/external/openscreen/cast/common/ |
D | BUILD.gn | 28 source_set("certificate") { 30 "certificate/cast_cert_validator.cc", 31 "certificate/cast_cert_validator.h", 32 "certificate/cast_cert_validator_internal.cc", 33 "certificate/cast_cert_validator_internal.h", 34 "certificate/cast_crl.cc", 35 "certificate/cast_crl.h", 36 "certificate/cast_trust_store.cc", 37 "certificate/cast_trust_store.h", 38 "certificate/types.cc", [all …]
|
/external/openscreen/util/crypto/ |
D | certificate_utils.cc | 58 bssl::UniquePtr<X509> certificate(X509_new()); in CreateCertificateInternal() local 60 issuer = certificate.get(); in CreateCertificateInternal() 68 if (X509_set_version(certificate.get(), kCertificateVersion3) != 1) { in CreateCertificateInternal() 76 if (ASN1_INTEGER_set(X509_get_serialNumber(certificate.get()), in CreateCertificateInternal() 86 if ((X509_set_notBefore(certificate.get(), now.get()) != 1) || in CreateCertificateInternal() 87 (X509_set_notAfter(certificate.get(), expiration_time.get()) != 1)) { in CreateCertificateInternal() 92 X509_NAME* certificate_name = X509_get_subject_name(certificate.get()); in CreateCertificateInternal() 103 if (X509_add1_ext_i2d(certificate.get(), NID_key_usage, x.get(), 0, 0) != 1) { in CreateCertificateInternal() 110 X509V3_set_ctx(&ctx, issuer, certificate.get(), nullptr, nullptr, 0); in CreateCertificateInternal() 119 X509_add1_ext_i2d(certificate.get(), NID_basic_constraints, thing, 1, 0); in CreateCertificateInternal() [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
D | CertificatePinnerTest.java | 49 certA1Pin = CertificatePinner.pin(certA1.certificate); 55 certB1Pin = CertificatePinner.pin(certB1.certificate); 61 certC1Pin = CertificatePinner.pin(certC1.certificate); 95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); in sameKeypairSamePin() 101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); in sameKeypairSamePin() 113 certificatePinner.check("example.com", certA1.certificate); in successfulCheck() 121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); in successfulMatchAcceptsAnyMatchingCertificate() 130 certificatePinner.check("example.com", certB1.certificate); in unsuccessfulCheck() 141 certificatePinner.check("example.com", certA1.certificate); in multipleCertificatesForOneHostname() 142 certificatePinner.check("example.com", certB1.certificate); in multipleCertificatesForOneHostname() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted 15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt… 16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted. 17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is… 21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded 22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded. 23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded. 24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins… 29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi… 31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai… [all …]
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
D | 00_Descriptions.txt | 2 tpmtoken_import import a certificate and key 4 tpmtoken_import import a certificate and key 6 tpmtoken_import import a certificate and key with -y option 8 tpmtoken_import import a public certificate and key 10 tpmtoken_import import a public certificate and key 12 tpmtoken_import import a public certificate and key with -y option 14 tpmtoken_import import a certificate 18 tpmtoken_import attempt to import a certificate from a key file 20 tpmtoken_import attempt to import a key from a certificate file
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 63 X509Certificate certificate) in fromCertificate() argument 68 if (certificate.getVersion() != 3) in fromCertificate() 70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate() 87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) in fromCertificate() argument 70 if (certificate.getVersion() != 3) in fromCertificate() 72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 73 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 76 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 80 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 82 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate() 89 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 93 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 96 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) in fromCertificate() argument 70 if (certificate.getVersion() != 3) in fromCertificate() 72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 73 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 76 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 80 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 82 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate() 89 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 93 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 96 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() [all …]
|
/external/python/cryptography/docs/development/ |
D | test-vectors.rst | 103 the private key for the certificate ``x509/custom/ca/ca.pem``. This key is 174 certificate. 178 * ``cryptography.io.pem`` - A leaf certificate issued by RapidSSL for the 181 ``cryptography.io.pem`` certificate. 182 * ``cryptography.io.precert.pem`` - A pre-certificate with the CT poison 184 * ``cryptography-scts.io.pem`` - A leaf certificate issued by Let's Encrypt for 185 the cryptography website which contains signed certificate timestamps. 186 * ``wildcard_san.pem`` - A leaf certificate issued by a public CA for 188 * ``san_edipartyname.der`` - A DSA certificate from a `Mozilla bug`_ 190 * ``san_x400address.der`` - A DSA certificate from a `Mozilla bug`_ containing [all …]
|
/external/python/cryptography/docs/x509/ |
D | tutorial.rst | 10 When obtaining a certificate from a certificate authority (CA), the usual 14 2. You create a request for a certificate, which is signed by your key (to 18 certificate for. 19 5. The CA gives you a certificate, signed by them, which identifies your public 21 6. You configure your server to use that certificate, combined with your 24 If you want to obtain a certificate from a typical commercial CA, here's how. 50 Next we need to generate a certificate signing request. A typical CSR contains 55 * Information about what domains this certificate is for. 72 ... # Describe what sites we want this certificate for. 84 Now we can give our CSR to a CA, who will give a certificate to us in return. [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | CertificateChainCleanerTest.java | 36 new RealTrustRootIndex(root.certificate)); in normalizeSingleSelfSignedCertificate() 67 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithRoot() 85 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithoutRoot() 107 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithRoot() 129 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithoutRoot() 150 new RealTrustRootIndex(root.certificate)); in unrelatedCertificatesAreOmitted() 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); in chainGoesAllTheWayToSelfSignedRoot() 194 HeldCertificate certificate = new HeldCertificate.Builder() in trustedRootNotSelfSigned() local 200 new RealTrustRootIndex(trusted.certificate)); in trustedRootNotSelfSigned() 201 assertEquals(list(certificate, intermediateCa, trusted), in trustedRootNotSelfSigned() [all …]
|
/external/webrtc/sdk/objc/unittests/ |
D | RTCCertificateTest.mm | 39 // Generate a new certificate. 43 // Store certificate in configuration. 44 originalConfig.certificate = originalCertificate; 52 // Create PeerConnection with this certificate. 56 // Retrieve certificate from the configuration. 59 // Extract PEM strings from original certificate. 61 std::string originalCertificateField = [[originalCertificate certificate] UTF8String]; 63 // Extract PEM strings from certificate retrieved from configuration. 64 RTC_OBJC_TYPE(RTCCertificate) *retrievedCertificate = retrievedConfig.certificate; 66 std::string retrievedCertificateField = [[retrievedCertificate certificate] UTF8String]; [all …]
|
/external/webrtc/rtc_base/ |
D | rtc_certificate_unittest.cc | 89 scoped_refptr<RTCCertificate> certificate = GenerateECDSA(); in TEST_F() local 92 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F() 95 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30 * 60)); in TEST_F() 100 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 102 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F() 108 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 111 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F() 113 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F() 136 scoped_refptr<RTCCertificate> certificate = RTCCertificate::FromPEM(pem); in TEST_F() local 137 EXPECT_FALSE(certificate); in TEST_F()
|
D | rtc_certificate.cc | 47 return identity_->certificate(); in GetSSLCertificate() 52 return identity_->certificate(); in ssl_certificate() 67 SSLIdentity::CreateFromPEMStrings(pem.private_key(), pem.certificate())); in FromPEM() 73 bool RTCCertificate::operator==(const RTCCertificate& certificate) const { in operator ==() 74 return *this->identity_ == *certificate.identity_; in operator ==() 77 bool RTCCertificate::operator!=(const RTCCertificate& certificate) const { in operator !=() 78 return !(*this == certificate); in operator !=()
|
D | openssl_utility.cc | 36 void LogCertificates(SSL* ssl, X509* certificate) { in LogCertificates() argument 46 X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER); in LogCertificates() 79 X509* certificate = SSL_get_peer_certificate(ssl); in VerifyPeerCertMatchesHost() local 80 if (certificate == nullptr) { in VerifyPeerCertMatchesHost() 86 LogCertificates(ssl, certificate); in VerifyPeerCertMatchesHost() 89 X509_check_host(certificate, host.c_str(), host.size(), 0, nullptr) == 1; in VerifyPeerCertMatchesHost() 90 X509_free(certificate); in VerifyPeerCertMatchesHost()
|
/external/grpc-grpc-java/okhttp/third_party/okhttp/main/java/io/grpc/okhttp/internal/ |
D | OkHostnameVerifier.java | 74 public boolean verify(String host, X509Certificate certificate) { in verify() argument 76 ? verifyIpAddress(host, certificate) in verify() 77 : verifyHostName(host, certificate); in verify() 87 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 88 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 100 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 103 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 112 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName() 123 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 124 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() [all …]
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
D | OkHostnameVerifier.java | 83 public boolean verify(String host, X509Certificate certificate) { in verify() argument 85 ? verifyIpAddress(host, certificate) in verify() 86 : verifyHostName(host, certificate); in verify() 96 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 97 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 109 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 117 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 141 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 142 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() 143 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames() [all …]
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | OkHostnameVerifier.java | 86 public boolean verify(String host, X509Certificate certificate) { in verify() argument 88 ? verifyIpAddress(host, certificate) in verify() 89 : verifyHostName(host, certificate); in verify() 99 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 100 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 113 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 116 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 139 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 140 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() 141 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames() [all …]
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/tls/ |
D | OkHostnameVerifier.java | 85 public boolean verify(String host, X509Certificate certificate) { in verify() argument 87 ? verifyIpAddress(host, certificate) in verify() 88 : verifyHostName(host, certificate); in verify() 98 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 99 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 111 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 119 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 143 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 144 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() 145 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames() [all …]
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | OkHostnameVerifier.java | 88 public boolean verify(String host, X509Certificate certificate) { in verify() argument 90 ? verifyIpAddress(host, certificate) in verify() 91 : verifyHostName(host, certificate); in verify() 101 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 102 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 115 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 118 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 141 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 142 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() 143 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames() [all …]
|
/external/webrtc/sdk/android/src/jni/pc/ |
D | rtc_certificate.cc | 37 const rtc::RTCCertificatePEM& certificate) { in NativeToJavaRTCCertificatePEM() argument 39 jni, NativeToJavaString(jni, certificate.private_key()), in NativeToJavaRTCCertificatePEM() 40 NativeToJavaString(jni, certificate.certificate())); in NativeToJavaRTCCertificatePEM() 49 rtc::scoped_refptr<rtc::RTCCertificate> certificate = in JNI_RtcCertificatePem_GenerateCertificate() local 52 rtc::RTCCertificatePEM pem = certificate->ToPEM(); in JNI_RtcCertificatePem_GenerateCertificate() 55 NativeToJavaString(jni, pem.certificate())); in JNI_RtcCertificatePem_GenerateCertificate()
|
/external/arm-trusted-firmware/docs/design/ |
D | trusted-board-boot.rst | 36 validity of a certificate's issuer but by the content of the certificate 44 with the hash extracted from the content certificate. Various hash algorithms 53 The private part of this key is used to sign the BL2 content certificate and 54 the trusted key certificate. The public part is the ROTPK. 60 one of the extension fields in the trusted world certificate. 64 The private part is used to sign the key certificate corresponding to the 66 extension fields in the trusted world certificate. 71 sign the content certificate for the BL3X image. The public part is stored 72 in one of the extension fields in the corresponding key certificate. 85 - **BL2 content certificate** [all …]
|
/external/webrtc/sdk/android/instrumentationtests/src/org/webrtc/ |
D | RtcCertificatePemTest.java | 35 RtcCertificatePem recreated = new RtcCertificatePem(original.privateKey, original.certificate); in testConstructor() 37 assertThat(original.certificate).isEqualTo(recreated.certificate); in testConstructor() 45 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateDefaults() 54 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateCustomKeyTypeDefaultExpires() 62 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateCustomExpiresDefaultKeyType() 71 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateCustomKeyTypeAndExpires()
|
/external/avb/libavb_atx/ |
D | avb_atx_validate.c | 83 const AvbAtxCertificate* certificate, in verify_certificate() argument 90 if (certificate->signed_data.version != 1) { in verify_certificate() 95 sha512((const uint8_t*)&certificate->signed_data, in verify_certificate() 100 certificate->signature, in verify_certificate() 109 if (certificate->signed_data.key_version < minimum_key_version) { in verify_certificate() 113 if (0 != avb_safe_memcmp(certificate->signed_data.usage, in verify_certificate() 124 const AvbAtxCertificate* certificate, in verify_pik_certificate() argument 131 certificate, authority, minimum_version, expected_usage)) { in verify_pik_certificate() 140 const AvbAtxCertificate* certificate, in verify_psk_certificate() argument 149 certificate, authority, minimum_version, expected_usage)) { in verify_psk_certificate() [all …]
|
/external/webrtc/sdk/objc/api/peerconnection/ |
D | RTCCertificate.mm | 22 @synthesize certificate = _certificate; 26 certificate:[self.certificate copyWithZone:zone]]; 30 - (instancetype)initWithPrivateKey:(NSString *)private_key certificate:(NSString *)certificate { 33 _certificate = [certificate copy]; 56 RTCLogError(@"Failed to generate certificate."); 62 std::string pem_certificate = pem.certificate(); 68 certificate:@(pem_certificate.c_str())];
|