/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
D | CertificatePinnerTest.java | 49 certA1Pin = CertificatePinner.pin(certA1.certificate); 55 certB1Pin = CertificatePinner.pin(certB1.certificate); 61 certC1Pin = CertificatePinner.pin(certC1.certificate); 95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); in sameKeypairSamePin() 101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); in sameKeypairSamePin() 113 certificatePinner.check("example.com", certA1.certificate); in successfulCheck() 121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); in successfulMatchAcceptsAnyMatchingCertificate() 130 certificatePinner.check("example.com", certB1.certificate); in unsuccessfulCheck() 141 certificatePinner.check("example.com", certA1.certificate); in multipleCertificatesForOneHostname() 142 certificatePinner.check("example.com", certB1.certificate); in multipleCertificatesForOneHostname() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted 15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt… 16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted. 17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is… 21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded 22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded. 23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded. 24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins… 29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi… 31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai… [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 63 X509Certificate certificate) in fromCertificate() argument 68 if (certificate.getVersion() != 3) in fromCertificate() 70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate() 87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) in fromCertificate() argument 70 if (certificate.getVersion() != 3) in fromCertificate() 72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 73 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 76 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 80 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 82 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate() 89 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 93 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 96 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() [all …]
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
D | 00_Descriptions.txt | 2 tpmtoken_import import a certificate and key 4 tpmtoken_import import a certificate and key 6 tpmtoken_import import a certificate and key with -y option 8 tpmtoken_import import a public certificate and key 10 tpmtoken_import import a public certificate and key 12 tpmtoken_import import a public certificate and key with -y option 14 tpmtoken_import import a certificate 18 tpmtoken_import attempt to import a certificate from a key file 20 tpmtoken_import attempt to import a key from a certificate file
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | CertificateChainCleanerTest.java | 36 new RealTrustRootIndex(root.certificate)); in normalizeSingleSelfSignedCertificate() 67 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithRoot() 85 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithoutRoot() 107 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithRoot() 129 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithoutRoot() 150 new RealTrustRootIndex(root.certificate)); in unrelatedCertificatesAreOmitted() 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); in chainGoesAllTheWayToSelfSignedRoot() 194 HeldCertificate certificate = new HeldCertificate.Builder() in trustedRootNotSelfSigned() local 200 new RealTrustRootIndex(trusted.certificate)); in trustedRootNotSelfSigned() 201 assertEquals(list(certificate, intermediateCa, trusted), in trustedRootNotSelfSigned() [all …]
|
D | CertificatePinnerChainValidationTest.java | 55 HeldCertificate certificate = new HeldCertificate.Builder() in pinRootNotPresentInChain() local 61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate)) in pinRootNotPresentInChain() 64 .addTrustedCertificate(rootCa.certificate) in pinRootNotPresentInChain() 72 .certificateChain(certificate, intermediateCa) in pinRootNotPresentInChain() 110 HeldCertificate certificate = new HeldCertificate.Builder() in pinIntermediatePresentInChain() local 116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate)) in pinIntermediatePresentInChain() 119 .addTrustedCertificate(rootCa.certificate) in pinIntermediatePresentInChain() 127 .certificateChain(certificate, intermediateCa) in pinIntermediatePresentInChain() 175 .add(server.getHostName(), CertificatePinner.pin(goodCertificate.certificate)) in unrelatedPinnedLeafCertificateInChain() 178 .addTrustedCertificate(rootCa.certificate) in unrelatedPinnedLeafCertificateInChain() [all …]
|
D | HostnameVerifierTest.java | 409 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local 420 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp() 422 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp() 561 private X509Certificate certificate(String certificate) throws Exception { in certificate() method in HostnameVerifierTest 563 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate() 566 private SSLSession session(String certificate) throws Exception { in session() argument 567 return new FakeSSLSession(certificate(certificate)); in session()
|
/external/grpc-grpc-java/okhttp/third_party/okhttp/main/java/io/grpc/okhttp/internal/ |
D | OkHostnameVerifier.java | 74 public boolean verify(String host, X509Certificate certificate) { in verify() argument 76 ? verifyIpAddress(host, certificate) in verify() 77 : verifyHostName(host, certificate); in verify() 87 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 88 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 100 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 103 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 112 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName() 123 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 124 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() [all …]
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
D | OkHostnameVerifier.java | 70 public boolean verify(String host, X509Certificate certificate) { in verify() argument 72 ? verifyIpAddress(host, certificate) in verify() 73 : verifyHostName(host, certificate); in verify() 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 84 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 96 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 99 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 123 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 124 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() 125 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames() [all …]
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/tls/ |
D | OkHostnameVerifier.java | 72 public boolean verify(String host, X509Certificate certificate) { in verify() argument 74 ? verifyIpAddress(host, certificate) in verify() 75 : verifyHostName(host, certificate); in verify() 85 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 86 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 98 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 101 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 125 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 126 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() 127 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames() [all …]
|
/external/webrtc/webrtc/base/ |
D | rtccertificate_unittests.cc | 90 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F() 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); in TEST_F() 102 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F() 110 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 113 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F() 115 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F()
|
D | sslidentity_unittest.cc | 90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 122 rv = identity->certificate().ComputeDigest(algorithm, digest, in TestDigestHelper() 129 rv = identity->certificate().ComputeDigest(algorithm, digest1, in TestDigestHelper() 257 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F() 284 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F() 402 identity->certificate().CertificateExpirationTime()); in TestExpireTime()
|
/external/avb/libavb_atx/ |
D | avb_atx_validate.c | 83 const AvbAtxCertificate* certificate, in verify_certificate() argument 90 if (certificate->signed_data.version != 1) { in verify_certificate() 95 sha512((const uint8_t*)&certificate->signed_data, in verify_certificate() 100 certificate->signature, in verify_certificate() 109 if (certificate->signed_data.key_version < minimum_key_version) { in verify_certificate() 113 if (0 != avb_safe_memcmp(certificate->signed_data.usage, in verify_certificate() 124 const AvbAtxCertificate* certificate, in verify_pik_certificate() argument 131 certificate, authority, minimum_version, expected_usage)) { in verify_pik_certificate() 140 const AvbAtxCertificate* certificate, in verify_psk_certificate() argument 149 certificate, authority, minimum_version, expected_usage)) { in verify_psk_certificate() [all …]
|
/external/curl/docs/ |
D | SSLCERTS.md | 23 This system is about trust. In your local CA certificate store you have certs 37 libcurl performs peer SSL certificate verification by default. This is done 38 by using a CA certificate store that the SSL library can use to make sure the 39 peer's server certificate is valid. 45 If the remote server uses a self-signed certificate, if you don't install a CA 46 cert store, if the server uses a certificate signed by a CA that isn't 56 2. Get a CA certificate that can verify the remote server and use the proper 62 3. Add the CA cert for your server to the existing default CA certificate 63 store. The default CA certificate store can changed at compile time with the 66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument 45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build() 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider() 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider() 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
|
D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument 75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build() 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider() 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider() 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
|
/external/openssh/ |
D | PROTOCOL.certkeys | 1 This document describes a simple public-key certificate authentication 15 system already in SSH to allow certificate-based authentication. The 45 algorithm names to add support for certificate authentication without 56 The certificate key types take a similar high-level format (note: data 63 RSA certificate 81 DSA certificate 101 ECDSA certificate 121 ED25519 certificate 152 serial is an optional certificate serial number set by the CA to 157 type specifies whether this certificate is for identification of a user [all …]
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
D | HeldCertificate.java | 39 public final X509Certificate certificate; field in HeldCertificate 42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) { in HeldCertificate() argument 43 this.certificate = certificate; in HeldCertificate() 110 signedByPrincipal = issuedBy.certificate.getSubjectX500Principal(); in build() 133 X509Certificate certificate = generator.generateX509Certificate( in build() local 135 return new HeldCertificate(certificate, heldKeyPair); in build()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
D | IssuerAndSerialNumber.java | 73 Certificate certificate) in IssuerAndSerialNumber() argument 75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber() 83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument 85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ct/ |
D | CertificateEntry.java | 56 private final byte[] certificate; field in CertificateEntry 58 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { in CertificateEntry() argument 71 this.certificate = certificate; in CertificateEntry() 116 return certificate; in getCertificate() 130 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES); in encode()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ct/ |
D | CertificateEntry.java | 61 private final byte[] certificate; field in CertificateEntry 63 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { in CertificateEntry() argument 76 this.certificate = certificate; in CertificateEntry() 121 return certificate; in getCertificate() 135 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES); in encode()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/cms/ |
D | IssuerAndSerialNumber.java | 75 Certificate certificate) in IssuerAndSerialNumber() argument 77 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 78 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber() 85 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument 87 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 88 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
|
/external/curl/docs/cmdline-opts/ |
D | cert.d | 3 Arg: <certificate[:password]> 4 Help: Client certificate file and password 8 Tells curl to use the specified client certificate file when getting a file 9 with HTTPS, FTPS or another SSL-based protocol. The certificate must be in
|
/external/grpc-grpc-java/testing/src/main/resources/certs/ |
D | openssl.cnf | 3 # This is mostly being used for generation of certificate requests. 50 certificate = $dir/ca.pem # The CA certificate 125 # req_extensions = v3_req # The extensions to add to a certificate request 168 # requires this to avoid interpreting an end user certificate as a CA. 173 # the certificate can be used for anything *except* object signing. 178 # For an object signing certificate this would be used. 187 # This is typical in keyUsage for a client certificate. 219 # Extensions to add to a certificate request 243 # Key usage: this is typical for a CA certificate. However since it will 244 # prevent it being used as an test self-signed certificate it is best [all …]
|