Searched defs:certificate (Results 1 - 25 of 55) sorted by relevance

123

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
H A DIssuerAndSerialNumber.java73 Certificate certificate)
75 this.name = certificate.getIssuer();
76 this.serialNumber = certificate.getSerialNumber();
83 X509CertificateStructure certificate)
85 this.name = certificate.getIssuer();
86 this.serialNumber = certificate.getSerialNumber();
72 IssuerAndSerialNumber( Certificate certificate) argument
82 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
H A DPKIXCertStoreSelector.java114 public boolean match(Certificate certificate) argument
116 return (selector == null) ? (certificate != null) : selector.match(certificate);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
H A DAuthorityKeyIdentifierStructure.java63 X509Certificate certificate)
68 if (certificate.getVersion() != 3)
70 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
71 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded());
74 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive();
78 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
80 byte[] ext = certificate.getExtensionValue(Extension.subjectKeyIdentifier.getId());
87 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Primitive();
91 SubjectPublicKeyInfo info = SubjectPublicKeyInfo.getInstance(certificate.getPublicKey().getEncoded());
94 info, new GeneralNames(genName), certificate
62 fromCertificate( X509Certificate certificate) argument
127 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument
[all...]
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
H A DSslContextBuilder.java36 * self-signed certificate for a single hostname such as "localhost".
57 .addTrustedCertificate(heldCertificate.certificate)
72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate
73 * in this chain is the server's certificate, further certificates are included in the handshake
74 * so the client can build a trusted path to a CA certificate.
82 * Add a certificate authority that this client trusts. Servers that provide certificate chains
85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) { argument
86 trustedCertificates.add(certificate);
[all...]
H A DHeldCertificate.java34 * A certificate and its private key. This can be used on the server side by HTTPS servers, or on
35 * the client side to verify those HTTPS servers. A held certificate can also be used to sign other
36 * held certificates, as done in practice by certificate authorities.
39 public final X509Certificate certificate; field in class:HeldCertificate
42 public HeldCertificate(X509Certificate certificate, KeyPair keyPair) { argument
43 this.certificate = certificate;
65 * Set this certificate's name. Typically this is the URL hostname for TLS certificates. This is
66 * the CN (common name) in the certificate. Will be a random string if no value is provided.
79 * Set the certificate tha
[all...]
/external/syslinux/gpxe/src/crypto/
H A Dx509.c41 * Identify X.509 certificate public key
43 * @v certificate Certificate
48 static int x509_public_key ( const struct asn1_cursor *certificate, argument
55 memcpy ( &cursor, certificate, sizeof ( cursor ) );
67 DBG_HDA ( 0, certificate->data, certificate->len );
76 DBG_HDA ( 0, certificate->data, certificate->len );
86 DBG_HDA ( 0, certificate->data, certificate
104 x509_rsa_public_key( const struct asn1_cursor *certificate, struct x509_rsa_public_key *rsa_pubkey ) argument
[all...]
/external/webrtc/webrtc/p2p/base/
H A Dtransportdescriptionfactory.h37 // The certificate to use when setting up DTLS.
38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory
44 // Specifies the certificate to use (only used when secure != SEC_DISABLED).
46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
47 certificate_ = certificate;
45 set_certificate( const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) argument
H A Ddtlstransport.h34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate)
36 certificate_(certificate),
45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override {
46 certificate_ = certificate;
49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override {
53 *certificate = certificate_;
32 DtlsTransport(const std::string& name, PortAllocator* allocator, const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) argument
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
H A DJcaSignerInfoGeneratorBuilder.java81 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument
84 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
H A DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) argument
45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider());
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
65 return new JcaContentVerifierProviderBuilder().build(certificate);
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
H A DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) argument
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
H A DCertificatePinner.java34 * against attacks on certificate authorities. It also prevents connections
35 * through man-in-the-middle certificate authorities either known or unknown to
38 * <p>This class currently pins a certificate's Subject Public Key Info as
68 * As expected, this fails with a certificate pinning exception: <pre> {@code
71 * Peer certificate chain:
85 * certificate pinner's configuration: <pre> {@code
121 * complexity and limit your ability to migrate between certificate authorities.
122 * Do not use certificate pinning without the blessing of your server's TLS
126 * {@link CertificatePinner} can not be used to pin self-signed certificate
127 * if such certificate i
222 pin(Certificate certificate) argument
[all...]
/external/webrtc/webrtc/base/
H A Drtccertificate_unittests.cc28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate";
86 // Generate a real certificate without specifying the expiration time.
90 scoped_refptr<RTCCertificate> certificate = local
94 EXPECT_FALSE(HasExpiredSeconds(certificate, now));
97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60));
102 scoped_refptr<RTCCertificate> certificate = local
104 EXPECT_EQ(now, ExpiresSeconds(certificate));
108 // Generate a certificate that expires in 1s.
110 scoped_refptr<RTCCertificate> certificate = local
113 EXPECT_FALSE(HasExpiredSeconds(certificate, no
[all...]
H A Dfakesslidentity.h100 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
/external/apache-http/android/src/android/net/http/
H A DHttpsConnection.java145 * Sets the server SSL certificate associated with this
147 * @param certificate The SSL certificate
149 /* package */ void setCertificate(SslCertificate certificate) { argument
150 mCertificate = certificate;
313 // allow the certificate anyway.
H A DLoggingEventHandler.java69 public void certificate(SslCertificate certificate) { argument
71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
H A DDelegatingSSLSession.java30 * This is only used when a {@code certificate} is available but usage
40 public CertificateWrap(Certificate certificate) { argument
41 mCertificate = certificate;
H A DEventHandler.java24 * there is an SSL certificate error. error() can occur anywhere
107 * SSL certificate callback called before resource request is
110 public void certificate(SslCertificate certificate); argument
120 * SSL certificate error callback. Handles SSL error(s) on the way
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/
H A DCertificateEntry.java57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */
58 private final byte[] certificate; field in class:CertificateEntry
60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { argument
73 this.certificate = certificate;
118 return certificate;
132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
H A DOkHostnameVerifier.java70 public boolean verify(String host, X509Certificate certificate) { argument
72 ? verifyIpAddress(host, certificate)
73 : verifyHostName(host, certificate);
81 * Returns true if {@code certificate} matches {@code ipAddress}.
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { argument
84 List<String> altNames = getSubjectAltNames(certificate, ALT_IPA_NAME);
94 * Returns true if {@code certificate} matches {@code hostName}.
96 private boolean verifyHostName(String hostName, X509Certificate certificate) { argument
99 List<String> altNames = getSubjectAltNames(certificate, ALT_DNS_NAME);
110 X500Principal principal = certificate
123 allSubjectAltNames(X509Certificate certificate) argument
132 getSubjectAltNames(X509Certificate certificate, int type) argument
[all...]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
H A DHostnameVerifierTest.java409 X509Certificate certificate = certificate(""
420 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal());
422 FakeSSLSession session = new FakeSSLSession(certificate);
561 private X509Certificate certificate(String certificate) throws Exception { argument
563 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
566 private SSLSession session(String certificate) throws Exception { argument
567 return new FakeSSLSession(certificate(certificate));
[all...]
/external/avb/libavb_atx/
H A Davb_atx_validate.c77 /* Verifies the format, key version, usage, and signature of a certificate. */
78 static bool verify_certificate(AvbAtxCertificate* certificate, argument
85 if (certificate->signed_data.version != 1) {
86 avb_error("Unsupported certificate format.\n");
90 sha512((const uint8_t*)&certificate->signed_data,
95 certificate->signature,
101 avb_error("Invalid certificate signature.\n");
104 if (certificate->signed_data.key_version < minimum_key_version) {
108 if (0 != avb_safe_memcmp(certificate->signed_data.usage,
111 avb_error("Invalid certificate usag
118 verify_pik_certificate(AvbAtxCertificate* certificate, uint8_t authority[AVB_ATX_PUBLIC_KEY_SIZE], uint64_t minimum_version) argument
133 verify_psk_certificate( AvbAtxCertificate* certificate, uint8_t authority[AVB_ATX_PUBLIC_KEY_SIZE], uint64_t minimum_version, uint8_t product_id[AVB_ATX_PRODUCT_ID_SIZE]) argument
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaContentVerifierProviderBuilder.java56 public ContentVerifierProvider build(final X509Certificate certificate) argument
63 certHolder = new JcaX509CertificateHolder(certificate);
67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
91 sig.initVerify(certificate.getPublicKey());
100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
/external/conscrypt/openjdk/src/test/java/org/conscrypt/
H A DTestSessionBuilder.java64 public TestSessionBuilder addCertificate(byte[] certificate) { argument
66 certificates.add(certificate);
67 certificateLengths.add(certificate.length);
/external/boringssl/src/ssl/
H A Dtls13_both.cc129 CBS certificate, extensions; local
130 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate) ||
132 CBS_len(&certificate) == 0) {
139 pkey = ssl_cert_parse_pubkey(&certificate);
145 // TLS 1.3 always uses certificate keys for signing thus the correct
147 if (!ssl_cert_check_digital_signature_key_usage(&certificate)) {
153 // Retain the hash of the leaf certificate if requested.
154 SHA256(CBS_data(&certificate), CBS_len(&certificate),
160 CRYPTO_BUFFER_new_from_CBS(&certificate, ss
[all...]

Completed in 688 milliseconds

123