Home
last modified time | relevance | path

Searched +full:- +full:- +full:no +full:- +full:check +full:- +full:certificate (Results 1 – 25 of 1027) sorted by relevance

12345678910>>...42

/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/
DBis.h2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block
3 against a digital certificate for the purpose of an integrity and authorization check.
5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
6 SPDX-License-Identifier: BSD-2-Clause-Patent
22 // X-Intel-BIS-ParameterSet
24 // Binary Value of X-Intel-BIS-ParameterSet Attribute.
25 // (Value is Base-64 encoded in actual signed manifest).
61 // ----------------------------------------------------//
64 // ----------------------------------------------------//
92 /// platform Boot Object Authorization Certificate to create the certificateID.
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/
DBis.h2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block
3 against a digital certificate for the purpose of an integrity and authorization check.
5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
6 SPDX-License-Identifier: BSD-2-Clause-Patent
22 // X-Intel-BIS-ParameterSet
24 // Binary Value of X-Intel-BIS-ParameterSet Attribute.
25 // (Value is Base-64 encoded in actual signed manifest).
61 // ----------------------------------------------------//
64 // ----------------------------------------------------//
92 /// platform Boot Object Authorization Certificate to create the certificateID.
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/
DBis.h2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block
3 against a digital certificate for the purpose of an integrity and authorization check.
5 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
6 SPDX-License-Identifier: BSD-2-Clause-Patent
22 // X-Intel-BIS-ParameterSet
24 // Binary Value of X-Intel-BIS-ParameterSet Attribute.
25 // (Value is Base-64 encoded in actual signed manifest).
58 // ----------------------------------------------------//
61 // ----------------------------------------------------//
89 /// platform Boot Object Authorization Certificate to create the certificateID.
[all …]
/external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/
DBis.h2 The EFI_BIS_PROTOCOL is used to check a digital signature of a data block
3 against a digital certificate for the purpose of an integrity and authorization check.
5 Copyright (c) 2006 - 2010, Intel Corporation. All rights reserved.<BR>
9 http://opensource.org/licenses/bsd-license.php.
28 // X-Intel-BIS-ParameterSet
30 // Binary Value of X-Intel-BIS-ParameterSet Attribute.
31 // (Value is Base-64 encoded in actual signed manifest).
67 // ----------------------------------------------------//
70 // ----------------------------------------------------//
98 /// platform Boot Object Authorization Certificate to create the certificateID.
[all …]
/external/cronet/tot/net/cert/internal/
Drevocation_checker.cc2 // Use of this source code is governed by a BSD-style license that can be
29 errors->AddError(bssl::cert_errors::kCertificateRevoked); in MarkCertificateRevoked()
55 // Check using stapled OCSP, if available. in CheckCertRevocation()
62 stapled_ocsp_verify_result->response_status = response_details; in CheckCertRevocation()
63 stapled_ocsp_verify_result->revocation_status = ocsp_status; in CheckCertRevocation()
81 // TODO(eroman): Should still check CRL/OCSP caches. in CheckCertRevocation()
87 // Check OCSP. in CheckCertRevocation()
88 if (cert->has_authority_info_access()) { in CheckCertRevocation()
90 for (const auto& ocsp_uri : cert->ocsp_uris()) { in CheckCertRevocation()
101 // Check the deadline after setting found_revocation_info, to not give a in CheckCertRevocation()
[all …]
/external/cronet/stable/net/cert/internal/
Drevocation_checker.cc2 // Use of this source code is governed by a BSD-style license that can be
29 errors->AddError(bssl::cert_errors::kCertificateRevoked); in MarkCertificateRevoked()
55 // Check using stapled OCSP, if available. in CheckCertRevocation()
62 stapled_ocsp_verify_result->response_status = response_details; in CheckCertRevocation()
63 stapled_ocsp_verify_result->revocation_status = ocsp_status; in CheckCertRevocation()
81 // TODO(eroman): Should still check CRL/OCSP caches. in CheckCertRevocation()
87 // Check OCSP. in CheckCertRevocation()
88 if (cert->has_authority_info_access()) { in CheckCertRevocation()
90 for (const auto& ocsp_uri : cert->ocsp_uris()) { in CheckCertRevocation()
101 // Check the deadline after setting found_revocation_info, to not give a in CheckCertRevocation()
[all …]
/external/openthread/third_party/mbedtls/repo/tests/
Dssl-opt.sh3 # ssl-opt.sh
6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
21 set -u
25 ulimit -f 20971520
38 : ${GNUTLS_CLI:=gnutls-cli}
39 : ${GNUTLS_SERV:=gnutls-serv}
46 # the variable is set, we can now check its value
54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then
62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"}
65 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key"
[all …]
/external/tpm2-tss/src/tss2-fapi/api/
DFapi_Provision.c1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright 2018-2019, Fraunhofer SIT sponsored by Infineon Technologies AG
32 /** One-Call function for the initial FAPI provisioning.
35 * and policy settings as well as the readout of the EK and its certificate and
36 * the initialization of the system-wide keystore.
50 * @retval TSS2_FAPI_RC_NO_CERT: if no certificate was found for the computed EK.
52 * configured certificate or the configured fingerprint does not match
57 * @retval TSS2_FAPI_RC_NO_TPM if FAPI was initialized in no-TPM-mode via its
85 /* Check for NULL parameters */ in Fapi_Provision()
88 /* Check whether TCTI and ESYS are initialized */ in Fapi_Provision()
[all …]
/external/openscreen/cast/common/certificate/proto/
Dtest_suite.proto2 // Use of this source code is governed by a BSD-style license that can be
7 package cast.certificate;
11 // A suite of test data to exercise Cast device certificate verification and
21 // The device certificate is valid.
24 // Problem with device certificate or its path.
30 // Device certificate or one of the certificates in its path did not pass the
31 // revocation check.
34 // No CRL was provided, but revocation check is required, and therefore fails.
38 // revocation is checked, the CRL signer cert has expired and the CRL is no
44 // Human-readable description of the test.
[all …]
/external/cronet/tot/third_party/boringssl/src/pki/
Dverify_certificate_chain.h2 // Use of this source code is governed by a BSD-style license that can be
26 // The key purpose (extended key usage) to check for during verification.
32 // certificate.
35 // certificate.
59 // certificate signing, false otherwise. When false is returned, the caller
69 // otherwise. This is called for each certificate in the chain, including the
70 // target certificate. When false is returned, the caller will add a high
74 // assumed to be non-null.
80 // is no verification cache.
85 // return false here. This should never return true for TLS certificate
[all …]
/external/cronet/stable/third_party/boringssl/src/pki/
Dverify_certificate_chain.h2 // Use of this source code is governed by a BSD-style license that can be
26 // The key purpose (extended key usage) to check for during verification.
32 // certificate.
35 // certificate.
59 // certificate signing, false otherwise. When false is returned, the caller
69 // otherwise. This is called for each certificate in the chain, including the
70 // target certificate. When false is returned, the caller will add a high
74 // assumed to be non-null.
80 // is no verification cache.
85 // return false here. This should never return true for TLS certificate
[all …]
/external/conscrypt/common/src/main/java/org/conscrypt/
DTrustManagerImpl.java8 * http://www.apache.org/licenses/LICENSE-2.0
26 * http://www.apache.org/licenses/LICENSE-2.0
46 import java.security.cert.Certificate;
87 * Comparator used for ordering trust anchors during certificate path building.
98 * The AndroidCAStore if non-null, null otherwise.
103 * The CertPinManager, which validates the chain against a host-to-pin mapping
108 * The backing store for the AndroidCAStore if non-null. This will
130 * non-AndroidCAStore, we initialize this as part of the
266 throw new CertificateException("Not in handshake; no session available"); in getHandshakeSessionOrThrow()
289 throw new CertificateException("Not in handshake; no session available"); in checkClientTrusted()
[all …]
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DTrustManagerImpl.java9 * http://www.apache.org/licenses/LICENSE-2.0
27 * http://www.apache.org/licenses/LICENSE-2.0
47 import java.security.cert.Certificate;
89 * Comparator used for ordering trust anchors during certificate path building.
99 * The AndroidCAStore if non-null, null otherwise.
104 * The CertPinManager, which validates the chain against a host-to-pin mapping
109 * The backing store for the AndroidCAStore if non-null. This will
131 * non-AndroidCAStore, we initialize this as part of the
271 throw new CertificateException("Not in handshake; no session available"); in getHandshakeSessionOrThrow()
296 throw new CertificateException("Not in handshake; no session available"); in checkClientTrusted()
[all …]
/external/mbedtls/tests/
Dssl-opt.sh3 # ssl-opt.sh
6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
21 set -u
25 ulimit -f 20971520
38 : ${GNUTLS_CLI:=gnutls-cli}
39 : ${GNUTLS_SERV:=gnutls-serv}
46 # the variable is set, we can now check its value
54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then
62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"}
64 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key"
[all …]
/external/google-cloud-java/java-compute/proto-google-cloud-compute-v1/src/main/java/com/google/cloud/compute/v1/
DSecuritySettingsOrBuilder.java8 * https://www.apache.org/licenses/LICENSE-2.0
30 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
42 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
54 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
67certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
79certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
91certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
104certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
DSecuritySettings.java8 * https://www.apache.org/licenses/LICENSE-2.0
80 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
95 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
118 …MANAGED. If left blank, communications are not encrypted. Note: This field currently has no impact.
146certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
160certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
174certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
189certificate to the client, the client inspects the certificate's subjectAltName field. If the fiel…
201 private byte memoizedIsInitialized = -1;
228 if (size != -1) return size; in getSerializedSize()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/trusty/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-10.rst1 Advisory TFV-10 (CVE-2022-47630)
4 +----------------+-------------------------------------------------------------+
5 | Title | Incorrect validation of X.509 certificate extensions can |
6 | | result in an out-of-bounds read. |
8 | CVE ID | `CVE-2022-47630`_ |
9 +----------------+-------------------------------------------------------------+
11 +----------------+-------------------------------------------------------------+
14 +----------------+-------------------------------------------------------------+
17 | | interfaces. Not exploitable in upstream TF-A code. |
18 +----------------+-------------------------------------------------------------+
[all …]
/external/parameter-framework/upstream/
Dappveyor.yml1 version: 3.0.0-{build}
13 # See: https://msdn.microsoft.com/en-us/library/bb513638%28VS.85%29.aspx
14 - reg add "HKLM\SYSTEM\CurrentControlSet\Control\Windows" /f /v ErrorMode /d 2
17 # | Windows can check online for a solution to the problem|
18 # | - Check online for a solution and close the program |
19 # | - Close the program |
20 # See: https://msdn.microsoft.com/en-us/library/bb513638%28VS.85%29.aspx
21 - reg add "HKLM\Software\Microsoft\Windows\Windows Error Reporting" /f /v DontShowUI /d 1
24 - set PREFIX_PATH=%APPVEYOR_BUILD_FOLDER%\asio-1.10.6;%APPVEYOR_BUILD_FOLDER%\catch
26 - set INSTALL=%HOMEPATH%\install
[all …]
/external/openthread/src/cli/
DREADME_COAPS.md1 # OpenThread CLI - CoAPS Example
13 CoAPS uses DTLS to establish a secure, end-to-end connection.
17 - TLS_PSK_WITH_AES_128_CCM_8
20 > coaps psk <your-psk> <your-psk-id>
24 - TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
29 The X.509 certificate stored in `core/cli/x509_cert_key.hpp`.
33 On node 1, setup CoAPS server with resource `test-resource`.
38 > coaps resource test-resource
47 > coaps connect <peer-ip6-address>
50 > coaps get test-resource
[all …]
/external/cronet/tot/third_party/boringssl/src/include/openssl/pki/
Dcertificate.h9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
29 // Certificate represents a parsed X.509 certificate. It includes accessors for
30 // the various things that one might want to extract from a certificate,
31 class OPENSSL_EXPORT Certificate {
33 Certificate(Certificate&& other);
34 Certificate(const Certificate& other) = delete;
35 ~Certificate();
36 Certificate& operator=(const Certificate& other) = delete;
38 // FromDER returns a certificate from an DER-encoded X.509 object in |der|.
39 // In the event of a failure, it will return no value, and |out_diagnostic|
[all …]
/external/boringssl/src/include/openssl/pki/
Dcertificate.h9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
29 // Certificate represents a parsed X.509 certificate. It includes accessors for
30 // the various things that one might want to extract from a certificate,
31 class OPENSSL_EXPORT Certificate {
33 Certificate(Certificate&& other);
34 Certificate(const Certificate& other) = delete;
35 ~Certificate();
36 Certificate& operator=(const Certificate& other) = delete;
38 // FromDER returns a certificate from an DER-encoded X.509 object in |der|.
39 // In the event of a failure, it will return no value, and |out_diagnostic|
[all …]
/external/cronet/stable/third_party/boringssl/src/include/openssl/pki/
Dcertificate.h9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
29 // Certificate represents a parsed X.509 certificate. It includes accessors for
30 // the various things that one might want to extract from a certificate,
31 class OPENSSL_EXPORT Certificate {
33 Certificate(Certificate&& other);
34 Certificate(const Certificate& other) = delete;
35 ~Certificate();
36 Certificate& operator=(const Certificate& other) = delete;
38 // FromDER returns a certificate from an DER-encoded X.509 object in |der|.
39 // In the event of a failure, it will return no value, and |out_diagnostic|
[all …]
/external/grpc-grpc-java/xds/src/test/java/io/grpc/xds/internal/security/trust/
DXdsX509TrustManagerTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
99 fail("no exception thrown"); in missingPeerCerts()
101 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate(s) missing"); in missingPeerCerts()
114 fail("no exception thrown"); in emptyArrayPeerCerts()
116 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate(s) missing"); in emptyArrayPeerCerts()
131 fail("no exception thrown"); in noSansInPeerCerts()
133 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate SAN check failed"); in noSansInPeerCerts()
169 fail("no exception thrown"); in oneSanInPeerCertsVerifies_differentCase_expectException()
171 assertThat(expected).hasMessageThat().isEqualTo("Peer certificate SAN check failed"); in oneSanInPeerCertsVerifies_differentCase_expectException()
217 fail("no exception thrown"); in oneSanInPeerCertsPrefix_differentCase_expectException()
[all …]
/external/tpm2-tss/src/tss2-fapi/
Dfapi_crypto.c1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright 2018-2019, Fraunhofer SIT sponsored by Infineon Technologies AG
62 /* Check for NULL parameters */ in ifapi_get_profile_sig_scheme()
69 if (tpmPublic->type == TPM2_ALG_RSA) { in ifapi_get_profile_sig_scheme()
70 *signatureScheme = profile->rsa_signing_scheme; in ifapi_get_profile_sig_scheme()
72 } else if (tpmPublic->type == TPM2_ALG_ECC) { in ifapi_get_profile_sig_scheme()
73 *signatureScheme = profile->ecc_signing_scheme; in ifapi_get_profile_sig_scheme()
168 /* Check for NULL parameters */ in ifapi_initialize_sign_public()
180 LOG_ERROR("No suitable template found"); in ifapi_initialize_sign_public()
199 /* Check for NULL parameters */ in ifapi_bn2binpad()
[all …]

12345678910>>...42