/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted 15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt… 16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted. 17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is… 21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded 22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded. 23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded. 24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins… 29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi… 31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai… [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 63 X509Certificate certificate) in fromCertificate() argument 68 if (certificate.getVersion() != 3) in fromCertificate() 70 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 71 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 74 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 78 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 80 …byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId()… in fromCertificate() 87 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() 91 …SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded… in fromCertificate() 94 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive(); in fromCertificate() [all …]
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
D | OkHostnameVerifier.java | 71 public boolean verify(String host, X509Certificate certificate) { in verify() argument 73 ? verifyIpAddress(host, certificate) in verify() 74 : verifyHostName(host, certificate); in verify() 84 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 85 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in verifyIpAddress() 97 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 100 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME); in verifyHostName() 109 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName() 120 public static List<String> allSubjectAltNames(X509Certificate certificate) { in allSubjectAltNames() argument 121 List<String> altIpaNames = getSubjectAltNames(certificate, ALT_IPA_NAME); in allSubjectAltNames() [all …]
|
/external/webrtc/webrtc/base/ |
D | rtccertificate_unittests.cc | 90 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F() 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); in TEST_F() 102 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); in TEST_F() 110 scoped_refptr<RTCCertificate> certificate = in TEST_F() local 113 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); in TEST_F() 115 EXPECT_TRUE(HasExpiredSeconds(certificate, now + 2)); in TEST_F()
|
D | sslidentity_unittest.cc | 90 ASSERT_TRUE(identity_rsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 94 ASSERT_TRUE(identity_rsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 98 ASSERT_TRUE(identity_ecdsa1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 102 ASSERT_TRUE(identity_ecdsa2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 122 rv = identity->certificate().ComputeDigest(algorithm, digest, in TestDigestHelper() 129 rv = identity->certificate().ComputeDigest(algorithm, digest1, in TestDigestHelper() 257 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F() 284 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString()); in TEST_F() 402 identity->certificate().CertificateExpirationTime()); in TestExpireTime()
|
D | opensslidentity.cc | 394 OpenSSLCertificate* certificate) in OpenSSLIdentity() argument 395 : key_pair_(key_pair), certificate_(certificate) { in OpenSSLIdentity() 397 ASSERT(certificate != NULL); in OpenSSLIdentity() 406 OpenSSLCertificate* certificate = in GenerateInternal() local 408 if (certificate) in GenerateInternal() 409 return new OpenSSLIdentity(key_pair, certificate); in GenerateInternal() 434 const std::string& certificate) { in FromPEMStrings() argument 436 OpenSSLCertificate::FromPEMString(certificate)); in FromPEMStrings() 461 const OpenSSLCertificate& OpenSSLIdentity::certificate() const { in certificate() function in rtc::OpenSSLIdentity
|
D | opensslidentity.h | 108 const std::string& certificate); 111 const OpenSSLCertificate& certificate() const override; 118 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate);
|
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/ANY/ |
D | CERT.py | 68 certificate): 73 self.certificate = certificate 79 dns.rdata._base64ify(self.certificate)) 96 certificate = b64.decode('base64_codec') 98 algorithm, certificate) 106 file.write(self.certificate) 115 certificate = wire[current : current + rdlen] 117 certificate)
|
/external/libmicrohttpd/doc/chapters/ |
D | tlsauthentication.inc | 24 In addition to the key, a certificate describing the server in human readable tokens 25 is also needed. This certificate will be attested with our aforementioned key. In this way, 26 we obtain a self-signed certificate, valid for one year. 33 To avoid unnecessary error messages in the browser, the certificate needs to 36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way, 39 Whether the server's certificate is signed by us or a third party, once it has been accepted 62 printf ("The key/certificate files could not be read.\n"); 119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (… 167 You can then extract the client certificate: 171 * Get the client's certificate [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument 45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build() 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider() 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider() 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
|
D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument 75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build() 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider() 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider() 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | HostnameVerifierTest.java | 395 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local 406 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp() 408 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp() 545 private X509Certificate certificate(String certificate) throws Exception { in certificate() method in HostnameVerifierTest 547 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate() 550 private SSLSession session(String certificate) throws Exception { in session() argument 551 return new FakeSSLSession(certificate(certificate)); in session()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
D | IssuerAndSerialNumber.java | 73 Certificate certificate) in IssuerAndSerialNumber() argument 75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber() 83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument 85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
|
/external/conscrypt/src/main/java/org/conscrypt/ct/ |
D | CertificateEntry.java | 55 private final byte[] certificate; field in CertificateEntry 57 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { in CertificateEntry() argument 70 this.certificate = certificate; in CertificateEntry() 115 return certificate; in getCertificate() 129 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES); in encode()
|
/external/conscrypt/src/test/resources/ |
D | README | 2 - ca-cert.pem: Root CA certificate 8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension 10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate 17 signed by the test CT log, but for another certificate
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | KeyStorePrivateKeyEntryTest.java | 62 Certificate certificate = cf.generateCertificate(certArray); in testGetCertificateChain() local 63 assertTrue(certificate instanceof X509Certificate); in testGetCertificateChain() 65 String algorithm = certificate.getPublicKey().getAlgorithm(); in testGetCertificateChain() 74 privateKey, new Certificate[] { certificate }); in testGetCertificateChain()
|
D | KeyStore3Test.java | 52 private Certificate certificate; field in KeyStore3Test 83 certificate = cf.generateCertificate(certArray); in KeyStore3Test() 113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_null() 134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_private() 143 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[] { certificate }); in test_setKeyEntry_key_is_public() 151 mockKeyStore.setCertificateEntry(null, certificate); in test_setCertificateEntry_null()
|
/external/autotest/client/site_tests/network_DestinationVerification/ |
D | control | 14 Tests that we can validate a ChromeCast device by its certificate. This test 16 certificate or validates an invalid certificate. This checks the ways that 18 correct key/certificate formats.
|
/external/tlsdate/src/ |
D | tlsdate-helper-plan9.c | 470 X509 *certificate; in check_cn() local 477 certificate = SSL_get_peer_certificate(ssl); in check_cn() 478 if (NULL == certificate) in check_cn() 484 xname = X509_get_subject_name(certificate); in check_cn() 502 X509_free(certificate); in check_cn() 662 X509 *certificate; in verify_signature() local 664 certificate = SSL_get_peer_certificate(ssl); in verify_signature() 665 if (NULL == certificate) in verify_signature() 692 const x509_cert *certificate; in check_key_length() local 696 certificate = ssl_get_peer_cert (ssl); in check_key_length() [all …]
|
D | tlsdate-helper.c | 606 X509 *certificate; in check_cn() local 613 certificate = SSL_get_peer_certificate(ssl); in check_cn() 614 if (NULL == certificate) in check_cn() 620 xname = X509_get_subject_name(certificate); in check_cn() 638 X509_free(certificate); in check_cn() 799 X509 *certificate; in verify_signature() local 801 certificate = SSL_get_peer_certificate(ssl); in verify_signature() 802 if (NULL == certificate) in verify_signature() 829 const x509_cert *certificate; in check_key_length() local 833 certificate = ssl_get_peer_cert (ssl); in check_key_length() [all …]
|
/external/curl/docs/ |
D | SSLCERTS | 37 libcurl performs peer SSL certificate verification by default. This is done 39 server certificate is valid. 45 If the remote server uses a self-signed certificate, if you don't install a CA 46 cert bundle, if the server uses a certificate signed by a CA that isn't 56 2. Get a CA certificate that can verify the remote server and use the proper 72 - View the certificate by double-clicking the padlock 73 - Find out where the CA certificate is kept (Certificate> 87 - The certificate will have "BEGIN CERTIFICATE" and "END CERTIFICATE" 89 - If you want to see the data in the certificate, you can do: "openssl 92 - If you want to trust the certificate, you can append it to your [all …]
|
/external/webrtc/webrtc/p2p/base/ |
D | dtlstransport.h | 34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) in DtlsTransport() argument 36 certificate_(certificate), in DtlsTransport() 45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override { in SetLocalCertificate() argument 46 certificate_ = certificate; in SetLocalCertificate() 49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override { in GetLocalCertificate() argument 53 *certificate = certificate_; in GetLocalCertificate()
|
D | transportdescriptionfactory.h | 38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { in certificate() function 46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { in set_certificate() argument 47 certificate_ = certificate; in set_certificate()
|
/external/apache-http/android/src/android/net/http/ |
D | LoggingEventHandler.java | 69 public void certificate(SslCertificate certificate) { in certificate() method in LoggingEventHandler 71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate); in certificate()
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 13 # racoon will look for certificate file in the directory, 14 # if the certificate/certificate request payload is received. 15 #path certificate "/usr/local/openssl/certs" ;
|