Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 200) sorted by relevance

12345678

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java63 X509Certificate certificate) in fromCertificate() argument
68 if (certificate.getVersion() != 3) in fromCertificate()
70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate()
87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
[all …]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
DOkHostnameVerifier.java71 public boolean verify(String host, X509Certificate certificate) { in verify() argument
73 ? verifyIpAddress(host, certificate) in verify()
74 : verifyHostName(host, certificate); in verify()
84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
97 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
100 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
109 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName()
120 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
121 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
[all …]
/external/webrtc/webrtc/base/
Drtccertificate_unittests.cc90 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); in TEST_F()
102 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
104 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F()
110 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
113 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
115 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F()
Dsslidentity_unittest.cc90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
122 rv = identity->certificate().ComputeDigest(algorithm, digest, in TestDigestHelper()
129 rv = identity->certificate().ComputeDigest(algorithm, digest1, in TestDigestHelper()
257 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
284 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
402 identity->certificate().CertificateExpirationTime()); in TestExpireTime()
Dopensslidentity.cc394 OpenSSLCertificate* certificate) in OpenSSLIdentity() argument
395 : key_pair_(key_pair), certificate_(certificate) { in OpenSSLIdentity()
397 ASSERT(certificate != NULL); in OpenSSLIdentity()
406 OpenSSLCertificate* certificate = in GenerateInternal() local
408 if (certificate) in GenerateInternal()
409 return new OpenSSLIdentity(key_pair, certificate); in GenerateInternal()
434 const std::string& certificate) { in FromPEMStrings() argument
436 OpenSSLCertificate::FromPEMString(certificate)); in FromPEMStrings()
461 const OpenSSLCertificate& OpenSSLIdentity::certificate() const { in certificate() function in rtc::OpenSSLIdentity
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/
DCERT.py68 certificate):
73 self.certificate = certificate
79 dns.rdata._base64ify(self.certificate))
96 certificate = b64.decode('base64_codec')
98 algorithm, certificate)
106 file.write(self.certificate)
115 certificate = wire[current : current + rdlen]
117 certificate)
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build()
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build()
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
/external/libmicrohttpd/doc/chapters/
Dtlsauthentication.inc24 In addition to the key, a certificate describing the server in human readable tokens
25 is also needed. This certificate will be attested with our aforementioned key. In this way,
26 we obtain a self-signed certificate, valid for one year.
33 To avoid unnecessary error messages in the browser, the certificate needs to
36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way,
39 Whether the server's certificate is signed by us or a third party, once it has been accepted
62 printf ("The key/certificate files could not be read.\n");
119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (…
167 You can then extract the client certificate:
171 * Get the client's certificate
[all …]
/external/curl/docs/
DSSLCERTS23 This system is about trust. In your local CA certificate store you have certs
37 libcurl performs peer SSL certificate verification by default. This is done
38 by using a CA certificate store that the SSL library can use to make sure the
39 peer's server certificate is valid.
45 If the remote server uses a self-signed certificate, if you don't install a CA
46 cert store, if the server uses a certificate signed by a CA that isn't
56 2. Get a CA certificate that can verify the remote server and use the proper
62 3. Add the CA cert for your server to the existing default CA certificate
63 store. The default CA certificate store can changed at compile time with the
66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
DIssuerAndSerialNumber.java73 Certificate certificate) in IssuerAndSerialNumber() argument
75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument
85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
/external/conscrypt/src/main/java/org/conscrypt/ct/
DCertificateEntry.java55 private final byte[] certificate; field in CertificateEntry
57 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { in CertificateEntry() argument
70 this.certificate = certificate; in CertificateEntry()
115 return certificate; in getCertificate()
129 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES); in encode()
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
DHostnameVerifierTest.java395 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local
406 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp()
408 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp()
545 private X509Certificate certificate(String certificate) throws Exception { in certificate() argument
547 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate()
550 private SSLSession session(String certificate) throws Exception { in session() argument
551 return new FakeSSLSession(certificate(certificate)); in session()
/external/openssh/
DPROTOCOL.certkeys1 This document describes a simple public-key certificate authentication
15 system already in SSH to allow certificate-based authentication. The
45 algorithm names to add support for certificate authentication without
56 The certificate key types take a similar high-level format (note: data
63 RSA certificate
81 DSA certificate
101 ECDSA certificate
132 serial is an optional certificate serial number set by the CA to
137 type specifies whether this certificate is for identification of a user
146 certificate is valid; hostnames for SSH_CERT_TYPE_HOST certificates and
[all …]
/external/v8/build/config/
Dcrypto.gni15 # Android, the platform certificate library is used for certificate
17 # flag also enables OpenSSL for certificate verification, but this configuration
21 # True if NSS is used for certificate handling. It is possible to use OpenSSL
22 # for the crypto library, but NSS for the platform certificate library.
/external/conscrypt/src/test/resources/
DREADME2 - ca-cert.pem: Root CA certificate
8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate
17 signed by the test CT log, but for another certificate
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DKeyStorePrivateKeyEntryTest.java62 Certificate certificate = cf.generateCertificate(certArray); in testGetCertificateChain() local
63 assertTrue(certificate instanceof X509Certificate); in testGetCertificateChain()
65 String algorithm = certificate.getPublicKey().getAlgorithm(); in testGetCertificateChain()
74 privateKey, new Certificate[] { certificate }); in testGetCertificateChain()
DKeyStore3Test.java52 private Certificate certificate; field in KeyStore3Test
83 certificate = cf.generateCertificate(certArray); in KeyStore3Test()
113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_null()
134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_private()
143 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_public()
151 mockKeyStore.setCertificateEntry(null, certificate); in test_setCertificateEntry_null()
/external/autotest/client/site_tests/network_DestinationVerification/
Dcontrol14 Tests that we can validate a ChromeCast device by its certificate. This test
16 certificate or validates an invalid certificate. This checks the ways that
18 correct key/certificate formats.
/external/tlsdate/src/
Dtlsdate-helper-plan9.c470 X509 *certificate; in check_cn() local
477 certificate = SSL_get_peer_certificate(ssl); in check_cn()
478 if (NULL == certificate) in check_cn()
484 xname = X509_get_subject_name(certificate); in check_cn()
502 X509_free(certificate); in check_cn()
662 X509 *certificate; in verify_signature() local
664 certificate = SSL_get_peer_certificate(ssl); in verify_signature()
665 if (NULL == certificate) in verify_signature()
692 const x509_cert *certificate; in check_key_length() local
696 certificate = ssl_get_peer_cert (ssl); in check_key_length()
[all …]
Dtlsdate-helper.c606 X509 *certificate; in check_cn() local
613 certificate = SSL_get_peer_certificate(ssl); in check_cn()
614 if (NULL == certificate) in check_cn()
620 xname = X509_get_subject_name(certificate); in check_cn()
638 X509_free(certificate); in check_cn()
799 X509 *certificate; in verify_signature() local
801 certificate = SSL_get_peer_certificate(ssl); in verify_signature()
802 if (NULL == certificate) in verify_signature()
829 const x509_cert *certificate; in check_key_length() local
833 certificate = ssl_get_peer_cert (ssl); in check_key_length()
[all …]
/external/webrtc/webrtc/p2p/base/
Ddtlstransport.h34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) in DtlsTransport() argument
36 certificate_(certificate), in DtlsTransport()
45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override { in SetLocalCertificate() argument
46 certificate_ = certificate; in SetLocalCertificate()
49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override { in GetLocalCertificate() argument
53 *certificate = certificate_; in GetLocalCertificate()
Dtransportdescriptionfactory.h38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { in certificate() function
46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { in set_certificate() argument
47 certificate_ = certificate; in set_certificate()
/external/apache-http/android/src/android/net/http/
DLoggingEventHandler.java69 public void certificate(SslCertificate certificate) { in certificate() method in LoggingEventHandler
71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate); in certificate()

12345678