HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 276 - 300 of 2776) sorted by null

<<11121314151617181920>>

  /prebuilts/gdb/linux-x86/lib/python2.7/test/
sha256.pem 0 # Certificate chain for https://sha256.tbs-internet.com
4 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
42 -----BEGIN CERTIFICATE-----
72 -----END CERTIFICATE-----
75 -----BEGIN CERTIFICATE-----
100 -----END CERTIFICATE-----
103 -----BEGIN CERTIFICATE-----
128 -----END CERTIFICATE-----
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
sha256.pem 0 # Certificate chain for https://sha256.tbs-internet.com
4 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
42 -----BEGIN CERTIFICATE-----
72 -----END CERTIFICATE-----
75 -----BEGIN CERTIFICATE-----
100 -----END CERTIFICATE-----
103 -----BEGIN CERTIFICATE-----
128 -----END CERTIFICATE-----
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
sha256.pem 0 # Certificate chain for https://sha256.tbs-internet.com
4 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
42 -----BEGIN CERTIFICATE-----
72 -----END CERTIFICATE-----
75 -----BEGIN CERTIFICATE-----
100 -----END CERTIFICATE-----
103 -----BEGIN CERTIFICATE-----
128 -----END CERTIFICATE-----
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
CaCertManagementTest.java 24 import java.security.cert.Certificate;
69 * Test: removing one certificate must not remove any others.
85 * supplementary installed certificate.
99 Certificate caCert = readCertificate(caBytes);
105 Certificate caCert = readCertificate(caBytes);
122 * <p>A CA certificate is "installed" if it matches all of the following conditions:
125 * <li>{@link DevicePolicyManager#getInstalledCaCerts} lists a matching certificate (not
127 * <li>Any new instances of {@link TrustManager} should report the certificate among their
134 private boolean isCaCertInstalledAndTrusted(Certificate caCert)
155 // All three responses should match - if an installed certificate isn't trusted or (worse
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathBuilderSpi.java 103 "Error finding target certificate.", e);
110 "No certificate found matching targetContraints.");
130 "Possible certificate chain could not be validated.",
137 "Unable to find certificate chain.");
155 // step out, the certificate is not allowed to appear in a certification
161 // test if certificate path exceeds maximum length
204 "Certification path could not be constructed from certificate list.",
231 // add additional X.509 stores from locations in certificate
240 "No additional X.509 stores can be added from certificate locations.",
244 // try to get the issuer certificate from on
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestKeyStoreSpi.java 17 import java.security.cert.Certificate;
31 public static final Certificate CERT = new MyCertificate("certtype",
33 public static final Certificate[] CERTCHAIN = new Certificate[] {
78 public Certificate engineGetCertificate(String alias) {
79 return (Certificate) aliases.get(alias);
83 public String engineGetCertificateAlias(Certificate cert) {
98 public Certificate[] engineGetCertificateChain(String alias) {
99 return (Certificate[]) aliases.get(alias);
128 Certificate c = (Certificate) aliases.get(alias)
    [all...]
  /system/update_engine/
certificate_checker.cc 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); local
43 TEST_AND_RETURN_FALSE(certificate);
50 bool success = X509_digest(certificate, digest_function, out_digest, &len);
87 // which will be called after each server certificate is validated. However,
89 // callback, the certificate check will have to be done statically. Since we
91 // certificate, we hardcode Chrome OS's two known update servers here, and
140 // certificate. We store a report to UMA and just propagate the fail result.
154 LOG(WARNING) << "Failed to generate digest of X509 certificate "
168 // If there's no stored certificate, we just store the current one and return.
171 LOG(WARNING) << "Failed to store server certificate on storage key
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
user-cert-chain.crt 1 -----BEGIN CERTIFICATE-----
30 -----END CERTIFICATE-----
31 -----BEGIN CERTIFICATE-----
63 -----END CERTIFICATE-----
64 -----BEGIN CERTIFICATE-----
96 -----END CERTIFICATE-----
ca.conf 17 # The root key and root certificate.
19 certificate = $dir/certs/ca.cert.pem
21 # For certificate revocation lists.
46 # The root key and root certificate.
48 certificate = $dir/certs/intermediate.cert.pem
50 # For certificate revocation lists.
130 nsComment = "OpenSSL Generated Client Certificate"
140 nsComment = "OpenSSL Generated Server Certificate"
  /cts/tests/tests/security/tools/
format_cert.sh 3 # Outputs the provided certificate (PEM or DER) in a format used by CTS tests.
5 # certificate, followed by the SHA-1 fingerprint.
24 # Input file containing the certificate in PEM or DER format
28 # is the certificate's subject hash produced by:
42 echo "Certificate file format is neither PEM nor DER"
53 # Output the certificate in the target format
  /external/autotest/client/cros/
certificate_util.py 10 """Object enclosing a PEM certificate.
12 Uses the "openssl" utility to report various properties of a certificate.
27 """Returns the named attribute of the certificate.
45 """Returns the SHA-1 fingerprint of a certificate."""
53 """Returns the subject DN of the certificate as a list of name=value"""
66 """Returns the subject DN of the certificate as a dict of name:value"""
  /external/curl/docs/libcurl/opts/
CURLOPT_ISSUERCERT.3 25 CURLOPT_ISSUERCERT \- issuer SSL certificate filename
32 certificate in PEM format. If the option is set, an additional check against
33 the peer certificate is performed to verify the issuer is indeed the one
34 associated with the certificate provided by the option. This additional check
36 certificate is from a specific branch of the tree.
44 mismatch with the issuer of peer certificate (\fICURLOPT_SSL_VERIFYPEER(3)\fP
  /libcore/ojluni/src/main/java/java/security/cert/
CRL.java 29 * This class is an abstraction of certificate revocation lists (CRLs) that
32 * on whether or not they list a given certificate.
81 * Checks whether the given certificate is on this CRL.
83 * @param cert the certificate to check for.
84 * @return true if the given certificate is on this CRL,
87 public abstract boolean isRevoked(Certificate cert);
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
OCSP.java 57 * This is a class that checks the revocation status of a certificate(s) using
60 * just check the revocation status of a certificate, and you don't want to
62 * associated certificate chain.
101 * Obtains the revocation status of a certificate using OCSP using the most
103 * certificate's AIA extension. The OCSP responder certificate is assumed
104 * to be the issuer's certificate (or issued by the issuer CA).
106 * @param cert the certificate to be checked
107 * @param issuerCert the issuer certificate
124 ("No OCSP Responder URI in certificate");
    [all...]
ConstraintsChecker.java 29 import java.security.cert.Certificate;
47 * constraints information on a PKIX certificate, namely basic constraints
105 * checks on the certificate using its internal state.
107 * @param cert the <code>Certificate</code> to be checked
110 * @throws CertPathValidatorException if the specified certificate
114 public void check(Certificate cert, Collection<String> unresCritExts)
202 // be sharing it with a Certificate object!
234 // RFC5280: If certificate i is a version 3 certificate, verify
236 // set to TRUE. (If certificate i is a version 1 or version
    [all...]
  /external/libmicrohttpd/doc/chapters/
tlsauthentication.inc 24 In addition to the key, a certificate describing the server in human readable tokens
25 is also needed. This certificate will be attested with our aforementioned key. In this way,
26 we obtain a self-signed certificate, valid for one year.
33 To avoid unnecessary error messages in the browser, the certificate needs to
36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way,
39 Whether the server's certificate is signed by us or a third party, once it has been accepted
62 printf ("The key/certificate files could not be read.\n");
119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (or configured)
167 You can then extract the client certificate
    [all...]
  /libcore/ojluni/src/main/java/java/security/
Identity.java 99 Vector<Certificate> certificates;
189 certificates = new Vector<Certificate>();
225 * Adds a certificate for this identity. If the identity has a public
226 * key, the public key in the certificate must be the same, and if
228 * public key is set to be that specified in the certificate.
232 * as its argument to see if it's ok to add a certificate.
234 * @param certificate the certificate to be added.
236 * @exception KeyManagementException if the certificate is not valid,
237 * if the public key in the certificate being added conflicts wit
    [all...]
  /libcore/ojluni/src/main/java/sun/security/x509/
PKIXExtensions.java 36 * v3 certificate. For example a "Driving License Certificate" could have
81 * Identifies the particular public key used to sign the certificate.
91 * Defines the purpose of the key contained in the certificate.
96 * Allows the certificate issuer to specify a different validity period
97 * for the private key than the certificate.
113 * Allows additional identities to be bound to the subject of the certificate.
118 * Allows additional identities to be associated with the certificate issuer.
129 * Identifies whether the subject of the certificate is a CA and how deep
136 * on names that may be included within a certificate issued by a given CA
    [all...]
X509CertInfo.java 39 * The X509CertInfo class represents X.509 certificate information.
44 * the entity (subject) for which the certificate was issued.
47 * This is one of the most important parts of the certificate.
50 * within which the certificate is valid (unless revoked).
53 * Certificate Authority (CA) which issued the certificate.
56 * certificate revocation and other applications.
66 * get, set, delete methods of Certificate, x509 type.
69 // Certificate attribute names
114 // The certificate attribute name to integer mapping stored her
    [all...]
  /cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/
CertInstallDelegateTest.java 37 import java.security.cert.Certificate;
54 "-----BEGIN CERTIFICATE-----\n" +
74 "-----END CERTIFICATE-----";
143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert));
146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert));
149 assertTrue("Certificate is not among installed certs",
154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert));
164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local
168 mDpm.installKeyPair(null, privatekey, certificate, alias))
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
CollectionCertStoreParametersTest.java 28 import java.security.cert.Certificate;
76 Vector<Certificate> certificates = new Vector<Certificate>();
88 // a Certificate or CRL
90 certificates.add(new String("Not a Certificate"));
99 Vector<Certificate> certificates = new Vector<Certificate>();
130 Vector<Certificate> certificates = new Vector<Certificate>();
144 Vector<Certificate> certificates = new Vector<Certificate>()
    [all...]
  /libcore/ojluni/src/main/java/javax/net/ssl/
HttpsURLConnection.java 79 * Returns the certificate(s) that were sent to the server during
82 * Note: This method is useful only when using certificate-based
87 * "best" certificate chain available, and transmits that to
89 * which certificate chain was actually sent.
92 * with the client's own certificate first followed by any
93 * certificate authorities. If no certificates were sent,
99 public abstract java.security.cert.Certificate [] getLocalCertificates();
102 * Returns the server's certificate chain which was established
105 * Note: This method can be used only when using certificate-based
106 * cipher suites; using it with non-certificate-based cipher suites
    [all...]
  /cts/hostsidetests/appsecurity/certs/pkgsigverify/
dsa-3072.x509.pem 1 -----BEGIN CERTIFICATE-----
34 -----END CERTIFICATE-----
rsa-4096.x509.pem 1 -----BEGIN CERTIFICATE-----
29 -----END CERTIFICATE-----
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
https_svn_python_org_root.pem 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----

Completed in 729 milliseconds

<<11121314151617181920>>