/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */ 58 private final byte[] certificate; field in class:CertificateEntry 60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { 73 this.certificate = certificate; 87 throw new CertificateException("Certificate does not contain embedded signed timestamps"); 118 return certificate; 132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
|
/system/keymaster/km_openssl/ |
attestation_utils.cpp | 73 inline keymaster_blob_t certBlobifier(X509* certificate, bool* fail){ 74 int len = i2d_X509(certificate, nullptr); 87 i2d_X509(certificate, &p); 143 * position in the newly created certificate chain. E.g., makeCertChain(emptyCert(), someCertChain) 149 * will take possession of secondary resources for the certificate blobs so that someCertChain is 201 X509* certificate) { 260 if (!X509_add_ext(certificate, key_usage_extension.get() /* Don't release; copied */, 268 bool add_public_key(EVP_PKEY* key, X509* certificate, keymaster_error_t* error) { 269 if (!X509_set_pubkey(certificate, key)) { 280 X509* certificate, [all...] |
/build/soong/java/ |
app.go | 35 // path to a certificate, or the name of a certificate in the default 36 // certificate directory, or blank to use the default product certificate 37 Certificate *string 61 certificate certificate 76 type certificate struct { type 143 c := String(a.appProperties.Certificate) 147 a.certificate = certificate{pem, key [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/curl/docs/cmdline-opts/ |
proxy-cacert.d | 2 Help: CA certificate to verify peer against for proxy
|
ssl-no-revoke.d | 5 (WinSSL) This option tells curl to disable certificate revocation checks.
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CertificatePinning.java | 23 import java.security.cert.Certificate; 47 for (Certificate certificate : response.handshake().peerCertificates()) { 48 System.out.println(CertificatePinner.pin(certificate));
|
/libcore/ojluni/src/main/java/java/security/ |
Identity.java | 99 Vector<Certificate> certificates; 189 certificates = new Vector<Certificate>(); 225 * Adds a certificate for this identity. If the identity has a public 226 * key, the public key in the certificate must be the same, and if 228 * public key is set to be that specified in the certificate. 232 * as its argument to see if it's ok to add a certificate. 234 * @param certificate the certificate to be added. 236 * @exception KeyManagementException if the certificate is not valid, 237 * if the public key in the certificate being added conflicts wit [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_nacl.go | 7 // Possible certificate files; stop after finding one.
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_nacl.go | 7 // Possible certificate files; stop after finding one.
|
/system/tpm/attestation/server/ |
key_store.h | 61 // If a non-empty |certificate| is provided it will be registered along with 69 const std::string& certificate) = 0; 71 // Registers a |certificate| that is not associated to a registered key. The 72 // certificate will be associated with |username|. 74 const std::string& certificate) = 0;
|
pkcs11_key_store.h | 67 const std::string& certificate) override; 69 const std::string& certificate) override; 105 // X.509 |certificate|. Returns false if the value cannot be determined. 106 bool GetCertificateFields(const std::string& certificate, 111 // Returns true iff the given certificate already exists in the token. 113 const std::string& certificate);
|
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/ |
fip_create.sh | 26 --fwu-cert FILENAME Non-Trusted Firmware Updater certificate 34 --rot-cert FILENAME Root Of Trust key certificate 35 --trusted-key-cert FILENAME Trusted key certificate 36 --scp-fw-key-cert FILENAME SCP Firmware key certificate 37 --soc-fw-key-cert FILENAME SoC Firmware key certificate 38 --tos-fw-key-cert FILENAME Trusted OS Firmware key certificate 39 --nt-fw-key-cert FILENAME Non-Trusted Firmware key certificate 40 --tb-fw-cert FILENAME Trusted Boot Firmware BL2 certificate 41 --scp-fw-cert FILENAME SCP Firmware content certificate 42 --soc-fw-cert FILENAME SoC Firmware content certificate [all...] |
/external/apache-http/android/src/android/net/http/ |
LoggingEventHandler.java | 69 public void certificate(SslCertificate certificate) { method in class:LoggingEventHandler 71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
alert.go | 52 alertBadCertificate: "bad certificate", 53 alertUnsupportedCertificate: "unsupported certificate", 54 alertCertificateRevoked: "revoked certificate", 55 alertCertificateExpired: "expired certificate", 56 alertCertificateUnknown: "unknown certificate", 58 alertUnknownCA: "unknown certificate authority",
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
alert.go | 52 alertBadCertificate: "bad certificate", 53 alertUnsupportedCertificate: "unsupported certificate", 54 alertCertificateRevoked: "revoked certificate", 55 alertCertificateExpired: "expired certificate", 56 alertCertificateUnknown: "unknown certificate", 58 alertUnknownCA: "unknown certificate authority",
|
/external/avb/libavb_atx/ |
avb_atx_validate.c | 77 /* Verifies the format, key version, usage, and signature of a certificate. */ 78 static bool verify_certificate(AvbAtxCertificate* certificate, 85 if (certificate->signed_data.version != 1) { 86 avb_error("Unsupported certificate format.\n"); 90 sha512((const uint8_t*)&certificate->signed_data, 95 certificate->signature, 101 avb_error("Invalid certificate signature.\n"); 104 if (certificate->signed_data.key_version < minimum_key_version) { 108 if (0 != avb_safe_memcmp(certificate->signed_data.usage, 111 avb_error("Invalid certificate usage.\n") [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
HostnameVerifierTest.java | 49 + "-----BEGIN CERTIFICATE-----\n" 73 + "-----END CERTIFICATE-----\n"); 84 + "-----BEGIN CERTIFICATE-----\n" 108 + "-----END CERTIFICATE-----\n"); 118 + "-----BEGIN CERTIFICATE-----\n" 143 + "-----END CERTIFICATE-----\n"); 159 + "-----BEGIN CERTIFICATE-----\n" 184 + "-----END CERTIFICATE-----\n"); 200 + "-----BEGIN CERTIFICATE-----\n" 224 + "-----END CERTIFICATE-----\n") 409 X509Certificate certificate = certificate("" local 561 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest [all...] |
CertificatePinnerChainValidationTest.java | 42 /** The pinner should pull the root certificate from the trust manager. */ 55 HeldCertificate certificate = new HeldCertificate.Builder() local 61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate)) 64 .addTrustedCertificate(rootCa.certificate) 72 .certificateChain(certificate, intermediateCa) 110 HeldCertificate certificate = new HeldCertificate.Builder() local 116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate)) 119 .addTrustedCertificate(rootCa.certificate) 127 .certificateChain(certificate, intermediateCa) 153 // Start with a trusted root CA certificate [all...] |
/external/webrtc/webrtc/p2p/base/ |
dtlstransport.h | 34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) 36 certificate_(certificate), 45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override { 46 certificate_ = certificate; 49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override { 53 *certificate = certificate_;
|
/external/webrtc/webrtc/base/ |
opensslidentity.h | 51 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 74 // Compute the digest of the certificate given algorithm 80 // Compute the digest of a certificate as an X509 * 100 // Holds a keypair and certificate together, and a method to generate 108 const std::string& certificate); 111 const OpenSSLCertificate& certificate() const override; 114 // Configure an SSL context object to use our key and certificate. 118 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate);
|
/libcore/ojluni/src/main/java/java/security/cert/ |
X509CRL.java | 46 * Abstract class for an X.509 Certificate Revocation List (CRL). 48 * It is signed by a Certificate Authority (CA) and made freely 51 * <p>Each revoked certificate is 52 * identified in a CRL by its certificate serial number. When a 53 * certificate-using system uses a certificate (e.g., for verifying a 55 * certificate signature and validity but also acquires a suitably- 56 * recent CRL and checks that the certificate serial number is not on 61 * entry may be removed when the certificate expiration date is reached. 73 * Public Key Infrastructure Certificate and CRL Profile</a> [all...] |
/tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/zfile/ |
ZFiles.java | 79 * @param certificate the {@link X509Certificate} used to sign the archive, or 96 @Nullable X509Certificate certificate, 117 if (key != null && certificate != null) { 121 certificate,
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 26 import java.security.cert.Certificate; 36 * self-signed certificate for a single hostname such as "localhost". 57 .addTrustedCertificate(heldCertificate.certificate) 72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate 73 * in this chain is the server's certificate, further certificates are included in the handshake 74 * so the client can build a trusted path to a CA certificate. 82 * Add a certificate authority that this client trusts. Servers that provide certificate chains 85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) { [all...] |