/external/python/google-api-python-client/docs/dyn/ |
D | appengine_v1.apps.authorizedCertificates.html | 79 <p class="firstline">Uploads the specified SSL certificate.</p> 82 <p class="firstline">Deletes the specified SSL certificate.</p> 85 <p class="firstline">Gets the specified SSL certificate.</p> 94 …certificate. To renew a certificate and maintain its existing domain mappings, update certificate_… 98 <pre>Uploads the specified SSL certificate. 105 { # An SSL certificate that a user has been authorized to administer. A user is authorized to admin… 106 … The user-specified display name of the certificate. This is not guaranteed to be unique. Example:… 108 …"domainMappingsCount": 42, # Aggregate count of the domain mappings with this certificate mapped. … 109 …certificate mapped. Example: apps/myapp/domainMappings/example.com.This may not represent the full… 112 …tring", # The time when this certificate expires. To update the renewal time on this certificate, … [all …]
|
D | appengine_v1alpha.apps.authorizedCertificates.html | 79 <p class="firstline">Uploads the specified SSL certificate.</p> 82 <p class="firstline">Deletes the specified SSL certificate.</p> 85 <p class="firstline">Gets the specified SSL certificate.</p> 94 …certificate. To renew a certificate and maintain its existing domain mappings, update certificate_… 98 <pre>Uploads the specified SSL certificate. 105 { # An SSL certificate that a user has been authorized to administer. A user is authorized to admin… 106 … The user-specified display name of the certificate. This is not guaranteed to be unique. Example:… 108 …"domainMappingsCount": 42, # Aggregate count of the domain mappings with this certificate mapped. … 109 …certificate mapped. Example: apps/myapp/domainMappings/example.com.This may not represent the full… 112 …tring", # The time when this certificate expires. To update the renewal time on this certificate, … [all …]
|
D | appengine_v1beta.apps.authorizedCertificates.html | 79 <p class="firstline">Uploads the specified SSL certificate.</p> 82 <p class="firstline">Deletes the specified SSL certificate.</p> 85 <p class="firstline">Gets the specified SSL certificate.</p> 94 …certificate. To renew a certificate and maintain its existing domain mappings, update certificate_… 98 <pre>Uploads the specified SSL certificate. 105 { # An SSL certificate that a user has been authorized to administer. A user is authorized to admin… 106 … The user-specified display name of the certificate. This is not guaranteed to be unique. Example:… 108 …"domainMappingsCount": 42, # Aggregate count of the domain mappings with this certificate mapped. … 109 …certificate mapped. Example: apps/myapp/domainMappings/example.com.This may not represent the full… 112 …tring", # The time when this certificate expires. To update the renewal time on this certificate, … [all …]
|
D | firebasehosting_v1beta1.sites.domains.html | 117 …"provisioning": { # The current certificate provisioning status information for a domain. # Output… 119 …tChallengeHttp": { # Represents an HTTP certificate challenge. # The HTTP challenge for generating… 121 # certificate challenge. 122 … "token": "A String", # The token to serve at the specified URL path to satisfy the certificate 128 …"certChallengeDiscoveredTxt": [ # The TXT records (for the certificate challenge) that were found … 136 …"certChallengeDns": { # Represents a DNS certificate challenge. # The DNS challenge for generating… 142 "certStatus": "A String", # The certificate provisioning status; updated when Firebase Hosting 143 # provisions an SSL certificate for the domain. 166 …"provisioning": { # The current certificate provisioning status information for a domain. # Output… 168 …tChallengeHttp": { # Represents an HTTP certificate challenge. # The HTTP challenge for generating… [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted 15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt… 16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted. 17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is… 21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded 22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded. 23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded. 24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins… 29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi… 31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai… [all …]
|
/external/rust/crates/grpcio-sys/grpc/include/grpc/ |
D | grpc_security_constants.h | 55 /** Callback results for dynamically loading a SSL certificate config. */ 63 /** Server does not request client certificate. 64 The certificate presented by the client is not checked by the server at 65 all. (A client may present a self signed or signed certificate or not 66 present a certificate at all and any of those option would be accepted) */ 68 /** Server requests client certificate but does not enforce that the client 69 presents a certificate. 71 If the client presents a certificate, the client authentication is left to 75 The client's key certificate pair must be valid for the SSL connection to 78 /** Server requests client certificate but does not enforce that the client [all …]
|
/external/rust/crates/grpcio-sys/grpc/spm-core-include/grpc/ |
D | grpc_security_constants.h | 55 /** Callback results for dynamically loading a SSL certificate config. */ 63 /** Server does not request client certificate. 64 The certificate presented by the client is not checked by the server at 65 all. (A client may present a self signed or signed certificate or not 66 present a certificate at all and any of those option would be accepted) */ 68 /** Server requests client certificate but does not enforce that the client 69 presents a certificate. 71 If the client presents a certificate, the client authentication is left to 75 The client's key certificate pair must be valid for the SSL connection to 78 /** Server requests client certificate but does not enforce that the client [all …]
|
/external/python/cryptography/vectors/cryptography_vectors/x509/PKITS_data/ |
D | pkits.ldif | 124 dn: CN=Valid EE Certificate Test1,O=Test Certificates 2011,C=US 126 cn: Valid EE Certificate Test1 158 dn: CN=Invalid CA notBefore Date EE Certificate Test1,O=Test Certificates 2011,C=US 160 cn: Invalid CA notBefore Date EE Certificate Test1 164 dn: CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US 166 cn: Invalid EE notBefore Date EE Certificate Test2 170 dn: CN=Valid pre2000 UTC notBefore Date EE Certificate Test3,O=Test Certificates 2011,C=US 172 cn: Valid pre2000 UTC notBefore Date EE Certificate Test3 176 dn: CN=Valid GeneralizedTime notBefore Date EE Certificate Test4,O=Test Certificates 2011,C=US 178 cn: Valid GeneralizedTime notBefore Date EE Certificate Test4 [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
D | X509CertificateHolder.java | 17 import org.bouncycastle.asn1.x509.Certificate; 27 * Holding class for an X.509 Certificate structure. 34 private transient Certificate x509Certificate; 37 private static Certificate parseBytes(byte[] certEncoding) in parseBytes() 42 return Certificate.getInstance(CertUtils.parseNonEmptyASN1(certEncoding)); in parseBytes() 57 * @param certEncoding BER/DER encoding of the certificate. 69 * @param x509Certificate an ASN.1 Certificate structure. 71 public X509CertificateHolder(Certificate x509Certificate) in X509CertificateHolder() 76 private void init(Certificate x509Certificate) in init() 96 * Return whether or not the holder's certificate contains extensions. [all …]
|
/external/python/cryptography/docs/development/ |
D | test-vectors.rst | 103 the private key for the certificate ``x509/custom/ca/ca.pem``. This key is 174 certificate. 178 * ``cryptography.io.pem`` - A leaf certificate issued by RapidSSL for the 181 ``cryptography.io.pem`` certificate. 182 * ``cryptography.io.precert.pem`` - A pre-certificate with the CT poison 184 * ``cryptography-scts.io.pem`` - A leaf certificate issued by Let's Encrypt for 185 the cryptography website which contains signed certificate timestamps. 186 * ``wildcard_san.pem`` - A leaf certificate issued by a public CA for 188 * ``san_edipartyname.der`` - A DSA certificate from a `Mozilla bug`_ 190 * ``san_x400address.der`` - A DSA certificate from a `Mozilla bug`_ containing [all …]
|
/external/grpc-grpc/include/grpc/ |
D | grpc_security_constants.h | 52 /** Callback results for dynamically loading a SSL certificate config. */ 60 /** Server does not request client certificate. 61 The certificate presented by the client is not checked by the server at 62 all. (A client may present a self signed or signed certificate or not 63 present a certificate at all and any of those option would be accepted) */ 65 /** Server requests client certificate but does not enforce that the client 66 presents a certificate. 68 If the client presents a certificate, the client authentication is left to 72 The client's key certificate pair must be valid for the SSL connection to 75 /** Server requests client certificate but does not enforce that the client [all …]
|
/external/libcups/scheduler/ |
D | cert.c | 2 * Authentication certificate routines for the CUPS scheduler. 31 * 'cupsdAddCert()' - Add a certificate. 40 cupsd_cert_t *cert; /* Current certificate */ in cupsdAddCert() 41 int fd; /* Certificate file */ in cupsdAddCert() 42 char filename[1024]; /* Certificate filename */ in cupsdAddCert() 47 cupsdLogMessage(CUPSD_LOG_DEBUG, "cupsdAddCert: Adding certificate for PID %d", pid); in cupsdAddCert() 50 * Allocate memory for the certificate... in cupsdAddCert() 57 * Fill in the certificate information... in cupsdAddCert() 65 cert->certificate[i] = hex[CUPS_RAND() & 15]; in cupsdAddCert() 68 * Save the certificate to a file readable only by the User and Group in cupsdAddCert() [all …]
|
/external/arm-trusted-firmware/docs/design/ |
D | trusted-board-boot.rst | 35 Certificate Authority (CA) because the CoT is not established by verifying the 36 validity of a certificate's issuer but by the content of the certificate 44 with the hash extracted from the content certificate. Various hash algorithms 53 The private part of this key is used to sign the BL2 content certificate and 54 the trusted key certificate. The public part is the ROTPK. 60 one of the extension fields in the trusted world certificate. 64 The private part is used to sign the key certificate corresponding to the 66 extension fields in the trusted world certificate. 71 sign the content certificate for the BL3X image. The public part is stored 72 in one of the extension fields in the corresponding key certificate. [all …]
|
/external/tpm2-tss/src/tss2-fapi/ |
D | fapi_certificates.h | 10 /* IFX RSA root certificate */ 11 "-----BEGIN CERTIFICATE-----\n" 43 "-----END CERTIFICATE-----\n", 45 /* IFX ECC root certificate */ 46 "-----BEGIN CERTIFICATE-----\n" 60 "-----END CERTIFICATE-----\n", 62 /* Intel root certificate */ 63 "-----BEGIN CERTIFICATE-----\n" 78 "-----END CERTIFICATE-----", 80 /* STM RSA root certificate */ [all …]
|
/external/arm-trusted-firmware/tools/cert_create/src/tbbr/ |
D | tbb_cert.c | 15 * tbb_cert.h. All certificates are self-signed, so the issuer certificate 22 .help_msg = "Trusted Boot FW Certificate (output file)", 24 .cn = "Trusted Boot FW Certificate", 39 .help_msg = "Trusted Key Certificate (output file)", 41 .cn = "Trusted Key Certificate", 54 .help_msg = "SCP Firmware Key Certificate (output file)", 56 .cn = "SCP Firmware Key Certificate", 68 .help_msg = "SCP Firmware Content Certificate (output file)", 70 .cn = "SCP Firmware Content Certificate", 82 .help_msg = "SoC Firmware Key Certificate (output file)", [all …]
|
/external/curl/docs/ |
D | SSLCERTS.md | 1 SSL Certificate Verification 23 This system is about trust. In your local CA certificate store you have certs 24 from *trusted* Certificate Authorities that you then can use to verify that the 34 Certificate Verification 37 libcurl performs peer SSL certificate verification by default. This is done 38 by using a CA certificate store that the SSL library can use to make sure the 39 peer's server certificate is valid. 45 If the remote server uses a self-signed certificate, if you don't install a CA 46 cert store, if the server uses a certificate signed by a CA that isn't 56 2. Get a CA certificate that can verify the remote server and use the proper [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/isismtt/ |
D | ISISMTTObjectIdentifiers.java | 18 * The id-isismtt-cp-accredited OID indicates that the certificate is a 19 * qualified certificate according to Directive 1999/93/EC of the European 33 * Certificate extensionDate of certificate generation 42 * Attribute to indicate that the certificate holder may sign in the name of 43 * a third person. May also be used as extension in a certificate. 51 * attribute in attribute certificate or as extension in a certificate 70 * certificate or as extension in a certificate 88 * certificate and that is used as "security anchor". 98 * Some other restriction regarding the usage of this certificate. May be 99 * used as attribute in attribute certificate or as extension in a [all …]
|
/external/boringssl/src/crypto/x509/ |
D | x509_txt.c | 65 return "unable to get issuer certificate"; in X509_verify_cert_error_string() 67 return "unable to get certificate CRL"; in X509_verify_cert_error_string() 69 return "unable to decrypt certificate's signature"; in X509_verify_cert_error_string() 75 return "certificate signature failure"; in X509_verify_cert_error_string() 79 return "certificate is not yet valid"; in X509_verify_cert_error_string() 83 return "certificate has expired"; in X509_verify_cert_error_string() 87 return "format error in certificate's notBefore field"; in X509_verify_cert_error_string() 89 return "format error in certificate's notAfter field"; in X509_verify_cert_error_string() 97 return "self signed certificate"; in X509_verify_cert_error_string() 99 return "self signed certificate in certificate chain"; in X509_verify_cert_error_string() [all …]
|
/external/openscreen/cast/common/certificate/ |
D | cast_cert_validator_unittest.cc | 5 #include "cast/common/certificate/cast_cert_validator.h" 10 #include "cast/common/certificate/cast_cert_validator_internal.h" 11 #include "cast/common/certificate/testing/test_helpers.h" 26 // Instead of using the built-in trust store, use root certificate in the 35 // a Cast device certificate yields |expected_result|. 41 // device certificate. 42 // * |time| - The timestamp to use when verifying the certificate. 46 // a valid signature generated by the device certificate. 67 // Parse the root certificate of the chain. in RunTest() 112 // If valid signatures are known for this device certificate, test them. in RunTest() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/isismtt/ |
D | ISISMTTObjectIdentifiers.java | 20 * The id-isismtt-cp-accredited OID indicates that the certificate is a 21 * qualified certificate according to Directive 1999/93/EC of the European 35 * Certificate extensionDate of certificate generation 44 * Attribute to indicate that the certificate holder may sign in the name of 45 * a third person. May also be used as extension in a certificate. 53 * attribute in attribute certificate or as extension in a certificate 72 * certificate or as extension in a certificate 90 * certificate and that is used as "security anchor". 100 * Some other restriction regarding the usage of this certificate. May be 101 * used as attribute in attribute certificate or as extension in a [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/isismtt/ |
D | ISISMTTObjectIdentifiers.java | 20 * The id-isismtt-cp-accredited OID indicates that the certificate is a 21 * qualified certificate according to Directive 1999/93/EC of the European 35 * Certificate extensionDate of certificate generation 44 * Attribute to indicate that the certificate holder may sign in the name of 45 * a third person. May also be used as extension in a certificate. 53 * attribute in attribute certificate or as extension in a certificate 72 * certificate or as extension in a certificate 90 * certificate and that is used as "security anchor". 100 * Some other restriction regarding the usage of this certificate. May be 101 * used as attribute in attribute certificate or as extension in a [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509/ |
D | x509_txt.c | 65 return ("unable to get issuer certificate"); in X509_verify_cert_error_string() 67 return ("unable to get certificate CRL"); in X509_verify_cert_error_string() 69 return ("unable to decrypt certificate's signature"); in X509_verify_cert_error_string() 75 return ("certificate signature failure"); in X509_verify_cert_error_string() 79 return ("certificate is not yet valid"); in X509_verify_cert_error_string() 83 return ("certificate has expired"); in X509_verify_cert_error_string() 87 return ("format error in certificate's notBefore field"); in X509_verify_cert_error_string() 89 return ("format error in certificate's notAfter field"); in X509_verify_cert_error_string() 97 return ("self signed certificate"); in X509_verify_cert_error_string() 99 return ("self signed certificate in certificate chain"); in X509_verify_cert_error_string() [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | CertificatePinnerChainValidationTest.java | 42 /** The pinner should pull the root certificate from the trust manager. */ 55 HeldCertificate certificate = new HeldCertificate.Builder() in pinRootNotPresentInChain() local 61 .add(server.getHostName(), CertificatePinner.pin(rootCa.certificate)) in pinRootNotPresentInChain() 64 .addTrustedCertificate(rootCa.certificate) in pinRootNotPresentInChain() 72 .certificateChain(certificate, intermediateCa) in pinRootNotPresentInChain() 110 HeldCertificate certificate = new HeldCertificate.Builder() in pinIntermediatePresentInChain() local 116 .add(server.getHostName(), CertificatePinner.pin(intermediateCa.certificate)) in pinIntermediatePresentInChain() 119 .addTrustedCertificate(rootCa.certificate) in pinIntermediatePresentInChain() 127 .certificateChain(certificate, intermediateCa) in pinIntermediatePresentInChain() 153 // Start with a trusted root CA certificate. in unrelatedPinnedLeafCertificateInChain() [all …]
|
/external/python/cryptography/docs/x509/ |
D | tutorial.rst | 7 Creating a Certificate Signing Request (CSR) 10 When obtaining a certificate from a certificate authority (CA), the usual 14 2. You create a request for a certificate, which is signed by your key (to 18 certificate for. 19 5. The CA gives you a certificate, signed by them, which identifies your public 21 6. You configure your server to use that certificate, combined with your 24 If you want to obtain a certificate from a typical commercial CA, here's how. 50 Next we need to generate a certificate signing request. A typical CSR contains 55 * Information about what domains this certificate is for. 72 ... # Describe what sites we want this certificate for. [all …]
|
/external/openscreen/cast/common/ |
D | BUILD.gn | 28 source_set("certificate") { 30 "certificate/cast_cert_validator.cc", 31 "certificate/cast_cert_validator.h", 32 "certificate/cast_cert_validator_internal.cc", 33 "certificate/cast_cert_validator_internal.h", 34 "certificate/cast_crl.cc", 35 "certificate/cast_crl.h", 36 "certificate/cast_trust_store.cc", 37 "certificate/cast_trust_store.h", 38 "certificate/types.cc", [all …]
|