/external/webrtc/webrtc/base/ |
rtccertificate.cc | 43 return identity_->certificate();
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_windows.go | 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory 14 // certificate store containing itself and all of the intermediate certificates specified 20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) { 58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. 59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) { 83 // checkChainTrustStatus checks the trust status of the certificate chain, translating 85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error { 98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for 99 // use as a certificate chain for a SSL/TLS server. 100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error [all...] |
root_solaris.go | 7 // Possible certificate files; stop after finding one.
|
root_bsd.go | 9 // Possible certificate files; stop after finding one.
|
root_linux.go | 7 // Possible certificate files; stop after finding one.
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_windows.go | 13 // Creates a new *syscall.CertContext representing the leaf certificate in an in-memory 14 // certificate store containing itself and all of the intermediate certificates specified 20 func createStoreContext(leaf *Certificate, opts *VerifyOptions) (*syscall.CertContext, error) { 58 // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. 59 func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) { 83 // checkChainTrustStatus checks the trust status of the certificate chain, translating 85 func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error { 98 // checkChainSSLServerPolicy checks that the certificate chain in chainCtx is valid for 99 // use as a certificate chain for a SSL/TLS server. 100 func checkChainSSLServerPolicy(c *Certificate, chainCtx *syscall.CertChainContext, opts *VerifyOptions) error [all...] |
root_solaris.go | 7 // Possible certificate files; stop after finding one.
|
root_bsd.go | 9 // Possible certificate files; stop after finding one.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoGeneratorBuilder.java | 81 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) 84 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 1 path certificate "/etc/openssl/certs";
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 1 path certificate "/etc/openssl/certs";
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 24 import java.security.cert.Certificate; 34 for (Certificate certificate : chain.connection().getHandshake().peerCertificates()) { 35 String pin = CertificatePinner.pin(certificate); 37 throw new IOException("Blacklisted peer certificate: " + pin);
|
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
MediaDrmSigner.java | 23 * Provides certificate request generation, response handling and 30 * Specify X.509 certificate type 35 * Contains the opaque data an app uses to request a certificate from a provisioning 53 * Get the default URL to use when sending the certificate request 55 * certificate server URL obtained from other sources. 63 * Contains the wrapped private key and public certificate data associated 64 * with a certificate. 66 public final static class Certificate { 67 private final MediaDrm.Certificate mCertificate; 69 Certificate(MediaDrm.Certificate certificate) [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
SubjectAlternativeNameTest.java | 21 import java.security.cert.Certificate; 53 Certificate root = new TestKeyStore.Builder() 66 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { 67 byte[] encoded = certificate.getEncoded();
|
/system/tpm/attestation/server/ |
mock_key_store.h | 54 const std::string& certificate)); 57 const std::string& certificate));
|
/development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/ |
PackageValidator.java | 45 * Map allowed callers' certificate keys to the expected caller information. 66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 70 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 73 validCertificates.put(certificate, infos); 77 " certificate=", certificate); 107 LogHelper.w(TAG, "Caller has more than one signature certificate!"); 126 // Check if the package name is valid for the certificate: 137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any " [all...] |
/frameworks/support/samples/Support4Demos/src/main/java/com/example/android/supportv4/media/ |
PackageValidator.java | 47 * Map allowed callers' certificate keys to the expected caller information. 68 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 72 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 75 validCertificates.put(certificate, infos); 78 + info.packageName + " release=" + info.release + " certificate=" 79 + certificate); 109 Log.w(TAG, "Caller has more than one signature certificate!"); 127 // Check if the package name is valid for the certificate: 138 Log.i(TAG, "Caller has a valid certificate, but its package doesn't match any expected [all...] |
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXCertStoreSelector.java | 7 import java.security.cert.Certificate; 18 public class PKIXCertStoreSelector<T extends Certificate> 43 public PKIXCertStoreSelector<? extends Certificate> build() 56 public boolean match(Certificate cert) 66 public static Collection<? extends Certificate> getCertificates(final PKIXCertStoreSelector selector, CertStore certStore) 114 public boolean match(Certificate certificate) 116 return (selector == null) ? (certificate != null) : selector.match(certificate);
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
TestSessionBuilder.java | 64 public TestSessionBuilder addCertificate(byte[] certificate) { 66 certificates.add(certificate); 67 certificateLengths.add(certificate.length);
|
/external/curl/docs/cmdline-opts/ |
pinnedpubkey.d | 11 When negotiating a TLS or SSL connection, the server sends a certificate 12 indicating its identity. A public key is extracted from this certificate and
|
/libcore/luni/src/test/java/tests/targets/security/ |
KeyStoreTest.java | 33 import java.security.cert.Certificate; 103 Certificate certificate = null; local 105 certificate = certificateFactory 114 generator = KeyPairGenerator.getInstance(certificate.getPublicKey() 123 .getPrivate(), new Certificate[] {certificate}); 167 private String encodedCertificate = "-----BEGIN CERTIFICATE-----\n" 189 + "-----END CERTIFICATE-----\n";
|
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 18 Verify a given OTA package with the specifed certificate. 53 """Verify the given package with the certificate. 68 print('Certificate: %s' % (cert,)) 156 # Dump pubkey from the certificate. 181 parser.add_argument('certificate', help='The certificate to be used.') 185 VerifyPackage(args.certificate, args.package) 186 VerifyAbOtaPayload(args.certificate, args.package)
|
/external/apache-http/android/src/android/net/http/ |
DelegatingSSLSession.java | 20 import java.security.cert.Certificate; 30 * This is only used when a {@code certificate} is available but usage 38 private final Certificate mCertificate; 40 public CertificateWrap(Certificate certificate) { 41 mCertificate = certificate; 45 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 46 return new Certificate[] { mCertificate }; 77 public Certificate[] getLocalCertificates() { 98 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException [all...] |
/frameworks/base/core/java/android/security/net/config/ |
TrustedCertificateStoreAdapter.java | 20 import java.security.cert.Certificate; 41 return anchor.certificate; 55 return anchor.certificate; 78 public Certificate getCertificate(String alias) { 83 public Certificate getCertificate(String alias, boolean includeDeletedSystem) { 113 public String getCertificateAlias(Certificate c) { 118 public String getCertificateAlias(Certificate c, boolean includeDeletedSystem) {
|