/device/google/wahoo/sepolicy/vendor/certs/ |
tango_userdev.x509.pem | 1 -----BEGIN CERTIFICATE----- 22 -----END CERTIFICATE-----
|
/device/google/wahoo/sepolicy/verizon/ |
verizon.x509.pem | 1 -----BEGIN CERTIFICATE----- 21 -----END CERTIFICATE-----
|
/external/autotest/client/cros/ |
mock_owner_cert.pem | 1 -----BEGIN CERTIFICATE----- 19 -----END CERTIFICATE-----
|
/external/autotest/client/site_tests/platform_AccurateTime/src/ |
ca.crt | 1 -----BEGIN CERTIFICATE----- 21 -----END CERTIFICATE-----
|
fc92dea4.0 | 1 -----BEGIN CERTIFICATE----- 21 -----END CERTIFICATE-----
|
/external/boringssl/src/ssl/test/runner/ |
ecdsa_p521_cert.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE-----
|
/external/conscrypt/openjdk/src/test/resources/ |
blacklist_test_valid_ca.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE-----
|
test_blacklist_ca.pem | 1 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE-----
|
blacklist_test_valid_chain.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE----- 18 -----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 36 -----BEGIN CERTIFICATE----- 52 -----END CERTIFICATE----- 53 -----BEGIN CERTIFICATE----- 70 -----END CERTIFICATE----- 71 -----BEGIN CERTIFICATE----- 87 -----END CERTIFICATE---- [all...] |
/external/curl/docs/cmdline-opts/ |
ftp-alternative-to-user.d | 9 client certificate, using "SITE AUTH" will tell the server to retrieve the 10 username from the certificate.
|
cert.d | 3 Arg: <certificate[:password]> 4 Help: Client certificate file and password 8 Tells curl to use the specified client certificate file when getting a file 9 with HTTPS, FTPS or another SSL-based protocol. The certificate must be in 12 the terminal. Note that this option assumes a \&"certificate" file that is the 13 private key and the client certificate concatenated! See --cert and --key to 17 curl the nickname of the certificate to use within the NSS database defined 27 certificate string can either be the name of a certificate/private key in the 28 system or user keychain, or the path to a PKCS#12-encoded certificate an [all...] |
/external/curl/tests/certs/ |
EdelCurlRoot-ca.csr | 1 -----BEGIN CERTIFICATE REQUEST----- 17 -----END CERTIFICATE REQUEST-----
|
/external/libmicrohttpd/src/testcurl/https/ |
cert.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE-----
|
/external/vboot_reference/tests/testkeys/ |
key_rsa2048.crt | 1 -----BEGIN CERTIFICATE----- 22 -----END CERTIFICATE-----
|
/tools/apksig/src/test/resources/com/android/apksig/ |
dsa-1024.x509.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE-----
|
rsa-2048.x509.pem | 1 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE-----
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PairingContext.java | 24 import java.security.cert.Certificate; 34 * The {@link Certificate} of the local endpoint of the protocol. 36 private Certificate mLocalCertificate; 39 * The {@link Certificate} of the remote endpoint of the protocol. 41 private Certificate mPeerCertificate; 61 * @param localCertificate the local endpoint's {@link Certificate} 62 * @param peerCertificate the remote endpoint's {@link Certificate} 67 public PairingContext(Certificate localCertificate, 68 Certificate peerCertificate, InputStream peerInputStream, 88 Certificate localCert = PoloUtil.getLocalCert(socket.getSession()) [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 26 import java.security.cert.Certificate; 36 * self-signed certificate for a single hostname such as "localhost". 57 .addTrustedCertificate(heldCertificate.certificate) 72 * Configure the certificate chain to use when serving HTTPS responses. The first certificate 73 * in this chain is the server's certificate, further certificates are included in the handshake 74 * so the client can build a trusted path to a CA certificate. 82 * Add a certificate authority that this client trusts. Servers that provide certificate chains 85 public SslContextBuilder addTrustedCertificate(X509Certificate certificate) { [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Handshake.java | 21 import java.security.cert.Certificate; 37 private final List<Certificate> peerCertificates; 38 private final List<Certificate> localCertificates; 41 String cipherSuite, List<Certificate> peerCertificates, List<Certificate> localCertificates) { 51 Certificate[] peerCertificates; 57 List<Certificate> peerCertificatesList = peerCertificates != null 59 : Collections.<Certificate>emptyList(); 61 Certificate[] localCertificates = session.getLocalCertificates(); 62 List<Certificate> localCertificatesList = localCertificates != nul [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
Certificate.java | 41 * An identity certificate is a binding of a principal to a public key which 47 * certificates, such as X.509 and PGP, share general certificate 52 * subclassing the Certificate class, even though they contain different 62 public abstract class Certificate implements java.io.Serializable { 66 // the certificate type 73 * Creates a certificate of the specified type. 75 * @param type the standard name of the certificate type. 79 * for information about standard certificate types. 81 protected Certificate(String type) { 86 * Returns the type of this certificate [all...] |
/cts/tests/tests/security/res/raw/ |
blacklist_test_valid_chain.pem | 1 -----BEGIN CERTIFICATE----- 17 -----END CERTIFICATE----- 18 -----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 36 -----BEGIN CERTIFICATE----- 52 -----END CERTIFICATE----- 53 -----BEGIN CERTIFICATE----- 70 -----END CERTIFICATE----- 71 -----BEGIN CERTIFICATE----- 87 -----END CERTIFICATE---- [all...] |
/external/apache-http/android/src/android/net/http/ |
DelegatingSSLSession.java | 20 import java.security.cert.Certificate; 30 * This is only used when a {@code certificate} is available but usage 38 private final Certificate mCertificate; 40 public CertificateWrap(Certificate certificate) { 41 mCertificate = certificate; 45 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { 46 return new Certificate[] { mCertificate }; 77 public Certificate[] getLocalCertificates() { 98 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509AttributeCertificate.java | 17 * Interface for an X.509 Attribute Certificate. 24 * Return the version number for the certificate. 31 * Return the serial number for the certificate. 38 * Return the date before which the certificate is not valid. 45 * Return the date after which the certificate is not valid. 52 * Return the holder of the certificate. 59 * Return the issuer details for the certificate. 66 * Return the attributes contained in the attribute block in the certificate. 95 * Return an ASN.1 encoded byte array representing the attribute certificate. 98 * @throws IOException if the certificate cannot be encoded [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
CertificateStub.java | 28 import java.security.Certificate; 34 * Stub for interface Certificate, necessary for testing 37 public class CertificateStub implements Certificate { 53 * @see java.security.Certificate#decode(java.io.InputStream) 63 * @see java.security.Certificate#encode(java.io.OutputStream) 72 * @see java.security.Certificate#getFormat() 80 * @see java.security.Certificate#getGuarantor() 88 * @see java.security.Certificate#getPrincipal() 95 * @see java.security.Certificate#getPublicKey() 103 * @see java.security.Certificate#toString(boolean [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 21 // NotAuthorizedToSign results when a certificate is signed by another 22 // which isn't marked as a CA certificate. 24 // Expired results when a certificate has expired, based on the time 28 // certificate has a name constraint which doesn't include the name 34 // IncompatibleUsage results when the certificate's key usage indicates 37 // NameMismatch results when the subject name of a parent certificate 45 Cert *Certificate 52 return "x509: certificate is not authorized to sign other certificates" 54 return "x509: certificate has expired or is not yet valid" 56 return "x509: a root or intermediate certificate is not authorized to sign in this domain [all...] |