HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 301 - 325 of 2776) sorted by null

<<11121314151617181920>>

  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
keycert.pem 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
wrongcert.pem 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
  /device/linaro/bootloader/edk2/NetworkPkg/
NetworkPkg.uni 27 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCaFile_HELP #language en-US "CA certificate used by IPsec."
31 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCaFileSize_HELP #language en-US "CA certificate file's size."
35 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCertificate_HELP #language en-US "X509 certificate as Public Key which is used by IPsec (DER format)"
39 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCertificateSize_HELP #language en-US "X509 certificate as Public Key's size."
49 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecCertificateEnabled_PROMPT #language en-US "Enable IPsec IKEv2 Certificate Authentication."
51 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecCertificateEnabled_HELP #language en-US "Indicates if the IPsec IKEv2 Certificate Authentication feature is enabled or not.<BR><BR>\n"
52 "TRUE - Certificate Authentication feature is enabled.<BR>\n"
53 "FALSE - Does not support Certificate Authentication.<BR>"
  /external/autotest/client/cros/
tpm_store.py 89 def install_certificate(self, certificate, identifier):
90 """Install a certificate into the TPM, returning the certificate ID.
92 @param certificate string PEM x509 contents of the certificate.
93 @param identifier string associated with this certificate in the TPM.
96 return self._install_object(certificate,
103 """Install a private key into the TPM, returning the certificate ID.
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
JcaSignerInfoVerifierBuilder.java 72 public SignerInformationVerifier build(X509Certificate certificate)
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate)
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
ExtendedPKIXParameters.java 155 * This model uses the following validity model. Each certificate must have
157 * certificate must have been valid at the time the signature was done. The
158 * CA certificate which signed the end certificate must have been valid,
159 * when the end certificate was signed. The CA (or Root CA) certificate must
160 * have been valid, when the CA certificate was signed and so on. So the
162 * the <em>end certificate</em> must have been valid.
386 * Returns the required constraints on the target certificate or attribute
387 * certificate. The constraints are returned as an instance o
    [all...]
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
CertificateEntry.java 57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */
58 private final byte[] certificate; field in class:CertificateEntry
60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) {
73 this.certificate = certificate;
87 throw new CertificateException("Certificate does not contain embedded signed timestamps");
118 return certificate;
132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
  /external/libmicrohttpd/src/datadir/
cert-and-key.pem 16 -----BEGIN CERTIFICATE-----
34 -----END CERTIFICATE-----
  /external/python/cpython2/Lib/test/
allsans.pem 17 -----BEGIN CERTIFICATE-----
37 -----END CERTIFICATE-----
keycert.passwd.pem 19 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
keycert.pem 17 -----BEGIN CERTIFICATE-----
31 -----END CERTIFICATE-----
keycert2.pem 17 -----BEGIN CERTIFICATE-----
31 -----END CERTIFICATE-----
wrongcert.pem 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
  /external/python/cpython2/Lib/test/capath/
5ed36f99.0 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----
99d0fa06.0 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----
  /external/vboot_reference/tests/testkeys/
key_rsa4096.crt 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
  /frameworks/base/media/java/android/media/
NotProvisionedException.java 21 * and the device does not have a certificate. The app should obtain and
22 * install a certificate using the MediaDrm provisioning methods then retry
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStoreSpi.java 35 import java.security.cert.Certificate;
53 public Certificate[] engineGetCertificateChain(String alias) {
57 public Certificate engineGetCertificate(String alias) {
69 Certificate[] chain) throws KeyStoreException {
74 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain)
80 public void engineSetCertificateEntry(String alias, Certificate cert)
124 public String engineGetCertificateAlias(Certificate cert) {
146 class MyCertificate extends Certificate {
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
https_svn_python_org_root.pem 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----
keycert.pem 17 -----BEGIN CERTIFICATE-----
31 -----END CERTIFICATE-----
wrongcert.pem 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
https_svn_python_org_root.pem 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----
keycert.pem 17 -----BEGIN CERTIFICATE-----
31 -----END CERTIFICATE-----
wrongcert.pem 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
  /prebuilts/go/darwin-x86/src/crypto/x509/
example_test.go 20 -----BEGIN CERTIFICATE-----
43 -----END CERTIFICATE-----`
46 -----BEGIN CERTIFICATE-----
67 -----END CERTIFICATE-----`
75 panic("failed to parse root certificate")
80 panic("failed to parse certificate PEM")
84 panic("failed to parse certificate: " + err.Error())
93 panic("failed to verify certificate: " + err.Error())

Completed in 422 milliseconds

<<11121314151617181920>>