Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 287) sorted by relevance

12345678910>>...12

/external/syslinux/gpxe/src/crypto/
Dx509.c48 static int x509_public_key ( const struct asn1_cursor *certificate, in x509_public_key() argument
55 memcpy ( &cursor, certificate, sizeof ( cursor ) ); in x509_public_key()
67 DBG_HDA ( 0, certificate->data, certificate->len ); in x509_public_key()
76 DBG_HDA ( 0, certificate->data, certificate->len ); in x509_public_key()
86 DBG_HDA ( 0, certificate->data, certificate->len ); in x509_public_key()
104 int x509_rsa_public_key ( const struct asn1_cursor *certificate, in x509_rsa_public_key() argument
113 if ( ( rc = x509_public_key ( certificate, &algorithm, in x509_rsa_public_key()
121 DBG_HDA ( 0, certificate->data, certificate->len ); in x509_rsa_public_key()
128 DBG_HDA ( 0, certificate->data, certificate->len ); in x509_rsa_public_key()
138 DBG_HDA ( 0, certificate->data, certificate->len ); in x509_rsa_public_key()
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
DCertificatePinnerTest.java49 certA1Pin = CertificatePinner.pin(certA1.certificate);
55 certB1Pin = CertificatePinner.pin(certB1.certificate);
61 certC1Pin = CertificatePinner.pin(certC1.certificate);
95 String keypairACertificate2Pin = CertificatePinner.pin(heldCertificateA2.certificate); in sameKeypairSamePin()
101 String keypairBCertificate2Pin = CertificatePinner.pin(heldCertificateB2.certificate); in sameKeypairSamePin()
113 certificatePinner.check("example.com", certA1.certificate); in successfulCheck()
121 certificatePinner.check("example.com", certA1.certificate, certB1.certificate); in successfulMatchAcceptsAnyMatchingCertificate()
130 certificatePinner.check("example.com", certB1.certificate); in unsuccessfulCheck()
141 certificatePinner.check("example.com", certA1.certificate); in multipleCertificatesForOneHostname()
142 certificatePinner.check("example.com", certB1.certificate); in multipleCertificatesForOneHostname()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java63 X509Certificate certificate) in fromCertificate() argument
68 if (certificate.getVersion() != 3) in fromCertificate()
70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate()
87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
[all …]
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
D00_Descriptions.txt2 tpmtoken_import import a certificate and key
4 tpmtoken_import import a certificate and key
6 tpmtoken_import import a certificate and key with -y option
8 tpmtoken_import import a public certificate and key
10 tpmtoken_import import a public certificate and key
12 tpmtoken_import import a public certificate and key with -y option
14 tpmtoken_import import a certificate
18 tpmtoken_import attempt to import a certificate from a key file
20 tpmtoken_import attempt to import a key from a certificate file
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
DCertificateChainCleanerTest.java36 new RealTrustRootIndex(root.certificate)); in normalizeSingleSelfSignedCertificate()
67 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithRoot()
85 new RealTrustRootIndex(root.certificate)); in orderedChainOfCertificatesWithoutRoot()
107 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithRoot()
129 new RealTrustRootIndex(root.certificate)); in unorderedChainOfCertificatesWithoutRoot()
150 new RealTrustRootIndex(root.certificate)); in unrelatedCertificatesAreOmitted()
173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); in chainGoesAllTheWayToSelfSignedRoot()
194 HeldCertificate certificate = new HeldCertificate.Builder() in trustedRootNotSelfSigned() local
200 new RealTrustRootIndex(trusted.certificate)); in trustedRootNotSelfSigned()
201 assertEquals(list(certificate, intermediateCa, trusted), in trustedRootNotSelfSigned()
[all …]
DCertificatePinnerChainValidationTest.java55 HeldCertificate certificate = new HeldCertificate.Builder() in pinRootNotPresentInChain() local
61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate)) in pinRootNotPresentInChain()
64 .addTrustedCertificate(rootCa.certificate) in pinRootNotPresentInChain()
72 .certificateChain(certificate, intermediateCa) in pinRootNotPresentInChain()
110 HeldCertificate certificate = new HeldCertificate.Builder() in pinIntermediatePresentInChain() local
116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate)) in pinIntermediatePresentInChain()
119 .addTrustedCertificate(rootCa.certificate) in pinIntermediatePresentInChain()
127 .certificateChain(certificate, intermediateCa) in pinIntermediatePresentInChain()
175 .add(server.getHostName(), CertificatePinner.pin(goodCertificate.certificate)) in unrelatedPinnedLeafCertificateInChain()
178 .addTrustedCertificate(rootCa.certificate) in unrelatedPinnedLeafCertificateInChain()
[all …]
DHostnameVerifierTest.java409 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local
420 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp()
422 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp()
561 private X509Certificate certificate(String certificate) throws Exception { in certificate() method in HostnameVerifierTest
563 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate()
566 private SSLSession session(String certificate) throws Exception { in session() argument
567 return new FakeSSLSession(certificate(certificate)); in session()
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
DOkHostnameVerifier.java70 public boolean verify(String host, X509Certificate certificate) { in verify() argument
72 ? verifyIpAddress(host, certificate) in verify()
73 : verifyHostName(host, certificate); in verify()
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
84 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
96 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
99 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
123 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
124 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
125 List<String> altDnsNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in allSubjectAltNames()
[all …]
/external/webrtc/webrtc/base/
Drtccertificate_unittests.cc90 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); in TEST_F()
102 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
104 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F()
110 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
113 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
115 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F()
Dsslidentity_unittest.cc90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
122 rv = identity->certificate().ComputeDigest(algorithm, digest, in TestDigestHelper()
129 rv = identity->certificate().ComputeDigest(algorithm, digest1, in TestDigestHelper()
257 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
284 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
402 identity->certificate().CertificateExpirationTime()); in TestExpireTime()
Dopensslidentity.cc394 OpenSSLCertificate* certificate) in OpenSSLIdentity() argument
395 : key_pair_(key_pair), certificate_(certificate) { in OpenSSLIdentity()
397 ASSERT(certificate != NULL); in OpenSSLIdentity()
406 OpenSSLCertificate* certificate = in GenerateInternal() local
408 if (certificate) in GenerateInternal()
409 return new OpenSSLIdentity(key_pair, certificate); in GenerateInternal()
434 const std::string& certificate) { in FromPEMStrings() argument
436 OpenSSLCertificate::FromPEMString(certificate)); in FromPEMStrings()
461 const OpenSSLCertificate& OpenSSLIdentity::certificate() const { in certificate() function in rtc::OpenSSLIdentity
/external/avb/libavb_atx/
Davb_atx_validate.c78 static bool verify_certificate(AvbAtxCertificate* certificate, in verify_certificate() argument
85 if (certificate->signed_data.version != 1) { in verify_certificate()
90 sha512((const uint8_t*)&certificate->signed_data, in verify_certificate()
95 certificate->signature, in verify_certificate()
104 if (certificate->signed_data.key_version < minimum_key_version) { in verify_certificate()
108 if (0 != avb_safe_memcmp(certificate->signed_data.usage, in verify_certificate()
118 static bool verify_pik_certificate(AvbAtxCertificate* certificate, in verify_pik_certificate() argument
125 certificate, authority, minimum_version, expected_usage)) { in verify_pik_certificate()
134 AvbAtxCertificate* certificate, in verify_psk_certificate() argument
143 certificate, authority, minimum_version, expected_usage)) { in verify_psk_certificate()
[all …]
/external/libmicrohttpd/doc/chapters/
Dtlsauthentication.inc24 In addition to the key, a certificate describing the server in human readable tokens
25 is also needed. This certificate will be attested with our aforementioned key. In this way,
26 we obtain a self-signed certificate, valid for one year.
33 To avoid unnecessary error messages in the browser, the certificate needs to
36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way,
39 Whether the server's certificate is signed by us or a third party, once it has been accepted
62 printf ("The key/certificate files could not be read.\n");
119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (…
167 You can then extract the client certificate:
171 * Get the client's certificate
[all …]
/external/curl/docs/
DSSLCERTS.md23 This system is about trust. In your local CA certificate store you have certs
37 libcurl performs peer SSL certificate verification by default. This is done
38 by using a CA certificate store that the SSL library can use to make sure the
39 peer's server certificate is valid.
45 If the remote server uses a self-signed certificate, if you don't install a CA
46 cert store, if the server uses a certificate signed by a CA that isn't
56 2. Get a CA certificate that can verify the remote server and use the proper
62 3. Add the CA cert for your server to the existing default CA certificate
63 store. The default CA certificate store can changed at compile time with the
66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA
[all …]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build()
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build()
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
DHeldCertificate.java39 public final X509Certificate certificate; field in HeldCertificate
42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) { in HeldCertificate() argument
43 this.certificate = certificate; in HeldCertificate()
110 signedByPrincipal = issuedBy.certificate.getSubjectX500Principal(); in build()
133 X509Certificate certificate = generator.generateX509Certificate( in build() local
135 return new HeldCertificate(certificate, heldKeyPair); in build()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
DIssuerAndSerialNumber.java73 Certificate certificate) in IssuerAndSerialNumber() argument
75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument
85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/
DCertificateEntry.java58 private final byte[] certificate; field in CertificateEntry
60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { in CertificateEntry() argument
73 this.certificate = certificate; in CertificateEntry()
118 return certificate; in getCertificate()
132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES); in encode()
/external/curl/docs/cmdline-opts/
Dcert.d3 Arg: <certificate[:password]>
4 Help: Client certificate file and password
8 Tells curl to use the specified client certificate file when getting a file
9 with HTTPS, FTPS or another SSL-based protocol. The certificate must be in
/external/python/cpython2/Doc/library/
Dssl.rst48 certificate of the other side of the connection, and :meth:`cipher`,which
129 Raised to signal an error with a certificate (such as mismatching
157 contain a certificate to be used to identify the local side of the
159 information on how the certificate is stored in the ``certfile``.
164 The parameter ``cert_reqs`` specifies whether a certificate is required from
243 trust for certificate verification, as in
297 default verification checks that the certificate is signed by a Certificate
299 Alternate Name) on the presented certificate matches the requested host.
304 Setting *enable* to :const:`False` reverts the default HTTPS certificate
308 where the hostname does not match the presented server certificate.
[all …]
/external/conscrypt/openjdk/src/test/resources/
DREADME2 - ca-cert.pem: Root CA certificate
8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate
17 signed by the test CT log, but for another certificate
/external/autotest/client/site_tests/network_DestinationVerification/
Dcontrol13 Tests that we can validate a ChromeCast device by its certificate. This test
15 certificate or validates an invalid certificate. This checks the ways that
17 correct key/certificate formats.
/external/webrtc/webrtc/p2p/base/
Ddtlstransport.h34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) in DtlsTransport() argument
36 certificate_(certificate), in DtlsTransport()
45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override { in SetLocalCertificate() argument
46 certificate_ = certificate; in SetLocalCertificate()
49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override { in GetLocalCertificate() argument
53 *certificate = certificate_; in GetLocalCertificate()

12345678910>>...12