/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
keycert.pem | 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
|
wrongcert.pem | 16 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
|
/device/linaro/bootloader/edk2/NetworkPkg/ |
NetworkPkg.uni | 27 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCaFile_HELP #language en-US "CA certificate used by IPsec."
31 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCaFileSize_HELP #language en-US "CA certificate file's size."
35 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCertificate_HELP #language en-US "X509 certificate as Public Key which is used by IPsec (DER format)"
39 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecUefiCertificateSize_HELP #language en-US "X509 certificate as Public Key's size."
49 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecCertificateEnabled_PROMPT #language en-US "Enable IPsec IKEv2 Certificate Authentication."
51 #string STR_gEfiNetworkPkgTokenSpaceGuid_PcdIpsecCertificateEnabled_HELP #language en-US "Indicates if the IPsec IKEv2 Certificate Authentication feature is enabled or not.<BR><BR>\n"
52 "TRUE - Certificate Authentication feature is enabled.<BR>\n"
53 "FALSE - Does not support Certificate Authentication.<BR>"
|
/external/autotest/client/cros/ |
tpm_store.py | 89 def install_certificate(self, certificate, identifier): 90 """Install a certificate into the TPM, returning the certificate ID. 92 @param certificate string PEM x509 contents of the certificate. 93 @param identifier string associated with this certificate in the TPM. 96 return self._install_object(certificate, 103 """Install a private key into the TPM, returning the certificate ID.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
ExtendedPKIXParameters.java | 155 * This model uses the following validity model. Each certificate must have 157 * certificate must have been valid at the time the signature was done. The 158 * CA certificate which signed the end certificate must have been valid, 159 * when the end certificate was signed. The CA (or Root CA) certificate must 160 * have been valid, when the CA certificate was signed and so on. So the 162 * the <em>end certificate</em> must have been valid. 386 * Returns the required constraints on the target certificate or attribute 387 * certificate. The constraints are returned as an instance o [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */ 58 private final byte[] certificate; field in class:CertificateEntry 60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { 73 this.certificate = certificate; 87 throw new CertificateException("Certificate does not contain embedded signed timestamps"); 118 return certificate; 132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
|
/external/libmicrohttpd/src/datadir/ |
cert-and-key.pem | 16 -----BEGIN CERTIFICATE----- 34 -----END CERTIFICATE-----
|
/external/python/cpython2/Lib/test/ |
allsans.pem | 17 -----BEGIN CERTIFICATE----- 37 -----END CERTIFICATE-----
|
keycert.passwd.pem | 19 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE-----
|
keycert.pem | 17 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE-----
|
keycert2.pem | 17 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE-----
|
wrongcert.pem | 16 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE-----
|
/external/python/cpython2/Lib/test/capath/ |
5ed36f99.0 | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE-----
|
99d0fa06.0 | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE-----
|
/external/vboot_reference/tests/testkeys/ |
key_rsa4096.crt | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE-----
|
/frameworks/base/media/java/android/media/ |
NotProvisionedException.java | 21 * and the device does not have a certificate. The app should obtain and 22 * install a certificate using the MediaDrm provisioning methods then retry
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStoreSpi.java | 35 import java.security.cert.Certificate; 53 public Certificate[] engineGetCertificateChain(String alias) { 57 public Certificate engineGetCertificate(String alias) { 69 Certificate[] chain) throws KeyStoreException { 74 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) 80 public void engineSetCertificateEntry(String alias, Certificate cert) 124 public String engineGetCertificateAlias(Certificate cert) { 146 class MyCertificate extends Certificate {
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
https_svn_python_org_root.pem | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE-----
|
keycert.pem | 17 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE-----
|
wrongcert.pem | 16 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE-----
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
https_svn_python_org_root.pem | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE-----
|
keycert.pem | 17 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE-----
|
wrongcert.pem | 16 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE-----
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
example_test.go | 20 -----BEGIN CERTIFICATE----- 43 -----END CERTIFICATE-----` 46 -----BEGIN CERTIFICATE----- 67 -----END CERTIFICATE-----` 75 panic("failed to parse root certificate") 80 panic("failed to parse certificate PEM") 84 panic("failed to parse certificate: " + err.Error()) 93 panic("failed to verify certificate: " + err.Error())
|