HomeSort by relevance Sort by last modified time
    Searched refs:certificate (Results 26 - 50 of 832) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
CertificateEntry.java 57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */
58 private final byte[] certificate; field in class:CertificateEntry
60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) {
73 this.certificate = certificate;
87 throw new CertificateException("Certificate does not contain embedded signed timestamps");
118 return certificate;
132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
  /system/keymaster/km_openssl/
attestation_utils.cpp 73 inline keymaster_blob_t certBlobifier(X509* certificate, bool* fail){
74 int len = i2d_X509(certificate, nullptr);
87 i2d_X509(certificate, &p);
143 * position in the newly created certificate chain. E.g., makeCertChain(emptyCert(), someCertChain)
149 * will take possession of secondary resources for the certificate blobs so that someCertChain is
201 X509* certificate) {
260 if (!X509_add_ext(certificate, key_usage_extension.get() /* Don't release; copied */,
268 bool add_public_key(EVP_PKEY* key, X509* certificate, keymaster_error_t* error) {
269 if (!X509_set_pubkey(certificate, key)) {
280 X509* certificate,
    [all...]
  /build/soong/java/
app.go 35 // path to a certificate, or the name of a certificate in the default
36 // certificate directory, or blank to use the default product certificate
37 Certificate *string
61 certificate certificate
76 type certificate struct { type
143 c := String(a.appProperties.Certificate)
147 a.certificate = certificate{pem, key
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
JcaSignerInfoVerifierBuilder.java 72 public SignerInformationVerifier build(X509Certificate certificate)
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
JcaSimpleSignerInfoVerifierBuilder.java 42 public SignerInformationVerifier build(X509Certificate certificate)
45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider());
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
65 return new JcaContentVerifierProviderBuilder().build(certificate);
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
  /external/curl/docs/cmdline-opts/
proxy-cacert.d 2 Help: CA certificate to verify peer against for proxy
ssl-no-revoke.d 5 (WinSSL) This option tells curl to disable certificate revocation checks.
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CertificatePinning.java 23 import java.security.cert.Certificate;
47 for (Certificate certificate : response.handshake().peerCertificates()) {
48 System.out.println(CertificatePinner.pin(certificate));
  /libcore/ojluni/src/main/java/java/security/
Identity.java 99 Vector<Certificate> certificates;
189 certificates = new Vector<Certificate>();
225 * Adds a certificate for this identity. If the identity has a public
226 * key, the public key in the certificate must be the same, and if
228 * public key is set to be that specified in the certificate.
232 * as its argument to see if it's ok to add a certificate.
234 * @param certificate the certificate to be added.
236 * @exception KeyManagementException if the certificate is not valid,
237 * if the public key in the certificate being added conflicts wit
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_nacl.go 7 // Possible certificate files; stop after finding one.
  /prebuilts/go/linux-x86/src/crypto/x509/
root_nacl.go 7 // Possible certificate files; stop after finding one.
  /system/tpm/attestation/server/
key_store.h 61 // If a non-empty |certificate| is provided it will be registered along with
69 const std::string& certificate) = 0;
71 // Registers a |certificate| that is not associated to a registered key. The
72 // certificate will be associated with |username|.
74 const std::string& certificate) = 0;
pkcs11_key_store.h 67 const std::string& certificate) override;
69 const std::string& certificate) override;
105 // X.509 |certificate|. Returns false if the value cannot be determined.
106 bool GetCertificateFields(const std::string& certificate,
111 // Returns true iff the given certificate already exists in the token.
113 const std::string& certificate);
  /device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/
fip_create.sh 26 --fwu-cert FILENAME Non-Trusted Firmware Updater certificate
34 --rot-cert FILENAME Root Of Trust key certificate
35 --trusted-key-cert FILENAME Trusted key certificate
36 --scp-fw-key-cert FILENAME SCP Firmware key certificate
37 --soc-fw-key-cert FILENAME SoC Firmware key certificate
38 --tos-fw-key-cert FILENAME Trusted OS Firmware key certificate
39 --nt-fw-key-cert FILENAME Non-Trusted Firmware key certificate
40 --tb-fw-cert FILENAME Trusted Boot Firmware BL2 certificate
41 --scp-fw-cert FILENAME SCP Firmware content certificate
42 --soc-fw-cert FILENAME SoC Firmware content certificate
    [all...]
  /external/apache-http/android/src/android/net/http/
LoggingEventHandler.java 69 public void certificate(SslCertificate certificate) { method in class:LoggingEventHandler
71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
  /prebuilts/go/darwin-x86/src/crypto/tls/
alert.go 52 alertBadCertificate: "bad certificate",
53 alertUnsupportedCertificate: "unsupported certificate",
54 alertCertificateRevoked: "revoked certificate",
55 alertCertificateExpired: "expired certificate",
56 alertCertificateUnknown: "unknown certificate",
58 alertUnknownCA: "unknown certificate authority",
  /prebuilts/go/linux-x86/src/crypto/tls/
alert.go 52 alertBadCertificate: "bad certificate",
53 alertUnsupportedCertificate: "unsupported certificate",
54 alertCertificateRevoked: "revoked certificate",
55 alertCertificateExpired: "expired certificate",
56 alertCertificateUnknown: "unknown certificate",
58 alertUnknownCA: "unknown certificate authority",
  /external/avb/libavb_atx/
avb_atx_validate.c 77 /* Verifies the format, key version, usage, and signature of a certificate. */
78 static bool verify_certificate(AvbAtxCertificate* certificate,
85 if (certificate->signed_data.version != 1) {
86 avb_error("Unsupported certificate format.\n");
90 sha512((const uint8_t*)&certificate->signed_data,
95 certificate->signature,
101 avb_error("Invalid certificate signature.\n");
104 if (certificate->signed_data.key_version < minimum_key_version) {
108 if (0 != avb_safe_memcmp(certificate->signed_data.usage,
111 avb_error("Invalid certificate usage.\n")
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
HostnameVerifierTest.java 49 + "-----BEGIN CERTIFICATE-----\n"
73 + "-----END CERTIFICATE-----\n");
84 + "-----BEGIN CERTIFICATE-----\n"
108 + "-----END CERTIFICATE-----\n");
118 + "-----BEGIN CERTIFICATE-----\n"
143 + "-----END CERTIFICATE-----\n");
159 + "-----BEGIN CERTIFICATE-----\n"
184 + "-----END CERTIFICATE-----\n");
200 + "-----BEGIN CERTIFICATE-----\n"
224 + "-----END CERTIFICATE-----\n")
409 X509Certificate certificate = certificate("" local
561 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest
    [all...]
CertificatePinnerChainValidationTest.java 42 /** The pinner should pull the root certificate from the trust manager. */
55 HeldCertificate certificate = new HeldCertificate.Builder() local
61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate))
64 .addTrustedCertificate(rootCa.certificate)
72 .certificateChain(certificate, intermediateCa)
110 HeldCertificate certificate = new HeldCertificate.Builder() local
116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate))
119 .addTrustedCertificate(rootCa.certificate)
127 .certificateChain(certificate, intermediateCa)
153 // Start with a trusted root CA certificate
    [all...]
  /external/webrtc/webrtc/p2p/base/
dtlstransport.h 34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate)
36 certificate_(certificate),
45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override {
46 certificate_ = certificate;
49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override {
53 *certificate = certificate_;
  /external/webrtc/webrtc/base/
opensslidentity.h 51 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object,
74 // Compute the digest of the certificate given algorithm
80 // Compute the digest of a certificate as an X509 *
100 // Holds a keypair and certificate together, and a method to generate
108 const std::string& certificate);
111 const OpenSSLCertificate& certificate() const override;
114 // Configure an SSL context object to use our key and certificate.
118 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate);
  /libcore/ojluni/src/main/java/java/security/cert/
X509CRL.java 46 * Abstract class for an X.509 Certificate Revocation List (CRL).
48 * It is signed by a Certificate Authority (CA) and made freely
51 * <p>Each revoked certificate is
52 * identified in a CRL by its certificate serial number. When a
53 * certificate-using system uses a certificate (e.g., for verifying a
55 * certificate signature and validity but also acquires a suitably-
56 * recent CRL and checks that the certificate serial number is not on
61 * entry may be removed when the certificate expiration date is reached.
73 * Public Key Infrastructure Certificate and CRL Profile</a>
    [all...]
  /tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/zfile/
ZFiles.java 79 * @param certificate the {@link X509Certificate} used to sign the archive, or
96 @Nullable X509Certificate certificate,
117 if (key != null && certificate != null) {
121 certificate,
  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
SslContextBuilder.java 26 import java.security.cert.Certificate;
36 * self-signed certificate for a single hostname such as "localhost".
57 .addTrustedCertificate(heldCertificate.certificate)
72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate
73 * in this chain is the server's certificate, further certificates are included in the handshake
74 * so the client can build a trusted path to a CA certificate.
82 * Add a certificate authority that this client trusts. Servers that provide certificate chains
85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) {
    [all...]

Completed in 593 milliseconds

12 3 4 5 6 7 8 91011>>