Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 494) sorted by relevance

12345678910>>...20

/external/openscreen/cast/common/
DBUILD.gn28 source_set("certificate") {
30 "certificate/cast_cert_validator.cc",
31 "certificate/cast_cert_validator.h",
32 "certificate/cast_cert_validator_internal.cc",
33 "certificate/cast_cert_validator_internal.h",
34 "certificate/cast_crl.cc",
35 "certificate/cast_crl.h",
36 "certificate/cast_trust_store.cc",
37 "certificate/cast_trust_store.h",
38 "certificate/types.cc",
[all …]
/external/openscreen/util/crypto/
Dcertificate_utils.cc58 bssl::UniquePtr<X509> certificate(X509_new()); in CreateCertificateInternal() local
60 issuer = certificate.get(); in CreateCertificateInternal()
68 if (X509_set_version(certificate.get(), kCertificateVersion3) != 1) { in CreateCertificateInternal()
76 if (ASN1_INTEGER_set(X509_get_serialNumber(certificate.get()), in CreateCertificateInternal()
86 if ((X509_set_notBefore(certificate.get(), now.get()) != 1) || in CreateCertificateInternal()
87 (X509_set_notAfter(certificate.get(), expiration_time.get()) != 1)) { in CreateCertificateInternal()
92 X509_NAME* certificate_name = X509_get_subject_name(certificate.get()); in CreateCertificateInternal()
103 if (X509_add1_ext_i2d(certificate.get(), NID_key_usage, x.get(), 0, 0) != 1) { in CreateCertificateInternal()
110 X509V3_set_ctx(&ctx, issuer, certificate.get(), nullptr, nullptr, 0); in CreateCertificateInternal()
119 X509_add1_ext_i2d(certificate.get(), NID_basic_constraints, thing, 1, 0); in CreateCertificateInternal()
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
DCertificatePinnerTest.java49 certA1Pin = CertificatePinner.pin(certA1.certificate);
55 certB1Pin = CertificatePinner.pin(certB1.certificate);
61 certC1Pin = CertificatePinner.pin(certC1.certificate);
95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); in sameKeypairSamePin()
101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); in sameKeypairSamePin()
113 certificatePinner.check("example.com", certA1.certificate); in successfulCheck()
121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); in successfulMatchAcceptsAnyMatchingCertificate()
130 certificatePinner.check("example.com", certB1.certificate); in unsuccessfulCheck()
141 certificatePinner.check("example.com", certA1.certificate); in multipleCertificatesForOneHostname()
142 certificatePinner.check("example.com", certB1.certificate); in multipleCertificatesForOneHostname()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
D00_Descriptions.txt2 tpmtoken_import import a certificate and key
4 tpmtoken_import import a certificate and key
6 tpmtoken_import import a certificate and key with -y option
8 tpmtoken_import import a public certificate and key
10 tpmtoken_import import a public certificate and key
12 tpmtoken_import import a public certificate and key with -y option
14 tpmtoken_import import a certificate
18 tpmtoken_import attempt to import a certificate from a key file
20 tpmtoken_import attempt to import a key from a certificate file
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java63 X509Certificate certificate) in fromCertificate() argument
68 if (certificate.getVersion() != 3) in fromCertificate()
70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate()
87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
[all …]
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java65 X509Certificate certificate) in fromCertificate() argument
70 if (certificate.getVersion() != 3) in fromCertificate()
72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
73 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
76 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
80 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
82 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate()
89 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
93 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
96 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
[all …]
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java65 X509Certificate certificate) in fromCertificate() argument
70 if (certificate.getVersion() != 3) in fromCertificate()
72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
73 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
76 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
80 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
82 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate()
89 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
93 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
96 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
[all …]
/external/python/cryptography/docs/development/
Dtest-vectors.rst103 the private key for the certificate ``x509/custom/ca/ca.pem``. This key is
174 certificate.
178 * ``cryptography.io.pem`` - A leaf certificate issued by RapidSSL for the
181 ``cryptography.io.pem`` certificate.
182 * ``cryptography.io.precert.pem`` - A pre-certificate with the CT poison
184 * ``cryptography-scts.io.pem`` - A leaf certificate issued by Let's Encrypt for
185 the cryptography website which contains signed certificate timestamps.
186 * ``wildcard_san.pem`` - A leaf certificate issued by a public CA for
188 * ``san_edipartyname.der`` - A DSA certificate from a `Mozilla bug`_
190 * ``san_x400address.der`` - A DSA certificate from a `Mozilla bug`_ containing
[all …]
/external/python/cryptography/docs/x509/
Dtutorial.rst10 When obtaining a certificate from a certificate authority (CA), the usual
14 2. You create a request for a certificate, which is signed by your key (to
18 certificate for.
19 5. The CA gives you a certificate, signed by them, which identifies your public
21 6. You configure your server to use that certificate, combined with your
24 If you want to obtain a certificate from a typical commercial CA, here's how.
50 Next we need to generate a certificate signing request. A typical CSR contains
55 * Information about what domains this certificate is for.
72 ... # Describe what sites we want this certificate for.
84 Now we can give our CSR to a CA, who will give a certificate to us in return.
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
DCertificateChainCleanerTest.java36 new RealTrustRootIndex(root.certificate)); in normalizeSingleSelfSignedCertificate()
67 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithRoot()
85 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithoutRoot()
107 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithRoot()
129 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithoutRoot()
150 new RealTrustRootIndex(root.certificate)); in unrelatedCertificatesAreOmitted()
173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); in chainGoesAllTheWayToSelfSignedRoot()
194 HeldCertificate certificate = new HeldCertificate.Builder() in trustedRootNotSelfSigned() local
200 new RealTrustRootIndex(trusted.certificate)); in trustedRootNotSelfSigned()
201 assertEquals(list(certificate, intermediateCa, trusted), in trustedRootNotSelfSigned()
[all …]
/external/webrtc/sdk/objc/unittests/
DRTCCertificateTest.mm39 // Generate a new certificate.
43 // Store certificate in configuration.
44 originalConfig.certificate = originalCertificate;
52 // Create PeerConnection with this certificate.
56 // Retrieve certificate from the configuration.
59 // Extract PEM strings from original certificate.
61 std::string originalCertificateField = [[originalCertificate certificate] UTF8String];
63 // Extract PEM strings from certificate retrieved from configuration.
64 RTC_OBJC_TYPE(RTCCertificate) *retrievedCertificate = retrievedConfig.certificate;
66 std::string retrievedCertificateField = [[retrievedCertificate certificate] UTF8String];
[all …]
/external/webrtc/rtc_base/
Drtc_certificate_unittest.cc89 scoped_refptr<RTCCertificate> certificate = GenerateECDSA(); in TEST_F() local
92 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
95 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30 * 60)); in TEST_F()
100 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
102 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F()
108 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
111 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
113 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F()
136 scoped_refptr<RTCCertificate> certificate = RTCCertificate::FromPEM(pem); in TEST_F() local
137 EXPECT_FALSE(certificate); in TEST_F()
Drtc_certificate.cc47 return identity_->certificate(); in GetSSLCertificate()
52 return identity_->certificate(); in ssl_certificate()
67 SSLIdentity::CreateFromPEMStrings(pem.private_key(), pem.certificate())); in FromPEM()
73 bool RTCCertificate::operator==(const RTCCertificate& certificate) const { in operator ==()
74 return *this->identity_ == *certificate.identity_; in operator ==()
77 bool RTCCertificate::operator!=(const RTCCertificate& certificate) const { in operator !=()
78 return !(*this == certificate); in operator !=()
Dopenssl_utility.cc36 void LogCertificates(SSL* ssl, X509* certificate) { in LogCertificates() argument
46 X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER); in LogCertificates()
79 X509* certificate = SSL_get_peer_certificate(ssl); in VerifyPeerCertMatchesHost() local
80 if (certificate == nullptr) { in VerifyPeerCertMatchesHost()
86 LogCertificates(ssl, certificate); in VerifyPeerCertMatchesHost()
89 X509_check_host(certificate, host.c_str(), host.size(), 0, nullptr) == 1; in VerifyPeerCertMatchesHost()
90 X509_free(certificate); in VerifyPeerCertMatchesHost()
/external/grpc-grpc-java/okhttp/third_party/okhttp/main/java/io/grpc/okhttp/internal/
DOkHostnameVerifier.java74 public boolean verify(String host, X509Certificate certificate) { in verify() argument
76 ? verifyIpAddress(host, certificate) in verify()
77 : verifyHostName(host, certificate); in verify()
87 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
88 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
100 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
103 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
112 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName()
123 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
124 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
[all …]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
DOkHostnameVerifier.java83 public boolean verify(String host, X509Certificate certificate) { in verify() argument
85 ? verifyIpAddress(host, certificate) in verify()
86 : verifyHostName(host, certificate); in verify()
96 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
97 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
109 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
117 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
141 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
142 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
143 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames()
[all …]
/external/conscrypt/common/src/main/java/org/conscrypt/
DOkHostnameVerifier.java86 public boolean verify(String host, X509Certificate certificate) { in verify() argument
88 ? verifyIpAddress(host, certificate) in verify()
89 : verifyHostName(host, certificate); in verify()
99 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
100 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
113 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
116 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
139 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
140 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
141 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames()
[all …]
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/tls/
DOkHostnameVerifier.java85 public boolean verify(String host, X509Certificate certificate) { in verify() argument
87 ? verifyIpAddress(host, certificate) in verify()
88 : verifyHostName(host, certificate); in verify()
98 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
99 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
111 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
119 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
143 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
144 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
145 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames()
[all …]
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DOkHostnameVerifier.java88 public boolean verify(String host, X509Certificate certificate) { in verify() argument
90 ? verifyIpAddress(host, certificate) in verify()
91 : verifyHostName(host, certificate); in verify()
101 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
102 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
115 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
118 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
141 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
142 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
143 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames()
[all …]
/external/webrtc/sdk/android/src/jni/pc/
Drtc_certificate.cc37 const rtc::RTCCertificatePEM& certificate) { in NativeToJavaRTCCertificatePEM() argument
39 jni, NativeToJavaString(jni, certificate.private_key()), in NativeToJavaRTCCertificatePEM()
40 NativeToJavaString(jni, certificate.certificate())); in NativeToJavaRTCCertificatePEM()
49 rtc::scoped_refptr<rtc::RTCCertificate> certificate = in JNI_RtcCertificatePem_GenerateCertificate() local
52 rtc::RTCCertificatePEM pem = certificate->ToPEM(); in JNI_RtcCertificatePem_GenerateCertificate()
55 NativeToJavaString(jni, pem.certificate())); in JNI_RtcCertificatePem_GenerateCertificate()
/external/arm-trusted-firmware/docs/design/
Dtrusted-board-boot.rst36 validity of a certificate's issuer but by the content of the certificate
44 with the hash extracted from the content certificate. Various hash algorithms
53 The private part of this key is used to sign the BL2 content certificate and
54 the trusted key certificate. The public part is the ROTPK.
60 one of the extension fields in the trusted world certificate.
64 The private part is used to sign the key certificate corresponding to the
66 extension fields in the trusted world certificate.
71 sign the content certificate for the BL3X image. The public part is stored
72 in one of the extension fields in the corresponding key certificate.
85 - **BL2 content certificate**
[all …]
/external/webrtc/sdk/android/instrumentationtests/src/org/webrtc/
DRtcCertificatePemTest.java35 RtcCertificatePem recreated = new RtcCertificatePem(original.privateKey, original.certificate); in testConstructor()
37 assertThat(original.certificate).isEqualTo(recreated.certificate); in testConstructor()
45 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateDefaults()
54 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateCustomKeyTypeDefaultExpires()
62 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateCustomExpiresDefaultKeyType()
71 assertThat(rtcCertificate.certificate).isNotEmpty(); in testGenerateCertificateCustomKeyTypeAndExpires()
/external/avb/libavb_atx/
Davb_atx_validate.c83 const AvbAtxCertificate* certificate, in verify_certificate() argument
90 if (certificate->signed_data.version != 1) { in verify_certificate()
95 sha512((const uint8_t*)&certificate->signed_data, in verify_certificate()
100 certificate->signature, in verify_certificate()
109 if (certificate->signed_data.key_version < minimum_key_version) { in verify_certificate()
113 if (0 != avb_safe_memcmp(certificate->signed_data.usage, in verify_certificate()
124 const AvbAtxCertificate* certificate, in verify_pik_certificate() argument
131 certificate, authority, minimum_version, expected_usage)) { in verify_pik_certificate()
140 const AvbAtxCertificate* certificate, in verify_psk_certificate() argument
149 certificate, authority, minimum_version, expected_usage)) { in verify_psk_certificate()
[all …]
/external/webrtc/sdk/objc/api/peerconnection/
DRTCCertificate.mm22 @synthesize certificate = _certificate;
26 certificate:[self.certificate copyWithZone:zone]];
30 - (instancetype)initWithPrivateKey:(NSString *)private_key certificate:(NSString *)certificate {
33 _certificate = [certificate copy];
56 RTCLogError(@"Failed to generate certificate.");
62 std::string pem_certificate = pem.certificate();
68 certificate:@(pem_certificate.c_str())];

12345678910>>...20