HomeSort by relevance Sort by last modified time
    Searched refs:CERTIFICATE (Results 1 - 25 of 54) sorted by null

1 2 3

  /prebuilts/go/darwin-x86/src/crypto/x509/
root_darwin_armx.go 20 -----BEGIN CERTIFICATE-----
53 -----END CERTIFICATE-----
54 -----BEGIN CERTIFICATE-----
78 -----END CERTIFICATE-----
79 -----BEGIN CERTIFICATE-----
111 -----END CERTIFICATE-----
112 -----BEGIN CERTIFICATE-----
144 -----END CERTIFICATE-----
145 -----BEGIN CERTIFICATE-----
164 -----END CERTIFICATE----
    [all...]
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
333 func certificateFromPEM(pemBytes string) (*Certificate, error) {
451 func chainToDebugString(chain []*Certificate) string {
466 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
485 -----END CERTIFICATE-----
488 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
511 -----END CERTIFICATE-----
514 const googleLeaf = `-----BEGIN CERTIFICATE-----
539 -----END CERTIFICATE----
    [all...]
example_test.go 20 -----BEGIN CERTIFICATE-----
43 -----END CERTIFICATE-----`
46 -----BEGIN CERTIFICATE-----
67 -----END CERTIFICATE-----`
75 panic("failed to parse root certificate")
80 panic("failed to parse certificate PEM")
84 panic("failed to parse certificate: " + err.Error())
93 panic("failed to verify certificate: " + err.Error())
x509_test.go 224 c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
root_darwin_arm_gen.go 11 // exists for a certificate, but the x509 API requires returning the entire
50 Type: "CERTIFICATE",
68 func selectCerts() ([]*x509.Certificate, error) {
79 var certs []*x509.Certificate
105 func sysCerts() (certs []*x509.Certificate, err error) {
106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
  /prebuilts/go/linux-x86/src/crypto/x509/
root_darwin_armx.go 20 -----BEGIN CERTIFICATE-----
53 -----END CERTIFICATE-----
54 -----BEGIN CERTIFICATE-----
78 -----END CERTIFICATE-----
79 -----BEGIN CERTIFICATE-----
111 -----END CERTIFICATE-----
112 -----BEGIN CERTIFICATE-----
144 -----END CERTIFICATE-----
145 -----BEGIN CERTIFICATE-----
164 -----END CERTIFICATE----
    [all...]
verify_test.go 232 // Putting a certificate as a root directly should work as a
245 // Putting a certificate as a root directly should not skip
333 func certificateFromPEM(pemBytes string) (*Certificate, error) {
451 func chainToDebugString(chain []*Certificate) string {
466 const geoTrustRoot = `-----BEGIN CERTIFICATE-----
485 -----END CERTIFICATE-----
488 const giag2Intermediate = `-----BEGIN CERTIFICATE-----
511 -----END CERTIFICATE-----
514 const googleLeaf = `-----BEGIN CERTIFICATE-----
539 -----END CERTIFICATE----
    [all...]
example_test.go 20 -----BEGIN CERTIFICATE-----
43 -----END CERTIFICATE-----`
46 -----BEGIN CERTIFICATE-----
67 -----END CERTIFICATE-----`
75 panic("failed to parse root certificate")
80 panic("failed to parse certificate PEM")
84 panic("failed to parse certificate: " + err.Error())
93 panic("failed to verify certificate: " + err.Error())
x509_test.go 224 c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
root_darwin_arm_gen.go 11 // exists for a certificate, but the x509 API requires returning the entire
50 Type: "CERTIFICATE",
68 func selectCerts() ([]*x509.Certificate, error) {
79 var certs []*x509.Certificate
105 func sysCerts() (certs []*x509.Certificate, err error) {
106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
  /prebuilts/android-emulator/darwin-x86_64/lib/
ca-bundle.pem 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015
6 ## This is a bundle of X.509 certificates of public Certificate Authorities
23 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
43 -----BEGIN CERTIFICATE-----
60 -----END CERTIFICATE-----
64 -----BEGIN CERTIFICATE-----
82 -----END CERTIFICATE-----
86 -----BEGIN CERTIFICATE-----
106 -----END CERTIFICATE----
    [all...]
  /prebuilts/android-emulator/linux-x86_64/lib/
ca-bundle.pem 4 ## Certificate data from Mozilla as of: Mon Apr 27 08:58:04 2015
6 ## This is a bundle of X.509 certificates of public Certificate Authorities
23 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
43 -----BEGIN CERTIFICATE-----
60 -----END CERTIFICATE-----
64 -----BEGIN CERTIFICATE-----
82 -----END CERTIFICATE-----
86 -----BEGIN CERTIFICATE-----
106 -----END CERTIFICATE----
    [all...]
  /prebuilts/go/darwin-x86/src/net/http/internal/
testcert.go 11 var LocalhostCert = []byte(`-----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----`)
  /prebuilts/go/linux-x86/src/net/http/internal/
testcert.go 11 var LocalhostCert = []byte(`-----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----`)
  /development/testrunner/
create_test.py 75 LOCAL_PACKAGE_NAME := ${MODULE_NAME}Tests${CERTIFICATE}
152 # include certificate definition if existent in makefile
153 certificate = mk.GetVariable(mk.CERTIFICATE)
154 if certificate:
155 cert_definition = ("\n%s := %s" % (mk.CERTIFICATE, certificate))
160 mapping = {"MODULE_NAME":module_name, "CERTIFICATE":cert_definition}
android_mk.py 37 CERTIFICATE = "LOCAL_CERTIFICATE"
  /external/autotest/client/site_tests/network_DestinationVerification/
network_DestinationVerification.py 38 "certificate":"-----BEGIN CERTIFICATE-----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\\nMYLrTwMQfGuUaaaKko6ldKIrovjrcPloQr1Hxb2bipFcjLmG7nxQLoS6vQ==\\n-----END CERTIFICATE-----\\n",
64 "certificate": "-----BEGIN CERTIFICATE-----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\\nNg7k4Sfif5iktYT4VRKpThe0EGJNfqKJKYtvHEVC\\n-----END CERTIFICATE-----\\n",
91 "certificate": "-----BEGIN CERTIFICATE-----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\\nf6nQGB1Ej8Klsxlo8B+rmQ6N8C7f48GMI8s=\\n-----END CERTIFICATE-----\\n",
233 message.certificate = sign_bundle['certificate'
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 22 import java.security.cert.Certificate;
77 static final int CERTIFICATE = 1;
107 Certificate[] certChain;
112 Certificate obj)
114 this.type = CERTIFICATE;
123 Certificate[] certChain)
135 Certificate[] certChain)
186 Certificate[] certChain)
329 Certificate[] getCertificateChain()
341 Certificate cert
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
example_test.go 28 // Connecting with a custom root-certificate set.
31 -----BEGIN CERTIFICATE-----
54 -----END CERTIFICATE-----`
62 panic("failed to parse root certificate")
99 InsecureSkipVerify: true, // test server certificate is not trusted.
tls.go 30 // at least one certificate or else set GetCertificate.
62 // at least one certificate or else set GetCertificate.
73 // at least one certificate or else set GetCertificate.
174 // of files. The files must contain PEM encoded data. The certificate file
175 // may contain intermediate certificates following the leaf certificate to
176 // form a certificate chain. On successful return, Certificate.Leaf will
177 // be nil because the parsed form of the certificate is not retained.
178 func LoadX509KeyPair(certFile, keyFile string) (Certificate, error) {
181 return Certificate{}, er
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
example_test.go 28 // Connecting with a custom root-certificate set.
31 -----BEGIN CERTIFICATE-----
54 -----END CERTIFICATE-----`
62 panic("failed to parse root certificate")
99 InsecureSkipVerify: true, // test server certificate is not trusted.
  /external/chromium-trace/catapult/telemetry/third_party/web-page-replay/
adb_install_cert.py 15 """Installs certificate on phone with KitKat."""
43 """Certificate installer for phones with KitKat."""
47 raise ValueError('Not a valid certificate path')
118 logging.warning('Certificate may not install properly')
135 """Makes a certificate file that follows the format of files in cacerts."""
140 'CERTIFICATE')
188 """Installs a certificate putting it in /system/etc/security/cacerts."""
210 """Installs certificate on the device using adb commands."""
212 # TODO(mruthven): Add a check to see if the certificate is already installed
213 # Install the certificate
    [all...]
  /external/curl/tests/
stunnel.pem 2 # This file contains a private key and a certificate used for stunnel.
3 # The certificate contains a number of extensions essentially being
4 # used in the 509 test. The certificate has been generated using
13 nsComment = "CURL stunnel server test certificate"
59 Certificate:
92 CURL stunnel server test certificate
117 -----BEGIN CERTIFICATE-----
138 -----END CERTIFICATE-----
  /build/make/core/
dpi_specific_apk.mk 30 $(built_dpi_apk): PRIVATE_CERTIFICATE := $(certificate)
51 $(built_dpi_apk) : $(private_key) $(certificate) $(SIGNAPK_JAR)
79 PACKAGES.$(dpi_apk_name).CERTIFICATE := $(certificate)
  /external/curl/lib/
mk-ca-bundle.pl 171 print wrap("\t","\t\t", "-s\tcomma separated list of certificate signatures/hashes to output in plain text mode. (default: $default_signature_algorithms)\n");
351 ## Certificate data from Mozilla ${datesrc}: ${currentdate}
353 ## This is a bundle of X.509 certificates of public Certificate Authorities
392 # this is a match for the start of a certificate
435 my $pem = "-----BEGIN CERTIFICATE-----\n"
437 . "-----END CERTIFICATE-----\n";

Completed in 581 milliseconds

1 2 3