Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 187) sorted by relevance

12345678

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java63 X509Certificate certificate) in fromCertificate() argument
68 if (certificate.getVersion() != 3) in fromCertificate()
70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate()
87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate()
94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate()
[all …]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
DOkHostnameVerifier.java71 public boolean verify(String host, X509Certificate certificate) { in verify() argument
73 ? verifyIpAddress(host, certificate) in verify()
74 : verifyHostName(host, certificate); in verify()
84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress()
97 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
100 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName()
109 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName()
120 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument
121 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames()
[all …]
/external/webrtc/webrtc/base/
Drtccertificate_unittests.cc90 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); in TEST_F()
102 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
104 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F()
110 scoped_refptr<RTCCertificate> certificate = in TEST_F() local
113 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F()
115 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F()
Dsslidentity_unittest.cc90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
122 rv = identity->certificate().ComputeDigest(algorithm, digest, in TestDigestHelper()
129 rv = identity->certificate().ComputeDigest(algorithm, digest1, in TestDigestHelper()
257 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
284 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F()
402 identity->certificate().CertificateExpirationTime()); in TestExpireTime()
Dopensslidentity.cc394 OpenSSLCertificate* certificate) in OpenSSLIdentity() argument
395 : key_pair_(key_pair), certificate_(certificate) { in OpenSSLIdentity()
397 ASSERT(certificate != NULL); in OpenSSLIdentity()
406 OpenSSLCertificate* certificate = in GenerateInternal() local
408 if (certificate) in GenerateInternal()
409 return new OpenSSLIdentity(key_pair, certificate); in GenerateInternal()
434 const std::string& certificate) { in FromPEMStrings() argument
436 OpenSSLCertificate::FromPEMString(certificate)); in FromPEMStrings()
461 const OpenSSLCertificate& OpenSSLIdentity::certificate() const { in certificate() function in rtc::OpenSSLIdentity
Dopensslidentity.h108 const std::string& certificate);
111 const OpenSSLCertificate& certificate() const override;
118 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate);
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/ANY/
DCERT.py68 certificate):
73 self.certificate = certificate
79 dns.rdata._base64ify(self.certificate))
96 certificate = b64.decode('base64_codec')
98 algorithm, certificate)
106 file.write(self.certificate)
115 certificate = wire[current : current + rdlen]
117 certificate)
/external/libmicrohttpd/doc/chapters/
Dtlsauthentication.inc24 In addition to the key, a certificate describing the server in human readable tokens
25 is also needed. This certificate will be attested with our aforementioned key. In this way,
26 we obtain a self-signed certificate, valid for one year.
33 To avoid unnecessary error messages in the browser, the certificate needs to
36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way,
39 Whether the server's certificate is signed by us or a third party, once it has been accepted
62 printf ("The key/certificate files could not be read.\n");
119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (…
167 You can then extract the client certificate:
171 * Get the client's certificate
[all …]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build()
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build()
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
DHostnameVerifierTest.java395 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local
406 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp()
408 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp()
545 private X509Certificate certificate(String certificate) throws Exception { in certificate() method in HostnameVerifierTest
547 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate()
550 private SSLSession session(String certificate) throws Exception { in session() argument
551 return new FakeSSLSession(certificate(certificate)); in session()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
DIssuerAndSerialNumber.java73 Certificate certificate) in IssuerAndSerialNumber() argument
75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument
85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
/external/conscrypt/src/main/java/org/conscrypt/ct/
DCertificateEntry.java55 private final byte[] certificate; field in CertificateEntry
57 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { in CertificateEntry() argument
70 this.certificate = certificate; in CertificateEntry()
115 return certificate; in getCertificate()
129 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES); in encode()
/external/conscrypt/src/test/resources/
DREADME2 - ca-cert.pem: Root CA certificate
8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate
17 signed by the test CT log, but for another certificate
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DKeyStorePrivateKeyEntryTest.java62 Certificate certificate = cf.generateCertificate(certArray); in testGetCertificateChain() local
63 assertTrue(certificate instanceof X509Certificate); in testGetCertificateChain()
65 String algorithm = certificate.getPublicKey().getAlgorithm(); in testGetCertificateChain()
74 privateKey, new Certificate[] { certificate }); in testGetCertificateChain()
DKeyStore3Test.java52 private Certificate certificate; field in KeyStore3Test
83 certificate = cf.generateCertificate(certArray); in KeyStore3Test()
113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_null()
134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_private()
143 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_public()
151 mockKeyStore.setCertificateEntry(null, certificate); in test_setCertificateEntry_null()
/external/autotest/client/site_tests/network_DestinationVerification/
Dcontrol14 Tests that we can validate a ChromeCast device by its certificate. This test
16 certificate or validates an invalid certificate. This checks the ways that
18 correct key/certificate formats.
/external/tlsdate/src/
Dtlsdate-helper-plan9.c470 X509 *certificate; in check_cn() local
477 certificate = SSL_get_peer_certificate(ssl); in check_cn()
478 if (NULL == certificate) in check_cn()
484 xname = X509_get_subject_name(certificate); in check_cn()
502 X509_free(certificate); in check_cn()
662 X509 *certificate; in verify_signature() local
664 certificate = SSL_get_peer_certificate(ssl); in verify_signature()
665 if (NULL == certificate) in verify_signature()
692 const x509_cert *certificate; in check_key_length() local
696 certificate = ssl_get_peer_cert (ssl); in check_key_length()
[all …]
Dtlsdate-helper.c606 X509 *certificate; in check_cn() local
613 certificate = SSL_get_peer_certificate(ssl); in check_cn()
614 if (NULL == certificate) in check_cn()
620 xname = X509_get_subject_name(certificate); in check_cn()
638 X509_free(certificate); in check_cn()
799 X509 *certificate; in verify_signature() local
801 certificate = SSL_get_peer_certificate(ssl); in verify_signature()
802 if (NULL == certificate) in verify_signature()
829 const x509_cert *certificate; in check_key_length() local
833 certificate = ssl_get_peer_cert (ssl); in check_key_length()
[all …]
/external/curl/docs/
DSSLCERTS37 libcurl performs peer SSL certificate verification by default. This is done
39 server certificate is valid.
45 If the remote server uses a self-signed certificate, if you don't install a CA
46 cert bundle, if the server uses a certificate signed by a CA that isn't
56 2. Get a CA certificate that can verify the remote server and use the proper
72 - View the certificate by double-clicking the padlock
73 - Find out where the CA certificate is kept (Certificate>
87 - The certificate will have "BEGIN CERTIFICATE" and "END CERTIFICATE"
89 - If you want to see the data in the certificate, you can do: "openssl
92 - If you want to trust the certificate, you can append it to your
[all …]
/external/webrtc/webrtc/p2p/base/
Ddtlstransport.h34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) in DtlsTransport() argument
36 certificate_(certificate), in DtlsTransport()
45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override { in SetLocalCertificate() argument
46 certificate_ = certificate; in SetLocalCertificate()
49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override { in GetLocalCertificate() argument
53 *certificate = certificate_; in GetLocalCertificate()
Dtransportdescriptionfactory.h38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { in certificate() function
46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { in set_certificate() argument
47 certificate_ = certificate; in set_certificate()
/external/apache-http/android/src/android/net/http/
DLoggingEventHandler.java69 public void certificate(SslCertificate certificate) { in certificate() method in LoggingEventHandler
71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate); in certificate()
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample13 # racoon will look for certificate file in the directory,
14 # if the certificate/certificate request payload is received.
15 #path certificate "/usr/local/openssl/certs" ;

12345678