| /external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/ |
| D | Bis.h | 2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block 3 against a digital certificate for the purpose of an integrity and authorization check. 5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR> 6 SPDX-License-Identifier: BSD-2-Clause-Patent 22 // X-Intel-BIS-ParameterSet 24 // Binary Value of X-Intel-BIS-ParameterSet Attribute. 25 // (Value is Base-64 encoded in actual signed manifest). 61 // ----------------------------------------------------// 64 // ----------------------------------------------------// 92 /// platform Boot Object Authorization Certificate to create the certificateID. [all …]
|
| /external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/ |
| D | Bis.h | 2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block 3 against a digital certificate for the purpose of an integrity and authorization check. 5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR> 6 SPDX-License-Identifier: BSD-2-Clause-Patent 22 // X-Intel-BIS-ParameterSet 24 // Binary Value of X-Intel-BIS-ParameterSet Attribute. 25 // (Value is Base-64 encoded in actual signed manifest). 61 // ----------------------------------------------------// 64 // ----------------------------------------------------// 92 /// platform Boot Object Authorization Certificate to create the certificateID. [all …]
|
| /external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/ |
| D | Bis.h | 2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block 3 against a digital certificate for the purpose of an integrity and authorization check. 5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR> 6 SPDX-License-Identifier: BSD-2-Clause-Patent 22 // X-Intel-BIS-ParameterSet 24 // Binary Value of X-Intel-BIS-ParameterSet Attribute. 25 // (Value is Base-64 encoded in actual signed manifest). 58 // ----------------------------------------------------// 61 // ----------------------------------------------------// 89 /// platform Boot Object Authorization Certificate to create the certificateID. [all …]
|
| /external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/ |
| D | Bis.h | 2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block 3 against a digital certificate for the purpose of an integrity and authorization check. 5 Copyright (c) 2006 - 2010, Intel Corporation. All rights reserved.<BR> 9 http://opensource.org/licenses/bsd-license.php. 28 // X-Intel-BIS-ParameterSet 30 // Binary Value of X-Intel-BIS-ParameterSet Attribute. 31 // (Value is Base-64 encoded in actual signed manifest). 67 // ----------------------------------------------------// 70 // ----------------------------------------------------// 98 /// platform Boot Object Authorization Certificate to create the certificateID. [all …]
|
| /external/cronet/tot/net/cert/internal/ |
| D | revocation_checker.cc | 2 // Use of this source code is governed by a BSD-style license that can be 29 errors->AddError(bssl::cert_errors::kCertificateRevoked); in MarkCertificateRevoked() 55 // Check using stapled OCSP, if available. in CheckCertRevocation() 62 stapled_ocsp_verify_result->response_status = response_details; in CheckCertRevocation() 63 stapled_ocsp_verify_result->revocation_status = ocsp_status; in CheckCertRevocation() 81 // TODO(eroman): Should still check CRL/OCSP caches. in CheckCertRevocation() 87 // Check OCSP. in CheckCertRevocation() 88 if (cert->has_authority_info_access()) { in CheckCertRevocation() 90 for (const auto& ocsp_uri : cert->ocsp_uris()) { in CheckCertRevocation() 101 // Check the deadline after setting found_revocation_info, to not give a in CheckCertRevocation() [all …]
|
| /external/cronet/stable/net/cert/internal/ |
| D | revocation_checker.cc | 2 // Use of this source code is governed by a BSD-style license that can be 29 errors->AddError(bssl::cert_errors::kCertificateRevoked); in MarkCertificateRevoked() 55 // Check using stapled OCSP, if available. in CheckCertRevocation() 62 stapled_ocsp_verify_result->response_status = response_details; in CheckCertRevocation() 63 stapled_ocsp_verify_result->revocation_status = ocsp_status; in CheckCertRevocation() 81 // TODO(eroman): Should still check CRL/OCSP caches. in CheckCertRevocation() 87 // Check OCSP. in CheckCertRevocation() 88 if (cert->has_authority_info_access()) { in CheckCertRevocation() 90 for (const auto& ocsp_uri : cert->ocsp_uris()) { in CheckCertRevocation() 101 // Check the deadline after setting found_revocation_info, to not give a in CheckCertRevocation() [all …]
|
| /external/openthread/third_party/mbedtls/repo/tests/ |
| D | ssl-opt.sh | 3 # ssl-opt.sh 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 21 set -u 25 ulimit -f 20971520 38 : ${GNUTLS_CLI:=gnutls-cli} 39 : ${GNUTLS_SERV:=gnutls-serv} 46 # the variable is set, we can now check its value 54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then 62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"} 65 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key" [all …]
|
| /external/tpm2-tss/src/tss2-fapi/api/ |
| D | Fapi_Provision.c | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright 2018-2019, Fraunhofer SIT sponsored by Infineon Technologies AG 32 /** One-Call function for the initial FAPI provisioning. 35 * and policy settings as well as the readout of the EK and its certificate and 36 * the initialization of the system-wide keystore. 50 * @retval TSS2_FAPI_RC_NO_CERT: if no certificate was found for the computed EK. 52 * configured certificate or the configured fingerprint does not match 57 * @retval TSS2_FAPI_RC_NO_TPM if FAPI was initialized in no-TPM-mode via its 85 /* Check for NULL parameters */ in Fapi_Provision() 88 /* Check whether TCTI and ESYS are initialized */ in Fapi_Provision() [all …]
|
| /external/openscreen/cast/common/certificate/proto/ |
| D | test_suite.proto | 2 // Use of this source code is governed by a BSD-style license that can be 7 package cast.certificate; 11 // A suite of test data to exercise Cast device certificate verification and 21 // The device certificate is valid. 24 // Problem with device certificate or its path. 30 // Device certificate or one of the certificates in its path did not pass the 31 // revocation check. 34 // No CRL was provided, but revocation check is required, and therefore fails. 38 // revocation is checked, the CRL signer cert has expired and the CRL is no 44 // Human-readable description of the test. [all …]
|
| /external/cronet/tot/third_party/boringssl/src/pki/ |
| D | verify_certificate_chain.h | 2 // Use of this source code is governed by a BSD-style license that can be 26 // The key purpose (extended key usage) to check for during verification. 32 // certificate. 35 // certificate. 59 // certificate signing, false otherwise. When false is returned, the caller 69 // otherwise. This is called for each certificate in the chain, including the 70 // target certificate. When false is returned, the caller will add a high 74 // assumed to be non-null. 80 // is no verification cache. 85 // return false here. This should never return true for TLS certificate [all …]
|
| /external/cronet/stable/third_party/boringssl/src/pki/ |
| D | verify_certificate_chain.h | 2 // Use of this source code is governed by a BSD-style license that can be 26 // The key purpose (extended key usage) to check for during verification. 32 // certificate. 35 // certificate. 59 // certificate signing, false otherwise. When false is returned, the caller 69 // otherwise. This is called for each certificate in the chain, including the 70 // target certificate. When false is returned, the caller will add a high 74 // assumed to be non-null. 80 // is no verification cache. 85 // return false here. This should never return true for TLS certificate [all …]
|
| /external/conscrypt/common/src/main/java/org/conscrypt/ |
| D | TrustManagerImpl.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 26 * http://www.apache.org/licenses/LICENSE-2.0 46 import java.security.cert.Certificate; 87 * Comparator used for ordering trust anchors during certificate path building. 98 * The AndroidCAStore if non-null, null otherwise. 103 * The CertPinManager, which validates the chain against a host-to-pin mapping 108 * The backing store for the AndroidCAStore if non-null. This will 130 * non-AndroidCAStore, we initialize this as part of the 266 throw new CertificateException("Not in handshake; no session available"); in getHandshakeSessionOrThrow() 289 throw new CertificateException("Not in handshake; no session available"); in checkClientTrusted() [all …]
|
| /external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
| D | TrustManagerImpl.java | 9 * http://www.apache.org/licenses/LICENSE-2.0 27 * http://www.apache.org/licenses/LICENSE-2.0 47 import java.security.cert.Certificate; 89 * Comparator used for ordering trust anchors during certificate path building. 99 * The AndroidCAStore if non-null, null otherwise. 104 * The CertPinManager, which validates the chain against a host-to-pin mapping 109 * The backing store for the AndroidCAStore if non-null. This will 131 * non-AndroidCAStore, we initialize this as part of the 271 throw new CertificateException("Not in handshake; no session available"); in getHandshakeSessionOrThrow() 296 throw new CertificateException("Not in handshake; no session available"); in checkClientTrusted() [all …]
|
| /external/mbedtls/tests/ |
| D | ssl-opt.sh | 3 # ssl-opt.sh 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 21 set -u 25 ulimit -f 20971520 38 : ${GNUTLS_CLI:=gnutls-cli} 39 : ${GNUTLS_SERV:=gnutls-serv} 46 # the variable is set, we can now check its value 54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then 62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"} 64 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key" [all …]
|
| /external/google-cloud-java/java-compute/proto-google-cloud-compute-v1/src/main/java/com/google/cloud/compute/v1/ |
| D | SecuritySettingsOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 30 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact. 42 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact. 54 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact. 67 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 79 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 91 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 104 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
|
| D | SecuritySettings.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 80 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact. 95 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact. 118 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact. 146 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 160 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 174 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 189 …certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel… 201 private byte memoizedIsInitialized = -1; 228 if (size != -1) return size; in getSerializedSize() [all …]
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
| D | CertPathReviewerMessages.properties | 14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted 15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt… 16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted. 17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is… 21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded 22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded. 23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded. 24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins… 29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi… 31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai… [all …]
|
| /external/trusty/arm-trusted-firmware/docs/security_advisories/ |
| D | security-advisory-tfv-10.rst | 1 Advisory TFV-10 (CVE-2022-47630) 4 +----------------+-------------------------------------------------------------+ 5 | Title | Incorrect validation of X.509 certificate extensions can | 6 | | result in an out-of-bounds read. | 8 | CVE ID | `CVE-2022-47630`_ | 9 +----------------+-------------------------------------------------------------+ 11 +----------------+-------------------------------------------------------------+ 14 +----------------+-------------------------------------------------------------+ 17 | | interfaces. Not exploitable in upstream TF-A code. | 18 +----------------+-------------------------------------------------------------+ [all …]
|
| /external/parameter-framework/upstream/ |
| D | appveyor.yml | 1 version: 3.0.0-{build} 13 # See: https://msdn.microsoft.com/en-us/library/bb513638%28VS.85%29.aspx 14 - reg add "HKLM\SYSTEM\CurrentControlSet\Control\Windows" /f /v ErrorMode /d 2 17 # | Windows can check online for a solution to the problem| 18 # | - Check online for a solution and close the program | 19 # | - Close the program | 20 # See: https://msdn.microsoft.com/en-us/library/bb513638%28VS.85%29.aspx 21 - reg add "HKLM\Software\Microsoft\Windows\Windows Error Reporting" /f /v DontShowUI /d 1 24 - set PREFIX_PATH=%APPVEYOR_BUILD_FOLDER%\asio-1.10.6;%APPVEYOR_BUILD_FOLDER%\catch 26 - set INSTALL=%HOMEPATH%\install [all …]
|
| /external/openthread/src/cli/ |
| D | README_COAPS.md | 1 # OpenThread CLI - CoAPS Example 13 CoAPS uses DTLS to establish a secure, end-to-end connection. 17 - TLS_PSK_WITH_AES_128_CCM_8 20 > coaps psk <your-psk> <your-psk-id> 24 - TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 29 The X.509 certificate stored in `core/cli/x509_cert_key.hpp`. 33 On node 1, setup CoAPS server with resource `test-resource`. 38 > coaps resource test-resource 47 > coaps connect <peer-ip6-address> 50 > coaps get test-resource [all …]
|
| /external/cronet/tot/third_party/boringssl/src/include/openssl/pki/ |
| D | certificate.h | 9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY 29 // Certificate represents a parsed X.509 certificate. It includes accessors for 30 // the various things that one might want to extract from a certificate, 31 class OPENSSL_EXPORT Certificate { 33 Certificate(Certificate&& other); 34 Certificate(const Certificate& other) = delete; 35 ~Certificate(); 36 Certificate& operator=(const Certificate& other) = delete; 38 // FromDER returns a certificate from an DER-encoded X.509 object in |der|. 39 // In the event of a failure, it will return no value, and |out_diagnostic| [all …]
|
| /external/boringssl/src/include/openssl/pki/ |
| D | certificate.h | 9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY 29 // Certificate represents a parsed X.509 certificate. It includes accessors for 30 // the various things that one might want to extract from a certificate, 31 class OPENSSL_EXPORT Certificate { 33 Certificate(Certificate&& other); 34 Certificate(const Certificate& other) = delete; 35 ~Certificate(); 36 Certificate& operator=(const Certificate& other) = delete; 38 // FromDER returns a certificate from an DER-encoded X.509 object in |der|. 39 // In the event of a failure, it will return no value, and |out_diagnostic| [all …]
|
| /external/cronet/stable/third_party/boringssl/src/include/openssl/pki/ |
| D | certificate.h | 9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY 29 // Certificate represents a parsed X.509 certificate. It includes accessors for 30 // the various things that one might want to extract from a certificate, 31 class OPENSSL_EXPORT Certificate { 33 Certificate(Certificate&& other); 34 Certificate(const Certificate& other) = delete; 35 ~Certificate(); 36 Certificate& operator=(const Certificate& other) = delete; 38 // FromDER returns a certificate from an DER-encoded X.509 object in |der|. 39 // In the event of a failure, it will return no value, and |out_diagnostic| [all …]
|
| /external/grpc-grpc-java/xds/src/test/java/io/grpc/xds/internal/security/trust/ |
| D | XdsX509TrustManagerTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 99 fail("no exception thrown"); in missingPeerCerts() 101 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate(s) missing"); in missingPeerCerts() 114 fail("no exception thrown"); in emptyArrayPeerCerts() 116 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate(s) missing"); in emptyArrayPeerCerts() 131 fail("no exception thrown"); in noSansInPeerCerts() 133 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate SAN check failed"); in noSansInPeerCerts() 169 fail("no exception thrown"); in oneSanInPeerCertsVerifies_differentCase_expectException() 171 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate SAN check failed"); in oneSanInPeerCertsVerifies_differentCase_expectException() 217 fail("no exception thrown"); in oneSanInPeerCertsPrefix_differentCase_expectException() [all …]
|
| /external/tpm2-tss/src/tss2-fapi/ |
| D | fapi_crypto.c | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright 2018-2019, Fraunhofer SIT sponsored by Infineon Technologies AG 62 /* Check for NULL parameters */ in ifapi_get_profile_sig_scheme() 69 if (tpmPublic->type == TPM2_ALG_RSA) { in ifapi_get_profile_sig_scheme() 70 *signatureScheme = profile->rsa_signing_scheme; in ifapi_get_profile_sig_scheme() 72 } else if (tpmPublic->type == TPM2_ALG_ECC) { in ifapi_get_profile_sig_scheme() 73 *signatureScheme = profile->ecc_signing_scheme; in ifapi_get_profile_sig_scheme() 168 /* Check for NULL parameters */ in ifapi_initialize_sign_public() 180 LOG_ERROR("No suitable template found"); in ifapi_initialize_sign_public() 199 /* Check for NULL parameters */ in ifapi_bn2binpad() [all …]
|