/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
sha256.pem | 0 # Certificate chain for https://sha256.tbs-internet.com 4 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 42 -----BEGIN CERTIFICATE----- 72 -----END CERTIFICATE----- 75 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 103 -----BEGIN CERTIFICATE----- 128 -----END CERTIFICATE-----
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
sha256.pem | 0 # Certificate chain for https://sha256.tbs-internet.com 4 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 42 -----BEGIN CERTIFICATE----- 72 -----END CERTIFICATE----- 75 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 103 -----BEGIN CERTIFICATE----- 128 -----END CERTIFICATE-----
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
sha256.pem | 0 # Certificate chain for https://sha256.tbs-internet.com 4 -----BEGIN CERTIFICATE----- 39 -----END CERTIFICATE----- 42 -----BEGIN CERTIFICATE----- 72 -----END CERTIFICATE----- 75 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 103 -----BEGIN CERTIFICATE----- 128 -----END CERTIFICATE-----
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
CaCertManagementTest.java | 24 import java.security.cert.Certificate; 69 * Test: removing one certificate must not remove any others. 85 * supplementary installed certificate. 99 Certificate caCert = readCertificate(caBytes); 105 Certificate caCert = readCertificate(caBytes); 122 * <p>A CA certificate is "installed" if it matches all of the following conditions: 125 * <li>{@link DevicePolicyManager#getInstalledCaCerts} lists a matching certificate (not 127 * <li>Any new instances of {@link TrustManager} should report the certificate among their 134 private boolean isCaCertInstalledAndTrusted(Certificate caCert) 155 // All three responses should match - if an installed certificate isn't trusted or (worse [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathBuilderSpi.java | 103 "Error finding target certificate.", e); 110 "No certificate found matching targetContraints."); 130 "Possible certificate chain could not be validated.", 137 "Unable to find certificate chain."); 155 // step out, the certificate is not allowed to appear in a certification 161 // test if certificate path exceeds maximum length 204 "Certification path could not be constructed from certificate list.", 231 // add additional X.509 stores from locations in certificate 240 "No additional X.509 stores can be added from certificate locations.", 244 // try to get the issuer certificate from on [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 17 import java.security.cert.Certificate; 31 public static final Certificate CERT = new MyCertificate("certtype", 33 public static final Certificate[] CERTCHAIN = new Certificate[] { 78 public Certificate engineGetCertificate(String alias) { 79 return (Certificate) aliases.get(alias); 83 public String engineGetCertificateAlias(Certificate cert) { 98 public Certificate[] engineGetCertificateChain(String alias) { 99 return (Certificate[]) aliases.get(alias); 128 Certificate c = (Certificate) aliases.get(alias) [all...] |
/system/update_engine/ |
certificate_checker.cc | 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); local 43 TEST_AND_RETURN_FALSE(certificate); 50 bool success = X509_digest(certificate, digest_function, out_digest, &len); 87 // which will be called after each server certificate is validated. However, 89 // callback, the certificate check will have to be done statically. Since we 91 // certificate, we hardcode Chrome OS's two known update servers here, and 140 // certificate. We store a report to UMA and just propagate the fail result. 154 LOG(WARNING) << "Failed to generate digest of X509 certificate " 168 // If there's no stored certificate, we just store the current one and return. 171 LOG(WARNING) << "Failed to store server certificate on storage key [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
user-cert-chain.crt | 1 -----BEGIN CERTIFICATE----- 30 -----END CERTIFICATE----- 31 -----BEGIN CERTIFICATE----- 63 -----END CERTIFICATE----- 64 -----BEGIN CERTIFICATE----- 96 -----END CERTIFICATE-----
|
ca.conf | 17 # The root key and root certificate. 19 certificate = $dir/certs/ca.cert.pem 21 # For certificate revocation lists. 46 # The root key and root certificate. 48 certificate = $dir/certs/intermediate.cert.pem 50 # For certificate revocation lists. 130 nsComment = "OpenSSL Generated Client Certificate" 140 nsComment = "OpenSSL Generated Server Certificate"
|
/cts/tests/tests/security/tools/ |
format_cert.sh | 3 # Outputs the provided certificate (PEM or DER) in a format used by CTS tests. 5 # certificate, followed by the SHA-1 fingerprint. 24 # Input file containing the certificate in PEM or DER format 28 # is the certificate's subject hash produced by: 42 echo "Certificate file format is neither PEM nor DER" 53 # Output the certificate in the target format
|
/external/autotest/client/cros/ |
certificate_util.py | 10 """Object enclosing a PEM certificate. 12 Uses the "openssl" utility to report various properties of a certificate. 27 """Returns the named attribute of the certificate. 45 """Returns the SHA-1 fingerprint of a certificate.""" 53 """Returns the subject DN of the certificate as a list of name=value""" 66 """Returns the subject DN of the certificate as a dict of name:value"""
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_ISSUERCERT.3 | 25 CURLOPT_ISSUERCERT \- issuer SSL certificate filename 32 certificate in PEM format. If the option is set, an additional check against 33 the peer certificate is performed to verify the issuer is indeed the one 34 associated with the certificate provided by the option. This additional check 36 certificate is from a specific branch of the tree. 44 mismatch with the issuer of peer certificate (\fICURLOPT_SSL_VERIFYPEER(3)\fP
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CRL.java | 29 * This class is an abstraction of certificate revocation lists (CRLs) that 32 * on whether or not they list a given certificate. 81 * Checks whether the given certificate is on this CRL. 83 * @param cert the certificate to check for. 84 * @return true if the given certificate is on this CRL, 87 public abstract boolean isRevoked(Certificate cert);
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
OCSP.java | 57 * This is a class that checks the revocation status of a certificate(s) using 60 * just check the revocation status of a certificate, and you don't want to 62 * associated certificate chain. 101 * Obtains the revocation status of a certificate using OCSP using the most 103 * certificate's AIA extension. The OCSP responder certificate is assumed 104 * to be the issuer's certificate (or issued by the issuer CA). 106 * @param cert the certificate to be checked 107 * @param issuerCert the issuer certificate 124 ("No OCSP Responder URI in certificate"); [all...] |
ConstraintsChecker.java | 29 import java.security.cert.Certificate; 47 * constraints information on a PKIX certificate, namely basic constraints 105 * checks on the certificate using its internal state. 107 * @param cert the <code>Certificate</code> to be checked 110 * @throws CertPathValidatorException if the specified certificate 114 public void check(Certificate cert, Collection<String> unresCritExts) 202 // be sharing it with a Certificate object! 234 // RFC5280: If certificate i is a version 3 certificate, verify 236 // set to TRUE. (If certificate i is a version 1 or version [all...] |
/external/libmicrohttpd/doc/chapters/ |
tlsauthentication.inc | 24 In addition to the key, a certificate describing the server in human readable tokens 25 is also needed. This certificate will be attested with our aforementioned key. In this way, 26 we obtain a self-signed certificate, valid for one year. 33 To avoid unnecessary error messages in the browser, the certificate needs to 36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way, 39 Whether the server's certificate is signed by us or a third party, once it has been accepted 62 printf ("The key/certificate files could not be read.\n"); 119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (or configured) 167 You can then extract the client certificate [all...] |
/libcore/ojluni/src/main/java/java/security/ |
Identity.java | 99 Vector<Certificate> certificates; 189 certificates = new Vector<Certificate>(); 225 * Adds a certificate for this identity. If the identity has a public 226 * key, the public key in the certificate must be the same, and if 228 * public key is set to be that specified in the certificate. 232 * as its argument to see if it's ok to add a certificate. 234 * @param certificate the certificate to be added. 236 * @exception KeyManagementException if the certificate is not valid, 237 * if the public key in the certificate being added conflicts wit [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
PKIXExtensions.java | 36 * v3 certificate. For example a "Driving License Certificate" could have 81 * Identifies the particular public key used to sign the certificate. 91 * Defines the purpose of the key contained in the certificate. 96 * Allows the certificate issuer to specify a different validity period 97 * for the private key than the certificate. 113 * Allows additional identities to be bound to the subject of the certificate. 118 * Allows additional identities to be associated with the certificate issuer. 129 * Identifies whether the subject of the certificate is a CA and how deep 136 * on names that may be included within a certificate issued by a given CA [all...] |
X509CertInfo.java | 39 * The X509CertInfo class represents X.509 certificate information. 44 * the entity (subject) for which the certificate was issued. 47 * This is one of the most important parts of the certificate. 50 * within which the certificate is valid (unless revoked). 53 * Certificate Authority (CA) which issued the certificate. 56 * certificate revocation and other applications. 66 * get, set, delete methods of Certificate, x509 type. 69 // Certificate attribute names 114 // The certificate attribute name to integer mapping stored her [all...] |
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
CertInstallDelegateTest.java | 37 import java.security.cert.Certificate; 54 "-----BEGIN CERTIFICATE-----\n" + 74 "-----END CERTIFICATE-----"; 143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert)); 146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert)); 149 assertTrue("Certificate is not among installed certs", 154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert)); 164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local 168 mDpm.installKeyPair(null, privatekey, certificate, alias)) [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CollectionCertStoreParametersTest.java | 28 import java.security.cert.Certificate; 76 Vector<Certificate> certificates = new Vector<Certificate>(); 88 // a Certificate or CRL 90 certificates.add(new String("Not a Certificate")); 99 Vector<Certificate> certificates = new Vector<Certificate>(); 130 Vector<Certificate> certificates = new Vector<Certificate>(); 144 Vector<Certificate> certificates = new Vector<Certificate>() [all...] |
/libcore/ojluni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 79 * Returns the certificate(s) that were sent to the server during 82 * Note: This method is useful only when using certificate-based 87 * "best" certificate chain available, and transmits that to 89 * which certificate chain was actually sent. 92 * with the client's own certificate first followed by any 93 * certificate authorities. If no certificates were sent, 99 public abstract java.security.cert.Certificate [] getLocalCertificates(); 102 * Returns the server's certificate chain which was established 105 * Note: This method can be used only when using certificate-based 106 * cipher suites; using it with non-certificate-based cipher suites [all...] |
/cts/hostsidetests/appsecurity/certs/pkgsigverify/ |
dsa-3072.x509.pem | 1 -----BEGIN CERTIFICATE----- 34 -----END CERTIFICATE-----
|
rsa-4096.x509.pem | 1 -----BEGIN CERTIFICATE----- 29 -----END CERTIFICATE-----
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
https_svn_python_org_root.pem | 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----
|