Home
last modified time | relevance | path

Searched full:certificate (Results 1 – 25 of 2172) sorted by relevance

12345678910>>...87

/external/python/google-api-python-client/docs/dyn/
Dappengine_v1.apps.authorizedCertificates.html79 <p class="firstline">Uploads the specified SSL certificate.</p>
82 <p class="firstline">Deletes the specified SSL certificate.</p>
85 <p class="firstline">Gets the specified SSL certificate.</p>
94certificate. To renew a certificate and maintain its existing domain mappings, update certificate_…
98 <pre>Uploads the specified SSL certificate.
105 { # An SSL certificate that a user has been authorized to administer. A user is authorized to admin…
106 … The user-specified display name of the certificate. This is not guaranteed to be unique. Example:…
108 …"domainMappingsCount": 42, # Aggregate count of the domain mappings with this certificate mapped. …
109certificate mapped. Example: apps/myapp/domainMappings/example.com.This may not represent the full…
112 …tring", # The time when this certificate expires. To update the renewal time on this certificate, …
[all …]
Dappengine_v1alpha.apps.authorizedCertificates.html79 <p class="firstline">Uploads the specified SSL certificate.</p>
82 <p class="firstline">Deletes the specified SSL certificate.</p>
85 <p class="firstline">Gets the specified SSL certificate.</p>
94certificate. To renew a certificate and maintain its existing domain mappings, update certificate_…
98 <pre>Uploads the specified SSL certificate.
105 { # An SSL certificate that a user has been authorized to administer. A user is authorized to admin…
106 … The user-specified display name of the certificate. This is not guaranteed to be unique. Example:…
108 …"domainMappingsCount": 42, # Aggregate count of the domain mappings with this certificate mapped. …
109certificate mapped. Example: apps/myapp/domainMappings/example.com.This may not represent the full…
112 …tring", # The time when this certificate expires. To update the renewal time on this certificate, …
[all …]
Dappengine_v1beta.apps.authorizedCertificates.html79 <p class="firstline">Uploads the specified SSL certificate.</p>
82 <p class="firstline">Deletes the specified SSL certificate.</p>
85 <p class="firstline">Gets the specified SSL certificate.</p>
94certificate. To renew a certificate and maintain its existing domain mappings, update certificate_…
98 <pre>Uploads the specified SSL certificate.
105 { # An SSL certificate that a user has been authorized to administer. A user is authorized to admin…
106 … The user-specified display name of the certificate. This is not guaranteed to be unique. Example:…
108 …"domainMappingsCount": 42, # Aggregate count of the domain mappings with this certificate mapped. …
109certificate mapped. Example: apps/myapp/domainMappings/example.com.This may not represent the full…
112 …tring", # The time when this certificate expires. To update the renewal time on this certificate, …
[all …]
Dfirebasehosting_v1beta1.sites.domains.html117 …"provisioning": { # The current certificate provisioning status information for a domain. # Output…
119 …tChallengeHttp": { # Represents an HTTP certificate challenge. # The HTTP challenge for generating…
121 # certificate challenge.
122 … "token": "A String", # The token to serve at the specified URL path to satisfy the certificate
128 …"certChallengeDiscoveredTxt": [ # The TXT records (for the certificate challenge) that were found …
136 …"certChallengeDns": { # Represents a DNS certificate challenge. # The DNS challenge for generating…
142 "certStatus": "A String", # The certificate provisioning status; updated when Firebase Hosting
143 # provisions an SSL certificate for the domain.
166 …"provisioning": { # The current certificate provisioning status information for a domain. # Output…
168 …tChallengeHttp": { # Represents an HTTP certificate challenge. # The HTTP challenge for generating…
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/rust/crates/grpcio-sys/grpc/include/grpc/
Dgrpc_security_constants.h55 /** Callback results for dynamically loading a SSL certificate config. */
63 /** Server does not request client certificate.
64 The certificate presented by the client is not checked by the server at
65 all. (A client may present a self signed or signed certificate or not
66 present a certificate at all and any of those option would be accepted) */
68 /** Server requests client certificate but does not enforce that the client
69 presents a certificate.
71 If the client presents a certificate, the client authentication is left to
75 The client's key certificate pair must be valid for the SSL connection to
78 /** Server requests client certificate but does not enforce that the client
[all …]
/external/rust/crates/grpcio-sys/grpc/spm-core-include/grpc/
Dgrpc_security_constants.h55 /** Callback results for dynamically loading a SSL certificate config. */
63 /** Server does not request client certificate.
64 The certificate presented by the client is not checked by the server at
65 all. (A client may present a self signed or signed certificate or not
66 present a certificate at all and any of those option would be accepted) */
68 /** Server requests client certificate but does not enforce that the client
69 presents a certificate.
71 If the client presents a certificate, the client authentication is left to
75 The client's key certificate pair must be valid for the SSL connection to
78 /** Server requests client certificate but does not enforce that the client
[all …]
/external/python/cryptography/vectors/cryptography_vectors/x509/PKITS_data/
Dpkits.ldif124 dn: CN=Valid EE Certificate Test1,O=Test Certificates 2011,C=US
126 cn: Valid EE Certificate Test1
158 dn: CN=Invalid CA notBefore Date EE Certificate Test1,O=Test Certificates 2011,C=US
160 cn: Invalid CA notBefore Date EE Certificate Test1
164 dn: CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US
166 cn: Invalid EE notBefore Date EE Certificate Test2
170 dn: CN=Valid pre2000 UTC notBefore Date EE Certificate Test3,O=Test Certificates 2011,C=US
172 cn: Valid pre2000 UTC notBefore Date EE Certificate Test3
176 dn: CN=Valid GeneralizedTime notBefore Date EE Certificate Test4,O=Test Certificates 2011,C=US
178 cn: Valid GeneralizedTime notBefore Date EE Certificate Test4
[all …]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
DX509CertificateHolder.java17 import org.bouncycastle.asn1.x509.Certificate;
27 * Holding class for an X.509 Certificate structure.
34 private transient Certificate x509Certificate;
37 private static Certificate parseBytes(byte[] certEncoding) in parseBytes()
42 return Certificate.getInstance(CertUtils.parseNonEmptyASN1(certEncoding)); in parseBytes()
57 * @param certEncoding BER/DER encoding of the certificate.
69 * @param x509Certificate an ASN.1 Certificate structure.
71 public X509CertificateHolder(Certificate x509Certificate) in X509CertificateHolder()
76 private void init(Certificate x509Certificate) in init()
96 * Return whether or not the holder's certificate contains extensions.
[all …]
/external/python/cryptography/docs/development/
Dtest-vectors.rst103 the private key for the certificate ``x509/custom/ca/ca.pem``. This key is
174 certificate.
178 * ``cryptography.io.pem`` - A leaf certificate issued by RapidSSL for the
181 ``cryptography.io.pem`` certificate.
182 * ``cryptography.io.precert.pem`` - A pre-certificate with the CT poison
184 * ``cryptography-scts.io.pem`` - A leaf certificate issued by Let's Encrypt for
185 the cryptography website which contains signed certificate timestamps.
186 * ``wildcard_san.pem`` - A leaf certificate issued by a public CA for
188 * ``san_edipartyname.der`` - A DSA certificate from a `Mozilla bug`_
190 * ``san_x400address.der`` - A DSA certificate from a `Mozilla bug`_ containing
[all …]
/external/grpc-grpc/include/grpc/
Dgrpc_security_constants.h52 /** Callback results for dynamically loading a SSL certificate config. */
60 /** Server does not request client certificate.
61 The certificate presented by the client is not checked by the server at
62 all. (A client may present a self signed or signed certificate or not
63 present a certificate at all and any of those option would be accepted) */
65 /** Server requests client certificate but does not enforce that the client
66 presents a certificate.
68 If the client presents a certificate, the client authentication is left to
72 The client's key certificate pair must be valid for the SSL connection to
75 /** Server requests client certificate but does not enforce that the client
[all …]
/external/libcups/scheduler/
Dcert.c2 * Authentication certificate routines for the CUPS scheduler.
31 * 'cupsdAddCert()' - Add a certificate.
40 cupsd_cert_t *cert; /* Current certificate */ in cupsdAddCert()
41 int fd; /* Certificate file */ in cupsdAddCert()
42 char filename[1024]; /* Certificate filename */ in cupsdAddCert()
47 cupsdLogMessage(CUPSD_LOG_DEBUG, "cupsdAddCert: Adding certificate for PID %d", pid); in cupsdAddCert()
50 * Allocate memory for the certificate... in cupsdAddCert()
57 * Fill in the certificate information... in cupsdAddCert()
65 cert->certificate[i] = hex[CUPS_RAND() & 15]; in cupsdAddCert()
68 * Save the certificate to a file readable only by the User and Group in cupsdAddCert()
[all …]
/external/arm-trusted-firmware/docs/design/
Dtrusted-board-boot.rst35 Certificate Authority (CA) because the CoT is not established by verifying the
36 validity of a certificate's issuer but by the content of the certificate
44 with the hash extracted from the content certificate. Various hash algorithms
53 The private part of this key is used to sign the BL2 content certificate and
54 the trusted key certificate. The public part is the ROTPK.
60 one of the extension fields in the trusted world certificate.
64 The private part is used to sign the key certificate corresponding to the
66 extension fields in the trusted world certificate.
71 sign the content certificate for the BL3X image. The public part is stored
72 in one of the extension fields in the corresponding key certificate.
[all …]
/external/tpm2-tss/src/tss2-fapi/
Dfapi_certificates.h10 /* IFX RSA root certificate */
11 "-----BEGIN CERTIFICATE-----\n"
43 "-----END CERTIFICATE-----\n",
45 /* IFX ECC root certificate */
46 "-----BEGIN CERTIFICATE-----\n"
60 "-----END CERTIFICATE-----\n",
62 /* Intel root certificate */
63 "-----BEGIN CERTIFICATE-----\n"
78 "-----END CERTIFICATE-----",
80 /* STM RSA root certificate */
[all …]
/external/arm-trusted-firmware/tools/cert_create/src/tbbr/
Dtbb_cert.c15 * tbb_cert.h. All certificates are self-signed, so the issuer certificate
22 .help_msg = "Trusted Boot FW Certificate (output file)",
24 .cn = "Trusted Boot FW Certificate",
39 .help_msg = "Trusted Key Certificate (output file)",
41 .cn = "Trusted Key Certificate",
54 .help_msg = "SCP Firmware Key Certificate (output file)",
56 .cn = "SCP Firmware Key Certificate",
68 .help_msg = "SCP Firmware Content Certificate (output file)",
70 .cn = "SCP Firmware Content Certificate",
82 .help_msg = "SoC Firmware Key Certificate (output file)",
[all …]
/external/curl/docs/
DSSLCERTS.md1 SSL Certificate Verification
23 This system is about trust. In your local CA certificate store you have certs
24 from *trusted* Certificate Authorities that you then can use to verify that the
34 Certificate Verification
37 libcurl performs peer SSL certificate verification by default. This is done
38 by using a CA certificate store that the SSL library can use to make sure the
39 peer's server certificate is valid.
45 If the remote server uses a self-signed certificate, if you don't install a CA
46 cert store, if the server uses a certificate signed by a CA that isn't
56 2. Get a CA certificate that can verify the remote server and use the proper
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/isismtt/
DISISMTTObjectIdentifiers.java18 * The id-isismtt-cp-accredited OID indicates that the certificate is a
19 * qualified certificate according to Directive 1999/93/EC of the European
33 * Certificate extensionDate of certificate generation
42 * Attribute to indicate that the certificate holder may sign in the name of
43 * a third person. May also be used as extension in a certificate.
51 * attribute in attribute certificate or as extension in a certificate
70 * certificate or as extension in a certificate
88 * certificate and that is used as "security anchor".
98 * Some other restriction regarding the usage of this certificate. May be
99 * used as attribute in attribute certificate or as extension in a
[all …]
/external/boringssl/src/crypto/x509/
Dx509_txt.c65 return "unable to get issuer certificate"; in X509_verify_cert_error_string()
67 return "unable to get certificate CRL"; in X509_verify_cert_error_string()
69 return "unable to decrypt certificate's signature"; in X509_verify_cert_error_string()
75 return "certificate signature failure"; in X509_verify_cert_error_string()
79 return "certificate is not yet valid"; in X509_verify_cert_error_string()
83 return "certificate has expired"; in X509_verify_cert_error_string()
87 return "format error in certificate's notBefore field"; in X509_verify_cert_error_string()
89 return "format error in certificate's notAfter field"; in X509_verify_cert_error_string()
97 return "self signed certificate"; in X509_verify_cert_error_string()
99 return "self signed certificate in certificate chain"; in X509_verify_cert_error_string()
[all …]
/external/openscreen/cast/common/certificate/
Dcast_cert_validator_unittest.cc5 #include "cast/common/certificate/cast_cert_validator.h"
10 #include "cast/common/certificate/cast_cert_validator_internal.h"
11 #include "cast/common/certificate/testing/test_helpers.h"
26 // Instead of using the built-in trust store, use root certificate in the
35 // a Cast device certificate yields |expected_result|.
41 // device certificate.
42 // * |time| - The timestamp to use when verifying the certificate.
46 // a valid signature generated by the device certificate.
67 // Parse the root certificate of the chain. in RunTest()
112 // If valid signatures are known for this device certificate, test them. in RunTest()
[all …]
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/isismtt/
DISISMTTObjectIdentifiers.java20 * The id-isismtt-cp-accredited OID indicates that the certificate is a
21 * qualified certificate according to Directive 1999/93/EC of the European
35 * Certificate extensionDate of certificate generation
44 * Attribute to indicate that the certificate holder may sign in the name of
45 * a third person. May also be used as extension in a certificate.
53 * attribute in attribute certificate or as extension in a certificate
72 * certificate or as extension in a certificate
90 * certificate and that is used as "security anchor".
100 * Some other restriction regarding the usage of this certificate. May be
101 * used as attribute in attribute certificate or as extension in a
[all …]
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/isismtt/
DISISMTTObjectIdentifiers.java20 * The id-isismtt-cp-accredited OID indicates that the certificate is a
21 * qualified certificate according to Directive 1999/93/EC of the European
35 * Certificate extensionDate of certificate generation
44 * Attribute to indicate that the certificate holder may sign in the name of
45 * a third person. May also be used as extension in a certificate.
53 * attribute in attribute certificate or as extension in a certificate
72 * certificate or as extension in a certificate
90 * certificate and that is used as "security anchor".
100 * Some other restriction regarding the usage of this certificate. May be
101 * used as attribute in attribute certificate or as extension in a
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509/
Dx509_txt.c65 return ("unable to get issuer certificate"); in X509_verify_cert_error_string()
67 return ("unable to get certificate CRL"); in X509_verify_cert_error_string()
69 return ("unable to decrypt certificate's signature"); in X509_verify_cert_error_string()
75 return ("certificate signature failure"); in X509_verify_cert_error_string()
79 return ("certificate is not yet valid"); in X509_verify_cert_error_string()
83 return ("certificate has expired"); in X509_verify_cert_error_string()
87 return ("format error in certificate's notBefore field"); in X509_verify_cert_error_string()
89 return ("format error in certificate's notAfter field"); in X509_verify_cert_error_string()
97 return ("self signed certificate"); in X509_verify_cert_error_string()
99 return ("self signed certificate in certificate chain"); in X509_verify_cert_error_string()
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
DCertificatePinnerChainValidationTest.java42 /** The pinner should pull the root certificate from the trust manager. */
55 HeldCertificate certificate = new HeldCertificate.Builder() in pinRootNotPresentInChain() local
61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate)) in pinRootNotPresentInChain()
64 .addTrustedCertificate(rootCa.certificate) in pinRootNotPresentInChain()
72 .certificateChain(certificate, intermediateCa) in pinRootNotPresentInChain()
110 HeldCertificate certificate = new HeldCertificate.Builder() in pinIntermediatePresentInChain() local
116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate)) in pinIntermediatePresentInChain()
119 .addTrustedCertificate(rootCa.certificate) in pinIntermediatePresentInChain()
127 .certificateChain(certificate, intermediateCa) in pinIntermediatePresentInChain()
153 // Start with a trusted root CA certificate. in unrelatedPinnedLeafCertificateInChain()
[all …]
/external/python/cryptography/docs/x509/
Dtutorial.rst7 Creating a Certificate Signing Request (CSR)
10 When obtaining a certificate from a certificate authority (CA), the usual
14 2. You create a request for a certificate, which is signed by your key (to
18 certificate for.
19 5. The CA gives you a certificate, signed by them, which identifies your public
21 6. You configure your server to use that certificate, combined with your
24 If you want to obtain a certificate from a typical commercial CA, here's how.
50 Next we need to generate a certificate signing request. A typical CSR contains
55 * Information about what domains this certificate is for.
72 ... # Describe what sites we want this certificate for.
[all …]
/external/openscreen/cast/common/
DBUILD.gn28 source_set("certificate") {
30 "certificate/cast_cert_validator.cc",
31 "certificate/cast_cert_validator.h",
32 "certificate/cast_cert_validator_internal.cc",
33 "certificate/cast_cert_validator_internal.h",
34 "certificate/cast_crl.cc",
35 "certificate/cast_crl.h",
36 "certificate/cast_trust_store.cc",
37 "certificate/cast_trust_store.h",
38 "certificate/types.cc",
[all …]

12345678910>>...87