/compatibility/cdd/9_security-model/ |
9_4_alternate-execution-environments.md | 22 the standard Android mechanisms of shared user ID and signing certificate.
|
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 809 var chainToSend *Certificate 826 return errors.New("tls: non-empty certificate request context sent in handshake") 861 return errors.New("tls: unexpected OCSP response in the server certificate") 865 return errors.New("tls: unexpected SCT list in the server certificate") 869 return errors.New("tls: unexpected extensions in the server certificate") 929 // from the client certificate are read over these keys. 992 for _, certData := range chainToSend.Certificate { [all...] |
/external/conscrypt/testing/src/main/java/org/conscrypt/javax/net/ssl/ |
TestSSLContext.java | 33 import java.security.cert.Certificate; 347 * SSLContext with certificate and key as well as SSLServerSocket 362 * certificate chain from the given KeyStore and a TrustManager 391 public static void assertCertificateInKeyStore(Certificate certificate, KeyStore keyStore) 398 Certificate keyStoreCertificate = keyStore.getCertificate(alias); 399 if (certificate.equals(keyStoreCertificate)) { 407 X509TrustManager trustManager, Certificate[] serverChain) throws CertificateException { 412 X509TrustManager trustManager, Certificate[] clientChain) throws CertificateException {
|
/external/webrtc/talk/app/webrtc/ |
webrtcsession.h | 295 rtc::scoped_refptr<rtc::RTCCertificate>* certificate); 297 // Caller owns returned certificate 310 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate);
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.cert.Certificate; 51 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 65 + "-----END CERTIFICATE-----\n"; 121 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 156 Certificate[] res = event.getPeerCertificates(); 554 * Implements basically a dummy TrustManager. It stores the certificate
|
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 33 import java.security.cert.Certificate; 241 * SSLContext with certificate and key as well as SSLServerSocket 314 * certificate chain from the given KeyStore and a TrustManager 347 public static void assertCertificateInKeyStore(Certificate certificate, 354 Certificate keyStoreCertificate = keyStore.getCertificate(alias); 355 if (certificate.equals(keyStoreCertificate)) { 364 Certificate[] serverChain) 371 Certificate[] clientChain)
|
/packages/apps/Settings/src/com/android/settings/ |
TrustedCredentialsDialogBuilder.java | 282 for (X509Certificate certificate : certificates) { 283 SslCertificate sslCert = new SslCertificate(certificate);
|
/external/nanohttpd/ |
README.md | 237 ### generating an self signed ssl certificate 239 Just a hint how to generate a certificate for localhost. 243 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
|
/external/nanohttpd/src/site/markdown/ |
index.md | 233 ### generating an self signed ssl certificate 235 Just a hint how to generate a certificate for localhost. 239 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
|
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel.h | 94 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override; 101 // Returns false if no local certificate was set, or if the peer doesn't 140 // Once DTLS has been established, this method retrieves the certificate in
|
p2ptransportchannel.h | 153 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override {
|
transportcontroller_unittest.cc | 285 EXPECT_EQ(certificate1->identity()->certificate().ToPEMString(), 286 returned_certificate->identity()->certificate().ToPEMString()); 297 EXPECT_EQ(certificate1->identity()->certificate().ToPEMString(), 298 returned_certificate->identity()->certificate().ToPEMString());
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
MockDrmCryptoPlugin.h | 87 Vector<uint8_t> &certificate,
|
/frameworks/av/media/libmedia/include/media/ |
Drm.h | 77 Vector<uint8_t> &certificate,
|
DrmHal.h | 98 Vector<uint8_t> &certificate,
|
IDrm.h | 75 Vector<uint8_t> &certificate,
|
/frameworks/base/core/java/android/security/net/config/ |
NetworkSecurityConfig.java | 58 // non-override pin entries. This allows us to handle the case where a certificate is in 59 // multiple entry refs by returning the certificate from the first entry ref. 78 // If we see the same certificate in two TrustAnchors, one with overridesPins and one 81 // this can be simplified to just using the first occurrence of a certificate. 86 X509Certificate cert = anchor.certificate; 171 * <li>No certificate pinning is used.</li> 172 * <li>The system certificate store is trusted for connections.</li> 173 * <li>If the application targets API level 23 (Android M) or lower then the user certificate 175 * <li>Privileged applications do not trust the user certificate store on Android P and higher. 184 // System certificate store, does not bypass static pins [all...] |
NetworkSecurityTrustManager.java | 174 issuers[i++] = anchor.certificate;
|
/frameworks/native/headers/media_plugin/media/drm/ |
DrmAPI.h | 251 // provisioning server to retrieve a device certificate. getProvisionRequest 264 Vector<uint8_t> &certificate,
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_cgo_darwin.go | 147 // "this certificate must be verified to a known trusted certificate"; aka not a root.
|
root_darwin.go | 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) { 47 // 2. Run "security find-certificate" to dump the list of system root 65 args := []string{"find-certificate", "-a", "-p", 143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 { 160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_cgo_darwin.go | 147 // "this certificate must be verified to a known trusted certificate"; aka not a root.
|
root_darwin.go | 27 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) { 47 // 2. Run "security find-certificate" to dump the list of system root 65 args := []string{"find-certificate", "-a", "-p", 143 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 { 160 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
|
/system/tpm/attestation/server/ |
attestation_service.h | 116 kGetCertificate, // Issues a certificate for a TPM-backed key. 199 // Finishes a certificate request by decoding the |certificate_response| to 247 // Creates a PEM certificate chain from the credential fields of a |key|. 250 // Creates a certificate in PEM format from a DER encoded X.509 certificate. 251 std::string CreatePEMCertificate(const std::string& certificate); 254 // certificate. This decision factors in the currently signed-in |user| and 255 // the |origin| of the certificate request. The strategy is to find an index
|
/frameworks/av/drm/libmediadrm/ |
IDrm.cpp | 272 Vector<uint8_t> &certificate, 283 readVector(reply, certificate); 866 Vector<uint8_t> certificate; local 869 status_t result = provideProvisionResponse(response, certificate, wrappedKey); 870 writeVector(reply, certificate); [all...] |