a dummy TrustManager. It stores the certificate
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestSSLContext.java 33 import java.security.cert.Certificate;
241 * SSLContext with certificate and key as well as SSLServerSocket
314 * certificate chain from the given KeyStore and a TrustManager
347 public static void assertCertificateInKeyStore(Certificate certificate,
354 Certificate keyStoreCertificate = keyStore.getCertificate(alias);
355 if (certificate.equals(keyStoreCertificate)) {
364 Certificate[] serverChain)
371 Certificate[] clientChain)
  /packages/apps/Settings/src/com/android/settings/
TrustedCredentialsDialogBuilder.java 282 for (X509Certificate certificate : certificates) {
283 SslCertificate sslCert = new SslCertificate(certificate);
  /external/nanohttpd/
README.md 237 ### generating an self signed ssl certificate
239 Just a hint how to generate a certificate for localhost.
243 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
  /external/nanohttpd/src/site/markdown/
index.md 233 ### generating an self signed ssl certificate
235 Just a hint how to generate a certificate for localhost.
239 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
  /external/webrtc/webrtc/p2p/base/
dtlstransportchannel.h 94 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override;
101 // Returns false if no local certificate was set, or if the peer doesn't
140 // Once DTLS has been established, this method retrieves the certificate in
p2ptransportchannel.h 153 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override {
transportcontroller_unittest.cc 285 EXPECT_EQ(certificate1->identity()->certificate().ToPEMString(),
286 returned_certificate->identity()->certificate().ToPEMString());
297 EXPECT_EQ(certificate1->identity()->certificate().ToPEMString(),
298 returned_certificate->identity()->certificate().ToPEMString());
  /frameworks/av/drm/mediadrm/plugins/mock/
MockDrmCryptoPlugin.h 87 Vector<uint8_t> &certificate,
  /frameworks/av/media/libmedia/include/media/
Drm.h 77 Vector<uint8_t> &certificate,
DrmHal.h 98 Vector<uint8_t> &certificate,
IDrm.h 75 Vector<uint8_t> &certificate,
  /frameworks/base/core/java/android/security/net/config/
NetworkSecurityConfig.java 58 // non-override pin entries. This allows us to handle the case where a certificate is in
59 // multiple entry refs by returning the certificate from the first entry ref.
78 // If we see the same certificate in two TrustAnchors, one with overridesPins and one
81 // this can be simplified to just using the first occurrence of a certificate.
86 X509Certificate cert = anchor.certificate;
171 * <li>No certificate pinning is used.</li>
172 * <li>The system certificate store is trusted for connections.</li>
173 * <li>If the application targets API level 23 (Android M) or lower then the user certificate
175 * <li>Privileged applications do not trust the user certificate store on Android P and higher.
184 // System certificate store, does not bypass static pins
    [all...]
NetworkSecurityTrustManager.java 174 issuers[i++] = anchor.certificate;
  /frameworks/native/headers/media_plugin/media/drm/
DrmAPI.h 251 // provisioning server to retrieve a device certificate. getProvisionRequest
264 Vector<uint8_t> &certificate,
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_cgo_darwin.go 147 // "this certificate must be verified to a known trusted certificate"; aka not a root.
root_darwin.go 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
47 // 2. Run "security find-certificate" to dump the list of system root
65 args := []string{"find-certificate", "-a", "-p",
143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
  /prebuilts/go/linux-x86/src/crypto/x509/
root_cgo_darwin.go 147 // "this certificate must be verified to a known trusted certificate"; aka not a root.
root_darwin.go 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
47 // 2. Run "security find-certificate" to dump the list of system root
65 args := []string{"find-certificate", "-a", "-p",
143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
  /system/tpm/attestation/server/
attestation_service.h 116 kGetCertificate, // Issues a certificate for a TPM-backed key.
199 // Finishes a certificate request by decoding the |certificate_response| to
247 // Creates a PEM certificate chain from the credential fields of a |key|.
250 // Creates a certificate in PEM format from a DER encoded X.509 certificate.
251 std::string CreatePEMCertificate(const std::string& certificate);
254 // certificate. This decision factors in the currently signed-in |user| and
255 // the |origin| of the certificate request. The strategy is to find an index
  /frameworks/av/drm/libmediadrm/
IDrm.cpp 272 Vector<uint8_t> &certificate,
283 readVector(reply, certificate);
866 Vector<uint8_t> certificate; local
869 status_t result = provideProvisionResponse(response, certificate, wrappedKey);
870 writeVector(reply, certificate);
    [all...]

Completed in 545 milliseconds

1 2 3 4 5 6 7 8 91011>>